首页 > 外语类考试> 大学英语四级
题目内容 (请给出正确答案)
[主观题]

Internet use appears to cause a decline in psychological well-being, according to research

at Carnegie Mellon University.

Even people who【B1】just a few hours a week on the Internet【B2】more depression and loneliness than those who logged on less【B3】, the two-year study showed. And it wasn't that people who were already feeling【B4】spent more time on the Internet, but the using the Net actually【B5】to cause the bad feelings.

Researchers are puzzling over the results,【B6】were completely contrary to their【B7】. They expected that the Net would prove socially【B8】than television, since the Net【B9】users to choose their information and to【B10】with others.

The fact that Internet use has【B11】time available for family and friends may【B12】for the drop in well-being,【B13】hypothesized(假设). Faceless, bodiless virtual communication may be less psychologically satisfying than actual【B14】, and the relationships formed through it may be【B15】. Another possibility is that exposure【B16】the wider world via the Net makes users【B17】satisfied with their lives.

"But it's important to remember this is not about the technology itself; it's about【B18】it is used," says psychologist Christine Riley of Intel, one of the study's sponsors. It really points to the need for considering social【B19】in terms of how you design applications and services【B20】technology.

【B1】

A.took

B.spent

C.cost

D.paid

查看答案
答案
收藏
如果结果不匹配,请 联系老师 获取答案
您可能会需要:
您的账号:,可能还需要:
您的账号:
发送账号密码至手机
发送
安装优题宝APP,拍照搜题省时又省心!
更多“Internet use appears to cause …”相关的问题
第1题
The author's attitude toward Internet advertising appears tO be one of ______.A.wholeheart

The author's attitude toward Internet advertising appears tO be one of ______.

A.wholehearted approval and confidence

B.approval so far but uncertainty in the future

C.objective analysis devoid of opinion

D.respect for its past record, but with little hope for its future

点击查看答案
第2题
The recession of stores appears to have accelerated because______.A.stores refuse to give

The recession of stores appears to have accelerated because______.

A.stores refuse to give heavy discounts

B.more shoppers turn to internet shopping

C.buyers are tired of queuing outside stores

D.customers are not confident in the economy

点击查看答案
第3题
Buying OnlineWhy buy online?It's little wonder that new buyers quickly learn to love Inter

Buying Online

Why buy online?

It's little wonder that new buyers quickly learn to love Internet shopping. At the moment, the best deals on the Web are in clothes, books, CDs, videos, flights and holidays.

Advantages — Buying online does have a number of potential advantages:

Price: items are usually cheaper on the Web because warehouse and staff costs are lower, and because online shops want to attract and keep customers.

Convenience: shopping can be much easier on the Internet. It can be done at home, at a convenient time and be very quick.

Wide choice: Internet shopping allows you access to a wide range of shops all around the world, some of which don't exist on the high street. Online shops also usually carry a much larger stock.

Quick delivery: most Internet sites are able to deliver within a few days.

Disadvantages — There are also some disadvantages buying online:

Delivery: many sites still use traditional carriers and don't deliver at night or at weekends. Often you end up having to go and collect from a warehouse.

Costs and returns: adding up transport and, if buying from outside the European Community, tax and duty, can often mean an item isn't as cheap as it seems. Returning a purchase often means having to parcel it up and take it down to the post office.

Cost of using the Internet: although online access is getting cheaper, many Internet providers still charge per minute. Browsing around a wide range of shops can take as long as a traditional shopping visit, so beware.

Buying more: because everything is at the click of a mouse, it's very easy to buy and spend more than you intended to.

How to go about shopping online

Most high-street names now have a presence online. These shops and other well-known Internet shopping sites are a good place to start, It's best to get used to buying online from a brand you already know and trust.

Simply search for it under its own name, adding "www" at the start and either ". com" or ". co. uk" at the end. If this doesn't work, most search engines and Internet shopping directories should be able to help. They'll also be the place to go if you're looking for a particular item.

Most online shops work on the "shopping basket" principle. You tour the site and click when you see something you want. The item gets placed into a virtual shopping basket. When you want to pay for the items in the basket, you'll be asked to register. You'll then be taken to a secure part of the site to give details of your credit or debit card. You're usually able to send a check instead, but this can mean a wait of a week or two, because the company will often want to clear the check before sending you the goods.

Tips before you buy

Pay by credit card because this may give you some additional protection. Only use debit cards when you're dealing with shops you know you can trust. When giving out these details, always ensure you're using a secure site.

Do some real-world research as well as Internet research to compare prices. Internet prices may not always be the cheapest.

Print out your order and keep any terms and conditions in a safe place along with the company's postal address and telephone number.

Check the company's policy on returning goods. If you've bought the item from a site abroad, you may find returning it costly.

Look out for loyalty schemes and email alerts where shops will contact you with bargains or new deals.

Be careful about spending too long surfing for a bargain it can be addictive and costly.

Security and privacy

Security is far less of a problem than it appears if you ensure you only shop at websites that offer secure payment pr

A.Y

B.N

C.NG

点击查看答案
第4题
HackThe first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all n

Hack

The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognizable names behind many of the computer technologies used today. These early hackers had a love of technology and a compelling need to know how it all worked, and their goal was to push programs beyond what they were designed to do. Back then, the word “hacker” didn’t have the negative connotation it has today. The original hacker ethic, rooted out of simple curiosity and a need to be challenged, appears to be dead.

