Timothy Berners-Lee, might be giving Bill Gates a run for the money, but he passed up his shot at fabulous wealth -- intentionally--in 1990. That’s when he decided not to patent the technology used to create the most important software innovation in the final decade of the 20th century: the World Wide Web. Berners-Lee wanted to make the world a richer place, not amass personal wealth. So he gave his brainchild to us all.
Berners-Lee regards today’s Web as a rebellious adolescent that can never fulfill his original expectations. By 2005, he hopes to begin replacing it with the Semantic Web--a smart network that will finally understand human languages and make computers virtually as easy to work with as other humans.
As envisioned by Berners-Lee, the new Web would understand not only the meaning of words and concepts but also theological relationships among them. That has awesome potential. Most knowledge is built on two pillars: semantic and mathematics. In number-crunching, computers already outclass people. Machines that are equally admit at dealing with language and reason won’t just help people uncover new insights; they could blaze new trails on their own.
Even with a fairly crude version of this future Web, mining online repositories for nuggets of knowledge would no longer force people to wade through screen after screen of extraneous data. Instead, computers would dispatch intelligent agents, or software messengers, to explore Websites by the thousands and logically sift out just what’s relevant. That alone would provide a major boost in productivity at work and at home. But there’s far more.
Software agents could also take on many routine business chores, such as helping manufacturers find and negotiate with lowest-cost parts suppliers and handling help-desk questions. The Semantic Web would also be a bottomless trove of eureka insights. Most inventions and scientific breakthronghs, including today’s Web, spring from novel combinations of existing knowledge. The Semantic Web would make it possible to evaluate more combinations overnight than a person could juggle in a lifetime. Sure scientists and other people can post ideas on the Web today for others to read. But with machines doing the reading and translating technical terms, related ideas from millions of Web pages could be distilled and summarized. That will lift the ability to assess and integrate information to new heights. The Semantic Web, Berners-Lee predicts, "will help more people become more intuitive as well as more analytical. It will foster global collaborations among people with diverse cultural perspectives, so we have a better chance of finding the right solutions to the really big issues--like the environment and climate warming./
To search for any information needed on tomorrow’s Web, one only has to

A:wade through screen after screen of extraneous data. B:ask the Web to dispatch some messengers to his door. C:use smart software programs called "agents". D:explore Web sites by the thousands and pick out what’s relevant.

Timothy Berners-Lee, might be giving Bill Gates a run for the money, but he passed up his shot at fabulous wealth -- intentionally--in 1990. That’s when he decided not to patent the technology used to create the most important software innovation in the final decade of the 20th century: the World Wide Web. Berners-Lee wanted to make the world a richer place, not amass personal wealth. So he gave his brainchild to us all.
Berners-Lee regards today’s Web as a rebellious adolescent that can never fulfill his original expectations. By 2005, he hopes to begin replacing it with the Semantic Web--a smart network that will finally understand human languages and make computers virtually as easy to work with as other humans.
As envisioned by Berners-Lee, the new Web would understand not only the meaning of words and concepts but also theological relationships among them. That has awesome potential. Most knowledge is built on two pillars: semantic and mathematics. In number-crunching, computers already outclass people. Machines that are equally admit at dealing with language and reason won’t just help people uncover new insights; they could blaze new trails on their own.
Even with a fairly crude version of this future Web, mining online repositories for nuggets of knowledge would no longer force people to wade through screen after screen of extraneous data. Instead, computers would dispatch intelligent agents, or software messengers, to explore Websites by the thousands and logically sift out just what’s relevant. That alone would provide a major boost in productivity at work and at home. But there’s far more.
Software agents could also take on many routine business chores, such as helping manufacturers find and negotiate with lowest-cost parts suppliers and handling help-desk questions. The Semantic Web would also be a bottomless trove of eureka insights. Most inventions and scientific breakthronghs, including today’s Web, spring from novel combinations of existing knowledge. The Semantic Web would make it possible to evaluate more combinations overnight than a person could juggle in a lifetime. Sure scientists and other people can post ideas on the Web today for others to read. But with machines doing the reading and translating technical terms, related ideas from millions of Web pages could be distilled and summarized. That will lift the ability to assess and integrate information to new heights. The Semantic Web, Berners-Lee predicts, "will help more people become more intuitive as well as more analytical. It will foster global collaborations among people with diverse cultural perspectives, so we have a better chance of finding the right solutions to the really big issues--like the environment and climate warming."

