首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
A、Hackers’ possibility of breaking into the school Internet system. B、The heightened security of information stored electronical
A、Hackers’ possibility of breaking into the school Internet system. B、The heightened security of information stored electronical
admin
2018-05-11
37
问题
W: Good morning, everybody.(1)Today, school districts across the country are going high-tech, incorporating educational apps and digital programs into the classroom. But fears about the privacy and security of students’ personal information are on the rise. Today, we have Nicole Rasmuson, a math teacher from Miami’s iPrep Academy. He is using innovative software. Thank you for joining us.
M: We all started at the very beginning, and then some just took off. It’s about 70 percent online. And it’s a smart program, and so it checks: Are they understanding? Are they answering questions correctly right away? Are they struggling? Is it taking them a long time to answer questions? Do they keep making mistakes?
W: All the while, the computer is crunching and storing data about the students and sending back customized lessons, is that correct?
M:(2)Yes. It’ll ask them, "What are your interests?" And so, in the word "problems" , it’ll—if one kid is really interested in food—it’ll talk about cookies and that kind of stuff. It’ll even ask them, " What are your friends’ names?" And then it’ll put their friends’ names in the "problems" , too.
W: Sounds quite smart.
M: All that gets uploaded, along with student schedules, grades, discipline records, homework and even e-mails, the making of what some have called a digital profile.
W: But shouldn’t we fear that someday it may be used in unauthorized ways?
M: We’re going to have a lot of data floating around, with a lot of very detailed information that can be quite surprising. One example: What a child eats in the school cafeteria is collected, using a student I. D. card. We can envision a day, for example, that a health insurance company wants to see what they ate when they were third-graders to decide how they were going to underwrite insurance.(3)Is it far-fetched? It could be. We don’t know.
W: Already, students’ data has been misused.(4)Google was recently sued for scanning students’ e-mail accounts in order to build advertising profiles. The tech giant has since stopped and pledged, along with 214 other companies, not to use student data for commercial purposes. But there are a whole lot more companies out there.
M: I’m trying to protect my kids, and there’s so much data collection that’s going on right now that we’re not even aware of. I think that’s absolutely a legitimate concern. But I think responsible school systems that have the appropriate policies and safeguards, quite frankly, reduce that threat.
W: What measures have been taken by schools so far?
M: To protect personal data, Miami Superintendent Alberto Carvalho requires that teachers and students use a web portal. All the apps and software inside have been vetted, and the companies must sign contracts that prohibit any unauthorized or commercial use of students’ information. These rules are strictly enforced.
W: So the penalties that we apply in Miami are when private companies default on their contractual obligation, we bar them from future business with the school system.
M: So far, the district says, the tech companies have stuck to the rules. But at iPrep, teachers say they go outside the portal to use unregulated apps every day. And they’re not the only ones. Miami school officials say hackers on the outside have never successfully broken in and stolen student data. But the growing amount of sensitive information stored electronically has driven lawmakers in at least 15 states to restrict what companies can collect and mandate steps to protect it.(5)That heightened security could put a damper on digital tools that personalize learning.
W: Thank you for your information.
This is the end of the first interview. Questions 1 to 5 are based on what you have just heard.
1. What is this interview mainly about?
2. Which of the following is included in the function of the innovative software in Miami’s iPrep Academy?
3. What is the man’s attitude toward data safety in his school?
4. According to the woman, why was Google recently sued?
5. According to the man, what will binder digital tools that personalize learning?
选项
A、Hackers’ possibility of breaking into the school Internet system.
B、The heightened security of information stored electronically.
C、Teachers go outside the portal to use unregulated apps.
D、The tech companies that have violated the security laws.
答案
B
解析
本题考查的是在使学习个性化的过程中,什么将阻碍电子工具的使用。由“That heightened security could put a damper on digital tools that personalize learning.”可知,与日俱增的安全问题会阻碍能使学习个性化的电子工具。因此答案为[B]。
转载请注明原文地址:https://jikaoti.com/ti/VKTMFFFM
0
专业英语八级
相关试题推荐
PASSAGEFOUR
PASSAGETWOWhatsymptomsdidsalonworkerssufferaftertheirusingofahair-careproduct?
StudyActivitiesinUniversityInordertohelpcollegeanduniversitystudentsintheprocessoflearning,fourkeystudya
A、Theirpaycheck.B、Theirbenefits.C、Thework-lifebalance.D、Theadvancementprospect.C在谈及优化自己的选择时,女士提到人们可以考虑工作与生活更好的平衡、更灵活的工
ImprovingYourMotivationforLearningEnglishI.TheimportanceofthetechniquesforimprovingmotivationA.Necessityforlea
ImprovingYourMotivationforLearningEnglishI.TheimportanceofthetechniquesforimprovingmotivationA.Necessityforlea
A、Sheisalinguist.B、Sheworksasateacher.C、She’sanexpertonlanguageeducation.D、She’sanexpertonspreadinglanguages
ThingstobeTaughtinEverySchoolI.Introduction:Importanceofstudents’abilitytodealwiththerealworld.A.Speaker’so
ThingstobeTaughtinEverySchoolI.Introduction:Importanceofstudents’abilitytodealwiththerealworld.A.Speaker’so
Shouldhighschoolseniorstakeagapyearbeforetheygotouniversities?GapYearsoriginallystartedintheUnitedKingdomin
随机试题
A.合谷B.神门C.太溪D.太冲E.列缺
最合理的处置应该是关于可能的发生机制和转归,正确的是
下列泌尿系统疾病中,不出现管型尿的是
工程建设定额按编制程序和用途可分为()。
下列关于石油化工储罐区防火设计的说法中,正确的是()。
在电话网中按信令的工作区域可分为(1)信令和(2)信令。No.7信令网由(3)、(4)及它们之间的(5)组成。数字通信网的同步方式主要有(6)方式、(7)方式和(8)方式。我国数字网的网同步方式采用(9)、多个基准时钟控制的全同步网方案,其定时准确度
下面关于中国外交战略的说法,正确的有()。
在μC/OS—II启动过程中,BootLoader执行完毕后,执行应用程序主文件中main()时,依次执行的三个主要的函数是:①OSInit();②___________【67】;③___________【68】。
下列程序的功能是计算N=2+(2+4)+(2+4+6)+……+(2+4+6+……+40)的值。PrivateSubCommand34_Click()t=0m=0sum=0Do
A.Howcommonisdepressioninlaterlife?B.Whatisdepression?C.Whatrelievesdepressioninolderpeople?D.Whydoesdepre
最新回复
(
0
)