欢迎光临,有需要请联系站长!
想要快速找到正确答案?
立即关注 超新尔雅学习通微信公众号,轻松解决学习难题!
作业辅导
扫码关注
论文指导
轻松解决学习难题!
中国大学MOOC大学英语 4作业答案
大学英语 4
学校: 无
平台: 超星学习通
题目如下:
1. Directions: In this section, you are going to read a passage with ten statements attached to it. Each statement contains information given in one of the paragraphs. Identify the paragraph from which the information is derived. You may choose a paragraph more than once. Each paragraph is marked with a letter. Do We Need a New Language to Describe Cybersecurity? A)The English language has changed in recent years to be more inclusive of a variety of groups. Some say those changes reflect our increasingly diverse society; others say the words we use help to create that diversity. Language matters, we now know. The words we use not only reflect our perceptions of the world, but may shape it, as well: How we say something can be as important as what we say. Aboriginal Australians(澳洲土著),for instance, use directional terms such as "north" and "southeast" instead of "left"and "right." They are said to have a sense of direction as good as any compass.Equatorial(赤道附近的) people whose language offers no distinction between “blue” and "green" have been found to see no difference between the two colors. And so on. B)"Language uses us as much as we use language," feminist scholar Robin Lakoff wrote in her 1973 essay, "Language and Woman's Place." Is this true in cybersecurity as well? Perhaps we ought to examine the terminology(术语) our profession uses, and ask whether it helps us to achieve our goals. “Zero-day attack." Kill chain." "Black hat.""Advanced persistent threat." These and other cybersecurity terms, with their implied meanings of armed conflict, can make the digital world feel like a scary place, even for those in the profession. C)Journalist Elizabeth Segren blames cybersecurity's “adversarial(敌对的) language of attack and combat" at least in part for the small number of female cybersecurity profesionals — fewer than 10 percent of college graduates in the field are female, she writes. And if cybersecurity's military-style language alienates(使···疏远) women in the profession, isn't it likely that "civilians" — everyday users of digital devices — feel the same effect? If so, that's a problem. Because for cybersecurity to work, we need users to feel engaged, not alienated. D)The language of battle is, by design, powerful, aggressive and intended to put fear in the enemy — which it doesn't seem to do. Cyber criminals seem undeterred(未被吓住) by talk of “brute force attacks,”“firewalls” and “insider threats.” Computer owners are often the ones feeling intimidated -in part, perhaps, because of the language we use. Losing one's "identity" can sound a lot like total destruction, one of our most b 渝粤教育 asic,instinctual fears. E) None of the biological responses to fear -“fight,”“flight,” or “freeze”- necessarily helps us to take rational, informed security measures such as opening email attachments with care, or declining to do our banking on a public Wi-Fi server. At least one study reports that fear and the stress it brings can cause a person to reject a threat altogether,or to deny that it exists. Is this what we want? F) For truly effective cybersecurity, we need people to engage, not disengage -to take an active role in protecting the security and privacy of not only their own devices and data but also of every site they log onto, every contact in their socia 成人学历 l media accounts,and every person on their contact lists. To this end, those in the cyber security profession might consider developing a new, inclusive, "all for one, and one for all" language, one emphasizing personal responsibility and a sense of community. G)Cybercriminals seem to have figured this out. A hacker's vocabulary reveals a playfulness with language that inspires the creation of new words and terms exclusive to the group, the verbal equivalent of the "secret handshake" at the clubhouse. "Raindance,""rubber ducky," even "angry fruit salad" and "spinning pizza of death":Compare these hacker phrases with such cybersecurity terms such as "adversary,""attack"and "advanced persistent threat." H)How did cybersecurity acquire its militaristic language? The earliest computer networks were developed to warn the government in case of coming nuclear attack,scholar Tung-Hui Hu points out in his book, A Prehistory of the Cloud. In those days, using the language of war must have seemed natural. Today, though, the Internet serves many functions, many of them business-oriented or personal. Our security concerns are more widespread, as well. Effective information security relies on the vigilance(警惕) and cooperation of all Internet users, and may, in turn, call for a new, inclusive language,one emphasizing cooperation over conflict, flexibility over firewalls, and creativity over rigidity. In short, we need to speak in human terms, not military ones, using what maybe the most effective persuasion technique available: storytelling. I) Our brains thrive on stories, for reasons as much to do with survival as entertainment,writes Lisa Cron, author of the book Wired for Story. Stories help us not only to avoid past mistakes - ours and others'— which certainly helped us to evolve, but they also can motivate us to behave in certain ways. "Story or narrative takes those big ideas,abstract concepts, dry fac 渝粤题库 ts and translates them into something very specific that we can experience . and that's