首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
The Internet affords anonymity to us users, a blessing to privacy and freedom of speech. But that very anonymity is also behind
The Internet affords anonymity to us users, a blessing to privacy and freedom of speech. But that very anonymity is also behind
admin
2013-11-29
56
问题
The Internet affords anonymity to us users, a blessing to privacy and freedom of speech. But that very anonymity is also behind the explosion of cyber crime that has【1】across the Web.
Can privacy be preserved【2】bringing safety and security to a world that seems increasingly 【3】?
Last month, Howard Schmidt, the nation’s cyber-czar, offered the federal government a【4】to make the Web a safer place - a "voluntary trusted identity" system that would be the high-tech【5】of a physical key, a fingerprint and a photo ID card, all rolled【6】one. The system might use a smart identity card, or a digital credential【7】to a specific computer, and would authenticate users at a range of online services.
The idea is to【8】a federation of private online identity systems. Users could【9】which system to join, and only registered users whose identities have been authenticated could navigate those systems. The approach contrasts with one that would require an Internet driver’s license【10】by the government.
Google and Microsoft are among companies that already have these "single sign-on" systems that make it possible for users to【11】just once but use many different services.【12】the approach would create a "walled garden" in cyberspace, with safe "neighborhoods" and bright "streetlights" to establish a sense of【13】community.
Mr. Schmidt described it as a "voluntary ecosystem" in which "individuals and organizations can complete online transactions with【14】, trusting the identities of each other and the identities of the infrastructure【15】which the transaction runs."
Still, the administration’s plan has【16】privacy rights activists. Some applaud the approach; others are concerned. It seems clear that such a scheme is an initiative push toward what would【17】be a compulsory of Internet "driver’s license" mentality.
The plan has also been greeted with【18】by some computer security experts, who worry that the "voluntary ecosystem" envisioned by Mr. Schmidt should still leave much of the Internet【19】. They argue that all Internet users should be【20】to register and identify themselves in the same way drivers must be licensed to drive on public roads.
【19】
选项
A、manageable
B、defendable
C、vulnerable
D、invisible
答案
C
解析
词汇题(词义选择)。空格所在句子说明一些电脑安全专家面对“voluntary ecosystem”的担忧,而“voluntary ecosystem”本来的目的是要网络安全,由此我们不难推断电脑专家的担忧是有了“voluntary ecosystem”网络仍然会不安全,所以空格中需要“不安全,容易被侵害,不可信”等类似含义。选项A.manageable意为“易处理的:可做到的”:选项B.defendable意为“可防御的”;选项C.vulnerable意为“脆弱的,易受伤的”;选项D.invisible意为“不可见的,无形的”。由此确定选项C.vulnerable为本题答案。
转载请注明原文地址:https://kaotiyun.com/show/u5e4777K
0
考研英语二
相关试题推荐
Thesentence"Aftereachrainshower,anotherInternetmillionairesprangup"(Paragraph1)means______.Whatisspecialabout
Mobiletelecommunications______isexpectedtodoubleinShanghaithisyearasaresultofacontractsignedbetweenthetwoco
ManyAmericansregardthejurysystemasaconcreteexpressionofcrucialdemocraticvalues,includingtheprinciplesthatallc
In2010,afederaljudgeshookAmerica’sbiotechindustrytoitscore.CompanieshadwonpatentsforisolatedDNAfordecades--b
Successfulbusinessestendtocontinueimplementingtheideasthatmadethemsuccessful.Butinarapidlychangingworld,ideas
RuthSimmonsjoinedGoldmanSachs’sboardasanoutsidedirectorinJanuary2000;ayearlatershebecamepresidentofBrownUni
Thesmoothlandingofshuttle(航天飞机)Discoveryendedaflightthatwassuccessfulinalmosteveryrespectbutone:thedislodging
Formostofthe20thcentury,Asiaaskeditselfwhatitcouldlearnfromthemodern,innovatingWest.Nowthequestionmustber
随机试题
关于基金销售的后端收费模式,下列描述错误的是()。
______istheformationofnewwordsbycombiningpartsoftwowordsorawordplusapartofanotherword.
—Thankyousomuchforthegiftyouboughtforme.—______
女性,28岁,左乳腺肿块,钼靶射线检查未见异常,镜下见导管上皮增生,形成大小不等、形状不规则的网孔状或裂隙状次级管腔,腔面不整齐,于导管周围呈边窗样分布,上皮细胞呈流水样排列,免疫组化CK5/6、CK34Be12阳性,应诊断为
A.体温B.脉搏C.呼吸D.血压E.瞳孔颅内压增高时主要观察其
()是承包人最终完成全部施工和保修义务后应得的全部合同价款。
个人经营专项贷款的主要还款来源是()
学习理论认为,态度是后天习得的,学习的机制包括()。
Cisco路由器执行showaccess.list命令显示如下一组信息StandardIPaccesslistblockdeny10.0.0.0,wildcardbits0.255.255.255logdeny172.16.0.0
一个模块直接调用的其他模块个数称为______。
最新回复
(
0
)