英语学习论坛

 找回密码
 立即注册
查看: 51|回复: 0

2015年12月英语四级阅读预测:仔细阅读

[复制链接]

36万

主题

36万

帖子

109万

积分

论坛元老

Rank: 8Rank: 8

积分
1094809
发表于 2016-7-30 15:35:31 | 显示全部楼层 |阅读模式

8e1d7e6f3654491e9c94945e72b6fa17.jpg

8e1d7e6f3654491e9c94945e72b6fa17.jpg

        关注沪江微信服务号(ID:hujiang4u),第一时间免费获取2015年12月四六级考试押题、答案等推送!
        四级考试倒计时,这是最后的四级复习冲刺时间了;为了让童鞋抓住复习重点,沪江四级教研特别推出:四级考前预测系列,希望能够帮助大家更好地复习。
        仔细阅读预测题:
        Cyber-security is now part of all our lives. "Patches" and other security updates arrive for phones, tablets and PCs. Consultants remind us all not to open unknown files or plug unfamiliar memory sticks into our computers. And yet, as a special report points out, digital walls keep on being breached. Last year more than 800m digital records, such as credit- and debit-card details, were pinched (偷取) or lost, more than three times as many as in 2012.
        Now a new phase in this contest is emerging: "the internet of things". This involves embedding miniature computers in objects and connecting them to the internet using wireless technology. Cisco, a technology company, predicts that 50 billion connected devices will be in circulation by the end of the decade, up from 11 billion last year. Web-connected cars and smart appliances in homes are becoming more common, as are medical devices that can be monitored by doctors many miles from their patients.
        Such connectivity offers many advantages, from being able to adjust your house's heating when you are in the office to alerting your doctor that your insulin (胰岛素) level has risen. But it also gives malicious hackers an easy way to burrow (搜寻) deeper into people's lives. The small, embedded computers at the center of the internet of things do not have as much processing power or memory as, say, a smartphone, so security software on them tends to be rudimentary(不完善的). There have already been instances of nefarious (邪恶的) types taking control ofwebcams (网络摄像头), televisions and even a fridge, which was roped into a network of computers pumping out e-mail spam. And security researchers have found ways of hacking into some kinds of medical devices and cars, though this still requires specialist knowledge and kit. The wireless heart monitor of Dick Cheney, America's former vice-president, was modified to stop remote assassination attempts.
        For governments, the temptation will be to panic and do too much. They should make clear that web-connected gadgets (小器具) are covered by existing safety laws and existing product-liability regimes: last year Japan's Toyota was successfully sued for installing malfunctioning, but not web-connected, software. Wrongdoers should be punished, but the best prompt for securing the internet of things is competition. Either tech firms will find ways to make web-connected gadgets more dependable, or people will decide they can live without them. Who needs a smart fridge anyway?
        6. What does the author try to draw attention to in the first paragraph?
        A) Cyber safety.
        B) Patches.
        C) Unfamiliar memory sticks.
        D) Digital records.
        7. How does "the internet of things" work?
        A) Tracking down the digital records of credit- and debit-card details.
        B) Circulating web-connected devices which are monitored by professionals.
        C) Employing wireless technology to connect miniature computers in objects to the internet.
        D) Hacking into some kinds of medical devices and cars without being noticed.
        8. Which of the following can be called "the internet of things"?
        A) Automobiles.
        B) E-mail spam.
        C) Smart appliances at home.
        D) Heart monitor.
        9. Why is security software vulnerable to attack?
        A) There are too many "patches" to be fixed.
        B) Hackers can take control of people's webcams and televisions at home.
        C) No safety laws and product-liability regulations have been passed.
        D) The embedded computers lack enough processing memory.
        10. What can ensure the safety of the internet of things according to the passage?
        A) Competition.
        B) Punishment.
        C) Temptation.
        D) Updates.
        沪江教研解析:
        Keys:
        6-10 ACCDA
       

08dc3ea9c184456ba9d46bf303dfb46d.gif

08dc3ea9c184456ba9d46bf303dfb46d.gif

       

en_cet_exam_begin_two_dimension_code.png

en_cet_exam_begin_two_dimension_code.png
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

小黑屋|手机版|Archiver|新都网

GMT+8, 2025-9-6 23:31 , Processed in 0.050425 second(s), 10 queries , WinCache On.

Powered by Discuz! X3.4

© 2001-2017 Comsenz Inc.

快速回复 返回顶部 返回列表