【正文】
g the 55 girl through a window. Fortunately, Julie and other neighbors, the police and the mother of the victim soon arrived 56 to save the girl. Kim dashed into her mother39。s arms. What are you doing? Julie 48 .But the man, undisturbed, walked along the block until he reached an alley and 49 .TJ39。11yearold TJ had just jumped off the scooter(滑板車)as his neighbor Kim, aged 7, and her sister Julie, 9, looked on. That was 41 a man with messy hair appeared. Without a word, he picked Kim up and 42 walked away.He held her like a baby. 43 , the calm way the man held Kim made TJ believe he must have been a 44 . But eventually something was not 45 . TJ could see Kim39。s resolutionD Red is supposed to bring you loveE. Food plays an important role in people39。s tradition in your culture!A. Learn something newB. I don39。s Eve. The most popular colors are red and yellow. 39 . Yellow is supposed to bring you money. 40 .Many use the start of New Year as a time to try something new or change something about themselves. The New Year is a perfect time to change yourself for the better. That is why many people have the tradition of making a New Year39。s a look at a few of them.Drive off bad luckMany cultures have traditions meant to scare off bad luck. This often involves using fire or loud noises in the form of fireworks! In Scotland, for example, people hold bonfire celebrations. Men from villages walk through the streets swinging giant burning fireballs over their heads. 36 .Food for good luck 37 . In the southern part of the United States , people often eat blackeyed peas and pork for good luck in the New Year. In Spain, as the clock strikes midnight, people eat 12 grapes, which represent the 12 months of the year. It guarantees that the year will be filled with good luck.Clothing traditionsMany people like to wear new clothing to start the New Year. In Romania, there is a tradition that involves dressing up in a bear costume . 38 ,if this won39。New Year39。s secrets are easily attacked because thousands of government puters are connected by telephone lines that hackers can get into.In November 1988, a college student entered a . Defense Department puter network called Arpanet. The hacker injected a puter program that made copies of itself throughout Arpanet. Some hackers use viruses to destroy all the data in a puter. But in this case, government officials shut down the network before the program reached every puter in the system. Shutting down the system angered many researchers who were using the puters. The hacker turned himself in to the police and he was charged with a crime.The incident put the spotlight on puter hacking in the United States. Many panies have hired experts to protect their puters from hackers, and many puter experts now advise panies on how to protect their puters.The . government believes foreign governments have hired hackers to try to break into topsecret defense puters.Experts disagree over whether a puter network can ever be safe from hacking. But in the future, some of the most outstanding minds in the . will be working to frustrate the attempts of puter hackers.32. What did the first hackers do?A. They broke into government puters. B. They destroyed airplane ticket systems.C. They played puter games. D. They made free phone calls.33. Why can . government puters be easily hacked into?A. They have no defense systems. B. They are connected by telephone lines.C. They are partly accessible to the public. D. They lack plex processing programs.34. What happened to the government puters in November 1988?A. They lost all of the important data. B. They were shut down by researchers.C. They were invaded by a college student. D. They got totally ruined by a puter program.35. What did panies decide to do to protect their puter systems?A. Employ puter talents. B. Build secret defense systems.C. Ask the government for help. D. Collect and analyze the data of hackers.第二節(jié):(共5小題;每小題2分,滿分10分)根據(jù)短文內容,從短文后的選項中選出能填入空白處的最佳選項。s credit records to get back at the officer for arresting him. He also used a puter to change his college records to give himself better grades.As hackers gained experience, they began invading puters at banks, airlines and other businesses. In one case a hacker instructed an airline39。 s measures on organ donation.CWhen she was studying to bee a scientist, Megan Strauss rode in a small airplane to study giraffes. While a pilot flew over the Serengeti in Tanzania, Africa, the researchers looked down carefully and counted giraffes.I am always amazed how easily we can spot warthogs and other small animals, yet we sometimes have trouble seeing giraffes. Giraffes are slender in shape, and they may not throw a good shadow, says Dr. Strauss, who has since bee a wildlife scientist.The Serengeti is about the size of Vermont, a state in the northeastern US, so the scientists could not study the entire area. Instead, they surveyed three areas where giraffes were studied in the 1970s. As they expected, they saw far fewer of these animals.To find out if lions had been killing more giraffes in recent years, the team looked at the survival of young giraffes. Lions kill more young giraffes than adults, but the team found no decrease in young giraffes39。 activity27. What39。 organs are not proper for operation.D. Many patients have to die because of no replacement organ.25. The underlined words opt out in Para. 2