If the hackings (黑客行为) taught us anything in 2014, it's actually nothing.
Password management firm SplashData released its list of the worst passwords of the year and it's just as terrible as you'd think. The most common leaked password in 2014 was "123456," followed by "password" — both topped the list the year before, too.
While numbers were as popular as ever as passwords, sports terms like “baseball" and "football" were used more often. Birthday years were common too (especially 1989, 1990, 1991 and 1992) and names like "Michael", "Jennifer" and "Hunter" are also among the top 100 worst passwords of 2014.
Here's a look at the top 10 worst passwords of the year:
1. 123456 (Unchanged from 2013) 6. 234567890 (Unchanged)
2. password (Unchanged) 7. baseball (New)
3. 12345 (Up 17) 8. dragon (New)
4. 12345678 (Down 1) 9. football (New)
5. qwerty (Down 1) 10. monkey (New)
This year's worst passwords are painfully weak, but what were once considered clever password strategies — using symbols, capitalizations, the number 3 in place of the letter "e" — are old tricks.
It's now recommended to pick a different password for each account you use — you wouldn't use the same key in all of your locks, and the same goes for passwords.
Companies like Facebook, Twitter and Apple are now trying to make hacking more difficult on their services by offering two-factor authentication (认证), which is basically like double locking your door at night. Each time you want to log into (登录) that account, the company will send a code to your phone — it changes after each login attempt, so hackers would have to be in physical possession of your smartphone to know the code.
1.What can we learn from the text?
A. Hackers leaked many more passwords in 2014.
B. Symbols were among the top 10 worst passwords.
C. 123456 was the most common leaked password in both 2013 and 2014.
D. People are getting more experienced in picking their passwords.
2.How many passwords were ranked lower on 2014's top 10 worst password list?
A. One. B. Two. C. Three. D. Four.
3.What is recommended in the text to have safer passwords?
A. Using long and strange passwords.
B. Changing passwords regularly.
C. Replacing "e" by "3" when setting passwords.
D. Choosing different passwords for different accounts.
4.To fight against hacking, some companies ______.
A. don't accept weak passwords
B. double lock their doors at night
C. combine the password with a code to prove one's identity
D. prevent hackers from stealing customers' smartphones
高三英语阅读理解中等难度题
If the hackings (黑客行为) taught us anything in 2014, it's actually nothing.
Password management firm SplashData released its list of the worst passwords of the year and it's just as terrible as you'd think. The most common leaked password in 2014 was "123456," followed by "password" — both topped the list the year before, too.
While numbers were as popular as ever as passwords, sports terms like “baseball" and "football" were used more often. Birthday years were common too (especially 1989, 1990, 1991 and 1992) and names like "Michael", "Jennifer" and "Hunter" are also among the top 100 worst passwords of 2014.
Here's a look at the top 10 worst passwords of the year:
1. 123456 (Unchanged from 2013) 6. 234567890 (Unchanged)
2. password (Unchanged) 7. baseball (New)
3. 12345 (Up 17) 8. dragon (New)
4. 12345678 (Down 1) 9. football (New)
5. qwerty (Down 1) 10. monkey (New)
This year's worst passwords are painfully weak, but what were once considered clever password strategies — using symbols, capitalizations, the number 3 in place of the letter "e" — are old tricks.
It's now recommended to pick a different password for each account you use — you wouldn't use the same key in all of your locks, and the same goes for passwords.
Companies like Facebook, Twitter and Apple are now trying to make hacking more difficult on their services by offering two-factor authentication (认证), which is basically like double locking your door at night. Each time you want to log into (登录) that account, the company will send a code to your phone — it changes after each login attempt, so hackers would have to be in physical possession of your smartphone to know the code.
1.What can we learn from the text?
A. Hackers leaked many more passwords in 2014.
B. Symbols were among the top 10 worst passwords.
C. 123456 was the most common leaked password in both 2013 and 2014.
D. People are getting more experienced in picking their passwords.
2.How many passwords were ranked lower on 2014's top 10 worst password list?
