职称英语考试阅读判断试题练习
13.Crypto 密码
Technology is a beauty. We eagerly adopt its pleasure, preferring to cope with the drawbacks on the morning after. Who can resist innovations like mobile phones and networked computers? They put anyone, anywhere, within earshot, and zip information whether an expression of love, a medical chart or a plan for a product rollout around the world in a heartbeat. Unfortunately, its all too easy for eavesdroppers to snap up those messages and conversations en route to their intended receiver. We think were whispering, but were broadcasting.
In this case, theres an antidote: cryptography, the use of codes and ciphers to protect information. If you scramble information before its sent, eavesdroppers cant hear what you say or read what youre written. The good news is that, after decades of struggle against a government opposed to its widespread use, weve finally got access to crypto software that does the scrambling, as well as other functions like digital signatures that will authenticate that we are who we say we are in cyberspace. You might not see the crypto, but its there, going into action every time your computer tells you its going into the secret secure mode. What should alarm you is that crypto still isnt there in the millions of medical records, credit-card databases. We can attribute that failure that failure to the governments active opposition.
Nowadays, more and more of the activities once associated with that good old physical world will be performed at our keyboards, phone devices and palmtops and over digital televisions. Crypto lies at the center of this transition, and were going to ask a lot of it over the next few years. Will our e-mail and phone systems ever have strong encryption and digital signatures built in? Will feats of crypto really send digital cash to replace the paper money, and enable us to spend it in stores?
The issues in the crypto-battle, the first great war of the digital age, were more straightforward. As people cozied up to digital communications, and e-commerce became a force in the economy, the need for cryptos near-magical power of encryption and authentication became red hot. But those at the helm of the government focused not on the benefits, but the dangers the fear that terrorists or drug dealers would use this digital shield. Ultimately, the question boiled down to this: in an attempt to deny those dangerous few, were we all to be deprived of the tools of privacy?
2016年宁夏成人学位英语考试准考证打印时间
2014年公共英语三级考试句型学习(5)
2015年教育部考试中心托福网考网上报名入口
2016年江西成人学位英语考试合格分数线
2016年安徽成人学位英语考试准考证打印时间
2016年成人学位英语考试写作大纲透析辅导
2015年GRE考试报名入口
2005年9月公共英语一级考试全真试卷及答案
2013年9月公共英语一级考试真题答案
2012年3月公共英语考试一级真题及答案
2003年9月全国公共英语考试二级笔试真题
SAT考试详解
各省2016年成人学位英语准考证打印
2015年11月湖南成人学位英语考试合格分数线
2016年4月湖南学位英语考试准考证打印时间
2015年雅思考试报名入口
2015年山西成人学位英语考试合格分数线
2014年3月公共英语二级真题及答案(文字完整版)
2015年下半年江西成人学位英语考试合格分数线
2013年9月公共英语三级考试真题答案
2011年9月全国英语等级考试二级真题及答案
2016年新疆成人学位英语考试准考证打印时间
2015年河南成人学位英语考试合格分数线
2004年9月全国公共英语考试一级笔试真题
2005年3月全国英语等级考试一级真题及答案
2006年9月公共英语一级考试全真试卷及答案
2015年GMAT考试报名流程
2016年江西成人学位英语考试大纲
2015年成人高考报名流程图
2004年3月全国公共英语考试二级笔试真题
| 不限 |
| 英语教案 |
| 英语课件 |
| 英语试题 |
| 不限 |
| 不限 |
| 上册 |
| 下册 |
| 不限 |