题目内容
III. Reading Comprehension (40’)
Section A
Directions: For each blank in the following passage there are four words or phrases marked A, B, C and D. Fill in each blank with the word or phrase that best fits the context.
Imagine waking up one morning to discover all your personal information in your mobile phone has been stolen. Your messages have been infected with a virus that has sent itself to all the people you have ever ___48___ messages with. You try to make a call but your mobile phone's address book has been deleted. What is ___49___ is that you turn on your phone, only to find your screen back. Nowadays, Computer hackers, who have long focused on computers, have now got their ___50___ on mobile phones. A phone virus programme can make your phone do things you have no control over. It might control the White House or the police. Or it could ___51___ eat into the phone's operating software, turning it off and erasing your personal information.
With mobile phones functioning more like computers, it’s no ___52___ that hackers and virus writers have the phones in their sights. Now that the mobile phone is a small computer with memory, important data and an ___53___ to the Internet, these devices should be protected equally and carefully. ___54___, it seems that the phone users have done nothing more to protect their phones and viruses have already made mobile phone owners ___55___ in Asia. A virus can get messages and send them elsewhere. And it can record your password. People are now ___56___ of surfing the Net, send emails and download software with their mobiles, so they are an easy target for the same hackers who have kept sending viruses to computers over the past two ___57___.
In China, the mobile of a certain ___58___ kept sending a huge amount of messages automatically and secretly, which made her pay a lot of extra money reluctantly. In Japan, if you opened an email message on your mobile, it would cause the phone to repeatedly ___59___ the national emergency number. So phone operators had to cancel emergency calls until the fault was removed. Some experts say that mobile users can ___60___ viruses, of course, by sticking to their traditional phones without Web links, while some others advise users to make Bluetooth invisible, delete all unsolicited messages without opening them, always say “___61___” if your phone asks to install a program that you are not ___62___ with and install only software from safe websites as much as possible
48. A. sent B. received C. exchanged D. contacted
49. A. important B. wonderful C. worse D. serious
50. A. hands B. viruses C. control D. temptation
51. A. extensively B. absolutely C. regularly D. simply
52. A. need B. wonder C. use D. possibility
53. A. affection B. access C. address D. admission
54. A. However B. Therefore C. Furthermore D. Somehow
55. A. amazed B. terrified C. amused D. surprised
56. A. capable B. possible C. able D. mobile
57. A. weeks B. centuries C. years D. decades
58. A. hacker B. businessman C. lady D. gentleman
59. A. call B. ring C. attack D. dial
60. A. copy B. delete C. avoid D. recognize
61. A. yes B. hello C. sorry D. no
62. A. satisfied B. familiar C. delighted D. Happy
48—52. CCADB 53—57. BABAD 58—62. CDCDB