首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Data has a habit of spreading. It slips past military security and it can also leak from WikiLeaks. It even slipped past the ban
Data has a habit of spreading. It slips past military security and it can also leak from WikiLeaks. It even slipped past the ban
admin
2016-01-05
84
问题
Data has a habit of spreading. It slips past military security and it can also leak from WikiLeaks. It even slipped past the bans of the Guardian and other media organisations involved in this story when a rogue copy of Der Spiegel accidentally went on sale in Basle, Switzerland. Someone bought it, realised what they had, and began scanning the pages, translating them from German to English and posting up-dates on Twitter. It would seem digital data respects no authority, be it the Pentagon, WikiLeaks or a newspaper editor.
Individually, we have all already experienced the massive changes resulting from digitisation. Events or information that we once considered momentary and private are now accumulated, permanent, public. Governments hold our personal data in huge databases. It used to cost money to disclose and distribute information. In the digital age it costs money not to.
But when data breaches happen to the public, politicians don’t care much. Our privacy is expendable. It is no surprise that the reaction to these leaks is different. What has changed the dynamic of power in a revolutionary way isn’ t just the scale of the databases being kept, but that individuals can upload a copy and present it to the world.
To some this marks a crisis, to others an opportunity. Technology is breaking down traditional social barriers of status, class, power, wealth and geography—replacing them with an ethos of collaboration and transparency.
Leaks are not the problem; they are the symptom. They reveal a disconnect between what people want and need to know and what they actually do know. The greater the secrecy, the more likely a leak. The way to move beyond leaks is to ensure a strong managing system for the public to access important information.
We are at a key moment where the visionaries in the leading position of a global digital age are clashing with those who are desperate to control what we know. WikiLeaks is the guerrilla front in a global movement for greater transparency and participation. It used to be that a leader controlled citizens by controlling information. Now it’ s harder than ever for the powerful to control what people read, see and hear. Technology gives people the ability to band together and challenge authority. The powerful have long spied on citizens as a means of control, now citizens are turning their collected eyes back upon the powerful.
This is a revolution, and all revolutions create fear and uncertainty. Will we move to a New Information Enlightenment or will the strong resistance from those who seek to maintain control no matter the cost lead us to a new totalitarianism ? What happens in the next five years will define the future of democracy for the next century, so it would be well if our leaders responded to the current challenge with an eye on the nature.
According to the last paragraph, "enlightenment" to "totalitarianism" can be described as
选项
A、trusting information to "fearing information".
B、publicizing informationto"centralizing information".
C、embracing the challenge of digitalisationto"being frightened by digitalisation".
D、being cost-oriented during digitalisation to "being result-oriented during digitalisation".
答案
B
解析
细节题。末段第二句提出疑问:我们会进入一次新的信息enlightenment,还是来自那些试图维持控制者们不惜代价的强烈抵制会把我们引领至新的totalitarianism?第四句进一步指出,未来的民主究竟如何将会在未来五年里逐步明朗。由此可推知,totalitarianism指少数人控制信息,enlightenment指信息公开化、民主化,B项符合文意。其他项是利用原文词汇fear,uncertainty,respond to…challenge,no matter the cost捏造的干扰。
转载请注明原文地址:https://kaotiyun.com/show/ttsZ777K
0
考研英语一
相关试题推荐
"AtBoozAllen,we’reshapingthefutureofcyber-security,"trumpetsarecruitingmessageonthewebsiteofBoozAllenHamilton
"AtBoozAllen,we’reshapingthefutureofcyber-security,"trumpetsarecruitingmessageonthewebsiteofBoozAllenHamilton
"AtBoozAllen,we’reshapingthefutureofcyber-security,"trumpetsarecruitingmessageonthewebsiteofBoozAllenHamilton
Afewyearsago,JamesGreenbegantodreadwork.HedraggedhimselfoutofbedeverymorningandploddedthroughNewYork’sPen
Anecosystemisagroupofanimalsandplantslivinginaspecificregionandinteractingwithoneanotherandwiththeirphysic
HalfacenturybeforeCharlesDarwinpublishedOntheOriginofSpecies,theFrenchnaturalistJean-BaptisteLamarckoutlinedhi
"Whyarehumanssosmart?"isaquestionthatfascinatesscientists.TadeuszKawecki,anevolutionarybiologistattheUniversit
Condolence吊唁Writeane-mailofabout100wordsbasedonthefollowingsituation:YourfriendMike’sfatherpassedawayyesterd
Mothersinterferewiththeirchildren’slivesevenmorethanmostoffspringrealize.Thattheynagabouteatinghabitsiswellk
随机试题
多服久服对肝功能有一定损害的药物是
有较强局麻作用的镇咳药是
广播电视建筑应按其()等因素,分为一、二两类建筑物。
无代价抵偿货物办理进出口手续的期限为原进出口合同规定的索赔期内且不超过原货物进出口之日起3年,()
根据以下表格资料,回答问题。哪一年C省房地产开发投资增长额最多?()
①让世代居住在古城的居民全搬到城外,破坏了历史街区的真实与完整,不利于古城文化遗产和原生态文化的保护与传承②人口流动是一个长期自然发展的过程③既要保护古城历史文化遗存、历史街区等物质载体,也要传承风土人情、生活习俗等文化生态,实现传统文化生活和古城文明
最早写入人格尊严内容的我国宪法是()。
[2001年MBA真题]赞扬一个历史学家对于具体历史事件阐述的准确性,就如同是在赞扬一个建筑师在完成一项宏伟建筑物时使用了合格的水泥、钢筋和砖瓦,而不是赞扬一个建筑材料供应商提供了合格的水泥、钢筋和砖瓦。以下哪项最为恰当地概括了题干所要表达的意思?
某项目已进展到第3周,对项目前两周的实施情况总结如下:PV=3200,EV=3000元,AC=3300元。SPI和项目状态为(44)。
(1)在考生文件夹下建立一个文件名和表单名均为oneform的表单,该表单中包括两个标签(Label1和Label2)、一个选项按钮组(OptionGmup1)、一个组合框(Combol)和两个命令按钮(Command1和Command2),Label1和
最新回复
(
0
)