admin管理员组

文章数量:1531253

2024年5月21日发(作者:)

2013年高考英语阅读理解与完型填空:网络安全

When the Internet on your laptopifrom your dorm or home, do; you

know .your personaldetails are being gathered secretly? And would you be -surprised

to know the information may be soldeheaply to advertisers and

marketers? . .

According to an inve~tigation by The Wall Street Jourmd, all

it takes is a tiny frle in a computer-a single code consisting of a long serigs

of numbers and letters-to record the computer user's age,gender, location, favorite

movies and hobbies.

The newspaper reports that Lotame Solutions,Iric,., ai~Jew York company,

uses sophisticatedsoftware called a "beacon" lo capture what people are typingiqn

a website. '

Lotame packages that data into profiles about individuals, only without

their names, and sells theprofiles to companies seeking customers. Batches*of such

data may be sold for a few dollars.

;The survey d18covered that spying on Intemet users§ one of the

fastest-growin~l; busmesses onthe'World Wide

Web. . '

i . .

~.. ' The "cookie"-a tiny text. file put on your PC by websites or marketing

finns which might be usedto remember your preferences for one site, or to track you

across many sites is already old news. Thereare r7ew and more, complex tools such

as "beacons"..which scan in,real time what people are doing on awebpaf;e. These

beacons instantly assess the Internet user's location,..income, shopping interests

andeven medical conditions. , .-Millions of Intemet users around

the'world also face unprecedented(空前的) threats. Private,sensitive, personal and

business information is being gathered and sold without their knowledge.

Companies insist the information they ~ather is anonymous and the data

is used hannlessly. Butthe technology has Sprown so powerful that eVen some of the

biggest websites in the US don't know thatthey were installing intnisive files on

visitors' computers. These include and * Next time you visit

a webpage and fmd an ad banner advertising 90mething you've been planningto buy,

don'.t be amazed that your computer can read your mind. . '

1. The purpose of the passage is to _ .

A. introduce a tiny file in a computer-a single code

B. show how your individual information was let out whert ASLirfing

the Intemet

C. show how to protect your privacy

D. introduce a sophisticated software called a "beacon" =

2. What can be inferred from the passage?

A. Because the data is used harmlessly, Intemet users around the

world will not face threats.

B. When a person sLufs the Intemet, his personal details may be let

out without his knowledge.

C. Your computer can really read your mind with the help of some

hardware. . .

D. and use software to capture what people are

typing on a website.

3. According to the passaf;e, "beacon" in the third paragraph _

A. is a tiny text file put on your PC by websites

B. is a software that can package that data into profiles about

individuals

C. can assess the Inteinet user's'personal information

D. js nqt more complex than the "coo ie"

4. What's the writer's attitude to this problem?

A. Neutral.

Worried.

Optimistic. D. Indifferent.

B.

C.

本文标签: 阅读理解完型填空高考