首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
The Internet affords anonymity to us users, a blessing to privacy and freedom of speech. But that very anonymity is also behind
The Internet affords anonymity to us users, a blessing to privacy and freedom of speech. But that very anonymity is also behind
admin
2013-11-29
73
问题
The Internet affords anonymity to us users, a blessing to privacy and freedom of speech. But that very anonymity is also behind the explosion of cyber crime that has【1】across the Web.
Can privacy be preserved【2】bringing safety and security to a world that seems increasingly 【3】?
Last month, Howard Schmidt, the nation’s cyber-czar, offered the federal government a【4】to make the Web a safer place - a "voluntary trusted identity" system that would be the high-tech【5】of a physical key, a fingerprint and a photo ID card, all rolled【6】one. The system might use a smart identity card, or a digital credential【7】to a specific computer, and would authenticate users at a range of online services.
The idea is to【8】a federation of private online identity systems. Users could【9】which system to join, and only registered users whose identities have been authenticated could navigate those systems. The approach contrasts with one that would require an Internet driver’s license【10】by the government.
Google and Microsoft are among companies that already have these "single sign-on" systems that make it possible for users to【11】just once but use many different services.【12】the approach would create a "walled garden" in cyberspace, with safe "neighborhoods" and bright "streetlights" to establish a sense of【13】community.
Mr. Schmidt described it as a "voluntary ecosystem" in which "individuals and organizations can complete online transactions with【14】, trusting the identities of each other and the identities of the infrastructure【15】which the transaction runs."
Still, the administration’s plan has【16】privacy rights activists. Some applaud the approach; others are concerned. It seems clear that such a scheme is an initiative push toward what would【17】be a compulsory of Internet "driver’s license" mentality.
The plan has also been greeted with【18】by some computer security experts, who worry that the "voluntary ecosystem" envisioned by Mr. Schmidt should still leave much of the Internet【19】. They argue that all Internet users should be【20】to register and identify themselves in the same way drivers must be licensed to drive on public roads.
【19】
选项
A、manageable
B、defendable
C、vulnerable
D、invisible
答案
C
解析
词汇题(词义选择)。空格所在句子说明一些电脑安全专家面对“voluntary ecosystem”的担忧,而“voluntary ecosystem”本来的目的是要网络安全,由此我们不难推断电脑专家的担忧是有了“voluntary ecosystem”网络仍然会不安全,所以空格中需要“不安全,容易被侵害,不可信”等类似含义。选项A.manageable意为“易处理的:可做到的”:选项B.defendable意为“可防御的”;选项C.vulnerable意为“脆弱的,易受伤的”;选项D.invisible意为“不可见的,无形的”。由此确定选项C.vulnerable为本题答案。
转载请注明原文地址:https://kaotiyun.com/show/u5e4777K
0
考研英语二
相关试题推荐
ThewriterwarnsAmericansthat______.By"commonresources"(Paragraph2),theauthormeansthat______.
Theauthorthinksthatpullfactors______.People’sdecisionstomigratemightbeinfluencedbyallthefollowingEXCEPT____
Asa______president,hisviewsaretreatedwithrespectwhenheisinterviewed.
ManyAmericansregardthejurysystemasaconcreteexpressionofcrucialdemocraticvalues,includingtheprinciplesthatallc
Withtheriseofthewomen’smovementinthelate1960s,thepoliticalsignificanceofdressbecameincreasinglyexplicit.Rejec
Pricesarcsky-high,withprofitstomatch.Butlookingfurtherahead,theindustryfaceswrenchingchange,saysanexpertofen
RuthSimmonsjoinedGoldmanSachs’sboardasanoutsidedirectorinJanuary2000:ayearlatershebecamepresidentofBrownUni
WetendtothinkofthedecadesimmediatelyfollowingWorldWarIIasatimeofprosperityandgrowth,withsoldiersreturningh
Priortothe20thcentury,manylanguageswithsmallnumbersofspeakerssurvivedforcenturies.Theincreasinglyinterconnected
Beautyhasalwaysbeenregardedassomethingpraiseworthy.Almosteveryonethinksattractivepeoplearehappierandhealthier,h
随机试题
(2020年昌邑)问题解决是指一个人应用一系列认知操作,从问题的起始状态到目标状态的过程,其具有()的特点。
Manyteenagersactagainsttheirparent’swishes.Ifwe【C1】______neatness,ourteenagerswillbesloppy(邋遢的).They’llleavethei
关于转移性低钾症的论述说法错误的是
背景某项目经理部承接到长途直埋光缆线路工程,施工季节处于夏季,工程沿途经过果园、稻田、村庄等地。施工过程中发生了以下事件:事件一:施工单位在敷设光缆时,施工人员将光缆包装物随意丢弃;在郊外进行光缆接续时,将裁剪下的光缆外皮、加强芯、光纤
在不存在风险时,纯利率是指( )。
某市区的甲建筑工程公司(以下简称甲公司)和乙防水建筑材料生产企业(以下简称乙企业)都具备建筑行政部门批准的建筑业施工资质。2013年10月发生如下经营业务:(1)甲公司承包一项建筑工程,工程价款为900万元,将其中的防水工程分包给乙企业,分包款为60万元
一般资料:求助者,男性,27岁,北方某大学在读硕士研究生。案例介绍:求助者将要硕士毕业,为继续考博士还是找工作而犹豫。现在高学历人才越来越多,硕士毕业不一定能找到一份如意的工作,所以想继续攻读博士学位。但如果再读三年博士,拿到学位就三十多岁了,于
已知函数f(x)=,则f[(2010)]=__________.
—Whatwasthepartylike?—Wonderful.Itisyears______Ienjoyedmyselfsomuch.
我国的自然资源主要包括()。
最新回复
(
0
)