摘要: A. copy B. create C. delete D. download

网址:http://m.1010jiajiao.com/timu3_id_2520843[举报]

Tens of thousands of smartphone applications are running ads from the overwhelming(势不可挡的) advertising networks that change smartphone settings and copy people’s contact information without permission.
Aggressive ad networks can disguise(假扮) ads as text message notifications (通告), and sometimes change browser settings and bookmarks. Often, the ads will upload your contacts list to the ad network’s servers--- information that the ad network can then sell to marketers.
Sounds scary? It’s not a giant problem yet, but it’s a growing one. As many as 5% of free mobile apps use an “aggressive” ad network to make money, according to Lookout, a San Francisco-based mobile security company. PhoneLiving was one of the most popular app developers to use these kinds of ad networks; their dozens of talking animal apps have been downloaded several million times. Later, PhoneLiving says it has mended its ways. The company admittedusing invasive techniques to make money from its apps, but said it dropped those methods at the start of July because of bad reviews and declining downloads.
The most popular type of apps that use aggressive ad networks are “Personalisation” apps, which include wallpapers. Comic and entertainment apps are also among the most likely to have rogue(凶猛的) ad networks running behind the scenes. Like aggressive pop-ups on PCs, the bad software isn’t easy to get rid of. Though the damage can typically be removed by deleting the app, it can be hard to tell which app is causing the problems.
When developers create free mobile apps, they usually make money through ads displayed within the app. App makers don’t usually tell people which ad network they are using, which makes it hard to avoid the known offenders. The best defense is to read reviews and avoid downloading apps that have attracted many complaints.
【小题1】What is an example of bad behavior by the annoying mobile ads?

A.They change browser settings and bookmarks.
B.They change people’s calendar settings.
C.They send scam text messages occasionally.
D.They download free versions of games.
【小题2】What do we know about PhoneLiving?
A.Its operation model is against the will of netizens.
B.It was forced to admit its bad behavior.
C.It has changed its business model rapidly.
D.Its relationship with Lookout may break up.
【小题3】Why is the bad software hard to get rid of?
A.The software runs behind the scenes.
B.The app is very hard to delete.
C.It is difficult to find the problem app.
D.The network antivirus is out of date.
【小题4】What does the underlined word, “ invasive”, mean in the third paragraph?
A.innovative B.positive C.flexible D.aggressive
【小题5】What is the main idea of the passage?
A.Mobile ads can attack your phone and steal your contacts.
B.Mobile ads have become popular in recent years.
C.Smartphones have been damaged by mobile ads.
D.You may download some aggressive apps unconsciously.

查看习题详情和答案>>

Tens of thousands of smartphone applications are running ads from the overwhelming(势不可挡的) advertising networks that change smartphone settings and copy people’s contact information without permission.

Aggressive ad networks can disguise(假扮) ads as text message notifications (通告), and sometimes change browser settings and bookmarks. Often, the ads will upload your contacts list to the ad network’s servers--- information that the ad network can then sell to marketers.

Sounds scary? It’s not a giant problem yet, but it’s a growing one. As many as 5% of free mobile apps use an “aggressive” ad network to make money, according to Lookout, a San Francisco-based mobile security company. PhoneLiving was one of the most popular app developers to use these kinds of ad networks; their dozens of talking animal apps have been downloaded several million times. Later, PhoneLiving says it has mended its ways. The company admittedusing invasive techniques to make money from its apps, but said it dropped those methods at the start of July because of bad reviews and declining downloads.

The most popular type of apps that use aggressive ad networks are “Personalisation” apps, which include wallpapers. Comic and entertainment apps are also among the most likely to have rogue(凶猛的) ad networks running behind the scenes. Like aggressive pop-ups on PCs, the bad software isn’t easy to get rid of. Though the damage can typically be removed by deleting the app, it can be hard to tell which app is causing the problems.

When developers create free mobile apps, they usually make money through ads displayed within the app. App makers don’t usually tell people which ad network they are using, which makes it hard to avoid the known offenders. The best defense is to read reviews and avoid downloading apps that have attracted many complaints.

1.What is an example of bad behavior by the annoying mobile ads?

A.They change browser settings and bookmarks.

B.They change people’s calendar settings.

C.They send scam text messages occasionally.

D.They download free versions of games.

2.What do we know about PhoneLiving?

A.Its operation model is against the will of netizens.

B.It was forced to admit its bad behavior.

C.It has changed its business model rapidly.

D.Its relationship with Lookout may break up.

3.Why is the bad software hard to get rid of?

A.The software runs behind the scenes.

B.The app is very hard to delete.

C.It is difficult to find the problem app.

D.The network antivirus is out of date.

4.What does the underlined word, “ invasive”, mean in the third paragraph?

A.innovative         B.positive           C.flexible           D.aggressive

5.What is the main idea of the passage?

A.Mobile ads can attack your phone and steal your contacts.

B.Mobile ads have become popular in recent years.

C.Smartphones have been damaged by mobile ads.

D.You may download some aggressive apps unconsciously.