A. One. B. Two. C. Three. D. Four.
3.What is recommended in the text to have safer passwords?
A. Using long and strange passwords.
B. Changing passwords regularly.
C. Replacing "e" by "3" when setting passwords.
D. Choosing different passwords for different accounts.
4.To fight against hacking, some companies ______.
A. don't accept weak passwords
B. double lock their doors at night
C. combine the password with a code to prove one's identity
D. prevent hackers from stealing customers' smartphones
高三英语阅读理解中等难度题查看答案及解析
For many in the UK, if the New Year means anything, it means starting with a clean beginning and turning over a new leaf. And to do this, many of us make New Year's resolutions—a list of ways that we intend to improve ourselves in the year ahead. We reflect on our past transgressions and decide not to do them again. Stopping smoking is ever popular, as is a vow to take up more exercise or spend more time with family. But where does the idea of a New Year's resolution come from?
The answer might lie 4,000 years ago in ancient Babylonia (巴比伦王国), according to History.com. The Babylonians are believed to be the first to hold recorded celebrations for the New Year. The 12-day-long celebration, allowed them not only to reaffirm (重申) their loyalty to the king, but also to promise to the gods to pay their debts and return borrowed objects. For their good behavior, they believed the gods would cast favor upon them for the year to come.
The Romans too had similar traditions. New Year's Day was a time when senators would swear they had maintained the laws and city leaders and soldiers would take an oath (宣誓) of loyalty to the emperor. Incidentally, the month of January, is named after the Roman god Janus. He is the god of beginnings, transitions and time, among other things and is described as having two faces—one looking to the past and the other facing forward to the future.
The Romans may be long gone, but their legacy lives on. Come the turn of the year and we look at self-improvement, review our past mistakes, confess our wrongdoings and try to sharpen up in general. Ultimately, much like the Babylonians and Romans, we seek to reaffirm the best parts of ourselves, while leaving the worthless behind.
Whether you're looking at a quick behavioral change, or huge personality improving, you're taking part in an old tradition. I wish you all the best sticking to your resolutions. Happy New Year!
1.The underlined word ''transgressions'' in the first paragraph means '' ''.
A.childhood B.wrongdoings
C.careers D.achievements
2.What did the Babylonians do during the 12-day-long celebration?
A.They strengthened their loyalty to the king again.
B.They borrowed objects from gods.
C.They took up more exercise.
D.They kept the laws and stayed with families.
3.What physical feature does the Roman god Janus have?
A.Janus is the god of beginnings. B.Janus is the god of transitions and time.
C.Janus has two faces. D.Janus looks to the past.
4.The main idea of the passage is .
A.the way to celebrate New Year B.the origin of the New Year's resolution
C.the old story of Romans D.the approach to changing people's behavior
高三英语阅读理解中等难度题查看答案及解析
PCs are no longer the only things that can be hacked(非法侵入). Anything with an electronic pulse, including cars, TVs and refrigerators, is now a target for hackers. Here are several strangest hacks that show where the future is headed:
Remote-controlling a car – Well-known security researcher Charlie Miller is able to control a car by accessing the automotive computer. In 2011, a security company figured out how to unlock a car and start it just by texting and back in 2010, someone hacked into100 cars in Texas, causing them to honk(鸣响)uncontrollably before he remotely disabled them.
Cyber Murder – In Season 2 of Show Time’s homeland series, hackers kill the US Vice President by hacking his pacemaker(心脏起搏器). Typical Hollywood B. S., right? No. It could actually happen. Well-known security researcher Barnaby Jack, who sadly passed away in July at the age of 35, had been prepared to demonstrate at Back Hat how to hack a pacemaker over Wi-Fi. The attack could kill a person by giving the pacemaker a high-voltage shock.
Spy Phone – By now, more people are becoming aware of the potential for a phone to be hacked. But what many fail to realize is the awesome potential of a smart phone to affect you, it has been hacked.
