完形填空     If your face and name are anywhere on the web, you may be recognized whenever you walk the streets—not just by cops but by any geek with a computer. That seems to be the conclusion from some new research on the limits of privacy.
    For suspected miscreants, and people chasing them, face-recognition technology is old hat. Brazil, preparing for the soccer World Cup in 2014, is already trying out pairs of glasses with mini-cameras attached; policemen wearing them could snap images of faces, easy to compare with databases of criminals. More authoritarian states love such methods: photos are taken at checkpoints, and images checked against recent participants in protests.
        41    A study which is to be unveiled on August 4th at Black Hat, a security conference in Las Vegas, suggests that day is close. Its authors, Alessandro Acquisti, Ralph Gross and Fred Stutzman, all at America's Carnegie Mellon University, ran several experiments that show how three converging technologies are undermining privacy. One is face-recognition software itself, which has improved a lot.     42    And they went to social networks like Facebook and LinkedIn, where most users post real names and photos of themselves.
    In their first experiment, the researchers collected images from 5,000 profiles of people on a popular American dating site in a particular city—most of whom used pseudonyms. They fed the pictures into an off-the-shelf face-recognition programme that compared them with 280,000 images they had found by using a search engine to identify Facebook profiles from the same city. They discovered the identity of just over a tenth of the folk from the dating site.
        43    The researchers did a second experiment: they took webcam photos of 93 students on Carnegie Mellon's campus, with their assent. These were fed into the face-recognition software along with 250,000 photos gleaned from publicly available profiles on Facebook. About a third of students in the test were identified.
        44    By mining public sources, including Facebook profiles and government databases, the researchers could identify at least one personal interest of each student and, in a few cases, the first five digits of a social security number. All this helps to explain concerns over the use of face-recognition software by the likes of Google and Facebook, which have been acquiring firms that specialize in that technology, or licensing software from them. (Google recently snapped up Pittsburgh Pattern Recognition, the firm which owns the programme the researchers used for their tests.) Privacy officials in Europe have said they will scrutinize Facebook's use of face-recognition software to help people 'tag', or identify, friends in photos they upload. And privacy campaigners in America have made a formal complaint to regulators. (Facebook notes that people can opt out of the photo-tagging service by altering their privacy settings. )
        45    Eric Schmidt, the executive chairman, has said it took the decision because 'people could use this stuff in a very, very bad way, as well as a good way. ' But face-recognition methods may still spread. As Mr Acquisti says, sharing named photos online has 'opened the floodgates' to a new, privacy-sapping world. Shutting them will be hard.
    A. That might not seem a big percentage, but the hit rate will get better as face-recognition software improves and more snaps are uploaded.
    B. Given the sensitivity, Google decided not to release a face-recognition search engine it had made.
    C. The researchers also used 'cloud computing' services, which provide lots of cheap processing power.
    D. The best face-recognition algorithms now perform more accurately than most humans can manage. Overall, facial-recognition technology is advancing rapidly.
    E. But the most striking result was from a third experiment.
    F. But could such technology soon be used by anyone at all, to identify random passers-by and unearth personal details about them?
    G. The main applications of face recognition have been in contexts like ID cards and face scanners.
问答题    
 
【正确答案】F
【答案解析】文章前两段讲的是面部识别技术对警务人员和嫌疑犯来说并不是一件新鲜事。第三段的开头句应该有承上启下的作用,并且空格后面第一句就说一份研究表明这一天已为期不远。由此可推断,填入的内容应该告诉我们那是怎么样的一天。选项F用but开头,有连接作用,可以将上下文联系起来,而且此句中的such technology正是前面提到的面部识别技术,符合语境。而且F是一个问句,设问句是一种很好的引出文章主题的写作手法。
问答题    
 
【正确答案】C
【答案解析】空格前两句提到,三种技术是如何联合使用来侵犯人们隐私的,接下来讲的是其中一种即face-recognition software,空格后面的句子说的是他们利用社交网站的信息。所以本空应该填一个和这两者并列的成分。C项的also也是一个线索。
问答题    
 
【正确答案】A
【答案解析】第四段介绍的是第一个实验,识别比例是1/10左右,第五段的空格后面是介绍第二个实验,提到识别比例是1/3。说明本空处应该是将这两个实验连接起来,A项中的percentage涉及的也是比例,better说明两者进行比较。
问答题    
 
【正确答案】E
【答案解析】第六段介绍的是可以将身份识别到更加精确的程度,和前两段是并列的,而且实验的结果更加精确。第四段的first,第五段的second更加确定E项的是正确选项,因为有third。
问答题    
 
【正确答案】B
【答案解析】第六段中首次出现了Google,并且B项中的decide和空格后面的decision对应。所以此空很容易就可以准确地定位。