Read the following passage and mark the letter A, B, C, or D on your answer sheet to indicate the correct answer to each of the following questions from 31 to 36.
One of the greatest security threats in the online world is computer hacking. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?
Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system.
In fact, just the act of entering a computer network is commonly considered passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are the more dangerous of the two.
The easiest way to protect a system is with a good password. Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them new code to use the next time. Even if a hacker steals the password, they won’t have the code. Or if the hacker somehow gets the code, they still don’t know the password.
Question 31.What should be the main title of the passage?
A. Hackers and Computer Security B. Funny Things Hackers Do
C. Famous Hackers D. Good Ways to Stop Hackers
Question 32. The word "threats" in paragraph 1 is CLOSEST in meaning to ____________.
A. danger B. safety C. solution D. benefit
Question 33. What do hackers do to get into a computer?
A. manipulating its codes B. replacing security programs
C. making a new password D. spreading viruses
Question 34. Which of the following can NOT be inferred about active hackers?
A. They make use of the hacked information. B. They deactivate the protocols in computers.
C. They are more warning than passive ones. D. They take over the computers systematically
Question 35. What is the easiest way to protect a system?
A. Using a long and unusual password B. Avoiding online services
C. Sharing passwords D. Using the same password everywhere
Question 36. The word "assesses” in paragraph 4 is OPPOSITE in meaning to ____________.
A. designs B. forgets C. ignores D. invents
Quảng cáo
2 câu trả lời 24
Question 31: What should be the main title of the passage?
Answer: A. Hackers and Computer Security
Explanation: The passage discusses hackers, their methods of hacking, and how to protect systems from them. The title "Hackers and Computer Security" accurately reflects the main focus of the passage.
Dịch: Câu hỏi này yêu cầu xác định tiêu đề chính của bài viết. Đáp án "A. Hackers and Computer Security" là phù hợp vì bài viết chủ yếu nói về các hacker và cách bảo vệ hệ thống khỏi chúng.
Question 32: The word "threats" in paragraph 1 is CLOSEST in meaning to ____________.
Answer: A. danger
Explanation: In this context, "threats" refers to potential dangers or risks posed by hackers in the online world.
Dịch: "Threats" có nghĩa là "nguy hiểm", chỉ những mối đe dọa mà các hacker có thể gây ra đối với hệ thống máy tính.
Question 33: What do hackers do to get into a computer?
Answer: A. manipulating its codes
Explanation: Hackers often manipulate protocols or codes within a system to gain unauthorized access, as described in the passage.
Dịch: Các hacker thao túng các mã hoặc giao thức của hệ thống để xâm nhập vào máy tính mà không được phép, như được mô tả trong bài viết.
Question 34: Which of the following can NOT be inferred about active hackers?
Answer: C. They are more warning than passive ones.
Explanation: The passage doesn't suggest that active hackers are more "warning" than passive ones. Instead, it states that active hackers are more dangerous. The term "warning" does not apply here.
Dịch: Câu này yêu cầu xác định điều không thể suy luận về các hacker chủ động. Đáp án "C. Họ cảnh báo nhiều hơn so với các hacker thụ động" là không đúng vì bài viết không đề cập đến khái niệm "cảnh báo" mà chỉ mô tả rằng hacker chủ động nguy hiểm hơn.
Question 35: What is the easiest way to protect a system?
Answer: A. Using a long and unusual password
Explanation: The passage states that the easiest way to protect a system is by using a good password, particularly long and unusual passwords that are harder for hackers to guess.
Dịch: Câu hỏi yêu cầu tìm cách bảo vệ hệ thống dễ dàng nhất. Đáp án đúng là "A. Sử dụng mật khẩu dài và bất thường", vì bài viết nói rằng mật khẩu khó đoán giúp bảo vệ hệ thống tốt hơn.
Question 36: The word "assesses" in paragraph 4 is OPPOSITE in meaning to ____________.
Answer: C. ignores
Explanation: "Assesses" means to evaluate or check, so its opposite would be "ignores," which means to disregard or not pay attention to something.
Dịch: Câu hỏi yêu cầu tìm từ trái nghĩa của từ "assesses". "Assesses" có nghĩa là đánh giá hoặc kiểm tra, vì vậy từ trái nghĩa của nó là "ignores", có nghĩa là phớt lờ hoặc không chú ý đến điều gì đó.
Question 31. What should be the main title of the passage?
A. Hackers and Computer Security (This title best encompasses the entire content of the passage, which discusses hackers, their methods, and security measures.)
Question 32. The word "threats" in paragraph 1 is CLOSEST in meaning to ____________.
A. danger (Threats imply potential harm or danger.)
Question 33. What do hackers do to get into a computer?
A. manipulating its codes (The passage states that hackers manipulate protocols, which are essentially codes.)
Question 34. Which of the following can NOT be inferred about active hackers?
B. They deactivate the protocols in computers. (The passage states that hackers manipulate protocols, not deactivate them.)
Question 35. What is the easiest way to protect a system?
A. Using a long and unusual password (The passage explicitly states this as the easiest way.)
Question 36. The word "assesses” in paragraph 4 is OPPOSITE in meaning to ____________.
C. ignores (Assess means to evaluate or check. The opposite would be to disregard or ignore.)
Quảng cáo
Câu hỏi hot cùng chủ đề
-
III. Match a question in column A with its answer in column B.
A B 1. How heavy is Mai? a. I like cartoons. 2. What kinds of TV programs do you like? b. Because I got up late. 3. Why did you come to class late? c. He should go to the movie theater. 4. Where should Nam go to relax? d. She is forty kilos. 6 85938 -
3 34027
-
2 20711
-
1 20340