时间:2018-12-01 作者:英语课 分类:Explorations


英语课

EXPLORATIONS - The Internet and Its Future
By Jill Moss 1


Broadcast: Wednesday, December 07, 2005


(MUSIC)


VOICE ONE:


I'm Doug Johnson.


VOICE TWO:


And I'm Faith Lapidus with Explorations in VOA Special English. Today we tell about the Internet computer information system and its progress and problems.


 
The Internet links people to information and businesses.
(MUSIC)


VOICE ONE:


Last month, thousands of government representatives and information experts met in Tunis, Tunisia to discuss the future of the Internet. The United Nations organized the World Summit on the Information Society to discuss Internet growth in developing nations. But the three-day meetings also developed into a struggle over who controls the Internet.


The Internet grew out of research paid for by the United States Defense 2 Department in the nineteen sixties and seventies. As a result, the United States government still has some control over it. In nineteen ninety-eight, the Commerce Department set up a non-profit organization to supervise the domain 3 name system of the Internet's World Wide Web. The Web is a major service on the Internet. The group, based in California, is called the Internet Corporation for Assigned Names and Numbers, or ICANN.


VOICE TWO:


A domain name is a series of words separated by dots. It identifies an Internet Web site. ICANN also operates a list of Web site owners and approves new endings for Web addresses, such as dot-com, dot-net or dot-gov. The group guarantees that Internet users around the world do not visit different Websites using the same Web address.


For example, thanks to ICANN, a person in Cuba will see the same www.unsv.com Website as someone in Belarus. ICANN also has some Internet policy powers. It can remove Web sites from the Internet. It also decides who can sell and list domain names.


VOICE ONE:


The European Union, China, Brazil, India and other countries want the United States to release at least some control over the World Wide Web. They believe that the Internet is an international resource that should be supervised by the United Nations or some other independent organization. The Bush Administration disagrees. It says that ICANN is the best way to guarantee an open, secure and dependable online environment. Heavy governmental controls, it says, would suppress Internet growth and development.


VOICE TWO:


Hours before the start of the Tunis conference, negotiators agreed to leave day-to-day supervision 4 of the Internet with ICANN. The compromise proposal from the European Union calls for the creation next year of an international governance committee.


Governments, businesses and organizations will be able to discuss public policy issues, including Internet crime, junk mail and viruses. The committee, however, will not have powers to make rules.


(MUSIC)


VOICE ONE:


The World Future Society estimated last year that about nine hundred fifty million people around the world were using the Internet. That number is expected to rise to more than one thousand million people within the next two years.


Most Internet communication is business-to-business, instead of personal electronic mail. Buying and selling goods and services over the Internet is growing around the world. The World Future Society estimates that two-point-seven million million dollars was earned through Internet commerce last year. But, there are risks involved with this e-commerce.


VOICE TWO:


For example, the Federal Trade Commission estimates that more than fifty-two thousand million dollars in goods and services were purchased last year through identity theft. Identity thieves steal personal information from Americans. They collect Social Security numbers, banking 5 records and telephone numbers. They use this information to request loans, or to get credit cards in the name of the victim.


Identity thieves often use computer viruses to collect a victim's personal information. They may also use spyware. These are programs that are loaded onto a computer without the owner's knowledge. Spyware follows the computer user's online activities. Identity thieves also use another method called Internet "phishing." These e-mail messages attempt to collect an Internet user's personal information, such as credit card numbers, by acting 6 like a real business.


VOICE ONE:


People can protect themselves from identity theft in several ways. Anti-virus and anti-spyware computer programs can help. So can firewalls. These are programs or devices that limit information coming through an Internet connection. Banks and individuals can also use Fob technology. A fob is a small device connected to a computer.


Every sixty seconds it creates a special series of numbers, or a code. A computer user must type the code created at the exact minute that the user she wants to see his or her online financial information or bank records.


VOICE TWO:


Advertisers interested in selling products over the Internet may use adware to identify possible buyers. Adware is a software program sent with free files or programs to a computer. Once loaded onto a computer, adware can collect information about a person's interests. Adware can use this information to provide targeted sales messages to the computer user.


These unwanted sales messages are sent through a person's e-mail. They can also be a problem for people using an Internet browser 7 to find information. In this case, pop-up blockers can help. A pop-up blocker is a computer program that prevents unwanted sales messages from opening.


(MUSIC)


VOICE ONE:


One of the most popular kinds of communication on the Internet is through personal Web sites called blogs. Blog is a shortened name for a Web log. Anyone can create his or her own blog. A blog may contain stories, pictures, links to other Web sites and comments from visitors. Some people add information to their blogs every day.


Blogs offer a way to present news and political or personal information. Blogs have become a place for public expression on many subjects. The Blog Herald 8 estimates that there are more than sixty million blogs around the world. People who have blogs are called bloggers. In the United States, many well known people have blogs. So do many other Americans, including teenagers and college students.


VOICE TWO:


Even United States soldiers serving in Iraq and Afghanistan are blogging. Troops are using their milblogs to share opinions, emotions and memories of lost soldiers. The United States military restricts troops from writing personal information about other soldiers. It also restricts operational security information from being published in a blog.


