Read the sentences in the box. Pay attention to the parts in bold. Target sentence patterns 1 But an expert programmer can sometimes figure out how to make a computer malfunction in a creative way, so that it provides access to secure parts of a system, or shares protected data. 2 Many modern specimens of malicious code, however, use a mixture of tricks to cheat their way onto computer systems, blurring the line between worms and viruses. 3 There is evidence that virus writers can earn large amounts of money by leasing access to networks of compromised computers-often referred to as "botnets". 4 This makes it far more difficult for spam hunters to block the messages at source and catch the offenders. 5 Once considered a fairly minor problem , spam is rapidly spiraling out of control, and much more than half of all email messages are now thought to consist of unwanted advertising messages. 6 Some genuine sites have even proven vulnerable to software bugs that can be exploited to capture information from regular users. Now complete the paragraph by translating the Chinese in brackets. You may refe r to the expressions and the sentence patterns listed above. ____________________________________ (有证据表明) that as the number of we b users has grown, _ _________________________________ (黑客的数量也有很大增 长) . Computer hackers _________________ ___________ ________________ _____ (往往被称之为) the major threat to the Internet as they can deliver dangerous malware to your compute r and ____________________________________ (损坏你的计算机) or __________________________________ (获取你的信息) . They can also try to ___________________________ (进入你的计算机) if you are not protected with a firewall.