Switching telephone providers used to be the only way homeowners could save money on telephone bills. Now thanks to new technology, comsumers have another choice-making phone calls over the internet. And this can be completely free if you call another person with an internet phone set-up.
The technology is called voice over internet protocol (協(xié)議), or VoIP. In 2005, consumer demand for VoIP dramatically grew. In the US, where popularity has grown faster than here in the UK, 8.4 million are predicted to subscribe this year. For the past couple years, VoIP pioneers such as Skype have accounted for the majority of internet phone subscribers.
VoIP is attractive to consumers because it’s cheaper than traditional phone services. With the basic equipment of PC, microphone and headset, and VoIP software and broadband internet for optimum (最適宜的) voice quality, consumers can save a fortune chatting for free to other internet phone owners and save money calling regular landlines (通訊電纜). But, as the saying goes, you get what you pay for. Many of these services suffer from uncontinuous lapses (失效) in quality. While some users may tolerate echoes or a dropped call, improved quality is needed to attract more customers.
Computing has examined the benefits of using a PC as a telephone with VoIP in how easy they were to set up, how effective they were and the range of their features.
Skype(www. skype.com) came top for its bother-free approach, easy set-up and exceptional voice clarity. Sipgate (www. sipgate. co. uk), MSN(www. messenger. msn. co. uk) and Yahoo! Messenger (uk. messenger. yahoo. com) provide an audio “wizard” that improves sound levels. Google Talk (www. google. com/ talk) was less helpful and Babble. net (www. babble. net) was let down by its poor help files. Yahoo! Messenger provides some of the best features, including the option of landline calls, webcam chats, instant messaging, voice-mail and conference calls.
【小題1】Which one of the following if you call others?
A.VolP,voice over internet protocol |
B.Switching telephone |
C.New technology |
D.letters |
A.VoIP can save money but it has some disadvantages |
B.whatever you buy is related to how much you pay |
C.what you pay for will belong to you forever |
D.what you buy is not always high in quality |
A.Sipgate is less helpful. |
B.Yahoo! Messenger offers some best features. |
C.Skype is the best one in the new technology. |
D.Google Talk provides very good audio “wizard”. |
年級(jí) | 高中課程 | 年級(jí) | 初中課程 |
高一 | 高一免費(fèi)課程推薦! | 初一 | 初一免費(fèi)課程推薦! |
高二 | 高二免費(fèi)課程推薦! | 初二 | 初二免費(fèi)課程推薦! |
高三 | 高三免費(fèi)課程推薦! | 初三 | 初三免費(fèi)課程推薦! |
科目:高中英語 來源: 題型:閱讀理解
“Get your hands off me, I have been stolen,” the laptop, a portable computer, shouted. That is a new solution to laptop computer theft: a program that lets owners give their property a voice when it has been taken.
The program allows users to display alerts on the missing computer’s screen and even to set a spoken message. Tracking software for stolen laptops has been on the market for some time, but this is thought to be the first that allows owners to give the thief a piece of their mind.
Owners must report their laptop missing by logging on to a website, which sends a message to the model: a red and yellow “l(fā)ost or stolen” banner pops up on its screen when it is started. Under the latest version(版本) of the software, users can also send a spoken message.
The message can be set to reappear every 30 seconds, no matter how many times the thief closes it. “One customer sent a message saying, ‘You are being tracked. I am right at your door’,” said Carrie Hafeman, chief executive of the company which produces the program, Retriever.
In the latest version, people can add a spoken message. The default through the computer’s speakers is: “Help, this laptop is reported lost or stolen. If you are not my owner, please report me now.”
The Retriever software package, which costs $29.95 (£21) but has a free trial period, has the functions of many security software programs. Owners can remotely switch to an alternative password prompt if they fear that the thief has also got hold of the access details.
If a thief accesses the internet with the stolen laptop, Retriever will collect information on the internet service provider in use, so that the police can be alerted to its location.
Thousands of laptops are stolen every year from homes and offices, but with the use of laptops increasing, the number stolen while their owners are out and about has been rising sharply.
Other security software allows users to erase data remotely or lock down the computer.