You can find blogs about a subject by using a special search engine created by Google. The Web address is blogsearch.google.com. That is b-l-o-g-s-e-a-r-c-h-dot-g-o-o-g-l-e-dot-com. Google is one of the most popular "search engines" for the Internet. People use a search engine to find information about almost any subject on the Web.


(MUSIC)


VOICE ONE:


There are many ways to link computers with other forms of communication. For example, mobile telephones can send voice messages, color photographs and written information called text messages. They can even receive electronic mail. Small hand-held computer devices can store and read electronic books.


Starting next year, the world's largest software company -- Microsoft -- will offer one hundred thousand books from the British Library's collection. People will be able to search and read the literature on the Internet for free. Amazon.com -- the largest online bookstore -- plans to sell individual pages or parts of books over the Internet.


VOICE TWO:


Google has started its own project. The company has put thousands of library books and documents on the Internet. Last month, Google gave three million dollars to help the United States Library of Congress create a World Digital Library on the Web. This will be a collection of rare books, documents, maps and other materials from America's library and other national libraries. The head of the Library of Congress says people will be able to learn about other cultures without traveling farther than the nearest computer.


(MUSIC)


VOICE ONE:


This program was written by Jill Moss. It was produced by Mario Ritter. I'm Doug Johnson.


VOICE TWO:


And I'm Faith Lapidus. Join us again next week for Explorations in VOA Special English.



1 moss
n.苔,藓,地衣
  • Moss grows on a rock.苔藓生在石头上。
  • He was found asleep on a pillow of leaves and moss.有人看见他枕着树叶和苔藓睡着了。
2 defense
n.防御,保卫;[pl.]防务工事;辩护,答辩
  • The accused has the right to defense.被告人有权获得辩护。
  • The war has impacted the area with military and defense workers.战争使那个地区挤满了军队和防御工程人员。
3 domain
n.(活动等)领域,范围;领地,势力范围
  • This information should be in the public domain.这一消息应该为公众所知。
  • This question comes into the domain of philosophy.这一问题属于哲学范畴。
4 supervision
n.监督,管理
  • The work was done under my supervision.这项工作是在我的监督之下完成的。
  • The old man's will was executed under the personal supervision of the lawyer.老人的遗嘱是在律师的亲自监督下执行的。
5 banking
n.银行业,银行学,金融业
  • John is launching his son on a career in banking.约翰打算让儿子在银行界谋一个新职位。
  • He possesses an extensive knowledge of banking.他具有广博的银行业务知识。
6 acting
n.演戏,行为,假装;adj.代理的,临时的,演出用的
  • Ignore her,she's just acting.别理她,她只是假装的。
  • During the seventies,her acting career was in eclipse.在七十年代,她的表演生涯黯然失色。
7 browser
n.浏览者
  • View edits in a web browser.在浏览器中看编辑的效果。
  • I think my browser has a list of shareware links.我想在浏览器中会有一系列的共享软件链接。
8 herald
vt.预示...的来临,预告,宣布,欢迎
  • In England, the cuckoo is the herald of spring.在英国杜鹃鸟是报春的使者。
  • Dawn is the herald of day.曙光是白昼的先驱。
学英语单词
acoustic mine
air tolerance test
alkali method of spinning
Alpha-fatoprotein
angsten
anti-soviet
arc form vessel
arcus jugalis
artificial cryolite
authorized deferred payment
Avellis'syndrome
bacteriostatically
Barnaby Day, Barnaby Bright
batter stick
boot someone out
botero
Burra Firth
Carex kwangtoushanica
caudatin
Cercopithecus talapoin
change the position of window
changement
child
chilling damage
commit a criminal offence
comobenzyl alcohol
compound evaporator
conformity case clause
coolant gas
cresol sulfonic acid
cross stream velocity component
daisy chain terminal
diffusion source
dorothys
dynamic address translation
erronist
exponential family
eye response
Fast Page Mode DRAM
fire clothes
fitting curve
fob off onto
fragile support
frustrations
fuck faces
globe cam
high-level command
hummyl
hydraulically expanded rubber die
impulse of recoil
in vivo neutron activation analysis
interceeds
Izhevskoye
jocote
Karpinsk
kesrouan
kitchen-diner
lanz
Lechites
Limón B.
logic zero data
lolly water
marable
mean neap rise of low tide
meridianal
methanol fuel gel
moderato
NAFO
natural language interface to database
neandertals
nisoi
not to be dropped
oriented region
permanent pleating
Pestovo
playing fields
pottern ore
preoxidation
push pull equipment
quadratum glaberi
rated temperature category
respiratory virus
rosa multiflora var.carnea theory
Sakakita
sandrammer
slangy
station chain
steelcast
stone road
table of normal distribution
taper thrust bearing
tereter
terristrial remote sensing
the Arctic Ocean
tipper lorries
top bearing shell
transitioning
uk -skinned
washington, d. c
water pigs
went belly up
white hellebores