30. She urges me ____ steps in the matter.
A.take | B.taking | C.took | D.to take |
科目:高中英语 来源: 题型:阅读理解
Millions of people are now using what are called“peer-to-peer”networks. Basically, you link your computer to other computers all across the country, mostly so you can give something in exchange for music for free.“But here's the problem,”“Early Show”Consumer Correspondent Susan Koeppen says as part of the broadcast's series, “Somebody's Watching You”: thieves are using the same networks, and they're not interested in music-they're seeking access to your financial information.
Beth Pope learned the hard way. When she put peer-to-peer software on her computer, she had one goal in mind: increasing her music library.“I thought I could get access to other people's music folders and they could have access to my music folders,”she says,“and that was about it. I didn't think it went any further than that.”
Are Your Medical Records Watched? That is, until she was contacted by the Secret Service-with shocking news-someone had stolen personal information from her computer-using the very software she used to trade music. With the help of David Dunn, a member of the Secret Service Electronic Crimes Task Force, Koeppen decided to see what personal information she could find using a peer-to-peer network.
Thieves typically seek documents such as credit reports, tax returns, or the federal financial student aid application, Dunn says.“Obviously,”says Dunn,“we aren't going to download it, because it's someone's personal information. I'm sure that, whoever (this file sharer) is didn't want her (student aid application) confirmation number available online for somebody to download.”Pope says she's done using peer-to-peer.“I've gotten all of that off my computer, ”she says.“I pay for music now. It's the best way to do it. There's no way that I would ever do that again.”
The trade group for file sharing software companies says they are working on better systems to prevent the misuse of the peer-to-peer networks. Still, Koeppen urges that people, for instance, delete Lime Wire from their computers, or make sure they have the latest version, which should have updated security features.
Thieves are trying to get access to your computer in order to .
A. find your personal information
B. see how your computer is working
C. talk with you
D. help you with your system
Why did Beth Pope use peer-to-peer software?
A. Because she wanted others to use her information.
B. Because she wanted to try it.
C. Because she wanted to increase her music library.
D. Because she wanted to get others' financial information.
Susan Koeppen tried to .
A. warn the readers of dangers of sharing music files with others.
B. warn the readers not to share music files with others.
C. tell us a true and funny story
D. advertise the peer-to-peer networks.
From the passage we get to know .
A. we shouldn't believe others.
B. computers make our life easy and comfortable.
C. softwares help us to share music with others
D. everything has two sides, the good side and the bad one
查看答案和解析>>
科目:高中英语 来源:2014届广东省十校高三上学期第一次联考英语卷(解析版) 题型:阅读理解
She’s not afraid of anything. Snakes? No problem. Walking alone in the dark? Easy. We’re not talking about a superhero here -- SM is a 44-year-old mother. And she’s fearless because she happens to be missing part of her brain: the amygdala(扁桃腺).
Shaped like a pair of almonds sitting in the middle of your brain, the amygdala helps control fear and anxiety. A rare condition called Urbach-Wiethe disease left SM without her amygdala, and seems to have completely erased her sense of fear.
To try to understand how the amygdala works, a team of researchers made their efforts to scare SM. They showed her horror movies and took her to the Waverly Hills Sanatorium Haunted House in Kentucky. She pushed out one of the monsters(巨物) and laughed. SM said she didn’t like snakes, but at a pet store full of poisonous creatures, she kept asking to touch them. When asked to rate her feelings, SM reported feeling surprised or disgusted, but never fearful.
“She tends to approach everything she should be avoiding,” says Justin Feinstein of the University of Iowa. This means the amygdala could control deeper urges to approach or avoid danger. Other scientists have a different opinion, though. “I don’t believe you can make a general statement about what the amygdala does by a single case study,” Elizabeth Phelps said. In 2002, Phelps published a study on a similar patient with amygdala damage who still showed fear.
It may sound like fun to be totally fearless, but we get scared for a good reason. “The nature of fear is survival and the amygdala helps us stay alive by avoiding situations, people, or objects that put our life in danger,” Feinstein said. SM was once followed in a park after dark by a man with a knife, and she simply walked away. “It is quite remarkable that she is still alive,” said Feinstein.
