题目内容
【题目】下面文章中有4个段落需要添加小标题,文章需要添加总标题。请从以下选项(A、B、C、 D、E和F)中选出符合意思的标题,并在答题纸上将相应选项的标号涂黑。选项中有一项是多余选项。
![]()
An increase in cyber-attacks and identity theft make the Internet seem like a scary place these days.
Last week, there were reports of a billion dollar theft from European banks and secret viruses on millions of computer systems across Russia, China, India, Iran and elsewhere. This raises a question: How can individuals protect or make it more difficult for hackers to access their information?
【1】________________
Hard passwords include upper and lower case letters, numbers and special characters. They should be at least eight characters in length. They should also not spell out words easy for hackers to find, like your pet's name or the name of a family member.
【2】_______________
A very common mistake made by users is to create one hard password, but then never change it. Remembering a long list of complicated passwords can be difficult. But no password is unbreakable. Hackers are better able hack multiple accounts if those accounts all have the same password. A password management service, like Dashlane or PasswordBox, can help you keep track of hard passwords. These services permit users to easily store and secure their passwords.
【3】_______________
This goes for all the devices you use in a day–your home computer, your work computer, or your friend's iPad. Internet browsers like Firefox or Chrome keep track of where you've been and what you've done online. They keep records of every site you visited. Information about what you sent
【4】_______________
An increasing number of public places now offer free wireless access to the Internet. Often, a user does not need a password to connect to these wireless networks. These services might be useful, but they're also an easy way for hackers to access everything on your device. Unless you really need it, it is best not to use it.
【5】________________
One of the most popular and successful ways hackers infect your computer is through a technique called phishing. Phishing occurs when someone opens an email attachment that looks real. But the attachment is actually a virus that immediately infects the user's computer. If someone sends you a file or a website you did not ask for, it is best to not click on it.
【答案】
【1】C
【2】E
【3】A
【4】F
【5】B
【解析】
试题分析:文章主要讲的是网络安全问题。网络攻击和身份盗用增多让互联网看上去非常可怕。个人应该如何防止或者让黑客更难获得他们的信息呢?
【1】根据“Hard passwords include upper and lower case letters...”可知,本段讲的是让自己的密码更难破解。
【2】根据“A very common mistake made by users is to create one hard password, but then never change it...But no password is unbreakable.”可知,本段讲的是要经常更换密码,因为没有密码是不能被破解的。
【3】根据“Internet browsers like Firefox or Chrome keep track of where you've been and what you've done online...It is very easy for anyone...to steal a detailed record of your online activities.”可知,Firefox或Chrome等互联网浏览器会记录你在网上去过的地方和做过的事情。看到这些信息的任何人都能轻易窃取你在网上详细的活动记录。A项“清除浏览器历史记录”符合段意。
【4】根据“An increasing number of public places now offer free wireless access to the Internet...they're also an easy way for hackers to access everything on your device”可知,现在越来越多的公共场所开始提供免费无线网络接入互联网。这些服务也是黑客访问你设备上所有内容的捷径。说明不能随便使用免费的无线网络。
【5】根据“One of the most popular and successful ways hackers infect your computer is through a technique called phishing. Phishing occurs when someone opens an email attachment that looks real.”可知,黑客感染电脑最常用和最有效的一种办法就是通过所谓的网络钓鱼。当有人打开一个看上去真实的电子邮件附件时,网络钓鱼就发生了。这个附件实际上是一个病毒。因此,我们应该谨慎点击,而不能随便打开陌生的链接。