Millions of people are now using what are called“peer-to-peer”networks. Basically, you link your computer to other computers all across the country, mostly so you can give something in exchange for music for free.“But here's the problem,”“Early Show”Consumer Correspondent Susan Koeppen says as part of the broadcast's series, “Somebody's Watching You”: thieves are using the same networks, and they're not interested in music-they're seeking access to your financial information.
Beth Pope learned the hard way. When she put peer-to-peer software on her computer, she had one goal in mind: increasing her music library.“I thought I could get access to other people's music folders and they could have access to my music folders,”she says,“and that was about it. I didn't think it went any further than that.”
Are Your Medical Records Watched? That is, until she was contacted by the Secret Service-with shocking news-someone had stolen personal information from her computer-using the very software she used to trade music. With the help of David Dunn, a member of the Secret Service Electronic Crimes Task Force, Koeppen decided to see what personal information she could find using a peer-to-peer network.
Thieves typically seek documents such as credit reports, tax returns, or the federal financial student aid application, Dunn says.“Obviously,”says Dunn,“we aren't going to download it, because it's someone's personal information. I'm sure that, whoever (this file sharer) is didn't want her (student aid application) confirmation number available online for somebody to download.”Pope says she's done using peer-to-peer.“I've gotten all of that off my computer, ”she says.“I pay for music now. It's the best way to do it. There's no way that I would ever do that again.”
The trade group for file sharing software companies says they are working on better systems to prevent the misuse of the peer-to-peer networks. Still, Koeppen urges that people, for instance, delete Lime Wire from their computers, or make sure they have the latest version, which should have updated security features.
1.Thieves are trying to get access to your computer in order to .
A. find your personal information
B. see how your computer is working
C. talk with you
D. help you with your system
2.Why did Beth Pope use peer-to-peer software?
A. Because she wanted others to use her information.
B. Because she wanted to try it.
C. Because she wanted to increase her music library.
D. Because she wanted to get others' financial information.
3.Susan Koeppen tried to .
A. warn the readers of dangers of sharing music files with others.
B. warn the readers not to share music files with others.
C. tell us a true and funny story
D. advertise the peer-to-peer networks.
4. From the passage we get to know .
A. we shouldn't believe others.
B. computers make our life easy and comfortable.
C. softwares help us to share music with others
D. everything has two sides, the good side and the bad one
完形填空(共20小题;每小题1.5分,满分30分)
When I was a young girl, I spent a lot of time with my grandparents, who lived in a community especially for the elderly and near to an old people's home. They used to tell me that few volunteers would go there and said if someone elderly engages me in 36 ,I'd better make time for them. As a result,I 37 be the only person they got to talk to that day. I've never forgotten this and still 38 time to chat with elderly people.
So when I 39 a 100-dollar prize in the kindness competition for my community, I 40 thought of the elderly! I then 41 my local community centre and told them how I'd made a suggestion that if I had 100 dollars to 42 my community, I would use it for the elderly who were living 43 . I asked, "Could you do something a bit 44 so that they could all get something from this 45 ?”"Yes, of course, we could do a buffet (自助餐)and dance,”the centre manager told me.
I thought this was a fantastic 46 and a very worthwhile use of the 47 .We bought food and beverages (饮料) enough to serve about 30 elderly residents. A poster was 48 to announce it and it was 49 for an afternoon.
I went up to see how it was all 50 and it turned out to be a very enjoyable afternoon. I was very 51 to see that the people I wanted to serve had a wonderful and enjoyable times. It 52 me that one is never too 53 to have fun! I knew my grandparents would have been very 54 of me. It also helped me to remember that whatever is going on in the world,we can still make a(n) 55 to other people's lives.
1.A. walking B. argument C. conversation D. shopping
2.A. might B. must C. would D. should
3.A. consume B. spare C. devote D. share
4.A. won B. admitted C. impressed D. paid
5.A. eventually B. usually C. immediately D. always
6.A. recognized B. joined C. contacted D. congratulated
7.A. purchase B. create C. benefit D. match
8.A. freely B. comfortably C. lonely D. alone
9.A. adventurous B. strange C. special D. merciful
10.A donation B. movement C. collection D. recreation
11.A. promise B. idea C. discovery D. comment
12.A. community B. competition C. money D. space
13.A. thought of B. put up C. agreed on D. sent up
14.A. known B. applied C. arranged D. read
15.A. going B. existing C. preparing D. ending
16.A. pleased B. hopeful C. curious D. anxious
17.A. provided B. challenged C. reminded D. puzzled
18.A. young B. busy C. poor D. old
19.A. proud B. ashamed . C. cautious D. aware
20.A. fortune B. influence C. promise D. contribution
The conventional view that the Mars' atmosphere is very poor because the planet lacks a magnetic field.
A. covers B. holds C. possesses D. contains
―Is that Miss Liu having dinner over there?
―It be her. She has gone to New York for an important business meeting.
A. mustn't B. needn't C. can't D. shouldn't
We are working on the ___________that everyone _________ will turn up.
A. assumption; invited B. regulation; inviting
C. constitution; invited D. expectation; inviting
In which part of the play is it Lily will play a role?
A. where B. which C. that D. who