题文
B
Typing your password or credit card number into a computer is a moment’s work. But if you think your personal details disappear as soon as you hit the Return key, think again: they can sit on the computer’s hard disk for years waiting for a hacker to rip them off.
As people spend more time on the web and hackers become more sophisticated, the dangers of storing personal information on computers are growing by the day, security experts say. There are some safeguards, such as never allowing your computer to store your passwords. But even that is no guarantee of security.
When you type in a password, it is stored in random access memory (RAM), where it is held temporarily until other data overwrites it or the computer is switched off.
But every so often, the computer copies the contents of its RAM onto hard disk, where it is easy prey for a hacker, who can read it directly or design a worm to e-mail it back. The longer sensitive data stays in RAM, the more likely it is to be copied onto the disk, where it stays until it is overwritten—which might not happen for years.
Tal Garfinkel and colleagues from Stanford University have created a software tool which simulates the workings of a complete computer system. Within the simulation, sensitive data can be tagged and then tracked as it passes through the system. Next, Garfinkel and his team simulated computers running common software that regularly handles passwords or confidential personal information, such as Internet Explorer, the Windows login script and Apache server software.
In a paper to be presented, they conclude that the programs took virtually no measures to limit the length of time the information is retained. Some of the tested software even copied the sensitive information, apparently without restraint.
This is the first time anyone has tried to measure the extent of this problem, says Rebecca Wright, a security expert at Stevens Institute of Technology. Garfinkel hopes the results will arouse software developers to take action.
40.Which of the following statements is true according to the passage?
A.It is secure to use your password as long as you hit the Return key.
B.Your personal details is likely to be in danger if you spend more time on the web.
C.Your password will be safe if you have some safeguards.
D.Never allowing your computer to store your passwords will be safe.
41.Which of the following is NOT the reason for the unsafety of a password?
A.It will be stored in RAM.
B.It will be copied onto hard disk.
C.It might not be overwritten.
D.It will disappear as soon as you hit the return key.
42.Tal Garfinkel and his team measured the extent of security of .
A.simulating the working of a complete computer system
B.tagging sensitive data
C.passing through the system
D.running common software
43 What can be inferred from the passage?
A.The length of the time the information is stored is not limited.
B.The programs can not retain the information.
C.The security problem should be paid more attention to.
D.Some sensitive information has been copied. 题型:未知 难度:其他题型
答案
小题1:B
小题2:D
小题3:A
小题4:C
解析
略考点
据考高分专家说,试题“ B Typing your pass.....”主要考查你对 [政治经济类阅读 ]考点的理解。政治经济类阅读
政治经济类文章的概念:
要做好这类阅读,平时就要注意了解国内外发生的政治经济大事,掌握一定背景知识,对这类文章的叙述特点及内容安排有一定了解,还要扩展这方面的词汇。阅读这类文章,要抓住文章的核心,即文章整体和各段主要在说什么,也要注意段落之间的逻辑关系。
如何备考政治经济类阅读理解题:
【题型说明】政治经济类阅读文章是高考常选材料之一。该类文章时代气息浓郁,语言鲜活,但熟字新义词、超纲词及专业词语多,长句、难句多。政治类文章大多数是同学们感性趣的内容,读起来倒有似曾相识的感觉,经济类文章读起来就像是雾里看花,文章看完,一头雾水。再加之这类文章的命题侧重于词义猜测、推理判断和文章主旨,同学们对这类题材是望而生畏。
【备考策略】建立心理优势。针对不同体裁的文章,我们要采取相应的阅读方法和技巧。政治类文章多采用记叙文形式,我们可采取“顺读法”,以便抓关键语句,领会文章主旨;而经济类文章则多采用说明文形式,我们则可以采取“逆读法”,先读试题,再从文章中查找有用信息。若遇到的确难读的材料。千万不用着急,因为你觉得难,其他人也一定是同感。在高考前,我们就要有这种心理准备,高考试卷肯定有一、两篇难以阅读的材料。不过,我们平时可以有意识地从报刊杂志上找一些较难的阅读材料来阅读,以培养自己迎难而上的心理素质。
【答题方法】
1、寻找主干:
根据英语中五种基本句型结构,把句子中的主语、谓语、宾语、表语等主要成分找出来,其他成分如定语、状语、补语等则易于理解。找到了句子主干,句子的意思至少明白了一半。
2、剔除从句:
在一个长句中可能会出现若干个从句,在理解时,如果把各个从句剔除出来单独理解,然后把大意拼凑起来,整个长句的意思就会明白六、七分。
3、辨别分句:
一个长句如果是由几个并列、转折、递进、对比关系的分句组成,句中往往有表示这些分句关系的连接词,只要能弄清楚分句和分句之间的逻辑关系,再把各层分句的意思加以连贯,整个长句的句意基本上能跃然脑中。
4、寻找关键词:
如果一个句子看完,一点句意的感觉也没有,下下策就是抓住句中的关键词,通过关键词大体弄懂这个长句的意思。



