Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

PPT 首页:新 SAT 科学类

This passage is excerpted from Larry Greenemeir. "Forget


Passwords." ~2012 by Scientific American.

PPT 第一页 原文
It seems like something out of a Robert Ludlum spy novel.
Someone tries to coerce you into revealing your computer
security passwords. You might be tempted to give in, but it is
Line impossible for you to reveal your authentication credentials.
5 You do not actually know them because they are safely
buried deep within your subconscious.

引入话题 security passwords

PPT 第二页 原文
Sounds a bit extreme just to make sure no one can log on
to your laptop or smartphone, but a team of researchers from
Stanford and Northwestern universities as well as SRI
10 International is nonetheless experimenting at the computer-,
cognitive- and neuroscience intersection to combat identity
theft and shore up cyber security-by taking advantage of the
human brain's innate abilities to learn and recognize patterns.

继续深入话题 human brain’s innate abilities to learn and recognize patterns

PPT 第三页 原文
The researchers are studying ways to covertly create and
15 store secret data within the brain's corticostriatal memory
system, which is responsible for reminding us how to do
things. When a person needs to access a computer, network
or some other secure system, they would use special
authentication software designed to tease out that secret data.

展开话题 研究人脑 create and store secret data

PPT 第四页 原文
20 To test this concept the researchers devised a computer
game requiring players to tap buttons on a keyboard as large
black dots descending down their screen cross a horizontal
line-very similar in concept to the video game Guitar Hero.
During an initial training session lasting from 30 minutes to
25 an hour, the dots fall at different speeds and in various
locations, forming patterns that repeat until participants
become adept at hitting the appropriate buttons at the right
time. In effect, users' corticostriatal memory becomes adept
at repeating a particular pattern over time such as dialing a
30 phone number or typing a word on a keyboard without
looking at one's fingers.

用实验证明 human brain’s innate abilities to learn and recognize patterns

PPT 第五页 原文
The researchers refer to this as "serial interception
sequence learning" training, during which a person
unwittingly learns a specific sequence of keystrokes that can
35 later be used to confirm that person's identity. To log on to,
for example, a Web site, the user would play the game the
same each time that pattern of dots appears, proving his
identity and allowing him access.

下定义,把上一段出现的训练游戏,定义为“serial interception sequence learning" training”

PPT 第六页 原文
"While the planted secret can be used for authentication,
40 the participant cannot be coerced into revealing it since he or
she has no conscious knowledge of it; according to the
researchers in a study they presented August 8 at the
USENIX Security Symposium in Bellevue, Wash. As
currently conceived, the implicit learning approach being
45 studied might protect against someone either forcing or
tricking you to reveal a password, says lead author Hristo
Bojinov, a Stanford University Ph.D. computer science
candidate. Such coercion could take the form of physical or
verbal threats demanding your password or other security
50 credentials, or it could be a seemingly legitimate phone call
or e-mail designed to coax out this information.

data within the brain's corticostriatal memory 可以防止被迫泄露 credential information

PPT 第七页 原文
The researchers say they have tested their approach on
370 players so far and continue to add new participants to
their study. The test currently requires at least 30 minutes of
55 training to get reliable results. "It is unlikely that training
time can be shrunk much because this type of brain memory
takes time to get trained;' Bojinov says. "It may be possible
to reduce the authentication time [that follows training], but
it is yet to be seen how much." . . .

训练电脑的时间,至少 30 分钟,验证 authenticity 时间,有可能可以减少

PPT 第八页 原文
60 Whether this approach is practical depends upon the
system being defended. It is unlikely, for example, that
Yahoo or Google would implement this approach to security
for their free e-mail services. Would someone want to play a
game for several minutes every time they want to log onto
65 their e-mail? A government facility housing nuclear
weapons, however, could better justify the time commitment
required to log in using the sequence learning method,
particularly if users log in once each day and such an
approach promises to improve security, says Nicolas
70 Christin, associate director of Carnegie Mellon University's
Information Networking Institute.

这种身份验证方法的使用取决于不同场景

PPT 第九页 图表
PPT 第十页 题目
1 Over the course of the passage, the main focus shifts from
A) a rejection of hypothetical scenarios to the dismissal of
these scenarios.
B) a description a research study to a discussion of the
study's possible applications.
C) an explanation of scientific work to an argument about
the ethics of using this working different ways.
D) the application of one scientific study to a
consideration of that study's results for an entire
scientific field.

PPT 第十一页 选项分析


B 选项 a description a research study to a discussion of the study's possible applications.和原文内
容直接对应,正确选项

PPT 第十二页 题目
2 The main purpose of paragraph one is to
A) show that science and literature have more in common
than most people realize.
B) explain a seemingly new technology by showing that it
has actually been in use for years.
C) demonstrate that the technologies discussed in the
article are too complex for most readers to understand.
D) introduce the subject with a compelling hypothetical
scenario.

