首页
登录
职称英语
[originaltext]W: You have spoken to us about how we can prevent our e-mail addr
[originaltext]W: You have spoken to us about how we can prevent our e-mail addr
游客
2023-11-28
29
管理
问题
W: You have spoken to us about how we can prevent our e-mail address falling into the wrong hands. What can we do to alleviate the spam problem if this has already occurred, beyond creating a new account, which may not be practical for all of our listeners? Is there anything we can do to fight back against the spammers?
M: Sure. There are a variety of handy antispam tools out there on the market. Your ISP, that is, your Internet service provider, will most likely have one of the main antispam filters active on all their users’ accounts.
W: Hmmm, tell me about these filters. I think I need to get one.
M: Without going into too much technical detail, spam filter software will analyze all incoming messages and flag, divert or delete e-mails that it considers to be spam. This may be because the message contains certain words—I think we all know what types of words I’m talking about here. Or the e-mail may have other qualities which mark it out to be spam in all likelihood, such as large blue or red font, lack of return address, too much capitalization and a whole list of other considerations.
W: But doesn’t that mean we have to ask our friends never to write e-mails to us in blue? I would be very concerned about legitimate e-mails being deleted...
M: Oh, absolutely! An antispam filter will only flag an e-mail message as spam if several of these factors are found to be present in a particular message. If your friends choose to write to you in blue, but the message is otherwise perfectly normal, it will not be considered spam. These filters are great because users are often given control over the sensitivity level, but that’s not true if you use one of the huge national ISPs such as AOL
W: We now move on to an issue we mentioned at the beginning of the program—phishing. What is it and how can we best protect ourselves from it?
M: First of all, we should explain that even though the pronunciation is the same, this variety of phishing is spelt with a "PH" and not an "F". Right, phishing is quite a recent phenomenon but can be very damaging if users are not very aware of the dangers that exist. If you get an e-mail that claims to be from, let’s say, your bank and asks you to click on a link, visit a site and enter information such as your account number, password, or username, you can be certain that you have been a victim of phishing.
W: David, it’s been very informative to have you here speaking to us today. A little understanding of these issues can help us to see the world of e-mail and the Internet isn’t so sinister after all. Please come back and see us soon, won’t you?
M: I’d be delighted. Thanks very much for inviting me to speak to your listeners.
6. What can we learn from the beginning of this part’s interview?
7. According to David Akris, what is spam filter software?
8. What messages can be considered to be spam?
9. Which situation means you may have gotten into phishing?
10. What is David Akris’ focus in the interview?
选项
A、Blue font.
B、Return address.
C、Capitalization.
D、Obscene content.
答案
D
解析
在谈到filters时,男士提到含有以下几种内容的电邮可能会被过滤掉:包含某些大家心照不宣的敏感词语、红色或蓝色的大字体、没有回信地址、太多的大写字母等,因此D项符合。男士进一步提到,即使用蓝色字体,但内容正常,是不会被当成垃圾邮件过滤掉的,因此不选A项。
转载请注明原文地址:https://tihaiku.com/zcyy/3225218.html
相关试题推荐
[originaltext]M:(6-1)Letmeswitchgearsnowandturnintothesubjectofthec
[originaltext]M:(6-1)Letmeswitchgearsnowandturnintothesubjectofthec
[originaltext]M:(6-1)Letmeswitchgearsnowandturnintothesubjectofthec
[originaltext]M:(6-1)Letmeswitchgearsnowandturnintothesubjectofthec
[originaltext]Interviewer(M)MiriamNelson(W)Now,listentoPartOneoftheint
[originaltext]Interviewer(M)MiriamNelson(W)Now,listentoPartOneoftheint
[originaltext]Interviewer(M)MiriamNelson(W)Now,listentoPartOneoftheint
TheDifferenceBetweenSpokenandWrittenEnglishI.Thedefinitionofspeecha
TheDifferenceBetweenSpokenandWrittenEnglishI.Thedefinitionofspeecha
TheDifferenceBetweenSpokenandWrittenEnglishI.Thedefinitionofspeecha
随机试题
ForallyoungAustralianswhoareneithercertifiedasinsanenorservingpr
Itisatruthuniversallyacknowledgedthatamarriedwomaninpossessionof
在制订培训规划时,设计评估标准的目标是()。A.明确员工现有技能与理想状态间的
已知某瞬时平面图形上O点的加速度为a0。图形的角速度ω=0,角加速度为α0。则图
算术表达式采用后缀式表示时不需要使用括号,使用()就可以方便地进行求值。a-b
可茶小传归有光 可茶为秦越人之术,医者称工焉。始,可茶有贤母,蚤寡,
企业建立( )是岗前培训的三阶段培训展开的前提。A.两阶培训体制 B.一阶培
活动义齿模型设计时,将模型向后倾斜的原因是A.使义齿从前向后倾斜 B.制作方便
某企业的产权比率为0.5,债务税前资本成本为12%,权益的β系数为2,市场风险溢
在供电部门与用户产权分界处,35kV及以上供电电压正、负偏差绝对值之和不超过标称
最新回复
(
0
)