When Your TV Watches You – This type of hack makes it possible to monitor people in their homes via the internet. Smart TVs aren’t that common yet, but in the next few years they could become an important part of the living room, so watch out.
1.The main purpose of this text is to ________.
A.promote hacking technology
B.demonstrate how hacks work today
C.teach people how to avoid being hacked
D.enrich people’s knowledge of hacks’ new trend
2.According to Cyber Murder, we know that Barnaby Jack ________.
A.was killed by the attack over Wi-Fi
B.was a well-known actor and researcher
C.researched how to hack a pacemaker over Wi-Fi
D.died at Black Hat when hacking a pacemaker
3.From the text we know the following things have been hacked except ________.
A.smart TVs
B.smart phones
C.the Internet
D.cars
高三英语阅读理解中等难度题查看答案及解析
If 62 is the number in red on the top of your math test, for most of us, it's a total disaster. Your entire week is ruined, and 62 is what races through your head for the rest of the day. If 9 is the number of likes on that cute photo you posted the other day, many will feel rather disappointed.
Our lives have become a constant system of ranks, assessments, and numbers. The days of passing judgment on others based on personality are gone, and now we judge based on how good a person's numbers are. We compare ourselves to the numbers of others, such as how low another person's weight is how high their paycheck. Self-worth is no longer based on quality of character, but quantity of numbers.
In today's social media consumed society,it has never been easier for people to broadcast their numbers to the world.A simple click of a button can take you to a page where you can observe the number of friends or followers a person has. Teenagers have taken on this mentality that if you don't have a certain number of followers, then you aren't“cool”. Many feel they are not important if very few people are witnessing their status updates. This state of mind is harmful and not at all accurate.Twitter and Facebook can let the world witness your updates, but they will never let anyone see who you really are. In the end.self-worth should be based on what you think of yourself, not what the world thinks of you.
So next time you receive a failing grade or you lose a follower, remember that these things cannot and should not define(定义)you. You are not your numbers. You are a person-a3-D living and breathing person with ideas and creativity and love that the rigidity of numbers cannot represent. You are the things you love and the things you laugh at and the way you treat others.
1.How does the author sound in Paragraph 2?
A. Regretful. B. Conservative. C. Doubtful. D. Friendly.
2.According to the passage,teenagers believe it cool to .
A. display their status updates B. post their daily doings online
C. win recognition on social media D. define their self-worth themselves
3.What can be a suitable title for the text?
A. Numbers make What You Are B. You Are More Than a Number
C. It's Your Number That Matters D. Let's Stop Sharing Our Numbers
高三英语阅读理解困难题查看答案及解析
---How will she behave in case of our failure?
----She’ll put the blame on us if it______ badly .
A.turns up B.turns down C.turn off D.turns out
高三英语单项填空中等难度题查看答案及解析
---How will she behave in case of our failure?
----She’ll put the blame on us if it______ badly .
A. turns up B. turns down C. turn off D. turns out
高三英语单项填空简单题查看答案及解析
一How will she behave in case of our failure?
—She’ll put the blame on us if it________badly.
A.turns up B.turns down C.turns off D.turns out
高三英语单项填空简单题查看答案及解析
If Joe knew anything about car mechanics, I’m sure he would help us fix the car, but he ______ even less than we do.
A.had known B.would know C.knew D.knows
高三英语单项填空简单题查看答案及解析
– If the traffic hadn't been so heavy, I could have been hack by 6 o'clock.
-- What a pity! Tina _____ here to see you.
A. is B. was C. would be D. has been
高三英语单项填空中等难度题查看答案及解析
-Should I ask the boss if he's upset at my coming in late in the mornings?
-If he hasn't t said anything about it, just .
A. let sleeping dogs lie. B. strike while the iron is hot.
C. put yourself in her shoes. D. kill two birds with one stone.
高三英语单项填空困难题查看答案及解析