时间:2018-12-19 作者:英语课 分类:环球英语 Spotlight


英语课

   Voice 1


 
  Welcome to Spotlight 1. I'm Ryan Geertsma.
 
  Voice 2
 
  And I'm Robin 2 Basselin. Spotlight uses a special English method of broadcasting. It is easier for people to understand, no matter where in the world they live.
 
  Voice 1
 
  On January 12, 2010, the world's largest internet company, Google, made a major announcement. It announced that their computer systems had been hacked 4. An unknown person or group of people had used computer skills to illegally enter Google's systems. The hackers 6 stole important information. This major computer attack was reported in the news around the world. In fact, this computer attack did not only affect Google. The hackers also attacked over 30 other large companies like Adobe 7, Yahoo and Dow Chemical.
 
  Voice 2
 
  This famous act of computer hacking 8 was very complex. The hackers were extremely intelligent and careful. But they used their computer skills in illegal and negative ways. Many people think of computer hackers as bad people - people who steal knowledge, money and even personal information. However, computer hacking is not always bad. Today's Spotlight is on the positive uses of hacking and the new "Random 9 Hacks 10 of Kindness" movement.
 
  Voice 1
 
  Like the hackers from the beginning of this program, computer hacking can be a bad thing. Sometimes, hackers find and get information they are not supposed to have. Some hackers steal this information or even destroy computer systems. This kind of a hacker 5 is called a black hat hacker. Black hat hackers break into systems without permission. And they use technology in illegal ways or for bad reasons. When most people think of hackers, they think of black hat hackers. However, hacking is just changing a computer program or system to work differently than it did originally. Many times, hackers are able to create new ways of doing things.
 
  Voice 2
 
  There are many different kinds of good hackers. For example, there are also Grey or Blue hat hackers. These hackers find weaknesses or security 11 issues for websites, computer programs and computer systems. Grey hat hackers do this work for free because they enjoy it. These hackers usually inform the website or program owner so that they can fix the problem. Blue hat hackers are usually paid to do this work. Companies will ask blue hat hackers to try and hack 3 their particular computer products. This helps the company test the security of these products.
 
  Voice 1
 
  White hat hackers are yet another kind of hacker. They usually work for large companies with computer systems, products and websites. They are full time employees. Their job is to continually 12 test the security of the company's systems and products.
 
  Voice 2
 
  These examples show that there are many different kinds of hackers. However, all these hackers have one thing in common: they know a lot about computer programs and systems. If this knowledge is used for good reasons, their skills are very valuable.
 
  Voice 1
 
  One organization has recognized the value of hackers. And it is trying to bring the hacking community together for a very good cause. This organization is called "Random Hacks of Kindness." This name comes from another popular movement. It is called "Random Acts of Kindness." You may remember another Spotlight program on "Acts of Kindness." This movement encourages people to do kind things for other people every day - for no reason. It just wants to encourage kindness all over the world. In the same way, "Random Hacks of Kindness" wants to encourage hackers to use their skills in kind ways.
 
  Voice 2
 
  The idea for "Random Hacks of Kindness" began in June of 2009. It came from a technology and crisis 13 meeting in Washington, D.C. in the United States. Representatives from global businesses like Google, Yahoo and Microsoft gathered at this meeting. They decided 14 that there were global problems that they could help solve. They wanted to "hack for humanity 15" and make a positive difference with their hacking.
 
  Voice 1
 
  Soon two other organizations joined: the World Bank and NASA, the United States' air and space organization. The organizations decided to bring hackers and disaster relief workers together. Disaster relief workers are people who help victims of disasters like earthquakes, floods, or even wars. They wanted computer hackers and disaster relief workers to work together at a "Random Hacks of Kindness" conference. They hoped the group could "hack" computer programs to find answers to the greatest problems of disaster victims.
 
  Voice 2
 
  Todd Khozein is a lead worker for "Random Hacks of Kindness." He explains,
 
  Voice 3
 
  "We are trying to use technology to make the world a better place. The event gives hackers the chance to use their skills for a good cause with the guidance of experts who understand the real world problems."
 
  Voice 1
 
  The first "Random Hacks of Kindness" conference was in November of 2009. About 100 hackers and relief workers attended. Craig Fugate was one of the disaster relief workers that attended the conference. He came to the conference with one request. He wanted a tool for people to use after disasters. This tool would allow them to tell their family and friends that they were alive and well. But he also wanted to be sure this tool would not interfere 16 with mobile 17 phone service in the disaster area. This is because relief workers need mobile phone systems to serve victims in emergency situations.
 
