题目列表(包括答案和解析)
Tens of thousands of smartphone applications are running ads from the overwhelming(势不可挡的) advertising networks that change smartphone settings and copy people’s contact information without permission.
Aggressive ad networks can disguise(假扮) ads as text message notifications (通告), and sometimes change browser settings and bookmarks. Often, the ads will upload your contacts list to the ad network’s servers--- information that the ad network can then sell to marketers.
Sounds scary? It’s not a giant problem yet, but it’s a growing one. As many as 5% of free mobile apps use an “aggressive” ad network to make money, according to Lookout, a San Francisco-based mobile security company. PhoneLiving was one of the most popular app developers to use these kinds of ad networks; their dozens of talking animal apps have been downloaded several million times. Later, PhoneLiving says it has mended its ways. The company admittedusing invasive techniques to make money from its apps, but said it dropped those methods at the start of July because of bad reviews and declining downloads.
The most popular type of apps that use aggressive ad networks are “Personalisation” apps, which include wallpapers. Comic and entertainment apps are also among the most likely to have rogue(凶猛的) ad networks running behind the scenes. Like aggressive pop-ups on PCs, the bad software isn’t easy to get rid of. Though the damage can typically be removed by deleting the app, it can be hard to tell which app is causing the problems.
When developers create free mobile apps, they usually make money through ads displayed within the app. App makers don’t usually tell people which ad network they are using, which makes it hard to avoid the known offenders. The best defense is to read reviews and avoid downloading apps that have attracted many complaints.
【小题1】What is an example of bad behavior by the annoying mobile ads?
A.They change browser settings and bookmarks. |
B.They change people’s calendar settings. |
C.They send scam text messages occasionally. |
D.They download free versions of games. |
A.Its operation model is against the will of netizens. |
B.It was forced to admit its bad behavior. |
C.It has changed its business model rapidly. |
D.Its relationship with Lookout may break up. |
A.The software runs behind the scenes. |
B.The app is very hard to delete. |
C.It is difficult to find the problem app. |
D.The network antivirus is out of date. |
A.innovative | B.positive | C.flexible | D.aggressive |
A.Mobile ads can attack your phone and steal your contacts. |
B.Mobile ads have become popular in recent years. |
C.Smartphones have been damaged by mobile ads. |
D.You may download some aggressive apps unconsciously. |
Tens of thousands of smartphone applications are running ads from the overwhelming(势不可挡的) advertising networks that change smartphone settings and copy people’s contact information without permission.
Aggressive ad networks can disguise(假扮) ads as text message notifications (通告), and sometimes change browser settings and bookmarks. Often, the ads will upload your contacts list to the ad network’s servers--- information that the ad network can then sell to marketers.
Sounds scary? It’s not a giant problem yet, but it’s a growing one. As many as 5% of free mobile apps use an “aggressive” ad network to make money, according to Lookout, a San Francisco-based mobile security company. PhoneLiving was one of the most popular app developers to use these kinds of ad networks; their dozens of talking animal apps have been downloaded several million times. Later, PhoneLiving says it has mended its ways. The company admittedusing invasive techniques to make money from its apps, but said it dropped those methods at the start of July because of bad reviews and declining downloads.
The most popular type of apps that use aggressive ad networks are “Personalisation” apps, which include wallpapers. Comic and entertainment apps are also among the most likely to have rogue(凶猛的) ad networks running behind the scenes. Like aggressive pop-ups on PCs, the bad software isn’t easy to get rid of. Though the damage can typically be removed by deleting the app, it can be hard to tell which app is causing the problems.
When developers create free mobile apps, they usually make money through ads displayed within the app. App makers don’t usually tell people which ad network they are using, which makes it hard to avoid the known offenders. The best defense is to read reviews and avoid downloading apps that have attracted many complaints.
1.What is an example of bad behavior by the annoying mobile ads?
A.They change browser settings and bookmarks.
B.They change people’s calendar settings.
C.They send scam text messages occasionally.
D.They download free versions of games.
2.What do we know about PhoneLiving?
A.Its operation model is against the will of netizens.
B.It was forced to admit its bad behavior.
C.It has changed its business model rapidly.
D.Its relationship with Lookout may break up.
3.Why is the bad software hard to get rid of?
A.The software runs behind the scenes.
B.The app is very hard to delete.
C.It is difficult to find the problem app.
D.The network antivirus is out of date.
4.What does the underlined word, “ invasive”, mean in the third paragraph?
A.innovative B.positive C.flexible D.aggressive
5.What is the main idea of the passage?
A.Mobile ads can attack your phone and steal your contacts.
B.Mobile ads have become popular in recent years.
C.Smartphones have been damaged by mobile ads.
D.You may download some aggressive apps unconsciously.
