皮皮学,免费搜题
登录
logo - 刷刷题
搜题
【简答题】
Directions: Each of the following statements contains information given in one of the paragraphs. Identify the paragraph from which the following information is derived. Each paragraph is marked with a letter. You may choose a paragraph more than once. A. Is asking for the Wi-Fi password the first thing you do when you walk into a restaurant or cafe? For many the answer is yes, for others it may be the second thing they do. In any case, in an era of logging in wherever we go, many people use sensitive information on the invisible Net, posing a risk to their finances and personal safety. B. Here, three students share their experience of being tricked or having their personal information stolen. Whether it’s chatting on QQ, shopping on Taobao or connecting to a “free” Wi-Fi network, not being careful can have serious consequences . C. Yang Lina, 22, a senior majoring in Chinese literature at Shandong Normal University, chatted to her niece online during the summer vacation. “My niece was studying in Germany at the time. When I asked when she would come back, she said she wanted to fly back next week but that her bank account had been blocked and that she couldn’t get any cash,” said Yang. “She asked me to transfer 10,000 yuan to her classmate’s account, and not to tell her parents as they would worry about her. She launched a video chat and I could see her. What’s more, her behavior was the same as usual. For instance, she always called Bonn ‘a small village’,” said Yang. Yang transferred 10,000 yuan to the account. But later, when her niece appeared again, she realizeed she had been tricked. D. Liu Wenjiang, 18, a sophomore majoring in automotive engineering at Wuhan Technical College of Communications, found a new laptop selling for only 1,600 yuan on Taobao. “It was only half the market price,” Liu said. “I talked to the seller online and he or she sent me a link asking me to do a favor by paying one yuan for an item and leaving a good rating for the store. When I had done this I could take advantage of the offer, the seller said.” The link opened a website that was so similar to the Taobao website that Liu didn’t suspect a thing. He typed in his bank account and password according to the prompts. When the website told Liu there was an error, he asked the seller what the problem was, but the seller didn’t reply. A few minutes later, he discovered that 2,000 yuan had been taken from his bank account. E. Ren Zhijiong, 24, a fresh graduate who works as a marketing executive in Shenzhen, used his cell phone to access the Wi-Fi at a Starbucks cafe. “I found two Wi-Fi networks, one called Starbucks and the other Starbucks2. The first one required me to register on a website, but the second one didn’t require a password. So I connected to the second one, and paid for an air ticket through my mobile banking app. But when I tried to buy a movie ticket through another app, I found I couldn’t log on to my bank account,” said Ren. “I called my bank and they told me that my password had been changed. When I asked the staff at Starbucks, they told me that they didn’t provide a Wi-Fi network called Starbucks2.” How to avoid being tricked F. Hackers plant viruses on public computers and websites to steal the passwords for your accounts when you log on. Here are some password tips: G. 1. Always set up a complicated password for your accounts. It’s best to include special characters in the password, as this makes it harder for hackers to decipher . a. Randomly substitute numbers for letters that look similar. The letter “o” becomes the number “0”, or even better than “@” or “*”. (i.e. –m0d3tf0rd... like modelTford). Randomly throw in capital letters (i.e. –Mod31TF0rd) b. Think of something you were attached to when you were younger, maybe a place you loved, or a specific car, an attraction