题目内容:
Questions are based on the following passage.As details of American snooping ( 窥探 ) spread, sales of "1984", George Orwell'sfable of an ever-watching state, rocketed. So did traffic to websites run by TacticalTechnology Collective, a(1) that teaches journalists and activists how to evade onlinespies. "It can be hard to persuade people accept surveillance (监事 )(2) to them,"admits Stephanie Hankey, a co-founder. Apparently not any more.
Opponents have always trying to take3to cover compromisingcommunications. But computers now mark suspicious patterns in daily activities too.
People need greater alertness and face three challenges to keep secrets.
The first is stopping the nosy ( 爱管闲事的 ) sniffing communications in transit.
Unencrypted ( 未加密的 ) e-mails are as(4)as postcards, warns Ben Wagner, anInternet specialist at the European University Institute. Pretty Good Privacy (PGP),scrambling ( 打乱 ) software that works with several web clients, can prevent such snooping.
Another task is to stop spies sucking data from wherever it is (5). That meanswithdrawing from services, such as social networks and search engines, that must passdata to governments--or (6) out alternatives in untouchable territories. A battereddesktop with free software makes a secure e-mail server.
It is (7) to escape from systems that record whether communications havetaken place. "Using a mobile is the worst thing you can do," says Marek Tuszynski atTactical Technology. The call logs ( 通话记录) kept by telecoms firms are difficult toavoid. Internet users have more security. Free software such as Tor can hide theiridentity by (8) routing their requests.
But staying under the radar is boring and hard to keep up. Clueless contactscan blow your cover. Even technophiles ( 技术爱好者) may compromise themselvesby(9)means.
Ms Hankey would prefer laws, not just technology, to preserve people's (10)She wants governments in Europe and elsewhere to boost alternatives to America's "digitalmonopolies".
A.charity
B.cleverly
C.clinic
D.hopefully
E.matters
F.meaningless
G.measures
H.open
I.posted
J.privacy
K.seeking
L.simpler
M.stored
N.Irickier
O.unconsciously
第1题应选( )
参考答案:
答案解析: