Alex felt restless. Along with his sister Rosita and his friend Hugo, Alex had been waiting in the cave for nearly three hours    1    either an attack from the returning robbers or the    2 of a rescue party, but nothing had happened. He and Rosita had some    3    and a sleep, and now it was Hugo's turn to sleep after his meal. Rosita was    4    in the entrance to the cave keeping watch on the valley below. Alex threw himself down beside her.

    “I do hope Ruark is all right,” she said, her eyes on the view outside. “I keep hoping I will __5    him somewhere.”

    “I'm sure he's okay,” answered Alex. “I'm pretty    6    the enemy thought it was a ground 7   . Anyway, they were too busy rushing to    8    in their jeep to    9    time firing at a condor (神鹰). I'm not worried about him. What I am worrying about, though, are the words on that    10    that was tied to Ruark's leg. I keep saying the words to myself: What about the cave? There's a two-meter hole at the back of it. No one will find it. There are so many caves ... The money they stole is hidden somewhere out there and I should hate them to come back and 11 it from under our noses.”

    “Well,” replied his sister, “you    12    what the man said. There are so many caves. At a 13  ,  I can see about two hundred of them dotted around. It could take a week to    14    in them all.” “Yes. It's a    15    hiding place, but I think we have one clue (线索)that might help us. Ruark was perched ()somewhere    16    enough for the tape to pick up their 17   . He was probably situated just above the entrance. Condors are not    18    tiny birds so he may have been on a shelf or an overhanging rock    19    enough to take his big feet and body.” Alex    20    closed his eyes against the strong light outside and tried to examine the opposite side of the valley.

    1

A. noticing            B. requiring

C. expecting            D. finding

    2

A. care               B. advice

C. attention           D. arrival

    3

A. wine               B. food

C. water             D. medicine

    4

A. lying               B. laughing

C. eating             D. talking

    5

A. see               B. catch

C. feed               D. beat

    6

A. clear               B. puzzled

C. certain              D. nervous

    7

A. fire               B. attack

C. force              D. control

    8

A. get down            B. get through

C. get away           D. get back

    9

A. waste.              B. save

C. kill               D. have

    10

A. rock               B. cave

C. paper              D. tape

    11

A. send               B. throw

C. break              D. take

    12

A. heard              B. told

C. found             D. understood

    13

A. time.              B. guess

C. distance            D. moment

    14

A. rest                B. work

C. look               D. walk

    15

A. small              B. warm

C. clever             D. clean

    16

A. quiet               B. near

C. tidy                D. wide

    17

A. sound             B. birds

C. voices              D. money

    18

A. exactly             B. simply

C. naturally             D. perfectly

    19

A. hard               B. high

C. flat               D. large

    20

A. just                B. still

C. half               D. also

 

A senior official in charge of Internet security has claimed that the country has become the world' s biggest victim of cyber-attacks.

In an interview with Xinhua over the weekend, Zhou Yonglin, deputy chief of the operations department of China National Computer Network Emergency Response Technical Team ( CNCERT), also dismissed Google' s complaints that hackers traced to China had attacked its servers.

Google has not yet given CNCERT any report on the company' s complaints about the attacks, according to Zhou. "We have been hoping that Google will contact us so that we could have details on this issue and provide them help if necessary.”

Foreign firms such as eBay have turned to CNCERT for cyber security issues in the past year. Last year, the Internet security watchdog received 21,618 complaints from foreign companies, of which 1,095 cases were solved after combining similar cases. These cases included the trojan and phishing attacks (钓鱼攻击) against eBay /Paypal, JPMorgan Chase & Co and MarkMonitor Inc.

China has also sought other countries' help to clear web pages with malicious content. In November 2009, CNCERT reported to its US counterpart, the US-CERT, about two US-registered domain (域) names that were planting trojans on hundreds of Chinese websites. The domain names were shut down within two days of CNCERT’s requests.

With the number of Chinese netizens soaring but their Internet security awareness lagging, hackers have made China their primary target, Zhou said. He accused overseas hackers, especially those in the US, of illegally controlling computers in China by implanting malicious programs including trojans and zombie programs.

Compared with Interact security issues in the US, Japan and the Republic of Korea, it is very serious in China. Last year, 262,000 IP addresses in China were hit by trojans planted by nearly 165,000 overseas IP addresses. Those from the US ranked first, accounting for 16.61 percent.

60. What is the best title of the passage?

A. Google attacked by unknown hackers.                  

B. US legally responsible for Internet Security

C. Malicious Programs, an International Problem

D. China, the world' s biggest victim of cyber-attacks

61. Who does the underlined "a senior official" refer to?

A. An interviewer from Xinhua News Agency.

B. Deputy Chief of operation department of CNCERT.

C. A high official from Google Company.                 

D. A representative from foreign firms.

62. The author mentions eBay as an example of ________.

A. complaining for the cyber attacks                         B. seeking other countries for assistance

C. turning to CNCERT for cyber security                   D. taking USA as a counterpart

63. What does the writer intend to tell the readers in Paragraph 5?

A. The global cyber-attacks are mainly from the US.

B. International cooperation quickens steps to settle cyber issues.

C. The two US-registered domains are the counterparts of US-CERT.

D. CNCERT shut down the two US domain names within two days.

违法和不良信息举报电话:027-86699610 举报邮箱:58377363@163.com

精英家教网