To search for any information needed on tomorrow’s Web, one only has to()

A:wade through screen after screen of extraneous data. B:ask the Web to dispatch some messengers to his door. C:use smart software programs called "agents". D:explore Web sites by the thousands and pick out what’s relevant.

It is an open secret in the tech world that Google and Facebook are hardly the best of friends. But now their relations are going to sink to a new low. According to numerous reports appearing today, Burson-Marsteller, a public-relations company working for Facebook has been urging bloggers and journalists to write scathing pieces about the way in which Social Circle, a Google offering that lets users share search results and other stuff with their friends, violates users’ privacy. The Financial Times’s website quotes Burson-Marsteller as saying that Facebook had asked the PR fill not to reveal who it was working for. The agency admitted that agreeing to this "was not at all standard operating procedure and is against our policies, and the assignment on those terms should have been declined. " USA Today is carrying the same statement from the PR fill.
There is no shortage of irony in all this. It is true that Google hardly has a stellar track record on privacy matters. The company’s Google Buzz social network came under fire when it was launched for using people’s Gmail contacts without their permission. And Google found itself in the middle of another stink when its Street View street-mapping service was caught "sniffing" (accidentally, Google has claimed) data from unprotected Wi-Fi networks. In March the film reached a settlement with America’s Federal Trade Commission that requires it to submit to regular external audits of its approach to privacy issues.
But Facebook is no angel either on privacy matters. In particular, it got its fingers badly burnt with its Beacon service, which shared people’s activities on the web with their contacts. This case eventually led to Facebook having to cough up millions of dollars to resolve litigation brought against it for violating their privacy. It has also been bashed repeatedly by privacy activists for using default settings in its privacy controls that mean users’ data is automatically shared broadly over the web unless they change them.
Indeed, Facebook’s reputation is arguably even worse than Google’s in this area—which may explain why, rather than concentrating on improving its own act, it has chosen to pay third parties to take a pop at Google instead. This Babbage’s coverage of Facebook’s shortcomings (e. g. here) may explain why Burson-Marsteller left him off its call list. It is possible that Google may have some questions to answer about Social Circle’s approach to data-sharing. But for now, it is Facebook that has egg all over its face.
What conclusion can we draw from this passage

A:For the problem of Social Circle, Google has already found the way to solve it. B:Google will pay millions of dollars to make up for "sniffing" data from unprotected Wi-Fi networks. C:As long as users change the default settings correctly, their data will not be shared automatically on the web. D:Privacy problem widely exists in tech world and there is no efficient way to curb it.

Is the Internet Broken

Google’s Gmail system, which serves millions of customers around the world, shut down yesterday. Twitter, the micro-blogging service used by tens of millions of people, went off-line last month. It blamed the trouble on a malicious programmer in Russia who was trying to shut down the account of a user in neighboring Georgia. It is astonishing the local actions of a small number of programmers call bring an entire Internet service to its knees, but that have been the case.
The Internet as it is set up now operates at three levels. The first is the servers that store data and content for use by customers. Google and other large companies keep massive server farms. These are well-protected from outside programmers by sophisticated software, but clearly that does not always work. The protection devices may fail more and more often as hackers get more skillful.
The second part of the Interact is the "pipes" that carry data, video, e-mail messages, and text of websites from companies such as Google, Yahoo!, and Twirler, that make up Interact content and services to customers. Some of these" pipe" providers, specifically telecom and cable companies, are already complaining that the amount of data that they have to move is rising too rapidly for them to accommodate. Video files, which are particularly large, have posed significant problems to cable companies.
The last piece of the Interact is the end user, the companies and consumers who have tire PCs. Perversely, these PCs are also the tools by which hackers build malicious code that they send out to compromise the effectiveness of the servers to destroy the data transport system which is at the core of the worldwide web’s operations.
The problem of online outages is as old as the internet itself, AOL’s dial-up 56k service would go down regularly in the mid-1990s. The company did not have enough modems to keep up with demand.
The Internet for the last decade may not be the Internet for tire future. The prophylactic software that was meant to protect the web is less effective. Like anything else that is used regularly whether it is a car, a light bulb, or a PC, the Internet is going to have to be upgraded more often now. It won’t work every hour of every day anymore.
According to the passage, why the PCs can he the tools to destroy the internet system

A:Because there are too many PCs while the internet system resources are limited. B:Because the PCs are weak in receiving data which makes the internet is overcrowded with data. C:Because hackers can use the PCs to send harmful code to reduce the effectiveness of servers. D:Because the worldwide web’s transportation can be broken down by PCs.