Ero Carrera is watching the computer screen in a lab in California as he tracks a new computer virus slowly circling the globe, targeting cell phones. Working from the US office of the Finnish computer 21 firm, Carrera knows this virus could be the start of something big and 22 . He’s one of a couple of hundred “virus hunters” worldwide who guard computers and cell phones from 23 . That’s the job for these unlikely action heroes of the Internet age, where quick and curious minds are more important than strong 24 .
Carrera works with Tzvetan Chaliavski to form the two-man team in California. Like that of other employees in the anti-virus companies in the world, their work is at the battle front of providing 25 from the damaging of computer virus, worms and Trojans. They break down software to discover a new virus and crack its code. Then they 26 and ship out a software update to customers. Roughly 300 new samples of viruses await the pair on a(n) 27 day.
Carrera has created a mathematical formula(公式), to 28 easily the software structure of viruses. With it, he is better able to compare the many variants(变种) and families of malware(恶意软件). To his 29 , Chaliavski, it doesn’t even matter why someone would create a virus. All that 30 is the hunt.
21. A. advertising B. commercial C. printing D. security
22. A. admiring B. exciting C. inviting D. threatening
23. A. attack B. bombing C. competition D. struggle
24. A. heads B. feelings C. muscles D. spirits
25. A. access B. contact C. measures D. protection
26. A. copy B. create C. delete D. download
27. A. average B. original C. previous D. special
28. A. get off B. make out C. pick up D. take in
29. A. assistant B. manager C. partner D. secretary
30. A. ignores B. matters C. overlooks D. rejects
Ero Carrera is watching the computer screen in a lab in California as he tracks a new computer virus slowly circling the globe, targeting cell phones. Working from the US office of the Finnish computer 21 firm, Carrera knows this virus could be the start of something big and 22 . He’s one of a couple of hundred “virus hunters” worldwide who guard computers and cell phones from 23 . That’s the job for these unlikely action heroes of the Internet age, where quick and curious minds are more important than strong 24 .
Carrera works with Tzvetan Chaliavski to form the two-man team in California. Like that of other employees in the anti-virus companies in the world, their work is at the battle front of providing 25 from the damaging of computer virus, worms and Trojans. They break down software to discover a new virus and crack its code. Then they 26 and ship out a software update to customers. Roughly 300 new samples of viruses await the pair on a(n) 27 day.
Carrera has created a mathematical formula(公式), to 28 easily the software structure of viruses. With it, he is better able to compare the many variants(变种) and families of malware(恶意软件). To his 29 , Chaliavski, it doesn’t even matter why someone would create a virus. All that 30 is the hunt.
21. A. advertising B. commercial C. printing D. security
22. A. admiring B. exciting C. inviting D. threatening
23. A. attack B. bombing C. competition D. struggle
24. A. heads B. feelings C. muscles D. spirits
25. A. access B. contact C. measures D. protection
26. A. copy B. create C. delete D. download
27. A. average B. original C. previous D. special
28. A. get off B. make out C. pick up D. take in
29. A. assistant B. manager C. partner D. secretary
30. A. ignores B. matters C. overlooks D. rejects
阅读下面短文, 掌握其大意, 然后从1—10各题所给的从A、B、C和D四个选项中, 选出可以填入空白处的最佳选项。
Ero Carrera is watching the computer screen in a lab in California as he tracks a new computer virus slowly circling the globe, targeting cell phones. Working from the US office of the Finnish computer 1 firm, Carrera knows this virus could be the start of something big and 2 . He’s one of a couple of hundred “virus hunters” worldwide who guard computers and cell phones from 3 . That’s the job for these unlikely action heroes of the Internet age, where quick and curious minds are more important than strong 4 .
Carrera works with Tzvetan Chaliavski to form the two-man team in California. Like that of other employees in the anti-virus companies in the world, their work is at the battle front of providing 5 from the damaging of computer virus, worms and Trojans. They break down software to discover a new virus and crack its code. Then they 6 and ship out a software update to customers. Roughly 300 new samples of viruses await the pair on a(n) 7 day.
Carrera has created a mathematical formula(公式), to 8 easily the software structure of viruses. With it, he is better able to compare the many variants(变种) and families of malware(恶意软件). To his 9 , Chaliavski, it doesn’t even matter why someone would create a virus. All that 10 is the hunt.
A. advertising B. commercial C. printing D. security
A. admiring B. exciting C. inviting D. threatening
A. attack B. bombing C. competition D. struggle
A. heads B. feelings C. muscles D. spirits
A. access B. contact C. measures D. protection
A. copy B. create C. delete D. download
A. average B. original C. previous D. special
A. get off B. make out C. pick up D. take in
A. assistant B. manager C. partner D. secretary
A. ignores B. matters C. overlooks D. rejects
湖北省互联网违法和不良信息举报平台 | 网上有害信息举报专区 | 电信诈骗举报专区 | 涉历史虚无主义有害信息举报专区 | 涉企侵权举报专区
违法和不良信息举报电话:027-86699610 举报邮箱:58377363@163.com