  Voice 2
 
  Surprisingly, the hackers created two solutions in only one day! In fact, one of these solutions won the first prize at the conference. It is a mobile phone program called "I'm OK." The program uses SMS or texting technology to send a simple message to friends and family. The message says "I'm OK" - it means "I am alive and well". The message spreads through social networks like Facebook and Twitter. In an emergency situation, a person only has to touch one button on their mobile phone. This will send the message to anyone they want.
 
  Voice 1
 
  "I'm OK" is not the only amazing solution from "Random Hacks of Kindness." Another program helps relief workers find exactly where a disaster has taken place - almost immediately. Before, this process could take hours and even days. Solutions from "Random Hacks of Kindness" have been used after recent disasters in Haiti, Pakistan and Chile.
 
  Voice 2
 
  "Random Hacks of Kindness" continues to gather every six months. The last conference was in December of 2010. Now, the conferences are much larger. In fact, they no longer meet in just one place. The December 2010 conference gathered over one thousand people in over twenty cities - including Nairobi, Kenya, Bogotá, Colombia and Jakarta, Indonesia.
 
  Voice 1
 
  Hackers that attend "Random Hacks of Kindness" conferences are clear examples that not all hackers are bad! Will Pate 18 attended the December 2010 conference in Toronto, Canada. He believes the conferences are making positive changes. He told the Christian 19 Science Monitor news organization,
 
  Voice 4
 
  "We are changing the way people understand the word 'hacking.' These are events where people are there because they care about helping 20 other people."
 
  Voice 1
 
  So, what do you think about hackers? Does "Random Hacks of Kindness" change what you think about computer hacking? Tell us your thoughts. You can e-mail us at radio@english.net
 
  Voice 2
 
  The writer of today's programme was Robin Basselin. The producer was Ryan Geertsma. The voices you heard were from the United States. All quotes were adapted and voiced by Spotlight. Computer users 21 can read our scripts 22, hear our programs and see our word list on our website: http://www.radio.english.net This .programme is called "Computer Programming for Good."