The objectives of early hackers are a far cry from the goals of today’s hacker. The motivation of the new breed of hackers appears not to be curiosity, or a hunger for knowledge, as it used to be. Instead, most of today’s hackers are driven by greed, power, revenge, or some other malicious intent, treating hacking as a game or sport, employing the tools that are readily available via the Internet.

The rate of security attacks is actually outpacing the growth of the Internet. This means that something besides the growth of the Internet is driving the rise in security attacks. Here are some realities you should know about: Operating systems and applications will never be secure. New vulnerabilities will be introduced into your environment every day. And even if you ever do get one operating system secure, there will be new operating systems with new vulnerabilities—phones, wireless devices, and network appliances. Employees will never keep up with security polices and awareness. It doesn’t matter bow much you train and educate your employees. If your employees disregard warnings about the hazards of opening questionable e-mail attachments, bow are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs? Managers have more responsibility than ever. And on top of the realities listed above, security managers are being asked to support increasing degrees of network availability and access. There are some good security measures you can take: Employ a layer 7, full-inspection firewall. Automatically update your anti-virus at the gateway, server and client. Keep all of your systems and applications updated. Hackers commonly break into a Web site through known security holes, so make sure your servers and applications are patched and up to date. Turn off unnecessary network services. Eliminate all unneeded programs. Scan network for common backdoor services—Use intrusion detection systems, vulnerability scans, anti-virus protection.

Which of the following statements of Steve Wozniak, Bill Gates and Linus Torvalds is TRUE?

A.They are all good examples of today’s computer users.

B.They are driven by greed, power, revenge, or some other malicious intent.

C.Their goal is to push programs beyond what they are designed to do.

D.They are all dead.

点击查看答案
第5题
The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now h
ighly recognisable names behind many of the computer technologies used today. These early hackers had a love of technology and a compelling need to know how it all worked, and their goal was to push programs beyond what they were designed to do. Back then, the word "hacker" didn't have the negative connotation it has today. The original hacker ethic, rooted out of simple curiosity and a need to be challenged, appears to be dead.

The objectives of early hackers are a far cry from the goals of today's hacker. The motivation of the new breed of hackers appears not to be curiosity, or a hunger for knowledge, as it used to be. Instead, most of today's hackers are driven by greed, power, revenge, or some other malicious intent, treating hacking as a game or sport, employing the tools that are readily available via the Internet.

The rate of security attacks is actually outpacing the growth of the Internet. This means that something besides the growth of the Internet is driving the rise in security attacks. Here are some realities you should know about: Operating systems and applications will never be secure. New vulnerabilities will be introduced into your environment every day. And even if you ever do get one operating system secure, there will be new operating systems with new vulnerabilities—phones, wireless devices, and network appliances. Employees will never keep up with security polices and awareness. It doesn't matter how much you train and educate your employees. If your employees disregard warnings about the hazards of opening questionable email attachments, how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs? Managers have more responsibility than ever. And on top of the realities listed above, security managers are being asked to support increasing degrees of network availability and access.

There are some good security measures you can take: Employ a layer 7, full-inspection firewall. Automatically update your anti-virus at the gateway, server and client. Keep all of your systems and applications updated. Hackers commonly break into a Web site through known security holes, so make sure your servers and applications are patched and up to date. Turn off unnecessary network services. Eliminate all unneeded programs. Scan network for common backdoor services—Use intrusion detection systems, vulnerability scans, anti-virus protection.

Which of the following statements of Steve Wozniak, Bill Gates and Linus Torvalds is TRUE?

A.They are all good examples of today's computer users.

B.They are driven by greed, power, revenge, or some other malicious intent.

C.Their goal is to push programs beyond what they are designed to do.

D.They are all dead.

点击查看答案
第6题
In marketing, the use of the Internet can help businesses to ______.A.identify their compe

In marketing, the use of the Internet can help businesses to ______.

A.identify their competitors

B.improve their products

C.provide comprehensive service

D.change their mindset

点击查看答案
第7题
What is confirmed by the study?A.Depression leads to excessive use of Internet.B.Depressio

What is confirmed by the study?

A.Depression leads to excessive use of Internet.

B.Depression results from excessive use of Internet.

C.Excessive use of Internet usually accompanies depression.

D.Excessive use of Internet is usually prior to depression.

点击查看答案
第8题
All the students and ______ are free to use all Internet services via a broadband connecti
on.

A.teacher

B.faculty

C.membership

D.stuff

点击查看答案
第9题
In the 1980s, the Internet ______. A.was under research B.began its commercial use C.had a limite

In the 1980s, the Internet ______.

A.was under research B.began its commercial use

C.had a limited number of users D.caused frequent attacks from viruses

点击查看答案
第10题
The Internet barter system relies heavily on ______.A.the size of barter sitesB.the use of

The Internet barter system relies heavily on ______.

A.the size of barter sites

B.the use of virtual currency

C.the quality of goods or services

D.the location of trading companies

点击查看答案
退出 登录/注册
发送账号至手机
密码将被重置
获取验证码
发送
温馨提示
该问题答案仅针对搜题卡用户开放,请点击购买搜题卡。
马上购买搜题卡
我已购买搜题卡, 登录账号 继续查看答案
重置密码
确认修改