组卷网 > 高中英语综合库 > 主题 > 人与社会 > 科普与现代技术 > 信息技术
题型:阅读理解-阅读单选 难度:0.4 引用次数:211 题号:20608808

Whom should you marry? Where should you live? How should you spend your time? For centuries, people have relied on their gut instincts (直觉) to figure out the answers to these life-changing questions. Now, though, there is a better way. We are living through a data explosion, as vast amounts of information about all aspects of human behavior have become more and more accessible. We can use this big data to help determine the best course to chart.

There has long been overwhelming—and often surprising—evidence that algorithms (算法) can be much better than people at making difficult decisions. Researchers have collected data on various kinds of choices people make, the information they base those choices on, and how things turn out. They have found, for example, that a simple data-driven algorithm would have been better than judges at deciding whether a defendant should stay in prison or be released; better than doctors at deciding whether a patient should undergo surgery; and better than school principals at deciding which teachers should be promoted.

The power of data analysis has been proved in the sports and business worlds, too. As made famous by the book and movie Moneyball, baseball teams found that algorithms were better than scouts (星探) at picking players, and better than managers at picking strategies. In finance, the hedge fund Renaissance Technologies dramatically defeated competitors by seeking out patterns in stock market data and using them to inform its investment strategy. Tech firms in Silicon Valley have found that data from experiments provides better insights into how to design their websites than designers could.

These are the early days of the data revolution in decision-making. I am not claiming that we can completely count on algorithms to make our lifestyle choices, though we might get to that point in the future. I am claiming instead that we can all dramatically improve our decision-making by consulting evidence mined from thousands or millions of people who faced dilemmas similar to ours. And we can do that now.

1. What’s the main idea of the passage?
A.Big data is a double-edged sword.
B.Data revolution will change people’s life.
C.Big data is helpful in making important decisions.
D.Algorithms behaves better than people in many fields.
2. According to paragraph 2, algorithms might NOT defeat people in_________.
A.court rulingsB.job promotions
C.operative estimationD.teaching practices
3. What is the writing purpose of paragraph 3?
A.To provide further evidence.B.To show potential applications.
C.To encourage the use of big data.D.To explain how to use algorithms.
4. Which of the following will the author most probably agree with?
A.Algorithms offer perfect advice now.
B.Big data will certainly cause a revolution.
C.Big data can make up for our lack of experience.
D.Algorithms are bound to be fully trusted in the future.

相似题推荐

阅读理解-阅读单选(约360词) | 较难 (0.4)
名校

【推荐1】In the first year or so of Web business, most of the action has revolved around efforts to tap the consumer market. More recently, as the Web proved to be more than a fashion, companies have started to buy and sell products and services with one another. Such business-to-business sales make sense because business people typically know what product they are looking for.

However, many companies still hesitate to use the Web because of doubts about its reliability. “Businesses need to feel they can trust the pathway between them and the suppliers,” says senior analyst Blane Erwin of Forrester Research. Some companies are limiting the risk by conducting online transactions only with established business partners who are given access to the company’s private Internet.

Another major shift in the model for Internet commerce concerns the technology available for marketing. Until recently, Internet marketing activities have focused on strategies to “pull” customers to sites. In the past year, however, software companies have developed tools that allow companies to “push” information directly onto consumers. Companies such as Virtual Vineyards are already starting to use similar technologies to push messages to customers about special sales, product offerings, or other events. But push technology has earned the contempt of many Web users. Online culture thinks highly of the notion that the information flowing onto the screen comes there by specific request. Once commercial promotion begins to fill the screen uninvited, the distinction between the Web and television fades. That’s a prospect that horrifies Net purists.

But it is nearly inevitable that companies on the Web will need to resort to past strategies to make money. A Web site selling the right kind of products with the right mix of interactivity, hospitality, and security will attract online customers. And the cost of computing power continues to free fall, which is a good sign for any enterprises setting up shop in silicon. People looking back 5 or 10 years from now may well wonder why so few companies took the online plunge.

