题目内容

For the longest time, I couldn’t get worked up about privacy: my right to it; how it’s dying; how we’re headed for an even more wired, underregulated, overintrusive, privacy-deprived planet.I should also point out that as news director for Pathfinder, Time Inc.’s mega info mall, and a guy who on the Web, I know better than most people that we’re hurtling toward an even more intrusive world. We’re all being watched by computers whenever we visit Websites; by the mere act of "browsing" (it sounds so passive!) we’re going public in a way that was unimaginable a decade ago.I know this because I’m a watcher too. When people come to my Website, without ever knowing their names, I can peer over their shoulders, recording what they look at, timing how long they stay on a particular page, following them around Pathfinder’s sprawling offerings.None of this would bother me in the least, I suspect, if a few years ago, my phone,.like Marley’s ghost, hadn’t given me a glimpse of the nightmares to come. On Thanksgiving weekend in 1995, someone (presumably a critic of a book my wife and I had just written about computer hackers) forwarded my home telephone number to an out-of-state answering machine, where unsuspecting callers trying to reach me heard a male voice identify himself as me and say some extremely rude things.Then, with typical hacker aplomb, the prankster asked people to leave their messages (which to my surprise many callers, including my mother, did). This went on for several days until my wife and I figured out that something was wrong ("Hey...why hasn’t the phone rung since Wednesday") and got our phone service restored.It seemed funny at first, and it gave us a swell story to tell on our book tour. But the interloper who seized our telephone line continued to hit us even after the tour ended. And hit us again and again for the next six months. The phone company seemed powerless. Its security folks moved us to one unlisted number after another, half a dozen times. They put special pin codes in place. They put traces on the line. But the troublemaker kept breaking through.If our hacker had been truly evil and omnipotent as only fictional movie hackers are, there would probably have been even worse ways he could have threatened my privacy. He could have sabotaged my credit rating. He could have eavesdropped on my telephone conversations or siphoned off my e-mail. He could have called in my mortgage, discontinued my health insurance or obliterated my Social Security number. Like Sandra Bullock in The Net, I could have been a digital untouchable, wandering the planet without a connection to the rest of humanity. (Although if I didn’t have to pay back school loans, it might be worth it. Just a thought.)Still, I remember feeling violated at the time and as powerless as a minnow in a flash flood. Someone was invading my private space--my family’s private space--and there was nothing I or the authorities could do. It was as close to a technological epiphany as I have ever been. And as I watched my personal digital hell unfold, it struck me that our privacy- mine and yours- has already disappeared, not in one Big Brotherly blitzkrieg but in Little Brotherly moments, bit by bit.Losing control of your telephone, of course, is the least of it. After all, most of us voluntarily give out our phone number and address when we allow ourselves to be listed in the White Pages. Most of us go a lot further than that. We register our whereabouts whenever we put a bank card in an ATM machine or drive through an E-Z Pass lane on the highway. We submit to being photographed every day--20 times a day on average if you live or work in New York City--by surveillance cameras. We make public our interests and our purchasing habits every time we shop by mail order or visit a commercial Website. Which of the following problems has the author experienced().

A. Someone got information from his medical files and sent him brochures on health products he may want to buy.
B. Someone used the motor-vehicle registration records on his car to find his home address.
C. Someone rerouted his telephone calls to another number without his knowledge.
D. Someone sent an e-mail message that destroyed the files on his computer.