from a vacation, or a favorite restaurant. c. You really need to have different username/password combinations for everything. Remember, the technique is to break into anything you access just to figure out your standard password, then compromise everything else. d. The passwords for your social media accounts, bank account, e-mail and forums should all be different. This is because the password for a forum can be easily cracked , and if the passwords for your other accounts are all the same, hackers can access your e-mail inbox, find personal information and figure out other passwords. H. 2. It’s best to use a U aegis, or a dynamic verification code for every bank transaction. With these precautions, fraudsters can’t take your money even if they know your password. I. 3. Most viruses come from illegal websites, USB sticks and mobile hard drives, so you should run a virus scan before you use them. When a virus accesses your computer, the hacker can control the camera to record your image, or even to record you typing in passwords on your keyboard. So pay attention that you don’t point the camera at your keyboard. J. 4. Friends and relatives should also be cautious about strange requests, especially from someone who is abroad. People abroad are usually harder to reach when verification is needed, and relatives and family members are often extra protective when they hear about an emergency. Students should leave multiple contact numbers with their family and keep family and friends updated on their news. K. 5. Some people like to connect to Wi-Fi networks automatically on their smartphone or laptop, but this means they’re at risk of falling into a trap without even noticing. It’s safer to choose “connect manually ”. L. 6. Please, be safe. It’s a jungle out there. 1. Yang Lina’s niece told her that she couldn’t get any cash because her bank account had been blocked. ( ) 2. You should run a virus scan before you use USB sticks and mobile hard drives. ( ) 3. Many people put their finances and personal safety at risk when using sensitive information on the invisible Net. ( ) 4. Pay attention that you don’t point the camera at your keyboard as when a virus accesses your computer, the hacker can control the camera to record your image, or even to record you typing in passwords on your keyboard. ( ) 5. Fraudsters can’t take your money even if they know your password if you use a U aegis, or a dynamic verification code for every bank transaction. ( ) 6. It’s safer to choose to connect your smartphone or laptop to Wi-Fi networks manually than automatically. ( ) 7. If you find several Wi-Fi networks in a store, ask the staff which one to choose. ( ) 8. You’d better set special characters in the password, as this makes it harder for hackers to decipher. ( ) 9. Three students had their personal information stolen because they are not careful enough. ( ) 10. When one victim in the passage opened a link similar to the Taobao website sent to him by someone online and typed in his bank account and password, he discovered that 2,000 yuan had been taken from his bank account. ( )
手机使用
分享
复制链接
新浪微博
分享QQ
微信扫一扫
微信内点击右上角“…”即可分享
反馈
参考答案:
举一反三
【多选题】在体育摄影中,关于拍“静”和拍“动”,()。
A.
拍“静”是指拍摄对象是静止的
B.
拍“静”是指把拍摄对象拍清晰
C.
拍“动”是指拍摄对象是运动的
D.
拍“动”是指把拍摄对象拍出动感
【单选题】治疗再生障碍性贫血错误的是( )。
A.
山莨菪碱
B.
抗生素淋巴细胞球蛋白
C.
雄性激素
D.
士的宁
E.
所有再障患者均可行脾切除
【简答题】如上哪项是治疗再生障碍性贫血性贫血具有重建造血和免疫功能的方法
【简答题】任何连通图的连通分量只有一个,即是()
【简答题】183~184 题共用备选答案: 第 183 题 治疗再生障碍性贫血应选用的药物是( )
【单选题】用雄激素治疗再生障碍性贫血,以下错误的是
A.
雄激素可刺激骨髓造血
B.
对慢性再障疗效较好
C.
对重型再障无效
D.
在用药1个月后生效
【简答题】能增加左心室后负荷的临床情况是 A.二尖瓣反流 B.高血压 C.房间隔缺损 D.主动脉瓣反流 E.室间隔缺损
【单选题】雄激素治疗再生障碍性贫血错误的是
A.
对严重障碍性贫血无效
B.
必须有残存造血干细胞才发挥作用
C.
用药剂量大,持续时间长
D.
丙酸睾酮有男性化副作用
E.
丙酸睾酮较17α-烷基雄激素肝脏毒性较大
【单选题】治疗再生障碍性贫血热入营血证,应首选
A.
圣愈汤
B.
犀角地黄汤
C.
左归丸
D.
龙胆泻肝汤
E.
苇茎汤
【单选题】用于治疗再生障碍性贫血
A.
切脾术
B.
糖皮质激素
C.
雄激素
D.
右旋糖酐铁注射
E.
输血
相关题目:
参考解析:
知识点:
题目纠错 0
发布
创建自己的小题库 - 刷刷题