当前位置: 高中英语 / 阅读理解
  • 1. (2022高一下·常州月考) 阅读理解

    Several years ago, when someone used camera covers to protect against possible monitoring, it was not popular to talk about it. Today, people use various types of tapes to cover the web cameras and microphones.

    There are many types of spyware that can dive into our devices and secretly spy on them, recording everything they do. Such programs may infect not only computers but also smartphones. Your data may be used by hackers who will try to request money for not exposing your private information or by companies like NSO Group who created the Pegasus spyware to "provide authorized governments with technology that helps struggle against terror and crime".

    In my opinion, the described protection technique is highly overestimated. Users tape cameras and microphones due to the lack of understanding of how their devices work and how malware(恶意软件)works. Hackers and even secret services do not have enough resources to monitor all victims using cameras or microphones. If they need to yet any information, they get it by sending a targeted malware to your device, which will not be stopped by the tapes. Such a virus will find what to steal -from personal photos and videos to passwords from social networks, browser history, bank accounts and much more.

    It is unwise to believe that attackers will not be able to find a way to spy on you, even if the device, discharged to zero, can still deliver data about your location, using the smartphones of the surrounding people as signal repeaters. Let us face it. we live in an era when it is extremely difficult to hide something and a piece of tape is clearly not the most useful tool in the struggle for your privacy.

    Again, to be able to spy on you, attackers need to plant malware in your device. To prevent malware from entering your device, do not click suspected links and email attachments. Use strong passwords for email, social media and online banking accounts.

    1. (1) What does the underlined word "them" in paragraph 2 refer to?
      A . Cameras. B . Types. C . Programs. D . Devices.
    2. (2) What is NSO Group?
      A . group of hackers. B . A company developing spyware. C . A group of terrorists and criminals. D . A company fighting against crime.
    3. (3) Why does the author think "the protection technique is highly overestimated"?
      A . People know little about their devices. B . Hackers have no access to others. C . It hardly prevents malware from getting privacy. D . It can't cover the cameras completely.
    4. (4) What is the text mainly about?
      A . Protecting privacy on devices. B . Rising trend of using tapes. C . Monitoring devices via cameras. D . Avoiding clicking distrustful links.

微信扫码预览、分享更方便