1 spotlight
n.公众注意的中心,聚光灯,探照灯,视听,注意,醒目
  • This week the spotlight is on the world of fashion.本周引人瞩目的是时装界。
  • The spotlight followed her round the stage.聚光灯的光圈随着她在舞台上转。
2 robin
n.知更鸟,红襟鸟
  • The robin is the messenger of spring.知更鸟是报春的使者。
  • We knew spring was coming as we had seen a robin.我们看见了一只知更鸟,知道春天要到了。
3 hack
n.劈,砍,出租马车;v.劈,砍,干咳
  • He made a hack at the log.他朝圆木上砍了一下。
  • Early settlers had to hack out a clearing in the forest where they could grow crops.早期移民不得不在森林里劈出空地种庄稼。
4 hacked
生气
  • I hacked the dead branches off. 我把枯树枝砍掉了。
  • I'm really hacked off. 我真是很恼火。
5 hacker
n.能盗用或偷改电脑中信息的人,电脑黑客
  • The computer hacker wrote that he was from Russia.这个计算机黑客自称他来自俄罗斯。
  • This site was attacked by a hacker last week.上周这个网站被黑客攻击了。
6 hackers
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
7 adobe
n.泥砖,土坯,美国Adobe公司
  • They live in an adobe house.他们住在一间土坯屋里。
  • Adobe bricks must drived dried completely before are used.土坯砖块使用前一定要完全干燥。
8 hacking
n.非法访问计算机系统和数据库的活动
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
9 random
adj.随机的;任意的;n.偶然的(或随便的)行动
  • The list is arranged in a random order.名单排列不分先后。
  • On random inspection the meat was found to be bad.经抽查,发现肉变质了。
10 hacks
黑客
  • But there are hacks who take advantage of people like Teddy. 但有些无赖会占类似泰迪的人的便宜。 来自电影对白
  • I want those two hacks back here, right now. 我要那两个雇工回到这儿,现在就回。 来自互联网
11 security
n.安全,安全感;防护措施;保证(金),抵押(品);债券,证券
  • A security guard brought him down with a flying tackle.一名保安人员飞身把他抱倒。
  • There was tight security at the airport when the President's plane landed.总统的专机降落时,机场的保安措施很严密。
12 continually
adv.不间断地,不停地;多次重复地
  • The other kids continually taunted him about his size.其他孩子不断地耻笑他的个头儿。
  • The US is continually building up its armed forces.美军正持续加强它的三军。
13 crisis
n.危机,危急关头,决定性时刻,关键阶段
  • He had proved that he could be relied on in a crisis.他已表明,在紧要关头他是可以信赖的。
  • The topic today centers about the crisis in the Middle East.今天课题的中心是中东危机。
14 decided
adj.决定了的,坚决的;明显的,明确的
  • This gave them a decided advantage over their opponents.这使他们比对手具有明显的优势。
  • There is a decided difference between British and Chinese way of greeting.英国人和中国人打招呼的方式有很明显的区别。
15 humanity
n.人类,[总称]人(性),人道[pl.]人文学科
  • Such an act is a disgrace to humanity.这种行为是人类的耻辱。
  • We should treat animals with humanity.我们应该以仁慈之心对待动物。
16 interfere
v.(in)干涉,干预;(with)妨碍,打扰
  • If we interfere, it may do more harm than good.如果我们干预的话,可能弊多利少。
  • When others interfere in the affair,it always makes troubles. 别人一卷入这一事件,棘手的事情就来了。
17 mobile
adj.可移动的,易变的,机动的;n.运动物体
  • The old lady sits on a mobile chair every morning.那位老妇人每天上午坐在一把可携带使用的椅子上。
  • She's much more mobile now that she's bought a car.自从她买了汽车后,活动量就大多了。
18 pate
n.头顶;光顶
  • The few strands of white hair at the back of his gourd-like pate also quivered.他那长在半个葫芦样的头上的白发,也随着笑声一齐抖动着。
  • He removed his hat to reveal a glowing bald pate.他脱下帽子,露出了发亮的光头。
19 Christian
adj.基督教徒的;n.基督教徒
  • They always addressed each other by their Christian name.他们总是以教名互相称呼。
  • His mother is a sincere Christian.他母亲是个虔诚的基督教徒。
20 helping
n.食物的一份&adj.帮助人的,辅助的
  • The poor children regularly pony up for a second helping of my hamburger. 那些可怜的孩子们总是要求我把我的汉堡包再给他们一份。
  • By doing this, they may at times be helping to restore competition. 这样一来, 他在某些时候,有助于竞争的加强。
21 users
用户,使用者( user的名词复数 )
  • The new software will prove a boon to Internet users. 这种新软件将会对互联网用户大有益处。
  • Ramps should be provided for wheelchair users. 应该给轮椅使用者提供坡道。
22 scripts
剧本( script的名词复数 ); 文字; 笔迹; (一种语言的)字母系统
  • Many felt he was prostituting his talents by writing Hollywood scripts. 许多人觉得他给好莱坞写剧本是滥用自己的才华。
  • The scripts had a rather tired plot. 这部陈旧的剧本的情节是非常俗套的。
学英语单词
advanced study
alignment system
alternating current/direct current
Appletards
arm pull
autoexpose
autonomist
balancies
banalest
bearing cooling water pump
bis(1-naphthylmethyl)amine
Bolshevikism
brightness coefficient
calyptella campanula
cephalobyrrhus latus
Chinese medicine anesthesia
colored smoke
come round
Corydalis cheilosticta
course of study
crank-guide way
crankiness
crystal nuclei
cutting of bands
d'Alembert's principle
Dianchi Lake
down symbol
dynamic surface tension
effervescence
embrasure
epithetize
Eria robusta
extreme tourism
fibrous covering
flexible-fuel
food-poisoning
formulizer
frontierland
glabredelphinine
global net
grouchier
hand pouring pot
harbo(u)r affairs
hemikaryon
horse hair fibre
hunt counter
in-phase computation
infantile massage
iron trioxide
irregular can
Keewation
kernel
landless plated hole
lucasite
main range circuit
Majdal Tarshīsh
marine electric power system
mehqs
Misión Fagnano
non disjunction gate
overlegalization
passenger flat
perceptronium
Pestalozzi, Johann Heinrich
plate cut-off current
probabilistic model
prosecutable
protectible
Puerto Eten
puniceus
qandahars
rarefactor
reactionless
respyce
rgc
scharmach
selector shaft
silicon isocyanate
snowdens
starting frequency
subversivenesses
Suldalsvatnet
switchboard room
Taraxacum florum
telluropalladinite
tenjin
the heebie-jeebies
thrombocythemia
tore-out
tosses away
tryptophanase
tuk tuks
uranometrical
volume-absorption term
watercannons
waveguide-type resonator
Welinite
white nickel
winch machine
workrelated
YACP
zygomaticofacial branch