题目内容

Section CDirections: In this section, you are going to read a passage with ten statements attached to it. Each statement contains information given in one of the paragraphs. Identify the paragraph from which the information is derived. You may choose a paragraph more than once. Each paragraph is marked with a letter. Answer the questions by matching the corresponding letter with each statement.A)Computers house so much of our personal data that it's essential to set up protective measures in case of cyber attack or mechanical failure. These five mustdo steps dramatically increase the odds your computer (and your privacy) will remain safe from the latest online criminal activity and let you save your most important files if your computer becomes irretrievably (无可挽回地) infected. B)Updating the software on your system, including the operating system, is an absolute necessity. If you don't download new versions of programs like Adobe Flash, your computer is more likely infected by malware (恶意软件). Updates to your Windows or Mac operating system help address new threats. To keep your Windows system up to date, you can use Windows Update to make sure you're getting the necessary adjustments. This is usually set to update automatically, but here's how can check to make sure. C)In Windows 7, click the Start button, type “windows update” into the search box. Click on Windows Update in the results (it will be under the Program section of the results.) Click on “Change Settings” in the Windows Update window that pops up and then check to see that the Install Updates Automatically option has been selected under Important Updates section. Then choose OK to save your changes. In Windows 8, open the Search bar, enter “turn automatic updating on or off” and then click Settings. Microsoft issues new updates every second Tuesday of the month. Mac OS X checks automatically for updates weekly if it has an internet connection. D)Uninstall Java. Java is a program that websites used to incorporate (使合并) into their systems, but is rarely used now. Continuous security holes allowing malware to infect computers through Java makes it no longer safe to leave it on your system unless you absolutely need it. Even the Department of Homeland Security has recommended removing Java from your computer or, at least, disabling it in your browser. We recently posted a step-by-step guide to identifying if your system has Java installed and what you need to do to remove or disable it. We cannot stress enough the importance of uninstalling Java for the health and security of your computer. E)Install malware protection. Trojans (木马病毒), viruses, keyloggers (键盘记录类病毒), zombie code, spyware, adware and more are continuously finding new ways to make it onto your PC. But many people are infected by malware that has been around for years, simply because they don't have decent security software installed. Norton Internet Security 2013 is a solid malware protector, especially adept at removing all sorts of things that shouldn't be on your system. If you don't want to spend any money, there are very good free antivirus programs available, like AVG AntiVirus Free 2013. Macs are not safe from these kinds of attacks either. A recent study judged the effectiveness of many top security software programs for the Mac against a virus that made the rounds on the Apple computer. F)Use strong passwords. Many of us just use one or two passwords for all the sites we visit. Who can keep track of a couple dozen unique passwords anyway? But if one of those sites gets hacked and they were to using proper encryption (加密) techniques, criminals will now have your password for Amazon, eBay, PayPal, or even your online bank. There is a simple three-step solution: 1) Make strong passwords. 2) Use different passwords for each site. 3) Use a password management system to track them all. A strong password usually should have at least 8 characters (the longer the better), with a mixture of upper and lowercase letters, numbers and, if the site or service allows, special characters, such as “!,” “#” and “?.” But it should also be something you can easily remember. And that conflict has led too many people to use common passwords that are easy to hack. The good news is that recent studies have shown password length may be more important than whether you're using fancy characters. So the password “IgrewupinBrooklyn” may actually be incredibly difficult to crack. Also, consider lying when creating password security questions. Public information that can be Googled makes you an easy target for hackers trying to get your password. G)Back it up. When your system is infected beyond repair or compromised and wiped, you need to have a backup of your critical documents so they're not lost forever. Your two major backup solutions are online storage and external hard drives. H)The major cloudbased storage services offer a few gigabytes for free with a cost to get access to more. If you back up thousands of large files, like photos and videos, you may have to pay a monthly fee. Cloudbased storage is perfect for saving important can'tlose documents and the best of your photos. Backing up is as simple as signing up for one of the services and then putting your documents into a special folder on your desktop that will sync (同步) to your cloud storage or marking which folders on your hard drive you want to sync. I)You can access your files from anywhere with a computer, tablet or phone and an Internet connection. Many also let you sync files between devices, so it's like having a cloudbased storage and external hard drive storage at the same time. Most of the cloud-based storage services provide encryption of files while they transfer from your computer to their servers, but the files will usually be stored unencrypted on the server. If you want an extra level of privacy protection, consider a program that encrypts files before uploading them. J)The external hard drive option is better for instant access to very large files or if you have tons of files and don't want to pay a monthly fee. But if a fire, flood or theft takes out your home computer, it will likely destroy your external hard drive, as well. So we always recommend using a backup drive in conjunction with cloudbased storage for your most important files.Statements:1. The Install Updates Automatically option is under the “Change Settings” in the Windows Update windows in Windows 7.[A] [B] [C] [D] [E] [F] [G] [H] [I] [J]2. Longer passwords are preferable than fancy ones.[A] [B] [C] [D] [E] [F] [G] [H] [I] [J]3. It's necessary to update the software as well as operating system to protect your computer from being attacked by malware.[A] [B] [C] [D] [E] [F] [G] [H] [I] [J]4. External hard drive is better used to store very large or quite a lot files.[A] [B] [C] [D] [E] [F] [G] [H] [I] [J]5. Cloud-based storage is the best backup solution for your most important but limited documents.[A] [B] [C] [D] [E] [F] [G] [H] [I] [J]6. It's better not to tell the truth when creating password security questions for public information could be compromised.[A] [B] [C] [D] [E] [F] [G] [H] [I] [J]7. It's not safe to have Java installed in your computer system.[A] [B] [C] [D] [E] [F] [G] [H] [I] [J]8. You'd better encrypts files before uploading them for better privacy protection.[A] [B] [C] [D] [E] [F] [G] [H] [I] [J]9. Both PC and Mac are all under attack of various malwares.[A] [B] [C] [D] [E] [F] [G] [H] [I] [J]10. If set to update automatically and connected to internet, Microsoft operating system may get updated every month.[A] [B] [C] [D] [E] [F] [G] [H] [I] [J]注意正确答案的格式是字母:H,不然不能得分。

查看答案
更多问题

“拉斯韦尔模式”,又称()模式。

A. 5C
B. 4W
C. 5W

沟通中必须遵循的原则包括()

A. 沟通的目标
B. 对方的身份
C. 科学的思维

当一个学生没有完成作业时,我们应该从哪个角度查找原因()

A. 环境
B. 行为
C. 能力
D. 身份

以下属于沟通要素的是()

A. 主体
B. 编码
C. 通道
D. 解码
E. 客体

答案查题题库