979] The first textbooks written for teaching English as a foreign language in the 16th century. [译文] 作为外语教学的英语课本出版于十六世纪. A. came out B. came about C. came across D. came round [答案及简析] A. come out出版, come about 发生,come across 偶然碰见,came round绕道而行. 查看更多

 

题目列表(包括答案和解析)

It was reported last week that developers could take photos from Apple mobile and Google Android devices without the phone owners knowing that the images were being taken. In Apple’s case, developers can also obtain the location information for each photo.

Senator(参议员) Charles Schumer said in a telephone interview that his office had spoken with officials at both Apple and Google on Monday.

 “We asked them if they could find a way on their own to prevent Apple from having access to private information,” Mr. Schumer said. “They were friendly and open to the idea that this ought to be changed.”

On Sunday, Mr. Schumer said that he planned to send a letter to the Federal Trade Commission asking the agency to investigate Apple and Google after the privacy concerns came to light. Claudia Bourne Farrell, an F.T.C. spokeswoman, said the agency had received the letter but she could not comment further.

“It worries people to think that one’s personal photos, address book, and who knows what else can be obtained and even posted online without permission,” Mr. Schumer wrote in his letter to the F.T.C. “If the technology exists to open the door to this kind of privacy invasion, then surely technology exists to close it, and that’s exactly what must happen.”

Mr. Schumer said if Apple and Google could not come to an agreement to fix the problem, then he would be forced to take the issue further.

He said other companies had been willing to work with his office to fix issues. “I’m optimistic that we can get this changed without any regulation,” he said. “If it’s not changed, then we’ll turn to the F.T.C., and if that doesn’t work then we’ll consider legislative approach.”

The F.T.C. has warned companies to try to be more vigilant(警醒的) in their efforts to protect consumers when it comes to privacy.

1.The senators spoke with officials at both Apple and Google___________.

A. to urge them not to invade consumers’ privacy.

B. to discuss whether it is illegal to have access to private information.

C. to stop them from developing the technology of taking photos.

D. to keep them from obtaining the location information for each photo.

2.Which of the following statements is True?

A. Privacy invasion from Apple has existed for a long time.

B. Mr. Schumer takes the privacy concerns caused by Apple and Google seriously.

C. Privacy invasion from Google has existed for a long time.

D. Apple and Google have decided to make a change.

3.Mr. Schumer’s letter to the F.T.C. mainly shows that the technology to open the door to privacy invasion___________.

A. causes privacy invasion to happen frequently.         

B. can be used if permitted.

C. causes people to worry about the safety of their personal information .

D. causes personal information to be posted online without permission.

4.If the privacy concerns can’t be solved with the help of the F.T.C., ___________.

A. The senators will force the companies not to invade privacy.

B. The companies will be closed.

C. The companies will be fined.

D. The senators will turn to legislation.

5.Where can we read about the passage?

A. In a newspaper.                    B. In a magazine.

C. In a science report.                 D. In a textbook.

 

查看答案和解析>>

单词拼写(共10小题;每小题0.5分,满分5分)
【小题1】He ate the food and drank the beer. Then he put a piece of cheese in his ________ and went away.
【小题2】A few hours earlier, someone had told the police that ______would try to steal the diamonds.
【小题3】 Nearly everybody enters for “The Nicest Garden _____” each year, but Joe wins every time.
【小题4】 It was the last day of the year and a large_______ of people had gathered under the Town Hall clock.
【小题5】 Our clavichord is kept in the living-room. It has __________ to our family for a long time.
【小题6】It is worth your time and patience to get out of the h___________ of smoking.
【小题7】The__________ (政府) should take measures to improve the living conditions of the people.
【小题8】They have planned a tight s_________ of travel, so they need an early start.
【小题9】Excuse me, what is the f___________ to Paris? Is $ 10 enough?
【小题10】The plane was then flying at an a___________ of 8000 feet.

查看答案和解析>>

Despite all the reports of Internet security attacks over the years, including the recent ones on Google’s e-mail service, many people have reacted to the break-ins with a shrug(耸肩).

  Mr. Shulman and his company examined a list of 32 million passwords that an unknown hacker stole last month from RockYou, a company that makes software for users of social networking sites like Facebook and MySpace. The list was briefly posted on the Web, and hackers and security researchers downloaded it.

  The list provided an unusually detailed window into computer users’ password habits. Typically, only government agencies like the F.B.I. or the National Security Agency have had access to such a large password list.

  Some Web sites try to keep back the attackers by freezing an account for a certain period of time if too many incorrect passwords are typed. But experts say that the hackers simply learn to trick the system, by making guesses at an acceptable rate, for instance.

  To improve security, some Web sites are forcing users to mix letters, numbers and even symbols in their passwords. Others, like Twitter, prevent people from picking common passwords.

  Still, researchers say, social networking and entertainment Web sites often try to make life simpler for their users and are reluctant to put too many controls in place.