1. All of the following statements are true EXCEPT that ________.
A.two major shifts in Internet commerce are mentioned in this passage
B.in some way, the Web acts as the pathway
C.“push” technology enjoys low reputation among Web users
D.many companies began to take the online plunge decades ago.
2. In the view of Net purist, ________.
A.there should be no marketing messages in online culture
B.money making should be given priority on the Web
C.the Web should be able to function as the television set
D.there should be no online commercial information without requests
3. The term “past strategies” (Line 1, Para. 4) refers to ________.
A.interactivity, hospitality and securityB.business-to-business sales
C.“push technology”D.online marketing
4. The author’s tone of writing this passage is ________.
A.pessimisticB.hopeful
C.disappointedD.indifferent
2018-11-12更新 | 185次组卷
阅读理解-阅读单选(约350词) | 较难 (0.4)
文章大意:本文是一篇说明。文章讲述了网络攻击的方式、国与国之间网络攻击的特点、危害以及我们应该怎样做来防止网络攻击。

【推荐2】Cyberattacks are like thievery in the dark-mostly invisible and highly dangerous. As proved on Sept 5, the cyberattack on the email system of Northwestern Polytechnical University in Xi’an, Shaanxi province, was launched by the US National Security Agency.

The cyberattack was launched against the university on April 12. The university is known for its education and research programs in the fields of astronautics and marine technology engineering, reported China Daily.

The university became aware of the attack by noticing phishing (网络钓鱼) emails with Trojan horse programs. Such emails, which were disguised as research reviews, invitations to academic events and opportunities to study abroad, were sent to teachers and students at the university. By tricking them into clicking the links and giving away their sign-in information, the attacker aimed to steal university data.

However, apart from the phishing emails which were visible to the public, the investigation team, including the National Computer Virus Emergency Response Center and internet security company 360, revealed in a report that over 40 cyberattack weapons were used. The weapons were used to steal core technology data, such as network management data and core operational data. It thus confirmed that the attack had severely endangered national security.

The incident showed the public a glimpse of cyberattacks between nations. Zhou Hongyi, founder of 360, said in the report that national-level hacker armies and organizations have become the biggest threat to China’s cybersecurity. “Cyberattacks launched by a country have clear targets. Hackers may first penetrate (秘密潜入) key information systems in China and wait for the right opportunities to steal information.” Zhou said.

Cyberattacks may seem far away from our daily activities online, but every internet user, no matter young or old, is a potential victim. For cyberattacks between countries, we may be unknowingly used to breach(破坏) our country’s network security. One simple way of preventing cyberattacks is to be watchful-raising your awareness of cybercrimes and keeping an eye on anything unusual when online.

1. Why did the US National Security Agency launch the cyberattack?
A.To damage key systems.B.To steal personal information.
C.To gain access to sensitive data.D.To seek certain financial benefits.
2. What aspect of cyberattacks between nations does paragraph 5 tell us about?
A.Their origins.B.Their purpose.
C.Their influence.D.Their characteristics.
3. What can be inferred from the last paragraph?
A.Some people are safe from cyberattacks.
B.Cyberattacks are not difficult to detect.
C.Anyone can be used to threaten national security.
D.Cyberattacks are the biggest threat to national security.
4. What does the author suggest people do to prevent cyberattacks?
A.Watch the news regularly.B.Be alert to anything strange online.
C.Use the internet as little as possible.D.Learn in-depth about cyber crimes
2023-04-23更新 | 255次组卷
阅读理解-阅读单选(约670词) | 较难 (0.4)
文章大意:这是一篇议论文。文章主要论述了,手机社交媒体对8-10岁的孩子产生了不良影响:10岁的孩子开始依赖社交媒体来获得自我价值感,文章最后呼吁社交媒体公司和父母要关注该问题。

【推荐3】Children as young as ten are becoming dependent on social media for their sense of self-worth, a major study warned.