72. The expression “to give the thief a piece of their mind” can be understood as “_______”.
A. to give the thief an alert mind | B. to express the owners’ anger to the thief |
C. to remind the thief of his conscience | D. to make the thief give up his mind |
73. Different from other security software, Retriever can ______.
A. record the stealing process | B. help recognize the lost laptop |
C. lock down the computer remotely | D. send a spoken message |
74. One function of the program is that it allows the owner to ______ at a distance.
A. change some access details for switching on the laptop
B. turn on the laptop by using the original password
C. operate the laptop by means of an alternative password
D. erase the information kept in the stolen laptop
75. Which of the following can best summarize the main idea of the passage?
A. With no Retriever, thousands of laptops are stolen every year.
B. A new software provides a means to reduce laptop theft.
C. Retriever has helped to find thieves and lost computers.
D. A new program offers a communication platform with the thief.
查看答案和解析>>
科目:高中英語 來源:2012-2013學(xué)年山東省濟(jì)寧市泗水一中高二12月質(zhì)量檢測(cè)英語試卷(帶解析) 題型:閱讀理解
They may be just passing your office, computer bag slung (懸掛) over one shoulder. Or they may be sitting in a car outside it, causally tapping away at a laptop. They look like innocent passers-by. In fact, they are stealing your corporate secrets.
Drive-by hacking is the trendy term given to the practice of breaking into wireless computer networks from outside the buildings that house them. A recent study in the UK, sponsored by RSA Data Security, found that two-thirds of organizations with wireless networks were risking their data in this way. Security experts patrolled (巡邏) several streets in the City of London seeking evidence of wireless networks in operation.
Of 124 that they identified, 83 were sending data without encrypting(加密)them. Such data could readily be picked up by a passer-by armed only with a portable computer, a wireless modem and a few pieces of software that can be freely downloaded from the Internet.
The data could include sensitive company documents containing valuable information. Or they could be e-mail identities and passwords that could be used by hackers to log into corporate networks as if they were legal users.
Most companies using wireless networking technology do not take even the simplest of measures to protect their data. Nearly all wireless network technology comes with some basic security features that need only to be activated (激活) in order to give a minimum level of security, for example, by encrypting the data being passed over the network.
Raymon Kruck, business development manager at Check Point Software, a security technology specialist, believes this could be partly a psychological problem. People see the solid walls of their building as safeguards and forget that wireless networks can extend up to 200 meters beyond physical walls.
Companies without any security at all on their wireless networks make it ridiculously easy for hackers to break in. Switching on the security that comes with the network technology should be automatic. Then there are other basic steps a company can take, says Mr. Kruck, such as changing the passwords on the network from the default (默認(rèn)) setting.
Companies can also install firewalls, which form a barrier between the internal network and the public Internet. They should also check their computer records regularly to spot any abnormal activity, which might betray the presence of a hacker.
【小題1】According to the study sponsored by RSA Data Security, two thirds of the subjects _______.
A.had most of their company data stolen |
B.depended on wireless computer networks |
C.were exposed to drive-by hacking |
D.were unaware of the risk of wireless hacking |
A.The number of computer hacking incidents. |
B.The number of wireless computer networks identified. |
C.The way in which data are sent and received. |
D.The way in which data are hacked and stolen. |
A.data encryption program | B.password security programs |
C.illegal-user detection | D.firewall |
A.wireless signal administration | B.changes in user’s awareness |
C.users’ psychological health | D.stronger physical walls |
A.book review | B.science fiction | C.textbook | D.computer magazine |
查看答案和解析>>
科目:高中英語 來源:2013屆福建省南安一中高三下學(xué)期第一次模擬考試英語試卷(帶解析) 題型:閱讀理解
Across countryside, non-food crops are growing alongside wheat.Some are used in new alternatives to plastics and other materials, but others will simply be burned.
Burning crops is becoming more popular because it is good for the planet.Doing so is also cheaper than burning fossil fuels.As more land is devoted to non-food crop production, the economics of crops for fuel are likely to become even more favorable.
Humans have been burning such biomass—organic materials from plants or animals— since they discovered fire.But that burning fossil fuels could have catastrophic consequences has brought biomass back into fashion.
Even allowing for emissions (排放) of carbon dioxide from fuel used in planting, harvesting, processing and transporting biomass fuel, replacing fossil fuel with biomass can typically reduce greenhouse gas emissions by more than 90 percent.
Power stations around the world are experimenting with forms of biomass to add to their coal or oil, with encouraging results.Indeed, power companies could profit by turning to biomass, especially when the subsidies (補(bǔ)助) many governments offer for using renewable energy are taken into account.
Farmers can benefit from growing biomass.In Europe, the reduction of subsidies for certain crops is exposing farmers to market forces.Instead of being paid for whatever they produce, farmers must seek a clear demand for their product.Many believe that the demand for alternatives to fossil fuels could be just such a driver.
