单选

Passage Four

What will people use the Internet for? Shopping and banking will be big growth areas. Henley predicts that, from under 1% of all purchases today, it will account for 6.4% of purchases within four years, amounting to 42 billion. Sales have already started with dry goods such as books and CDs and, as people learn to trust it, will move on to regular purchases such as food. Iceland, the supermarket chain, began computer shopping trials two weeks ago and has already signed up at least 15,000 customers, ranging from busy executives to the housebound. When it links up with digital television, Iceland expects to double that immediately.

Yet internet-linked televisions and phones may be only the start. One potential breakthrough is Bluetooth named after a 10th century Danish king famed for his rotten front tooth and uniting warring factions in Denmark and Norway.

The modern Bluetooth allows an unlikely array of machines to talk to each other, so that a phone tucked away in a briefcase can remember to send out a signal that turns on a video machine 50 miles away, switches on the heating or starts the cooker. Cars, offices and kitchens will all speak to each other. In Finland, the idea of phones communicating with computerized tills so that you press a button and pay for your supermarket goods or drink from a vending machine is being tested. Said one enthusiast:“Your phone will be your remote control for life.”

  • As with all revolutions, there are reservations. Health concerns about mobile phones are unresolved, with microwave radiation linked to increased tiredness and headaches in one recent study in Sweden.    Some argue that more sophistica
  • According to the passage, internet purchases ______.
  • A.will have great growth in dry goods
  • B.will be accepted by more and more people
  • C.will be used in Iceland, the supermarket chain
  • D.will become a major form of purchase within four years
参考答案
您可能感兴趣的试题

Virtually every company with a computer is vulnerable to computer abuse, crime and accident. Security of the computer and of the information and assets contained within it are therefore of paramount importance to management. (46. Skilled computer criminals can break into a computer system far more easily than an armed robber can gain access to a bank vault, and usually with far less risk of apprehension and punishment.) A slight change in a complex program can bring about the misappropriation of thousands of pounds. Accidental erasure of crucial data can paralyse a company’s operations. Anyone familiar with the procedure can gain access to information stored in the computer, no matter how confidential, and use it for his own purposes.

Although the actual extent of computer crime is difficult to measure, most experts agree that it is one of the fastest growing areas of illegal activity. (47. The principal reason for both the growth and the lack of accurate measurement is the difficulty in detecting a well-executed theft. Losses per incident thus tend to be higher than in other types of theft.) Once the computer criminal has compromised the system, it is just as easy to steal a great sum as it is to steal a little, and to continue stealing long after the initial theft. Indeed, the computer criminal may find it more difficult to stop his illicit activity than to start it.

(48. Computer criminals are, for the most part, well-educated and highly intelligent, and have the analytical skills that make them valued employees.) The fact that computer criminals do not fit criminal stereotypes helps them to obtain the positions they require to carry out crimes. Being intelligent, they have fertile imaginations, and the variety of ways in which they use equipment to their advantage is constantly being extended. (49. In addition to direct theft of funds, the theft of data for corporate espionage or extortion is becoming widespread, and can obviously have a substantial effect on a company’s finances.) Another lucrative scheme, often difficult to detect, involves accumulating fractions of pence from individual payroll accounts, with electronic transfer of the accumulated amount to the criminal’s payroll. Employers are hardly concerned with pence, much less fractions of pence. In addition, of course, the company’s total payroll is unaffected. But the cumulative value of fractions of pence per employee in a company with a substantial payroll can add up to a useful gain.Sabotage is also an increasingly common type of computer crime. This can involve disabling the hardware, but is more likely to affect the software. Everyone in the computer business has heard of cases of a “time-bomb” being placed in a program. (50. Typically, the programmer inserts an instruction that causes the computer to destroy an entire personnel data bank, for example, if the programmer’s employment is terminated.) As soon as the termination data is fed into the system, it automatically erases the entire program.

¥

订单号:

遇到问题请联系在线客服

订单号:

遇到问题请联系在线客服