  Even commercial sites like eBay must weigh the consequences of freezing accounts, since a hacker could, say, try to win an auction(拍卖) by freezing the accounts of other potential buyers.

  But owing to the reality of our overcrowded brains, the experts suggest that everyone choose at least two different passwords — a complex one for Web sites where security is vital, such as banks and e-mail, and a simpler one for less risky places, such as social networking and entertainment sites.

  Mr. Moss relies on passwords at least 12 characters long, figuring that those make him a more difficult target than the millions of people who choose five- and six-character passwords.

  “It’s like the joke where the hikers run into a bear in the forest, and the hiker that survives is the one who outruns his companions,” Mr. Moss said. “You just want to run that bit faster.

59.   The underlined sentence “Many people have reacted to the break-ins with a shrug” shows that many people ______.

don’t take seriously the hacker’s break-ins

are worried and frightened at the hacker’s break-ins

don’t know what to do with the hacker’s attacks

are eager to get helps from the experts

60.   According to the passage, which of the following web sites needs a more complex password?

A social web site.

An entertainment web site.

A commercial web site.

A government web site.

61.   The Internet users are advised to______ in order to keep back the hackers.

mix letters, numbers and symbols as well

choose passwords with at least 12 characters

choose passwords with 5 or 6 characters

choose at least two different passwords

62.   Which would be the best title for the passage?

Password, Simple or Complex?

Popular Passwords, High Risk!

Clever Hackers, Stupid Netizens.

Hacker, the Enemy of Internet Security.

 

查看答案和解析>>

根据所给的首字母和中文写出所缺单词的完整形式(每空1分,满分10分)

1.Quite a few v____________(暴力)scenes were cut from the film before it came to show.

2. He s____________(强调) the importance of kindness, duty and order in society.

3.They are collecting money for a c____________(慈善机构).

4.They can destroy houses, but leave the f____________(家具) inside exactly where it was.

5.I regret that a p____________(先前的)engagement prevents me from accepting your kind invitation.

6. Arthur promised that he would answer the policeman’s questions with h____________(诚实).

7.The people are fighting to gain their f____________(自由).

8.Every day, many visitors are attracted by the r____________(遗迹)in the old city.

9.Our English teacher always explains difficult words or s____________(结构)in class.

10.There is plenty of e____________(证据)that smoking is very harmful to people’s health.

 

查看答案和解析>>

Despite all the reports of Internet security attacks over the years, including the recent ones on Google’s e-mail service, many people have reacted to the break-ins with a shrug (耸肩).

Mr. Shulman and his company examined a list of 32 million passwords that an unknown hacker(黑客) stole last month from Rock You, a company that makes software for users of social networking sites like Facebook and MySpace. The list was briefly posted on the Web, and hackers and security researchers downloaded it.

The list provided an unusually detailed window into computer users’ password habits. Typically, only government agencies like the F.B.I. or the National Security Agency have had access to such a large password list.

Some Web sites try to keep back the attackers by freezing an account for a certain period of time if too many incorrect passwords are typed. But experts say that the hackers simply learn to trick the system, by making guesses at an acceptable rate, for instance.

To improve security, some Wed sites are forcing users to mix letters,numbers even symbols in their passwords. Others, like Twitter, prevent people from picking common passwords.

Still, researchers say, social networking and entertainment Web sites often try to make life simpler for their users and are unwilling to put too many controls in place.

Even commercial sites like eBay must weigh the consequences of freezing accounts, since a hacker could, say, try to win an auction(拍卖) by freezing the accounts of other potential buyers.

But owing to the reality of our overcrowded brains, the experts suggest that everyone choose at least two different passwords— a complex one for Web sites where security is vital, such as banks and e-mail, and a simpler one for less risky places, such as social networking and entertainment sites.

Mr. Moss relies on passwords at least 12 characters long, figuring that those make him a more difficult target than the millions of people who choose five-and six-character passwords.

“It’s like the joke where the hikers run into a bear in the forest, and the hiker that survives is the one who outruns his companions,” Mr. Moss said. “You just want to run that bit faster.”

The underlined sentence “Many people have reacted to the break-ins with a shrug” shows that many people            .

A.don’t take seriously the hacker’s break-ins

B.are worried and frightened at the hacker’s break-ins

C.don’t know what to do with the hacker’s attacks

D.are eager to get helps from the experts

According to the passage, which of the following web sites needs a more complex password?

A.A social web site.                            B.An entertainment web site.

C.A commercial web site.                    D.A game web site.

The Internet users are advised to             in order to keep back the hackers.

A.mix letters, numbers and symbols as well

B.choose passwords with at least 12 characters

C.choose passwords with 5 or 6 characters

D.choose at least two different passwords

Which would be the best title for the passage?

A.Password, good luck or risk!                          B.Popular Passwords, High Risk!

C.Clever Hackers, Stupid Netizens.                    D.Hacker,the Enemy of Internet Security.

查看答案和解析>>


同步练习册答案