سرفصل های مهم
Cloud of suspicion
توضیح مختصر
Are your pictures, documents and videos safe online? Listen to Rob and Finn's chat and learn new vocabulary
- زمان مطالعه 0 دقیقه
- سطح خیلی سخت
دانلود اپلیکیشن «زبانشناس»
فایل صوتی
برای دسترسی به این محتوا بایستی اپلیکیشن زبانشناس را نصب کنید.
ترجمهی درس
متن انگلیسی درس
Hello I’m Rob. Welcome to 6 Minute English. I’m joined today by Finn.
Hello.
Now, Finn, could you give us a smile, please?
Oh, OK, hang on.
Say cheese!
Oh, are you going to take a picture of me with that smartphone? Hang on; just let me comb my hair a bit.
Finn, Finn, Finn, you look fine. Don’t worry about it.
This isn’t quite right. I just want to. have you got a mirror?
No I haven’t. Just hold it there, OK? Hold it there (he takes a picture). Nice.
OK, let’s have a look.
Right. I’m gonna save that now. OK, that’s it: it’s gone to the cloud!
Really?
Yes. we’ll be able to look at that later on my laptop.
Ah, the cloud! You don’t mean the one in the sky, of course.
No.
You mean the huge computers where companies like Apple, Facebook and Google store their users’ pictures, videos and documents. You know, I’m a little suspicious about the cloud.
Are you?
Well, I just don’t want lots of people looking at that picture. Mainly because my hair doesn’t look quite right.
You’re so vain. Gosh! It’s too late now. But you look fine so you can share it with the world.
OK.
Think about those poor celebrities who’ve had their nude pictures leaked online.
Leaked - now this refers to pictures that were being kept hidden being made available to the public. They were leaked to the public. Actress Jennifer Lawrence, who starred in the Hunger Games movies, was one as was the singer Rhianna.
This incident has made people discuss the issue of privacy on the internet. Privacy means being free from public attention. And in this programme you’ll hear useful words for giving your opinion on this subject.
Yes. The celebrities were very angry.
They thought they could keep their pictures private because they were in the cloud protected by a password - a word or sequence of numbers that only they knew and which is required for them to gain access to what is stored in their name.
The US federal police - that’s the FBI - have been investigating this to find the hackers involved. Hackers are people who understand a lot about computers and use flaws - or little problems - in the software to gain access to a computer file, or network, illegally.
Today we have passwords for everything. And we have so many devices - like smartphones and laptops and computers - so I’m going to ask you a question about smartphones.
OK. Very good.
According to research, how many people had mobile phones in 2013? Was it:
a) 1.4 million people
b) 14 million people
c) 1.4 billion people
Across the whole world?
Yup.
I think this is got to be: c) 1.4 billion people.
Well, you’ll get the correct answer at the end of the programme. Right. Let’s talk more about privacy online. People are more and more concerned about it. Listen to the advice internet expert Oliver Crofton gives us. Which word does he use to describe how you have to be when putting things into the cloud?
Oliver Crofton, expert on the internet I think ultimately it’s about being slightly savvy on what you put into the cloud. If you have a private or sensitive photograph, or a contract or some sort of document that has public interest and that people will want to try and get, just think twice about putting it into an environment such as a Cloud, of which you don’t really have any control over.
He says people have to be ‘savvy’ - now, that means well-informed and quite shrewd, you know, thinking carefully about things. He advises us to be very careful before putting documents and pictures onto these websites owned by big corporations.
Yes, because he says we don’t have any control over their computers - you don’t know how secure your documents are.
Yeah, you know Rob, I can see why people are suspicious of these things.
Well, let’s see what the BBC technology correspondent Rory Cellan-Jones has to say. Rory explains howsome cloud companies are offering to make the cloud more secure. Which word does he use to describe this kind of security process and it also means ‘identification of the user’?
Rory Cellan-Jones, BBC technology correspondent Many cloud companies now offer an added layer of security called ‘two-factor authentication ‘, where users have to enter a code sent to their mobile phone as well as a password to get into their accounts.
OK, the word was ‘authentication’ - now, that’s confirmation that someone is who they say they are. And the company actually uses two steps to do this.
Yes. After you try to access your account, they send a code - probably a series of numbers - to your mobile phone, so it’s an extra bit of information that only you know.
We really all should be very careful about how we protect our computers, and our tablets and our smartphones, things like that.
Talking about smartphones, let’s go back to my question.
OK.
I asked you how many people had mobile phones in 2013. Was it: 1.4 million people, 14 million people, or 1.4 billion people?
And I said 1.4 billion - the big one.
And you are correct!
OK!
Yes, by the end of 2013, about 1.4 billion people owned and used smartphones and by the end of 2014 this number will increase by 25% - this is according to the research company eMarketer.
Wow! What a lot of phones, Rob!
Indeed. Well, our time is up so let’s remember some of the words we’ve explained today.
Finn They were:
cloud
leak
privacy
password
hackers
savvy
authentication
That’s it for today. Do log on to bbclearningenglish.com - there’s no password - to find more 6 Minute English.
Bye for now!
Bye.
مشارکت کنندگان در این صفحه
تا کنون فردی در بازسازی این صفحه مشارکت نداشته است.
🖊 شما نیز میتوانید برای مشارکت در ترجمهی این صفحه یا اصلاح متن انگلیسی، به این لینک مراجعه بفرمایید.