what .. moves us to action," Cron said in an interview with a New York state public radio station. J) Many people do not take proper cybersecurity precautions such as using strong passwords even though they know that they are supposed to, researchers have found. In other words, cybersecurity's "FUD" approach — trying to motivate change by sowing fear, uncertainty, and doubt-doesn't work with consumers. K) So what can we do to change the language of cybersecurity? One idea: Replace the dull FUD with the shining STAR model -situation, task, action and results. Instead of sparking fear with talk of "kill chains" and "weaponized content," this type of story telling model can provide a framework for new ways of engaging with, and inspiring secure online 国家开放大学 behaviors. We can persuade people to keep away from risky behaviors by telling stories that people can relate to. Instead of scaring them to inaction using doomsday(世界末日) terminology and attack scenes, why not motivate them to action with good,old-fashioned, empowering stories told in language they can relate to? 1. The military-style cybersecurity language can be dated back to the Internet's original function: warning the government of potential nuclear attack. 2. There're very few female cybersecurity professionals due to the field's heavy use of aggressive language. 3. One study shows that we might respond to a threat by ignoring it or pretending that it has never been there. 4. The fact that aboriginal Australians have an exceptional sense of direction can be attributed to the directional terms they use. 5. Cybersecurity's adversarial language, which is intended to intimidate cyber criminals, often intimidates computer owners. 6. In order to change the language of cybersecurity, the dull FUD approach should give way to the more persuasive STAR model. 7. We need stories because stories urge us to behave properly and not to repeat mistakes. 8. Military-style language in the field of cybersecurity has made the digital world a scary place. 9. Cybersecurity's FUD approach has failed to make computer users take more cautious security measures. 10. Cybersecurity professionals might consider developing a new cybersecurity language featuring personal responsibility and a sense of community.
答案: H# C# E# A# D# K# I# B# J# 第十空: F
2. Directions: There is one passage followed by some questions or unfinished statements. For each of them there are four choices marked A), B), C)and D). You should decide on the best choice. It is very apparent that bullying is growing and spreading rapidly in our society. It is an issue that we need to address very seriously. Duane Alexander, director of the National Institute of Child Health Human Development said: "Being bullied is a public health problem that merits attention. People who were bullied as children are more likely to suffer from depression and low self esteem, well into adulthood, and the bullies themselves are more likely to engage in criminal behavior later in life." There are many types of bullying: cyber bullying, verbal bullying, school bullying, text bullying, workplace bulying, bullying parents, bullying harassment(骚扰), physical bullying. All these types of bullying are very damaging. Now, cyber bullying is growing rapidly. Cyber bulying has an effect on many young people on a daily basis. Cyber bullying entails(需要)using technology, such as cell phones and the internet, to bully or harass somebody else. Cyber bullying has many forms such as: "Sending mean messages or threats to a person's email account or cell phone, spreading rumors online or through texts, posting hurtful or threatening messages on social networking sites or web pages, stealing a person's account information to break into their ac 广东开放大学 count and send damaging messages, pretending to be someone else online to hurt another person,taking unflattering(有损形象的) pictures of a person and spreading them through cell phones or the internet, or circulating sexually suggestive pictures or messages about a person." Many people have committed suicide because of cyber bullying and it is very damaging,especially to young people. In many cases, it can lead to depression and anxiety. There are many cyber bullies who believe that it is funny to bully people online or via phones and they don't think about the impact it is having on the other person. Also, once something is circulated on the web, it may never disappear; these materials have the potential to resurface at a later time to renew the pain of cyber bullying. 1.The author quoted Duane Alexander to confirm that______. A)bullying is a serious social issue B)bullying comes in different types C)children bullying is more damaging D)children bullying is growing rapidly 2. What might happen to children bullies when they grow up? A)They might suffer from depression. B)They might have a lower self-esteem. C)They are more likely to commit suicide. D)They are more likely to commit crimes. 3. What do cyber bullies themselves think of bullying? A)It is not harmful. B)It affects the other people. C)It targets no specific victims. D)It spreads various information. 4. What do we learn about the pain of cyber bullying? A)It has multiple forms. B)It may be renewed. C)It can be replaced. D)It may disappear. 5. What is the passage mainly about? A)Types of bullying. B)Children and bullying. C)Cyber bullying and its causes. D)Cyber bullying and its consequences.
答案: A# D# A# B# D