首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
The battle between Apple and law enforcement officials over unlocking a terrorist’s smart-phone is the climax of a slow turning
The battle between Apple and law enforcement officials over unlocking a terrorist’s smart-phone is the climax of a slow turning
admin
2017-11-19
72
问题
The battle between Apple and law enforcement officials over unlocking a terrorist’s smart-phone is the climax of
a slow turning of the tables
between the technology industry and the United States government.
On the one side, you have the United States government’ s mighty legal and security apparatus fighting for data of the most sympathetic sort: the secrets buried in a dead mass murderer’s phone. The action stems from a federal court order issued on Tuesday requiring Apple to help the F.B.I. unlock an iPhone used by one of the two attackers who killed 14 people in San Bernardino, Calif, in December.
In the other corner is the world’ s most valuable company, whose chief executive, Timothy D. Cook, has said he will appeal the court’ s order. Apple argues that it is fighting to preserve a principle that most of us who are addicted to our smartphones can defend: Weaken a single iPhone so that its contents can be viewed by the American government and you risk weakening all iPhones for any government intruder, anywhere.
There will probably be months of legal tussling, and it is not at all clear which side will prevail in court, nor in the battle for public opinion and legislative favor.
Yet underlying all of this is a simple dynamic: Apple, Google, Facebook and other companies hold most of the cards in this confrontation. They have our data, and their businesses depend on the global public’ s collective belief that they will do everything they can to protect that data.
Any crack in that front could be fatal for tech companies that must operate worldwide. If Apple is forced to open up an iPhone for an American law enforcement investigation, what’ s to prevent it from doing so for a request from the Chinese or the Iranians? Once armed with a method for gaining access to iPhones, the government could ask to use it proactively, before a suspected terrorist at tack—leaving Apple in a bind as to whether to comply or risk an attack and suffer a public-relations nightmare.
Yet it’ s worth noting that even if Apple ultimately loses this case, it has plenty of technical means to close a backdoor over time. "If they’re anywhere near worth their salt as engineers, I bet they’re rethinking their threat model as we speak," said Jonathan Zdziarski, who studies the iPhone and its vulnerabilities.
What is the United States government fighting for?
选项
A、The strong legal and security power.
B、The basic rights of the poor.
C、The data in a bad guy’ s phone.
D、The authority of the federal court.
答案
C
解析
根据题干关键词定位到第二段。根据On the one side,you have the United States government’s mighty legal and security apparatus fighting for data of the most sympathetic sort:the secrets buried in a dead mass murderer’s phone.可知政府争夺的是那种最能赢得同情的数据:藏在死了的制造群体谋杀的人手机里的秘密。故C项为正确答案。A项“强大的法律和安全力量”是对本段第一句的错误理解,原文是说“拥有强大的法律和安全机器的美国政府”、B项“穷人的基本权利”和D项“联邦法院的权威”均不符合题意,故排除。
转载请注明原文地址:https://kaotiyun.com/show/qdIZ777K
0
考研英语一
相关试题推荐
Rememberbooks?Theywerethosepiecesofpaperwithwordsprintedonthem【C1】______inbetweentwo,sometimes,【C2】______covers.
Rememberbooks?Theywerethosepiecesofpaperwithwordsprintedonthem【C1】______inbetweentwo,sometimes,【C2】______covers.
Rememberbooks?Theywerethosepiecesofpaperwithwordsprintedonthem【C1】______inbetweentwo,sometimes,【C2】______covers.
Rememberbooks?Theywerethosepiecesofpaperwithwordsprintedonthem【C1】______inbetweentwo,sometimes,【C2】______covers.
Rememberbooks?Theywerethosepiecesofpaperwithwordsprintedonthem【C1】______inbetweentwo,sometimes,【C2】______covers.
Rememberbooks?Theywerethosepiecesofpaperwithwordsprintedonthem【C1】______inbetweentwo,sometimes,【C2】______covers.
Rememberbooks?Theywerethosepiecesofpaperwithwordsprintedonthem【C1】______inbetweentwo,sometimes,【C2】______covers.
Rememberbooks?Theywerethosepiecesofpaperwithwordsprintedonthem【C1】______inbetweentwo,sometimes,【C2】______covers.
Rememberbooks?Theywerethosepiecesofpaperwithwordsprintedonthem【C1】______inbetweentwo,sometimes,【C2】______covers.
随机试题
被王国维评为“最得风人深致”的诗歌是()
患者,男,56岁。头晕2周,加重3天。刻下症见:头晕目眩,泛泛欲吐,神疲乏力,面色㿠白,舌淡,脉细。除主穴外,宜选配
患者男性,34岁,突起发热半天余,恶心、呕吐所进食物及胃液7次,阵发性腹痛,排稀便4次,最后1次便中带脓血,无里急后重感。左下腹有压痛。大便常规:白细胞20~25个/HP,红细胞10~15个/HP,此患者首选哪种抗生素治疗
A.腺癌B.鳞状细胞癌C.印戒细胞癌D.黏液腺癌E.髓样癌女性的肺癌大多是
区域规划按其研究的对象来划分可分为两大类,以下()不符合按建设地区的经济地理特征划分的区域规划。
费德勒在研究不同领导风格不同情境下的效能时指出,当情景维度呈现上下级关系好、工作结构高、职权较小的情况时,其产生的领导效能是()。
PEST分析法主要是用于对外部环境中的()进行分析。
学生报数时,从头到尾各个都要转头报数。()
A、 B、 C、 D、 D前面五个图形都是具有明显意义的事物或动作,且这些图形均表示一种动态或正在运行的状态,如飘动的旗子,向下漏沙的沙漏,点燃的炸弹,书写的手,飞行的飞机,故应选D项——运行的电脑。
下列财产不得用于抵押的是()。
最新回复
(
0
)