首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
In the following article, some sentences have been removed. For questions 1 — 5, choose the most suitable one from the list A—G
In the following article, some sentences have been removed. For questions 1 — 5, choose the most suitable one from the list A—G
admin
2014-07-25
4
问题
In the following article, some sentences have been removed. For questions 1 — 5, choose the most suitable one from the list A—G to fit into each of the numbered blank. There are two extra choices which you do not need to use.
What could be more revealing than a list of one’s search queries? The efficiency of finding what we need on the Web encourages us to quest away—whether we’re researching a car purchase, puzzling out some medical symptoms, wondering what happened to an old friend. "Your search record involves aspirations and dreams," says Marc Rotenberg of the Electronic Privacy Information Center. "It becomes almost a reflection of what’s in one’s head. " And, as we learned recently, when America On-line temporarily released the search history of thousands of customers for the use of researchers, those reflections can be retained by search companies—and, ultimately, exposed.
【R1】______. Indeed, The New York Times was able to deduce the identity of a 62-year-old widow in Georgia who researched Italian vacations, termites and hand tremors.
The intimacy of our searches has led Rotenberg and other privacy experts to urge companies like Google, Yahoo and Microsoft not to retain such logs. And a bill proposed by Rep. Edward Markey (Democrat of Massachusetts)would set limits on the length of time such data could be stored. 【R2】______. "Our searches have improved dramatically because we have that data," says Alan Eustace,
Google’s senior vice president of engineering and research. Furthermore, they contend that without the information, they would be severely obstructed in further improving their products. "If you don’t have such data, there will be significant compromise of the user experience in the future," says Prabhakar Raghavan, Yahoo’s head of research.
【R3】______. For instance, when a fishing enthusiast types in "bass", he or she will get a different result than the same research from a Paul McCartney fan.
【R4】______. Yahoo even has a security group referred to informally as "the paranoids", whose motto is "We worry about these things so you won’t have to. "
【R5】______. The federal government has already expressed interest in such records, and if the data are demanded by the government the companies must turn it over. It’s also not much of a stretch to envision a scene(for example, another terrorist attack)that would pressure the companies to submit to a sweeping request for such logs, just to see if there is sleeper cell or two out there.
It is possible to search without a trail. So-called anonymizing services can mask your identity when you surf. And some smaller search engines do not keep session logs. The big players, though, are betting that you’ll stick around—because, they say, access to your dreams makes their searches great.
[A]But the detailed records of searches conducted by the users and 657,000 other Americans, copies of which continue to circulate online, underline how much people unintentionally reveal about themselves when they use search engines.
[B]In the AOL case, the records were supposedly anonymous, but since people commonly type in their own names and addresses into search engines, it’s often trivial to judge who is searching.
[C]It is no secret that search engines operated by AOL, Google, Yahoo, and other companies compile data on users such as terms searched for, when they were queried, and what computer and browser was used.
[D]As you would expect, research companies like Google say that protecting the information on those research logs is assigned highest priority.
[E]But the top researchers in the research field argue that that would be ultimately destructive. These experts believe that the information extracted from studying the way individuals search has been crucial in raising the quality of search to its present level.
[F]But even if the companies are flawless in protecting that information, there is still reason to worry.
[G]In particular, these companies hope to introduce schemes by which one’s researching success would be enhanced by previous behavior.
【R5】
选项
答案
F
解析
本题空格在第六段段首,所以其内容可能承接上文,也可能是段落的主题句。上文提到,Yahoo公司安全小组让人们不必担心信息的安全;下文具体列举了公司不能保存用户搜索记录的特殊情况,即信息安全的忧虑;可见,空格上下文内容存在转折。空格处的内容应该将上下文衔接起来。[A]以but转折,讲到很多搜索用户会不经意地暴露自己的信息,对上文话题进行了转折,但是无法与下文内容衔接,应排除;[D]提到了公司重视保护用户信息安全,承接上文的话题,无法过渡到下文内容,应该排除;[F]以but开头,对上文观点进行转折。even if让步从句复现了上文的内容“数据保护”,主句部分“仍然有理由担心”引起下文对担忧的原因的论述,是正确选项。
转载请注明原文地址:https://jikaoti.com/ti/yKMRFFFM
0
考研英语一
相关试题推荐
Studythefollowingdrawingcarefullyandwriteanessayinwhichyoushould1)describethedrawing,2)analyzetheaimofthe
Studythefollowingdrawingcarefullyandwriteanessayinwhichyoushould1)describethedrawingbriefly,2)analyzetheint
Studythefollowingdrawingcarefullyandwriteanessayinwhichyoushould1)describethedrawing,2)deducethepurposeoft
Writeanessayof160~200wordsbasedonthefollowingdrawing.Inyouressay,youshould1)describethedrawingbriefly,2)
Inthefollowingtext,somesentenceshavebeenremoved.ForQuestions41-45,choosethemostsuitableonefromthelist(A、B、C、
Inthefollowingtext,somesentenceshavebeenremoved.ForQuestions41-45,choosethemostsuitableonefromthelist(A、B、C、
ThefirsttwoparagraphssuggestthatTheauthorgivestheexampleofPacificislandsclimatechangeto
Youaregoingtoreadatextaboutbeingabetterfriend,followedbyalistofimportantways.Choosethebestwayfromthelis
Youaregoingtoreadatextaboutbeingabetterfriend,followedbyalistofimportantways.Choosethebestwayfromthelis
随机试题
()岩石中所含油或水的体积与岩石孔隙体积的比值就叫含油饱和度或含水饱和度,常用百分数表示。
Veniceissuchastrangecity.ItisbuiltonanItalianlagoonintheAdriaticSea.Ithascanalsinsteadofroads,whichmeans
男性,52岁,发热两天伴腹泻。查体:皮肤可见荨麻疹,脾可及,肝未及,血WBC12×109/L,嗜酸粒细胞40%,ALT861U/L。进一步最有价值的辅助检查是
招标采购项目信息管理是()的基础。
下列关于投资项目经济费用效益分析中经济净现值指标的表述,正确的是()。
1.事故经过某装饰公司在综合实验研究平台项目精装修工程2号地下车库入口钢架玻璃雨棚施工,该公司易某、陈某、周某等4名工人在现场铺设雨棚顶玻璃时,周某在移动钢架上的木板时,由于没有系安全带,在铺装玻璃的钢架下方也未设置安全底网,从5.5m高玻璃雨棚钢架顶坠
危机介入模式是围绕服务对象的危机而展开的服务。下面对于危机介入模式特点的论述正确的是()。
某小区为老年人提供娱乐活动,共有不足100名老人选择跳集体舞,有两种组合:一种是中间6人,其他人按8人一组围在外圈;另一种是中间8人,其他人按6人一组围在外圈。最多有多少老人跳集体舞?
AndylivedhighintheRockyMountains.Hehunted(打猎)wildanimalsthere.Healsotookothermenhunting.Thatwashiswork.
YouwillhearDr.MarvinCheung,IndependentNon-executiveDirectorofHangSengBank,givingalectureaboutthequalitiesofl
最新回复
(
0
)