50 câu hỏi
Mark the letter A, B, C or D to indicate the word whose underlined part differs from the other three in pronunciation in each of the following questions.
academic
apply
apology
achieve
Mark the letter A, B, C or D to indicate the word whose underlined part differs from the other three in pronunciation in each of the following questions.
impresses
abolishes
influences
heightens
Mark the letter A, B, C, or D to indicate the word that differs from the other three in the position of primary stress in each of the following questions.
muscle
listen
disease
pretty
Mark the letter A, B, C, or D to indicate the word that differs from the other three in the position of primary stress in each of the following questions.
biomass
addicted
distinguished
efficient
In many countries, divorces ______ to rise because of long-standing conflicts.
tend
have
aim
encourage
______ being the CEO of Microsoft, Bill Gates is also one of the world's greatest philanthropists.
Aside from
But for
Except for
In addition
People often use the natural world as inspiration to design and invent new ______.
producers
productivities
productions
products
In the U.S, children can choose their own partners even if their parents object ______ their choice.
to
for
against
with
My mother ______ me from going home after 10 p.m. every day.
forbids
allows
lets
All are correct
If one wants to take part in volunteer organisations such as Green Summer Camp, Green Saturday Movement, Blood Donor, he/she will have to ______ an application form.
fill in
find out
log on
send off
Southern Spain's Costa del Sol, ______ from Nerja in the east to Manilva in the west, is one of the most fascinating tourist areas in the world.
stretches
being stretched
stretched
stretching
Next week when there ______ a full moon, the ocean tides will be higher.
will be
will have been
is being
is
I have visited ______ Portugal but I have never been to ______ Netherlands.
the-the
0- the
a - the
a - a
______ irritating they are, you shouldn't lose temper with small children.
No matter how much
As much as
However
Although
If I weren't afraid of travelling by air, I ______ to go to American by ship, which took me much longer time.
I hadn't had
Iwouldn't have had
I shouldn't have had
I wouldn't have
______ is over your head is just an exaggeration because you have well prepared for it over the years.
This entrance exam
What this entrance exam
That this entrance exam
It is this entrance exam
It was ______ silent inside the old, abandoned house.
extremely
hardly
perfectly
totally
I don't like networking events - spending hours trying to ______ small talk with strangers just isn't my cup of tea.
make
take
have
do
Mark the letter A, B, C, or D to indicate the word(s) CLOSEST in meaning to the underlined word (s) in each of the following questions.
Sometimes, in order to get things done, you have to take the initiative.
make the last decision
make important changes
raise the first idea
sacrifice for others
Mark the letter A, B, C, or D to indicate the word(s) CLOSEST in meaning to the underlined word (s) in each of the following questions.
The emblem of the Association of Southeast Asian Nations was designed basing on rice - the most important crop for the Southeast Asian people.
banner
logo
motto
slogan
Mark the letter A, B, C, or D to indicate the word(s) OPPOSITE in meaning to the underlined word(s) in each of the following questions.
The best hope of avoiding downmarket tabloid TV future lies in the pressure currently being put on the networks to clean up their act.
expensive
famous
poor quality
uncreative
Mark the letter A, B, C, or D to indicate the word(s) OPPOSITE in meaning to the underlined word(s) in each of the following questions.
Teenagers can become addicted to social networking if they can't control they spend online.
dependent on
hooked on
indifferent to
exhausted by
A: “Well, Brad Pitt and Angelina Jolie have just decided to divorce! Don't you know?”
B: “__________________.”
I couldn't agree more.
Oh, thanks!
Really? Are you kidding?
No, not right now.
Stranger: “Could you show me how to get to the nearest train station from here?”
Lan: “_____________.”
I'm not certain but its maybe at the end of the street.
I totally agree with you.
Sorry, I never know you.
I'm busy. now.
Read the following passage and mark the letter A, B, C, or D to indicate the correct word or phrase that best fits each the numbered blanks.
The idea of going overseas to study can be daunting, with visions of baffling languages or nights spent in isolation while you are gradually forgotten by your friends and family. (25) ______ the benefits of studying abroad - such as broadening your mind, improving your career prospects and making friends from all over the world - can make digging out your passport really rewarding.
“Studying abroad is an eye-opening experience,” says Anna Boyd, event manager at The Student World. “Being (26) ______ in another culture, understanding differences and spotting similarities, living on a beach or in the mountains, (27) ______ will have an impact on every student.”