But while biomass offers a variety of potential alternatives, the world's infrastructure (基礎(chǔ)設(shè)施) has developed around burning fossil fuels to such a stage that switching to biomass involves a change in conception that many companies have not accepted.
Also, there are problems with using biomass.Although most coal-fired power stations could take a small amount of their fuel from biomass without significant adjustment, few are built to run on biomass alone.Burning some forms of biomass also causes environmental problems.Oils and waste can be smelly, while wood produces smoke unless burned properly.
The supply chains for fossil fuels are set up well, but those for biomass are just the beginning. Sources of supply for biomass rely on farm production and can therefore be less reliable. They are necessarily limited and it wouldn't make sense to turn a very large amount of valuable agricultural land away from food crops.But as the world adjusts to the need to control greenhouse gas emissions, these problems may receive more attention.
【小題1】What do we know about biomass?
A.It is a useful way of burning crops. |
B.It is plant and animal matter used to provide power. |
C.It is a new alternative to be used widely. |
D.It is a popular approach to fighting against pollution. |
A.a(chǎn), b, c | B.b, c, d | C.c, d, e | D.a(chǎn), d, e |
A.more effective ways to use biomass have been tried |
B.using renewable energy has become their daily task |
C.burning biomass alone would require considerable changes |
D.setting up dependable supply channels needs governments' support |
A.Defensive. | B.Doubtful. | C.Negative. | D.Objective |
查看答案和解析>>
科目:高中英語 來源:2011-2012學(xué)年江蘇漣水中學(xué)高三階段性檢測(cè)英語卷(解析版) 題型:閱讀理解
Imagine that you are sitting in a park and suddenly remember that you need to send an urgent email. You have your laptop computer with you and you connect it to a wireless access point and access the Internet. Then you send your email. This wouldn’t have been possible if there were no wireless Internet for laptops. Wireless Internet has come into our life in so many ways that we don’t even realize what a necessary part it has become of our day-to-day lives.
How do we connect to a wireless Internet service for laptop computers? There are two ways to do this. They are Wi-Fi connection and Bluetooth connection. Wireless networking is very easy. You just switch on the Wi-Fi button that has been provided in the laptop for Wi-Fi scanning. Once that is done, the computer will connect to the Internet.
An interesting fact about Wi-Fi networking is that you can create a network between similar wireless equipment. Consider a situation where you and your friend both have Wi-Fi laptops, and there is some data you want to exchange. Traditional networking architecture demands that you have a wireless router (路由器). But the beauty of Wi-Fi networking technology is that you can set up a network between you and your friend’s laptop, and share all the data you want.
Broadband (寬帶) Internet connection is typically preferred by any user as it provides better speed for Internet surfing. Up until the invention of 3G mobile phones, Internet speed on mobile phones was very slow. 3G has the promise of changing the entire face of broadband technology. Just imagine browsing at speeds of more that 2MB per second. To give you a measure of the speed, 3G enables you to watch high quality live videos on the Internet.
It is amazing to see how technology changes and the rate at which it changes. There may come a time when you may be able to browse using mobile wireless Internet for laptops anywhere in the world.
1.What can we learn from Paragraph 1?
A.Wireless Internet will become a reality soon.
B.We can send emails outdoors through wireless Internet.
C.Laptops enable us to do business everywhere.
D.People can easily find a laptop to surf the Internet.
2.People can enjoy a wireless Internet service for laptop computers by .
A.connecting to another computer B.switching off the Wi-Fi button
C.using bluetooth connection D.connecting bluetooth to Wi-Fi
3.What should we do to share some data with a friend through Wi-Fi networking?
A.Use the same computer. B.Surf online.
C.Have a wireless router. D.Set up a network.
4.One main advantage of 3G mobile phones mentioned in the passage is .
A.their low price B.their different functions
C.their high Internet speed D.their bright future
查看答案和解析>>
百度致信 - 練習(xí)冊(cè)列表 - 試題列表
湖北省互聯(lián)網(wǎng)違法和不良信息舉報(bào)平臺(tái) | 網(wǎng)上有害信息舉報(bào)專區(qū) | 電信詐騙舉報(bào)專區(qū) | 涉歷史虛無主義有害信息舉報(bào)專區(qū) | 涉企侵權(quán)舉報(bào)專區(qū)
違法和不良信息舉報(bào)電話:027-86699610 舉報(bào)郵箱:58377363@163.com