首页
登录
职称英语
[originaltext] With the development of the computer, the possibility of stor
[originaltext] With the development of the computer, the possibility of stor
游客
2023-06-30
20
管理
问题
With the development of the computer, the possibility of storing more and more information at a central point is growing rapidly. But so is the possibility of gaining access to the stored information. And that raises serious questions regarding personal privacy. Four basic principles of privacy have emerged from various studies, and appear to be the foundation for sound public policy.
We at IBM believe:
1. Individuals should have access to information about themselves in record-keeping systems. And there should be some procedure for individuals to find out how this information is used.
2. There should be a way for individuals to correct or amend inaccurate records.
3. Information on individuals should not be improperly disclosed or used for other than authorized purposes. The custodian of data files containing sensitive information should take all reasonable precautions to make sure that the data is reliable and not misused.
Translating such broad principles into specific and uniform guidelines is not easy. In particular, there must be a proper balance between limiting access to information for the protection of individual privacy on the one hand, and allowing freedom of information to fulfill the needs of society on the other.
Questions 19 to 21 are based on the passage you have just heard.
19. What raises the problems regarding personal privacy?
20. What is suggested by people at IBM?
21. What is the difficulty to make uniform guidelines?
选项
A、It’ s hard to limit access to information.
B、It’ s hard to forbid the freedom of information use.
C、It’s hard to get a balance between limiting access to information and using it for social needs.
D、It’s hard to forbid individuals from invading others’ privacy.
答案
C
解析
事实细节题。由短文最后一段可知很难制定一个统一的指导方针原因在于:一方面为了保护个人隐私要限制信息的获取,另一方面为了满足社会需要必须信息自由,这两个方面很难达到平衡。故选C。
转载请注明原文地址:https://tihaiku.com/zcyy/2795255.html
相关试题推荐
[originaltext]Inmanyhomes,divorceiscausedby"battlebetweenthesexes
[originaltext]ThisfirstSaturdaynightofMarch,ateightthirty,allthe
[originaltext]ThisfirstSaturdaynightofMarch,ateightthirty,allthe
[originaltext]Millionsofbabiesandchildrencouldsoonbeprotectedagain
[originaltext](22)Askayoungchild"Howwasschooltoday?"andyou’relik
[originaltext](22)Askayoungchild"Howwasschooltoday?"andyou’relik
[originaltext](19)Conditionsforgrowingpumpkinswerepoorinsomeareas
[originaltext](19)Conditionsforgrowingpumpkinswerepoorinsomeareas
[originaltext](19)Conditionsforgrowingpumpkinswerepoorinsomeareas
[originaltext]TheAmericanPetProductsAssociationcarriesoutaNational
随机试题
Childrentodayspendmoretimestareatcomputer【S1】______andTVscreens
HowtoBuildaStrongTeamSpirit1.ThreeprinciplestobuildingateamTea
人慢性粒细胞白血病肿瘤细胞特有的费城染色体产生于()。A.插入突变 B.点突
(2016年)下列关于境外旅客购物离境退税政策的说法中,正确的有(???)。A
当境内托管人委托境外托管人负责境外业务托管时,以下符合境外托管资格规定的是()
结晶紫是以下哪个方法常用的指示剂A.酸碱滴定法 B.非水溶液滴定法 C.沉淀
工具性攻击行为,是指有目标指导(攻击是作为达到目标的工具)和认识基础的攻击。根据
在商业银行()时,中国银监会可以对商业银行实行接管。A.严重违法经营 B.严
20×9年1月1日,甲公司与乙公司签订租赁合同,将其一栋物业租赁给乙公
根据美国洛克希德公司的管理幅度定量方法,在相同条件下,对管理幅度影响最小的是(
最新回复
(
0
)