文语站

位置:首页 > 习题库 > 

Youmighthaveheardaboutidentitytheft:it’swhatcanhappenwh...

习题库3.3W

问题详情:

Youmighthaveheardaboutidentitytheft:it’swhatcanhappenwh...

You might have heard about identity theft: it’s what can happen when a thief gets enough of someone’s information to commit fraud(诈骗). Why should people care about it? Because recovering a stolen identity can be a time—consuming and expensive process. Imagine that someone pretends to be you: they use your name; they even convince businesses that they’re you and they open a credit card in your name, get a cell phone in your name, or buy things using a credit card that has your name on it.

ID thieves can be creative about getting your information. There are some low—tech ways they get it: sometimes they steal garbage, going through it to find personal information» or they steal mail.

There are high—tech ways, too: ID thieves might put software onto your computer without you knowing it—it can happen when you open an email attachment, click on a pop—up (*出窗口) advertisement, or download some music files. Some software lets a thief see everything on your computer, and record everything you type on your computer.

Unfortunately, even if you’re really careful with your personal information, thieves can still get it. Sometimes, they hack (入侵) into computer systems at stores or schools, hospitals or businesses. They look for personal information to use or sell to other thieves.

It’s pretty easy for you and your family to make it harder for a thief to steal your identity. You can start with the low—tech defenses: being careful with your mail and garbage. Tear anything that has personal information on it before you throw it away. And be sure to take care with your purse, your wallet, or your backpack.

Practice some routine higher-tech defensive plays, too: protect your computer by installing (安装) and turning on an up-to-date firewall along with anti-spyware and anti-virus software. Once you are online, be careful with your personal information. Some sites might ask for a credit card number, stop and check if they really need that number. When you get email or pop—ups on your computer, don’t respond automatically. Emails that ask you to reply or click a link could be thieves trying to trick you into giving them your personal information. It’s a technique called “phishing”, because the thieves are fishing for your information. Stop and think before you click.

25. The purpose of the first paragraph is to tell readers that       .

A. people worry about identity theft

B. it is important to avoid identity theft

C. it is too difficult to recover a stolen identity

D. thieves manage to obtain personal information

26. What can we learn from the text?

A. Schools can be targets for identity thieves.

B. Email attachments mainly expose you to spyware.

C. Identity thieves prefer high—tech ways.

D. Identity thieves mainly target people on the Internet.

27. What does the author think of identity theft?

A. It becomes more and more serious.                               B. It is out of control at present.

C. It will eventually be stopped.                                    D. It can be prevented in some simple ways.

28. The underlined word “palys” in paragraph 6 probably means       .

A. tasks                              B. games                                  C. exercises                       D. actions

29. Which of the following is an effective way of preventing identity theft?

A. Take the Social Security card with you.

B. Click on a link only after considering whether it’s safe.

C. Enter your credit card number on personal computers only.

D. Throw anything with your personal information in the garbage.

【回答】

BADDB

知识点:阅读理解

题型:阅读理解

标签:swhatcanhappenwh