Soon, creating a hospital in cyberspace may no longer be science fiction. NASA’s Ames Research Center and Salinas Valley Memorial HosPital are working toeether in bring a virtual medical facility to the World Wide Web in the enear future.
The venture will involve machines that transmit and receive data and three- dimensional images of the human body via a special workstation located at the hospital. Medical professionals will send diagnostic information to NAS

A:through its Research and Education Network, which will transmit the 3 -D images and data back to the hospital for evaluation and image manipulation. The doctors will then give feedback about how well the network works and the quality of the images. B:In a virtual hospital, medical professionals will work at the real hospital. C:at NASA’s Research and Education Network. D:the World Wide Web. E:at a special workstation at hom

Is the Internet Broken

Google’s Gmail system, which serves millions of customers around the world, shut down yesterday. Twitter, the micro - blogging service used by tens of millions of people, went off - line last month. It blamed the trouble on a malicious programmer in Russia who was trying to shut down the account of a user in neighboring Georgia. It is astonishing the local actions of a small number of programmers can bring an entire Interact service to its knees, but that have been the case.
The Internet as it is set up now operates at three levels. The first is the servers that store data and content for use by customers. Google and other large companies keep massive server farms. These are well -protected from outside programmers by sophisticated software, but clearly that does not always work. The protection devices may fail more and more often as hackers get more skillful.
The second part of the Internet is the" pipes" that carry data, video, e - mail messages, and text of websites from companies such as Google, Yahoo !, and Twitter, that make up Internet content and services to customers. Some of these" pipe" providers, specifically telecom and cable companies, are already complaining that the amount of data that they have to move is rising too rapidly for them to accommodate. Video files, which aye particularly large, have posed significant problems to cable companies.
The last piece of the Internet is the end user, the companies and consumers who have the PCs. Perversely, these PCs are also the tools by which hackers build malicious code that they send out to compromise the effectiveness of the servers to destroy the data transport system which is at the core of the worldwide web’s operations.
The problem of online outages is as old as the internet itself, AOL’s dial - up 56k service would go down regularly in the mid - 1990s. The company did not have enough modems to keep up with demand.
The Internet for the last decade may not be the Internet for the future. The prophylactic software that was meant to protect the web is less effective. Like anything else that is used regularly whether it is a car, a light bulb, or a PC, the Internet is going to have to be upgraded more often now. It won’t work every hour of every day anymore.
According to the passage, why the PCs can be the tools to destroy the internet system

A:Because there are too many PCs while the interact system resources are limited. B:Because the PCs are weak in receiving data which makes the internet is overcrowded with data. C:Because hackers can use the PCs to send harmful code to reduce the effectiveness of servers. D:Because the worldwide web’s transportation can be broken down by PCs.

While the Internet is inherently insecure, businesses still need to preserve the privacy of data as it travels over the network. To help do that, the Internet Engineering Task Force an international group of network designers, operators, vendors, and researchers concerned with the evolution of (71) has developed a suite of (72) called Internet Protocol Security (IPSec).
IPSec creates a standard platform to develop secure networks and electronic (73) between two machines. Secure tunneling via IPSec creates (74) connections in a network through which data packets can move. It creates these tunnels between remote users and within a local network. It also (75) each data packet in a new packet that contains the information neccessary to set up, maintain and tear down the tunnel when it’s no longer needed.

A:channels B:Web browser C:Internet data D:Internet architecture

若要对Data类中重载的加法运算符成员函数进行声明,下列选项中正确的是______。

A:Data+(Data); B:Data operator+(Data); C:Data+operator(Data); D:operator+(Data,Data);

若要对Data类中重载的加法运算符成员函数进行声明,下列选项中正确的是

A:Data+(Data); B:Data operator+(Data); C:Data+operator(Data); D:operator+(Data,Data);

微信扫码获取答案解析
下载APP查看答案解析