题目内容
“I do hope Ruark is all right,” she said, her eyes on the view outside. “I keep hoping I will __5 him somewhere.”
“I'm sure he's okay,” answered Alex. “I'm pretty 6 the enemy thought it was a ground 7 . Anyway, they were too busy rushing to 8 in their jeep to 9 time firing at a condor (神鹰). I'm not worried about him. What I am worrying about, though, are the words on that 10 that was tied to Ruark's leg. I keep saying the words to myself: What about the cave? There's a two-meter hole at the back of it. No one will find it. There are so many caves ... The money they stole is hidden somewhere out there and I should hate them to come back and 11 it from under our noses.”
“Well,” replied his sister, “you 12 what the man said. There are so many caves. At a 13 , I can see about two hundred of them dotted around. It could take a week to 14 in them all.” “Yes. It's a 15 hiding place, but I think we have one clue (线索)that might help us. Ruark was perched (落)somewhere 16 enough for the tape to pick up their 17 . He was probably situated just above the entrance. Condors are not 18 tiny birds so he may have been on a shelf or an overhanging rock 19 enough to take his big feet and body.” Alex 20 closed his eyes against the strong light outside and tried to examine the opposite side of the valley.
1.
A. noticing B. requiring
C. expecting D. finding
2.
A. care B. advice
C. attention D. arrival
3.
A. wine B. food
C. water D. medicine
4.
A. lying B. laughing
C. eating D. talking
5.
A. see B. catch
C. feed D. beat
6.
A. clear B. puzzled
C. certain D. nervous
7.
A. fire B. attack
C. force D. control
8.
A. get down B. get through
C. get away D. get back
9.
A. waste. B. save
C. kill D. have
10.
A. rock B. cave
C. paper D. tape
11.
A. send B. throw
C. break D. take
12.
A. heard B. told
C. found D. understood
13.
A. time. B. guess
C. distance D. moment
14.
A. rest B. work
C. look D. walk
15.
A. small B. warm
C. clever D. clean
16.
A. quiet B. near
C. tidy D. wide
17.
A. sound B. birds
C. voices D. money
18.
A. exactly B. simply
C. naturally D. perfectly
19.
A. hard B. high
C. flat D. large
20.
A. just B. still
C. half D. also
A senior official in charge of Internet security has claimed that the country has become the world' s biggest victim of cyber-attacks.
In an interview with Xinhua over the weekend, Zhou Yonglin, deputy chief of the operations department of China National Computer Network Emergency Response Technical Team ( CNCERT), also dismissed Google' s complaints that hackers traced to China had attacked its servers.
Google has not yet given CNCERT any report on the company' s complaints about the attacks, according to Zhou. "We have been hoping that Google will contact us so that we could have details on this issue and provide them help if necessary.”
Foreign firms such as eBay have turned to CNCERT for cyber security issues in the past year. Last year, the Internet security watchdog received 21,618 complaints from foreign companies, of which 1,095 cases were solved after combining similar cases. These cases included the trojan and phishing attacks (钓鱼攻击) against eBay /Paypal, JPMorgan Chase & Co and MarkMonitor Inc.
China has also sought other countries' help to clear web pages with malicious content. In November 2009, CNCERT reported to its US counterpart, the US-CERT, about two US-registered domain (域) names that were planting trojans on hundreds of Chinese websites. The domain names were shut down within two days of CNCERT’s requests.
With the number of Chinese netizens soaring but their Internet security awareness lagging, hackers have made China their primary target, Zhou said. He accused overseas hackers, especially those in the US, of illegally controlling computers in China by implanting malicious programs including trojans and zombie programs.
Compared with Interact security issues in the US, Japan and the Republic of Korea, it is very serious in China. Last year, 262,000 IP addresses in China were hit by trojans planted by nearly 165,000 overseas IP addresses. Those from the US ranked first, accounting for 16.61 percent.
60. What is the best title of the passage?
A. Google attacked by unknown hackers.
B. US legally responsible for Internet Security
C. Malicious Programs, an International Problem
D. China, the world' s biggest victim of cyber-attacks
61. Who does the underlined "a senior official" refer to?
A. An interviewer from Xinhua News Agency.
B. Deputy Chief of operation department of CNCERT.
C. A high official from Google Company.
D. A representative from foreign firms.
62. The author mentions eBay as an example of ________.
A. complaining for the cyber attacks B. seeking other countries for assistance
C. turning to CNCERT for cyber security D. taking USA as a counterpart
63. What does the writer intend to tell the readers in Paragraph 5?
A. The global cyber-attacks are mainly from the US.
B. International cooperation quickens steps to settle cyber issues.
C. The two US-registered domains are the counterparts of US-CERT.
D. CNCERT shut down the two US domain names within two days.