查看答案
更多问题

Hello, my name is Richard and I am an ego surfer. The habit began about five years ago, and now I need help. Like most journalists, I can’t deny that one of my private joys is seeing my byline in print. Now the Intemet is allowing me to feed this vanity to an ever greater extent, and the occasional sneaky web search has grown into a full-blown obsession with how high up Google’s ranking my articles appear when I put my name into the search box. When I last looked, my best effort was a rather humiliating 47th place. You know you have a problem when you find yourself competing for ranking with a retired basketball player from the 1970s.Not that I’m alone in suffering from a disfunctional techno-habit. New technologies have revealed a whole raft of hitherto unsuspected personality problems: think crackberry, powerpointlessness or cheesepodding. Most of us are familiar with sending an email to a colleague sitting a couple of feet away instead of talking to them. Some go onto the web to snoop on old friends, colleagues or even first dates. More of us than ever reveal highly personal information on blogs or My Space entries. A few will even use Intemet anonymity to fool others into believing they are someone else altogether. So are these web syndromes and technological tics new versions of old afflictions, or are we developing fresh mind bugsDeveloping a bad habit is easier than many might think. "You can become addicted to potentially anything you do," says Mark Griffiths, an addiction researcher at Nottingham Trent University in the UK, "because addictions rely on constant rewards." Indeed, although definitions of addiction vary, there is a body of evidence that suggests drug addictions and non-drug habits share the same neural pathways. While only a hardcore few can be considered true technology addicts, an entirely unscientific survey of the web, and of New Scientist staff, has revealed how prevalent techno-addictions may have become.The web in particular has opened up a host of opportunities for overindulgence. Take Wikipedia. Updating the entries--something anyone can do--has become almost a way of life for some. There are more than 2,400 "Wikipedians", who have edited more than 4,000 pages each. "It’s clearly like crack for some people," says Dan Closely at Cornell University in New York, who has studied how websites such as Wikipedia foster a community. To committed Wikipedians, he says, the site is more than a useful information resource; it’s the embodiment of an ideology of free information for all.Then there are photolog sites like Flickr. While most of us would rather die than be caught surreptitiously browsing through someone else’s photos, there need be no such qualms about the private PICS people put up on these sites. Most people using Flickr and similar sites spent time each day browsing albums owned by people they had never met. They do this for emotional kicks. Khalid and Dix suggest: flicking through someone else’s wedding photos, for example, allows people to daydream about their own nuptials.Email is another area where things can get out of hand. While email has led to a revival of the habit of penning short notes to friends and acquaintances, the ease with which we can do this means that we don’t always think hard enough about where our casual comments could end up. This was the undoing of US broadcaster Keith Olbermann,who earlier this year sent a private email in which he described a fellow MSNBC reporter as "dumber than a suitcase of rocks". Unfortunately for Olbermann, the words found their way into the New York Daily News.Pam Briggs, a specialist in human-computer interaction at the University of Northumbria, UK, says the lack of cues such as facial expressions or body language when communicating electronically can lead us to overcompensate in what we say. "The medium is so thin, there’s little room for projecting ourselves into it," says Briggs. "When all the social cues disappear, we feel we have to put something else into the void, which is often an overemotional or over-intimate message."The habit of forwarding jokey emails or YouTube videos- think Diet Coke and Mentos fountains- can also say a lot about how people want to be perceived, Briggs adds. "We rarely want to be seen as too serious, so we try to project more of our personality into email." This could also explain why many bloggers expose private information that they would never shout out to a crowded room. Richard felt disgraced when he found ().

A. his article was rated low
B. he got a dysfunctional techno-habit
C. he compared himself with a retired basketball player
D. he became more egocentric

They might be willing to move from country to country, until they end up in a backwater ()nation with no laws or lawmakers to speak of, and can proceed with their miserably experiments.

A. well-built
B. ill-conceived
C. well-groomed
D. ill-bred

插头与插座应按规定正确接线,插座的保护接地极在任何情况下都必须单独与保护线可靠连接。可以在插头(座)内将保护接地极与工作中性线连接在一起。( )

A. 对
B. 错

用电单位或个人应掌握所使用的电气装置的额定容量、保护方式和要求、保护装置的整定值和保护元件的规格。不得擅自更改电气装置或延长电气线路。不得擅自增大电气装置的额定容量,不得任意改动保护装置的整定值和保护元件的规格。( )

A. 对
B. 错

答案查题题库