Given the advantages of electronic money, you might think that we would move quickly to the cashless society in which all payments are made electronically. 1 a true cashless society is probably not around the corner. Indeed, predictions have been 2 for two decades but have not yet come to fruition. For example, Business Week predicted in 1975 that electronic means of payment would soon "revolutionize the very 3 of money itself," only to 4 itself several years later. Why has the movement to a cashless society been so 5 in coming? Although electronic means of payment may be more efficient than a payments system based on paper, several factors work 6 the disappearance of the paper system. First, it is very 7 to set up the computer, card reader, and telecornmunications networks necessary to make electronic money the 8 form. of payment Second, paper checks have the advantage that they 9 receipts, something thai many consumers are unwilling to 10 . Third, the use of paper checks gives consumers several days of "float" - it takes several days 11 a check is cashed and funds are 12 from the issuer&39;s account, which means that the writer of the check can cam interest on the funds in the meantime. 13 electronic payments arc immediate, they eliminate the float for the consumer. Fourth, electronic means of payment may 14 security and privacy concerns. We often hear media reports that an unauthorized hacker has been able to access a computer database and to alter information 15 there. The fact that this is not an 16 occurrence means that dishonest persons might be able to access bank accounts in electronic payments systems and 17 from someone else&39;s accounts. The 18 of this type of fraud is no easy task, and a new field of computer science is developing to 19 security issues. A further concern is that the use of e lectronic means of payment leaves an electronic 20 that contains a large amount of personal data. There are concerns that government, employers, and marketers might be able to access these data, thereby violating our privacy. 1 A.However B.Moreover C.Therefore D.Otherwise 2A.off B.back C.over D.around 7A.imaginative B.expensive C.sensitive D.productive 8A.similar B.original C.temporary D.dominant 9A.collect B.provide C.copy D.print 10A.give up B.take over C.bring back D.pass down 11A.before B.after C.since D.when 12A.kept B.borrowed C.released D.withdrawn 13A.Unless B.Until C.Because D.Though 14A.hide B.express C.raise D.ease 16A.unsafe B.unnatural C.uncommon D.unclear 17A.steal B.choose C.benefit D.return 18A.consideration B.prevention C.manipulation D.justification 6A.for B.against C.with D.on 20A.chunk B.chip C.path D.trail 15A.analyzed B.shared C.stored D.displayed 3A.power B.concept C.history D.role 19A.cope with B.fight against C.adapt to D.call for 5A.silent B.sudden C.slow D.steady 4A.reward B.resist C.resume D.reverse