2022届江苏省南京师范大学附属中学高三模拟考试(最后一卷)英语试题
学校:___________姓名:___________班级:___________考号:___________
一、阅读理解
What is identity theft?
昊是什么意思Identity theft occurs when someone steals your personal information to take over your credit accounts, open new ones, access bank accounts, or commit many other crimes in your name and at your expen. When it strikes, the effects can be disastrous. What’s more, becau it frequently involves no physical theft, identity theft may not be noticed by its victims until significant damage has already been done-often veral months and thousands of pounds later. It’s estimated that more than 100, 000 people are affected by identity theft in the UK each year, costing the British economy over £1.3 billion annually.
东营经济>长袜子皮皮读后感
How does it happen?
The are some of the ways crooks get hold of your personal information:李晟李佳航
• Fake emails
You may receive an email emingly from, say, your bank requesting that you follow a link and key information into a website that looks very similar to your bank’s own site but is in fact a fake.
• Pretext phone calls
开花馒头怎样做A crook pretending to be an official from, for example, your bank may phone up asking you to give personal or account details as a curity check.
• Dishonest people
Sometimes sales assistants,unbeknown(不知情的) to you, swipe your card through a machine which records its details. At the workplace, a fellow employee can u your personal details fraudulently.
How can you protect yourlf?
Be careful who you give your personal details to, and tear up documents like credit-card slips before you throw them away. Don’t make this rious crime easy for crooks!
1.What do we know about identity theft according to the passage?
A.It is a frequent physical theft.
配股增发
B.It is only committed by strangers.
C.It is easy to be noticed by victims.
D.It is costly to individuals and society.
2.Identity theft may happen when________.
A.you receive an email from your bank
B.you give personal details to a fake website
C.you are requested to pay in cash by sales assistants
D.you tear bank documents before throwing them away
3.What is the text?
指纹画
A.A financial survey. B.A book review.
C.A curity report. D.A history paper.
The people who called into the help hotlines and domestic violence shelters said they felt as if they were going crazy. One woman said the code numbers of the digital lock at her front door changed every day and she could not figure out why. Still another said she kept hearing the doorbell ring, but no one was there.
Their stories are part of a new pattern of behavior in domestic abu cas tied to the ri of smart home technology. Internet-connected locks, speakers, lights and cameras marketed as the newest conveniences are now also being ud as a means for monitoring, revenge and control.
数学活动
In more than 30 interviews with The New York Times, domestic abu victims, their lawyers, shelter workers and emergency responders described how the technology was becoming an alarming new tool. Aburs—using apps on their smartphones, which are connected to the Internet-enabled devices—would remotely control everyday objects in the home, sometimes to watch and listen, other times to scare or show power. Even after a partner had left the home, the devices often stayed and continued to be ud to threaten and confu.
For victims, the experiences were often aggravated by a lack of knowledge about how smart technology works, how much power the other person had over the devices, how to legally deal with the behavior and how to make it stop.
“People have started to ask what to do about this,” said Erica Oln, director of the Safety Net Project at the National Network to End Domestic Violence. When it came to discussing the misu of emerging technologies, she said: “we don’t want to introduce the idea to the world, but now that it’s become so common, the cat’s out of the bag.”
Connected home devices have been increasing in domestic abu cas over the past year. Several lawyers said they were arguing about how to add language to the current restraining orders to cover smart home technology.
4.What is the problem with the Internet-enabled devices?
A.They give ri to complaints in the help hotlines.
B.They are being employed in domestic abu.
C.They are unaffordable as newest conveniences.
D.They threaten the market of smart home technology.
5.The underlined word “aggravated” in Paragraph 4 means________.
A.worned B.broadened C.reflected D.guaranteed
6.According to Erica Oln, the discussion of the misu of emerging technologies is________.
A.insignificant B.unavoidable C.controversial D.optional
7.What can we infer from the last paragraph?
A.Officials have trouble drawing up laws to protect people’s privacy.