PPT 第十三页 选项分析

第一段的修辞目的是引出话题,对应 D 选项 introduce the subject with a compelling


hypotheticalscenario.

PPT 第十四页 题目
3 The words "covertly" and "secret," lines 14-15 ("covertly
create and store secret"), primarily serve to
A) highlight the participant's lack of conscious knowledge
of their "password”
B) demonstrate that not even the researchers know how
the experiment works.
C) argue that the experiment as described, is unethical.
D) inject a colorful characterization of the research into a
straightforward text

原文 The researchers are studying ways to covertly create and store secret data within the brain's
corticostriatal memory system, which is responsible for reminding us how to do things.

PPT 第十五页 选项分析

原文所描述的储存机密信息的方法是在用户无意识的状况下,从而可以避免被迫泄露,对应
A 选项 highlight the participant's lack of conscious knowledge of their "password”

PPT 第十六页 题目
4 As used in line 32, "serial” most nearly means
A) parallel.
B) successive.
C) continual.
D) harmonic.

原文:The researchers refer to this as "serial interception sequence learning" training, during
which a person unwittingly learns a specific sequence of keystrokes that can later be used to
confirm that person's identity.

PPT 第十七页 选项分析

serial:in regular succession without gaps


successive:Successive means happening or existing one after another without a break. 连续的
continual:A continual process or situation happens or exists without stopping. 持续不断的

continual 强调“不停止”,serial 和 successive 强调“连贯”


,答案选择 B

(SAT 核心词汇的学习,一定要用英文释义)

PPT 第十八页 题目
5 The authors imply that subjects who used the sequence
learning method could not be forced or tricked into
revealing their passwords because the subjects
A) will soon forget their passwords.
B) will not be able to keep up with the changing
passwords.
C) don’t know what the passwords are.
D) do not have access to certain sites' password games.

没有定位的全文细节题,判断下一题是不是 command of evidence 题

PPT 第十九页 题目
6 which choice provides the best evidence for the answer to
the previous question?
A) lines 39-41 (“while . . . it”)
B) lines 43-46 ("As . . . Password”)
C) lines 48-51 ("Such . . . information")
D) lines 52-54 ("The researchers . . . study")

PPT 第二十页 选项分析

第 5 题,很容易选择 C
再解答第 6 题,选择 A
原文 39-41 "While the planted secret can be used for authentication, the participant cannot be
coerced into revealing it since he or she has no conscious knowledge of it

(寻证题和它所“加强”的题,做题先后顺序,取决于哪一个题更容易得到正确答案)

PPT 第二十一页 题目
7 The authors imply that the sequence learning method
would be most useful for sites that
A) run risks high enough to make the time investment
worthwhile.
B) provide access to the general public on a daily basis.
C) serve the government by housing nuclear materials.
D) target researchers with an academic perspective.

没有定位的全文细节题,判断下一题是不是 command of evidence 题

PPT 第二十二页 题目
8 Which choice provides the best evidence for the answer to
the previous question?
A) lines 57-59 ("it may . . . Much”)
B) lines 60-63 ("Whether . . . services")
C) lines 63-65 ("Would . . . email")
D) lines 65-67 ("A government . . . method")

PPT 第二十三页 选项分析

第 7 题,很容易做答,正确选项是 A,
然后解答第 8 题,正确选项是 D
原文 65-67: A government facility housing nuclear weapons, however, could better justify the time
commitment required to log in using the sequence learning method

PPT 第二十四页 题目
9 According to the graph, the greatest gain in advantage came between training blocks
A) 1 and 2.
B) 3 and 4.
C) 5 and 6.
D) 6 and 7.

PPT 第二十五页 选项分析

根据图表,第 9 题,正确答案选择 A,1 and 2.

PPT 第二十六页 题目
10 According to the passage, one explanation for the rise in
final advantage as shown by the graph is that
A) users worked to memorize different patterns over a
period of time.
B) researchers programmed various patterns into the
minds of the subjects.
C) only a select group of people are good at remembering
patterns.
D) subjects' corticostriatal memories began to store and
repeat patterns.

根据原文,正确答案选择 D

PPT 第二十七页 题目
11 The average final advantage for participants in the study,
as shown by the graph, is closest to
A) 0.02
B) 0.04
C) 0.08
D) 0.14

根据图表,正确答案选择 D

(SAT 的图表题,借鉴了 ACT 的科学类题目,训练考生读图表的能力)

PPT 第二十八页 作业

新 SAT 可汗 45 篇 科学部分 level2 和 level3

You might also like