《2013年高考英語 閱讀理解與完型填空 網(wǎng)絡(luò)安全》由會員分享,可在線閱讀,更多相關(guān)《2013年高考英語 閱讀理解與完型填空 網(wǎng)絡(luò)安全(2頁珍藏版)》請在裝配圖網(wǎng)上搜索。
1、2013年高考英語閱讀理解與完型填空:網(wǎng)絡(luò)安全
When srt.ufing the Internet on your laptopifrom your dorm or home, do; you know .your personaldetails are being gathered secretly? And would you be -surprised to know the information may be soldeheaply to advertisers and marketers????? .?? .
????????? According to an inve~t
2、igation by The? Wall Street Jourmd, all it takes is a tiny frle in a computer-a single code consisting of a long serigs of numbers and letters-to record the computer user's age,gender, location, favorite movies and hobbies.
???? The newspaper reports that Lotame Solutions,Iric,., ai~Jew York compan
3、y, uses sophisticatedsoftware called a "beacon" lo capture what people are typingiqn a website.????????? '
????? Lotame packages that data into profiles about individuals, only without their names, and sells theprofiles to companies seeking customers. Batches*of such data may be sold for a few doll
4、ars.
???? ;The survey d18covered that spying on Intemet users§ one of the fastest-growin~l; busmesses onthe'World Wide Web.?????? .?????????????????????????? '???? i? .? .
?~.. '? The "cookie"-a tiny text. file put on your PC by websites or marketing finns which might be usedto remember your prefe
5、rences for one site, or to track you across many sites is already old news. Thereare r7ew and more, complex tools such as "beacons"..which scan in,real time what people are doing on awebpaf;e. These beacons instantly assess the Internet user's location,..income, shopping interests andeven medical co
6、nditions.??? ,??? .-Millions of Intemet users around the'world also face unprecedented(空前的) threats. Private,sensitive, personal and business information is being gathered and sold without their knowledge.
????? Companies insist the information they ~ather is anonymous and the data is used hannless
7、ly. Butthe technology has Sprown so powerful that eVen some of the biggest websites in the US don't know thatthey were installing intnisive files on visitors' computers. These include MSN.com and Y*?? Next time you visit a webpage and fmd an ad banner advertising 90mething you've been planningto buy
8、, don'.t be amazed that your computer can read your mind. .???? '
?? 1.? The purpose of the passage is to _??????????? .
??????? A. introduce a tiny file in a computer-a single code
???????? B. show how your individual information was let out whert ASLirfing the Intemet
????? C. show how to prot
9、ect your privacy
??????? D. introduce a sophisticated software called a "beacon"? =
? 2.? What can be inferred from the passage?
???????? A. Because the data is used harmlessly, Intemet users around the world will not face threats.
??????? B. When a person sLufs the Intemet, his personal details
10、 may be let out without his knowledge.
??????? C. Your computer can really read your mind with the help of some hardware.?? .???? .
??????? D. MSN.com and Y use software to capture what people are typing on a website.
?? 3.? According to the passaf;e, "beacon" in the third paragraph _?????
?????
11、?? A. is a tiny text file put on your PC by websites
?????? B. is a software that can package that data into profiles about individuals
???????? C. can assess the Inteinet user's'personal information
?????? D. js nqt more complex than the "coo ie"
? 4. What's the writer's attitude to this problem?
??????? A. Neutral.?????????????????? B. Worried.?????????????????? C. Optimistic.??????????????? D. Indifferent.