【正文】
o smoke____.A. breathe less carbon monoxide the workers in a cigarette factoryB. always live at an altitude of two milesC. breathe as little oxygen as nonsmokersD. get much less amount of oxygen than nonsmokers get when they live at the same altitude5. Smokers are easily __in games.A. hurt B. excited C. worn out D. nervousPassage Two Tracking down cybercriminals who steal credit card numbers, transfer money from other people’s accounts, or viruses around the world takes a knowledge of the technology used to mit the crimes. Instead of using fingerprints or following suspects, government agents painstakingly sort out the mess of numbers and symbols and letters that can lead them back through the puter system to the cybercriminals.One such investigation led to the arrest of the man accused of sending the extremely dangerous Melissa virus, a puter virus that destroyed files in puters around the world in the spring of 1999. The agents received help from online service technicians, software experts, and a puterscience student. All helped to trace the plex pathways of the virus aback to the telephone line and puter of the man who released it.In another case, agents worked for two years to catch a cybercriminal who was, among other offenses, stealing credit card numbers. Agents found him by tracing a path from a puter he broke into to the mobile telephone he had used, which led to his address — and arrest.The government agents are also working to block cybercriminals who could cut off power and confuse telephone panies. “Think of the consequences if the power went out for a week — not in just one town or city but down the whole East Coast, says Michael Vatis, an FBI agent. From TVs to hospital equipment, all would fail.Makaveli and Tooshort were arrested for the charges of breaking into puters. They were given probation (假釋), required to perform munity service, and prevented form having home puters with modems. Punishment for adults can be more severe and usually includes some jail time.Most people use their puters legally. For the few who don’t, however, cyberpolice and better security systems will make it harder for cybercriminals to get away with their crimes.6. What should be known to catch cybercrimials?A. Credit card numbers. B. Suspects’ fingerprints.C. The technology used to mit the crimes. D. Numbers, symbols and letters.7. How dangerous was Melissa virus back in 1999?A. It destroyed puter files worldwide.B. Many agents took up the case.C. Technicians, experts, and a student were investigated.D. Telephone lines and puters were destroyed.8. How serious could a puter crime bee?A. Many telephone