刷题刷出新高度,偷偷领先!偷偷领先!偷偷领先! 关注我们,悄悄成为最优秀的自己!

单选题

    The Internet affords anonymity to its users, a blessing to privacy and freedom of speech. But that very anonymity is also behind the explosion of cyber-crime that has (1)_____ across the Web.

    Can privacy be preserved (2)_____ bringing safety and security to a world that seems increasingly (3)_____?

    Last month, Howard Schmidt, the nation’s cyber-czar, offered the federal government a (4)_____ to make the Web a safer place—a “voluntary trusted identity” system that would be the high-tech (5)_____ of a physical key, a fingerprint and a photo ID card, all rolled (6)_____ one. The system might use a smart identity card, or a digital credential (7)_____ to a specific computer, and would authenticate users at a range of online services.

    The idea is to (8)_____ a federation of private online identity systems. Users could (9)_____ which system to join, and only registered users whose identities have been authenticated could navigate those systems. The approach contrasts with one that would require an Internet driver’s license (10)_____ by the government.

    Google and Microsoft are among companies that already have these “single sign-on” systems that make it possible for users to (11)_____ just once but use many different services.

    (12)_____ , the approach would create a “walled garden” in cyberspace, with safe “neighborhoods” and bright “streetlights” to establish a sense of a (13)_____ community.

    Mr. Schmidt described it as a “voluntary ecosystem” in which “individuals and organizations can complete online transactions with (14)_____, trusting the identities of each other and the identities of the infrastructure (15)_____ which the transaction runs”.

    Still, the administration’s plan has (16)_____ privacy rights activists. Some applaud the approach; others are concerned. It seems clear that such a scheme is an initiative push toward what would (17)_____ be a compulsory Internet “driver’s license” mentality.

    The plan has also been greeted with (18)_____ by some computer security experts, who worry that the “voluntary ecosystem” envisioned by Mr. Schmidt would still leave much of the Internet (19)_____. They argue that all Internet users should be (20)_____ to register and identify themselves, in the same way that drivers must be licensed to drive on public roads.

(12)

A
In vain
B
In effect
C
In return
D
In contrast      
使用微信搜索喵呜刷题,轻松应对考试!

答案:

B

解析:

答案精析:空处所填词表明前后文逻辑关系。前文阐述了“身份自动识别”系统的运作原理,本段介绍create(产生)的效果,与上文是顺承的关系,故B选项为正确答案。

错项排除:A、C选项均有转折含义,与原文逻辑不符,故错误。C选项暗示上文某一行为产生本段的结果,隐含因果关系,在原文没有体现,故错误。

创作类型:
原创

本文链接: (12)

版权声明:本站点所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明文章出处。

让学习像火箭一样快速,微信扫码,获取考试解析、体验刷题服务,开启你的学习加速器!

分享考题
share