 

查看习题详情和答案>>

Ero Carrera is watching the computer screen in a lab in California as he tracks a new computer virus slowly circling the globe, targeting cell phones. Working from the US office of the Finnish computer   21   firm, Carrera knows this virus could be the start of something big and   22  . He’s one of a couple of hundred “virus hunters” worldwide who guard computers and cell phones from   23  . That’s the job for these unlikely action heroes of the Internet age, where quick and curious minds are more important than strong   24  .

    Carrera works with Tzvetan Chaliavski to form the two-man team in California. Like that of other employees in the anti-virus companies in the world, their work is at the battle front of providing   25   from the damaging of computer virus, worms and Trojans. They break down software to discover a new virus and crack its code. Then they   26   and ship out a software update to customers. Roughly 300 new samples of viruses await the pair on a(n)  27   day.

    Carrera has created a mathematical formula(公式), to   28   easily the software structure of viruses. With it, he is better able to compare the many variants(变种) and families of malware(恶意软件). To his   29  , Chaliavski, it doesn’t even matter why someone would create a virus. All that   30   is the hunt.

21. A. advertising          B. commercial                     C. printing                    D. security

22. A. admiring             B. exciting                    C. inviting                    D. threatening

23. A. attack                 B. bombing                  C. competition                     D. struggle

24. A. heads                  B. feelings                    C. muscles                    D. spirits

25. A. access                 B. contact                     C. measures                  D. protection

26. A. copy                   B. create                    C. delete                    D. download

27. A. average               B. original                    C. previous                   D. special

28. A. get off                B. make out                  C. pick up                    D. take in

29. A. assistant                  B. manager                   C. partner                            D. secretary

30. A. ignores               B. matters                     C. overlooks                 D. rejects

查看习题详情和答案>>

Ero Carrera is watching the computer screen in a lab in California as he tracks a new computer virus slowly circling the globe, targeting cell phones. Working from the US office of the Finnish computer   21   firm, Carrera knows this virus could be the start of something big and   22  . He’s one of a couple of hundred “virus hunters” worldwide who guard computers and cell phones from   23  . That’s the job for these unlikely action heroes of the Internet age, where quick and curious minds are more important than strong   24  .

    Carrera works with Tzvetan Chaliavski to form the two-man team in California. Like that of other employees in the anti-virus companies in the world, their work is at the battle front of providing   25   from the damaging of computer virus, worms and Trojans. They break down software to discover a new virus and crack its code. Then they   26   and ship out a software update to customers. Roughly 300 new samples of viruses await the pair on a(n)  27   day.

    Carrera has created a mathematical formula(公式), to   28   easily the software structure of viruses. With it, he is better able to compare the many variants(变种) and families of malware(恶意软件). To his   29  , Chaliavski, it doesn’t even matter why someone would create a virus. All that   30   is the hunt.

21. A. advertising          B. commercial                     C. printing                    D. security

22. A. admiring             B. exciting                    C. inviting                    D. threatening

23. A. attack                 B. bombing                  C. competition                     D. struggle

24. A. heads                  B. feelings                    C. muscles                    D. spirits

25. A. access                 B. contact                     C. measures                  D. protection

26. A. copy                   B. create                    C. delete                    D. download

27. A. average               B. original                    C. previous                   D. special

28. A. get off                B. make out                  C. pick up                    D. take in

29. A. assistant              B. manager                   C. partner                            D. secretary

30. A. ignores               B. matters                     C. overlooks                 D. rejects

查看习题详情和答案>>

阅读下面短文, 掌握其大意, 然后从1—10各题所给的从A、B、C和D四个选项中, 选出可以填入空白处的最佳选项。

Ero Carrera is watching the computer screen in a lab in California as he tracks a new computer virus slowly circling the globe, targeting cell phones. Working from the US office of the Finnish computer   1   firm, Carrera knows this virus could be the start of something big and   2  . He’s one of a couple of hundred “virus hunters” worldwide who guard computers and cell phones from   3  . That’s the job for these unlikely action heroes of the Internet age, where quick and curious minds are more important than strong   4  .

    Carrera works with Tzvetan Chaliavski to form the two-man team in California. Like that of other employees in the anti-virus companies in the world, their work is at the battle front of providing   5   from the damaging of computer virus, worms and Trojans. They break down software to discover a new virus and crack its code. Then they   6   and ship out a software update to customers. Roughly 300 new samples of viruses await the pair on a(n)  7   day.

    Carrera has created a mathematical formula(公式), to   8   easily the software structure of viruses. With it, he is better able to compare the many variants(变种) and families of malware(恶意软件). To his   9  , Chaliavski, it doesn’t even matter why someone would create a virus. All that   10   is the hunt.

A. advertising   B. commercial            C. printing                  D. security

A. admiring     B. exciting                  C. inviting                  D. threatening

A. attack          B. bombing                C. competition            D. struggle

A. heads          B. feelings                  C. muscles                  D. spirits

A. access          B. contact                   C. measures                D. protection

A. copy           B. create                     C. delete                     D. download

A. average      B. original                  C. previous                 D. special

A. get off         B. make out                C. pick up                  D. take in

A. assistant       B. manager                 C. partner                   D. secretary

A. ignores      B. matters                   C. overlooks               D. rejects

查看习题详情和答案>>

违法和不良信息举报电话:027-86699610 举报邮箱:58377363@163.com

精英家教网