1.SM dares to walk alone in the dark mainly because ____________.
A. she is a superhero
B. she has experienced such conditions a lot
C. she is a mental patient
D. she has no sense of fear
2.Researchers tried their best to frighten SM in order to find ___________.
A. The function of a particular organ
B. SM’s reaction of fear and anxiety
C. The process of removing amygdale
D. A special way to get along with monsters
3.What do we know from the research on SM?
A. It was easy for her to avoid danger.
B. SM never felt fearful but disgusted.
C. SM was frightened by nothing except monsters.
D. SM got along well with the snakes.
4.What is Elizabeth Phelps’ attitude toward the function of the amygdala based on the research on SM?
A. Indifferent B. Supportive C. Disapproving D. Interested
5.What can we infer from the last paragraph?
A. People can remove their amygdala to be fearless.
B. SM will be admired because of her bravery.
C. No one can survive if their amygdala is removed.
D. The sense of fear is crucial to humans.
查看答案和解析>>
科目:高中英语 来源:2010年江西省高二下学期期末考试英语卷 题型:阅读理解
Millions of people are now using what are called“peer-to-peer”networks. Basically, you link your computer to other computers all across the country, mostly so you can give something in exchange for music for free.“But here's the problem,”“Early Show”Consumer Correspondent Susan Koeppen says as part of the broadcast's series, “Somebody's Watching You”: thieves are using the same networks, and they're not interested in music-they're seeking access to your financial information.
Beth Pope learned the hard way. When she put peer-to-peer software on her computer, she had one goal in mind: increasing her music library.“I thought I could get access to other people's music folders and they could have access to my music folders,”she says,“and that was about it. I didn't think it went any further than that.”
Are Your Medical Records Watched? That is, until she was contacted by the Secret Service-with shocking news-someone had stolen personal information from her computer-using the very software she used to trade music. With the help of David Dunn, a member of the Secret Service Electronic Crimes Task Force, Koeppen decided to see what personal information she could find using a peer-to-peer network.
Thieves typically seek documents such as credit reports, tax returns, or the federal financial student aid application, Dunn says.“Obviously,”says Dunn,“we aren't going to download it, because it's someone's personal information. I'm sure that, whoever (this file sharer) is didn't want her (student aid application) confirmation number available online for somebody to download.”Pope says she's done using peer-to-peer.“I've gotten all of that off my computer, ”she says.“I pay for music now. It's the best way to do it. There's no way that I would ever do that again.”
The trade group for file sharing software companies says they are working on better systems to prevent the misuse of the peer-to-peer networks. Still, Koeppen urges that people, for instance, delete Lime Wire from their computers, or make sure they have the latest version, which should have updated security features.
1.Thieves are trying to get access to your computer in order to .
A. find your personal information
B. see how your computer is working
C. talk with you
D. help you with your system
2.Why did Beth Pope use peer-to-peer software?
A. Because she wanted others to use her information.
B. Because she wanted to try it.
C. Because she wanted to increase her music library.
D. Because she wanted to get others' financial information.
3.Susan Koeppen tried to .
A. warn the readers of dangers of sharing music files with others.
B. warn the readers not to share music files with others.
C. tell us a true and funny story
D. advertise the peer-to-peer networks.
4. From the passage we get to know .
A. we shouldn't believe others.
B. computers make our life easy and comfortable.
C. softwares help us to share music with others
D. everything has two sides, the good side and the bad one
查看答案和解析>>
科目:高中英语 来源: 题型:
30. She urges me ____ steps in the matter.
A. take B. taking C. took D. to take
查看答案和解析>>
湖北省互联网违法和不良信息举报平台 | 网上有害信息举报专区 | 电信诈骗举报专区 | 涉历史虚无主义有害信息举报专区 | 涉企侵权举报专区
违法和不良信息举报电话:027-86699610 举报邮箱:58377363@163.com