1、2013年高考英语阅读理解与完型填空:网络安全When srt.ufing the Internet on your laptopifrom your dorm or home, do; you know .your personaldetails are being gathered secretly? And would you be -surprised to know the information may be soldeheaply to advertisers and marketers? . . According to an invetigation by The Wall
2、Street Jourmd, all it takes is a tiny frle in a computer-a single code consisting of a long serigs of numbers and letters-to record the computer users age,gender, location, favorite movies and hobbies. The newspaper reports that Lotame Solutions,Iric,., aiJew York company, uses sophisticatedsoftware
3、 called a beacon lo capture what people are typingiqn a website. Lotame packages that data into profiles about individuals, only without their names, and sells theprofiles to companies seeking customers. Batches*of such data may be sold for a few dollars. ;The survey d18covered that spying on Inteme
4、t users one of the fastest-growinl; busmesses ontheWorld Wide Web. . i . . The cookie-a tiny text. file put on your PC by websites or marketing finns which might be usedto remember your preferences for one site, or to track you across many sites is already old news. Thereare r7ew and more, complex t
5、ools such as beacons.which scan in,real time what people are doing on awebpaf;e. These beacons instantly assess the Internet users location,.income, shopping interests andeven medical conditions. , .-Millions of Intemet users around theworld also face unprecedented(空前的) threats. Private,sensitive, p
6、ersonal and business information is being gathered and sold without their knowledge. Companies insist the information they ather is anonymous and the data is used hannlessly. Butthe technology has Sprown so powerful that eVen some of the biggest websites in the US dont know thatthey were installing
7、intnisive files on visitors computers. These include MSN.com and Y* Next time you visit a webpage and fmd an ad banner advertising 90mething youve been planningto buy, don.t be amazed that your computer can read your mind. . 1. The purpose of the passage is to _ . A. introduce a tiny file in a compu
8、ter-a single code B. show how your individual information was let out whert ASLirfing the Intemet C. show how to protect your privacy D. introduce a sophisticated software called a beacon = 2. What can be inferred from the passage? A. Because the data is used harmlessly, Intemet users around the wor
9、ld will not face threats. B. When a person sLufs the Intemet, his personal details may be let out without his knowledge. C. Your computer can really read your mind with the help of some hardware. . . D. MSN.com and Y use software to capture what people are typing on a website. 3. According to the pa
10、ssaf;e, beacon in the third paragraph _ A. is a tiny text file put on your PC by websites B. is a software that can package that data into profiles about individuals C. can assess the Inteinet userspersonal information D. js nqt more complex than the coo ie 4. Whats the writers attitude to this problem? A. Neutral. B. Worried. C. Optimistic. D. Indifferent. 版权所有:高考资源网()版权所有:高考资源网()