It found many youngsters (少年) now measure their status by how much public approval they get online, often through “likes”. Some change their behavior in real life to improve their image on the web.

The report into youngsters aged from 8 to 12 was carried out by Children’s Commissioner (专员) Anne Longfield. She said social media firms were exposing children to major emotional risks, with some youngsters starting secondary school ill-equipped to cope with the tremendous pressure they faced online.

Some social apps were popular among the children even though they supposedly require users to be at least 13. The youngsters admitted planning trips around potential photo-opportunities and then messaging friends — and friends of friends — to demand “likes” for their online posts.

The report found that youngsters felt their friendships could be at risk if they did not respond to social media posts quickly, and around the clock.

Children aged 8 to 10 were “starting to feel happy” when others liked their posts. However, those in the 10 to 12 age group were “concerned with how many people like their posts”, suggesting a “need” for social recognition that gets stronger the older they become.

Miss Longfield warned that a generation of children risked growing up “worried about their appearance and image as a result of the unrealistic lifestyles they follow on platforms, and increasingly anxious about switching off due to the constant demands of social media”.

She said: “Children are using social media with family and friends and to play games when they are in primary school. But what starts as fun usage of apps turns into tremendous pressure in real social media interaction at secondary school.”

As their world expanded, she said, children compared themselves to others online in a way that was “hugely damaging in terms of their self-identity, in terms of their confidence, but also in terms of their ability to develop themselves”.

Miss Longfield added: “Then there is this push to connect — if you go offline, will you miss something, will you miss out, will you show that you don’t care about those people you are following, all of those come together in a huge way at once.”

“For children it is very, very difficult to cope with emotionally.” The Children’s Commissioner for England’s study — Life in Likes — found that children as young as 8 were using social media platforms largely for play.

However, the research — involving eight groups of 32 children aged 8 to 12 — suggested that as they headed toward their teens, they became increasingly anxious online.

By the time they started secondary school — at age 11 — children were already far more aware of their image online and felt under huge pressure to ensure their posts were popular, the report found.

However, they still did not know how to cope with mean-spirited jokes, or the sense of incompetence they might feel if they compared themselves to celebrities (名人) or more brilliant friends online. The report said they also faced pressure to respond to messages at all hours of the day — especially at secondary school when more youngsters have mobile phones.

The Children’s Commissioner said schools and parents must now do more to prepare children for the emotional minefield (雷区) they faced online. And she said social media companies must also “take more responsibility”.

They should either monitor their websites better so that children do not sign up too early, or they should adjust their websites to the needs of younger users.

Javed Khan, of children’s charity Barnardo’s, said: “It’s vital that new compulsory age-appropriate relationship and sex education lessons in England should help equip children to deal with the growing demands of social media.

“It’s also hugely important for parents to know which apps their children are using.”

1. Why did some secondary school students feel too much pressure?
A.They were not provided with adequate equipment.
B.They were not well prepared for emotional risks.
C.They were required to give quick responses.
D.They were prevented from using mobile phones.
2. Some social app companies were to blame because_______.
A.they didn’t adequately check their users’ registration
B.they organized photo trips to attract more youngsters
C.they encouraged youngsters to post more photos
D.they didn’t stop youngsters from staying up late
3. Children’s comparing themselves to others online may lead to _______ .
A.less friendliness to each other
B.lower self-identity and confidence
C.an increase in online cheating
D.a stronger desire to stay online
4. According to Life in Likes, as children grew, they became more anxious to_______.
A.circulate their posts quickly
B.know the qualities of their posts
C.use mobile phones for play
D.get more public approval
5. What does the passage mainly talk about?
A.The influence of social media on children.
B.The importance of social media to children.
C.The problem in building a healthy relationship.
D.The measure to reduce risks from social media.
2024-02-21更新 | 105次组卷
共计 平均难度:一般