- 完形填空
題干:TheInternetaffordsanonymitytoitsusers,ablessingtoprivacyandfreedomofspeech.Butthatveryanonymityisalsobehindtheexplosionofcyber-crimethathas(1)acrosstheWeb.Canprivacybepreserved(2)bringingsafetyandsecuritytoaworldthatseemsincreasingly(3)?Lastmonth,HowardSchmidt,thenation’scyber-czar,offeredthefederalgovernmenta(4)tomaketheWebasaferplace—a“voluntarytrustedidentity”systemthatwouldbethehigh-tech(5)ofaphysicalkey,afingerprintandaphotoIDcard,allrolled(6)one.Thesystemmightuseasmartidentitycard,oradigitalcredential(7)toaspecificcomputer,andwouldauthenticateusersatarangeofonlineservices.Theideaisto(8)afederationofprivateonlineidentitysystems.Userscould(9)whichsystemtojoin,andonlyregistereduserswhoseidentitieshavebeenauthenticatedcouldnavigatethosesystems.TheapproachcontrastswithonethatwouldrequireanInternetdriver’slicense(10)bythegovernment.GoogleandMicrosoftareamongcompaniesthatalreadyhavethese“singlesign-on”systemsthatmakeitpossibleforusersto(11)justoncebutusemanydifferentservices.(12),theapproachwouldcreatea“walledgarden”incyberspace,withsafe“neighborhoods”andbright“streetlights”toestablishasenseofa(13)community.Mr.Schmidtdescribeditasa“voluntaryecosystem”inwhich“individualsandorganizationscancompleteonlinetransactionswith(14),trustingtheidentitiesofeachotherandtheidentitiesoftheinfrastructure(15)whichthetransactionruns”.Still,theadministration’splanhas(16)privacyrightsactivists.Someapplaudtheapproach;othersareconcerned.Itseemsclearthatsuchaschemeisaninitiativepushtowardwhatwould(17)beacompulsoryInternet“driver’slicense”mentality.Theplanhasalsobeengreetedwith(18)bysomecomputersecurityexperts,whoworrythatthe“voluntaryecosystem”envisionedbyMr.SchmidtwouldstillleavemuchoftheInternet(19).TheyarguethatallInternetusersshouldbe(20)toregisterandidentifythemselves,inthesamewaythatdriversmustbelicensedtodriveonpublicroads.
題目:(5) - A 、information
- B 、interference
- C 、entertainment
- D 、equivalent

掃碼下載億題庫
精準(zhǔn)題庫快速提分
參考答案【正確答案:D】
A. information信息;B. interference干涉; C. entertainment娛樂;D. equivalent等同物
原文a “voluntary trusted identity” system的具體內(nèi)容為:a physical key, a fingerprint and a photo ID card,根據(jù)邏輯只能選D。其他三項(xiàng)都不符合邏輯。
您可能感興趣的試題熱門試題換一換
- This chapter is so difficult to(),I shall have to read it again later.
- Too often Dr.Johnson's lectures()how to protect the doctor rather than how to cure thepatient.
- ()is power is a famous saying known to all.
- 總經(jīng)理:根據(jù)本公司目前的實(shí)力,我主張環(huán)島綠地和宏達(dá)小區(qū)這兩項(xiàng)工程至少上馬一個(gè),但清河橋改造工程不能上馬。董事長:我不同意。 以下哪項(xiàng)最為準(zhǔn)確地表達(dá)了董事長實(shí)際同意的意思()。
- 如圖,正方體的棱長為2,F(xiàn)是棱的中點(diǎn),則AF的長為()。
- 將6人分成3組,每組2人,則不同的分組方式共有()種。
- 如圖,在扇形AOB中,,OA=1,AC⊥OB,則陰影部分的面積為()。
- 45.()
億題庫—讓考試變得更簡單
已有600萬用戶下載
Gxnya
