2014-08-15 08:33:00 来源:网络发表评论
备考辅导:英语备考策略和技巧 联考英语翻译备考策略 2015在职硕士考试经验技巧
GCT考试: GCT英语备考辅导 GCT数学备考辅导 GCT语文备考辅导 GCT逻辑备考
公共管理: 公文写作范文汇总 2015年在职MPA管理学案例材料 人力资源营销新论
艺术硕士: 艺术硕士艺术概论资料汇总 艺术硕士复习试题|答案 艺术硕士备考知识点
Muffin Man has more than 2,000 songs on his hard drive, and he's happy to share them. He's a big fan of bands like Pearl Jam and the White Stripes, so there's plenty of hard rock in his collection.
But chances are you'll never get to it. The 21-year-old pizza cook, who asked to be identified by his online nickname, makes his songs available only through private file-sharing networks known as darknets. Unlike such public networks as Kazaa or Morpheus, which let you share songs with anyone, private networks operate more like underground nightclubs or secret societies. To gain access, you need to know the name of the group and a password. And the only way to get that information is from another member who invites you in. Some darknets even encrypt files and mask your identity within a group to keep eavesdroppers from finding out who you are and what you are sharing.
It's a handy invention now that the recording industry has taken to suing kids who share music online. But darknets are not just for digital music files. Carving out a bit of privacy online has wide appeal; students, community groups and even political dissidents can use these hidden networks to share projects, papers and information. One part of the allure is anonymity; the other is exclusivity. Since participation is limited, file searches don't turn up a lot of junk or pornography. Darknets offer the convenience of the Web without a lot of the bad stuff.
You need special software to start a darknet of your own. The two most popular programs are Direct Connect by NeoModus (at neomodus.com) and an open-source variation of it called DC++, available at sourceforge.net. More than 800,000 copies of DC++ have been downloaded since mid-July. A third program, called Waste (also at sourceforge.net), automatically encrypts files but is much harder to use.
There are no good estimates of how many people use darknets. Lowtec, a college sophomore studying computer engineering, figures that 10% of the students at his school (which he declined to name) share files through Direct Connect. "It's much faster than Kazaa," he says. That's because private networks typically link small, close-knit communities in which all members have superfast connections.
The recording industry so far hasn't put much effort into combatting the secret networks, but its neglect might not last long. If networks like Kazaa become too risky, darknets could quickly rise to take their place. And if that happens, the music industry could find itself chasing users who are that much harder to catch.
1. From the first two paragraphs, we learn that__________.
[A] Muffin Man’s songs will be available if you know his online nickname
[B] Outsiders can not visit darknets without the invitation from a member
[C] Kazaa is to darknets what police is to underground world
[D] It’s impossible for people to find out your true identity on the darknets
2. Which of the following statements is true according to the text?
[A] Darknets are being accused by the recording industry of allowing kids to share music online.
[B] People use darknets to share music mainly.
[C] One advantage of darknets is that people can avoid reading unwanted information.
[D] Users of private networks are mostly students.
3. The word “allure” (Line 4, Paragraph 3) most probably means____________.
[A] advantage
[B] achievement
[C] feature
[D] appeal
4. We can draw a conclusion from the text that ___________.
[A] darknets may become a headache of the music industry
[B] the age of darknets is within reach
[C] darknets may excel Kazaa in the number of its users very soon
[D] the music industry will lose the battle against darknets
5. From the text we can see that the write seems__________.
[A] positive
[B] negative
[C] doubtful
[D] uncertain
答案:BCDAA
篇章剖析
本篇文章是一篇说明文,介绍了一种名为“地下网络”的私人文件共享网络。文章第一段介绍了在这种网络中活动的一位典型的用户。第二段介绍了这种地下网络的特点。第三段说明地下网络受人欢迎的原因。第四段说明如何创立自己的地下网络。第五段介绍了目前使用地下网络的情况。最后一段得出结论:这种网络有可能崛起并取代现有的一些共享音乐的公共网络。
词汇注释
encrypt[in5kript] v. [计] 加密,将...译成密码
eavesdropper[`i:vz9drCpE(r)] n. 偷听者
dissident[5dIsIdEnt] n. 持不同政见者
allure[E5ljuE] n. 诱惑力
anonymity[7AnE5nimiti] n. 匿名
exclusivity[7eksklu:5siviti] n. 排外(主义); 排他性[主义](尤指搞宗派, 拉山头, 或闭关自守)
pornography[pC:5nC^rEfi] n. 色情资料
难句突破
Some darknets even encrypt files and mask your identity within a group to keep eavesdroppers from finding out who you are and what you are sharing.
主体句式:some darknets encrypt files and mask your identity.
结构分析:本句是个复杂句,介词短语within a group作方位状语,不定式短语做目的状语,在这个短语中有一个who和what引导的并列宾语从句作介词from的宾语。
句子译文:一些地下网络甚至在组织内部还要对文件进行加密,并且对你的身份进行伪装,以防好事之徒发现的身份以及你所共享的内容。
GCT | 【特训】2015年GCT英语全程专项特训班 | ¥980 | 免费试听 |
【特训】2015GCT语文全程专项特训班 | ¥400 | 免费试听 | |
【特训】2015年GCT数学全程专项特训班 | ¥680 | 免费试听 | |
【特训】2015年GCT逻辑全程专项特训班 | ¥400 | 免费试听 | |
联考英语 | 【提高】2015年联考英语技巧提高班 | ¥680 | 免费试听 |
【冲刺】2015年联考英语冲刺抢分班 | ¥680 | 免费试听 | |
法律硕士 | 【全程】2015法律硕士专业综合全程 | ¥880 | 免费试听 |
工商管理 | 写作专项零基础班数学专项逻辑专项 | ||
专项班 | 公共管理会计硕士教育硕士艺术硕士 |
版权及免责声明
1,"新东方在线"上的内容,包括文章、资料、资讯等, 本网注明"稿件来源:新东方在线"的,其版权 均为"新东方在线"或北京新东方迅程网络科技有限公司所有 ,任何公司、媒体、网站或个人未经授权不得转载、链接、转贴或以其他方式使用。已经得到 "新东方在线"许可 的媒体、网站,在使用时必须注明"稿件来源:新东方",违者本网站将依法追究责任。
2, "新东方在线" 未注明"稿件来源:新东方"的 文章、资料、资讯等 均为转载稿,本网站转载出于传递更多信息之目的,并不意味着赞同其观点或证实其内容的真实性。如其他媒体、网站或个人从本网站下载使用,必须保留本网站注明的"稿件来源",并自负版权等法律责任。如擅自篡改为 " 稿件来源:新东方 " ,本网站将依法追究其法律责任。
3,如本网转载稿涉及版权等问题,请作者见稿后在两周内与新东方在线联系。