Overseas study comes in many shapes and sizes. It might be a single semester abroad via an Erasmus programme, for example. Or you might elect to follow a full three-or four-year degree programme. Whatever your ambition, the key is starting early. Some countries require specific combinations of A-levels from UK students, Germany looks for four A-levels including maths or science and one modern foreign language, for instance, while others, such as the US, value extracurricular activities. Starting our research well ahead (28) ______time can help you make the right choices. "Getting involved in sports, arts and music is also worth considering, as well as gaining experience through volunteering and work placements," says Boyd. In fact, applying to study abroad could even work to your advantage , for example, you might encounter lower (29) ______ requirements.
Điền vào số (25)
But
However
Therefore
Thereby
Read the following passage and mark the letter A, B, C, or D to indicate the correct word or phrase that best fits each the numbered blanks.
The idea of going overseas to study can be daunting, with visions of baffling languages or nights spent in isolation while you are gradually forgotten by your friends and family. (25) ______ the benefits of studying abroad - such as broadening your mind, improving your career prospects and making friends from all over the world - can make digging out your passport really rewarding.
“Studying abroad is an eye-opening experience,” says Anna Boyd, event manager at The Student World. “Being (26) ______ in another culture, understanding differences and spotting similarities, living on a beach or in the mountains, (27) ______ will have an impact on every student.”
Overseas study comes in many shapes and sizes. It might be a single semester abroad via an Erasmus programme, for example. Or you might elect to follow a full three-or four-year degree programme. Whatever your ambition, the key is starting early. Some countries require specific combinations of A-levels from UK students, Germany looks for four A-levels including maths or science and one modern foreign language, for instance, while others, such as the US, value extracurricular activities. Starting our research well ahead (28) ______time can help you make the right choices. "Getting involved in sports, arts and music is also worth considering, as well as gaining experience through volunteering and work placements," says Boyd. In fact, applying to study abroad could even work to your advantage , for example, you might encounter lower (29) ______ requirements.
Điền vào số (26)
immersed
interested
resided
taken
Read the following passage and mark the letter A, B, C, or D to indicate the correct word or phrase that best fits each the numbered blanks.
The idea of going overseas to study can be daunting, with visions of baffling languages or nights spent in isolation while you are gradually forgotten by your friends and family. (25) ______ the benefits of studying abroad - such as broadening your mind, improving your career prospects and making friends from all over the world - can make digging out your passport really rewarding.
“Studying abroad is an eye-opening experience,” says Anna Boyd, event manager at The Student World. “Being (26) ______ in another culture, understanding differences and spotting similarities, living on a beach or in the mountains, (27) ______ will have an impact on every student.”
Overseas study comes in many shapes and sizes. It might be a single semester abroad via an Erasmus programme, for example. Or you might elect to follow a full three-or four-year degree programme. Whatever your ambition, the key is starting early. Some countries require specific combinations of A-levels from UK students, Germany looks for four A-levels including maths or science and one modern foreign language, for instance, while others, such as the US, value extracurricular activities. Starting our research well ahead (28) ______time can help you make the right choices. "Getting involved in sports, arts and music is also worth considering, as well as gaining experience through volunteering and work placements," says Boyd. In fact, applying to study abroad could even work to your advantage , for example, you might encounter lower (29) ______ requirements.
Điền vào số (27)
where
why
which
that
Read the following passage and mark the letter A, B, C, or D to indicate the correct word or phrase that best fits each the numbered blanks.
The idea of going overseas to study can be daunting, with visions of baffling languages or nights spent in isolation while you are gradually forgotten by your friends and family. (25) ______ the benefits of studying abroad - such as broadening your mind, improving your career prospects and making friends from all over the world - can make digging out your passport really rewarding.
“Studying abroad is an eye-opening experience,” says Anna Boyd, event manager at The Student World. “Being (26) ______ in another culture, understanding differences and spotting similarities, living on a beach or in the mountains, (27) ______ will have an impact on every student.”
Overseas study comes in many shapes and sizes. It might be a single semester abroad via an Erasmus programme, for example. Or you might elect to follow a full three-or four-year degree programme. Whatever your ambition, the key is starting early. Some countries require specific combinations of A-levels from UK students, Germany looks for four A-levels including maths or science and one modern foreign language, for instance, while others, such as the US, value extracurricular activities. Starting our research well ahead (28) ______time can help you make the right choices. "Getting involved in sports, arts and music is also worth considering, as well as gaining experience through volunteering and work placements," says Boyd. In fact, applying to study abroad could even work to your advantage , for example, you might encounter lower (29) ______ requirements.
Điền vào số (28)
on
off
in
of
Read the following passage and mark the letter A, B, C, or D to indicate the correct word or phrase that best fits each the numbered blanks.
The idea of going overseas to study can be daunting, with visions of baffling languages or nights spent in isolation while you are gradually forgotten by your friends and family. (25) ______ the benefits of studying abroad - such as broadening your mind, improving your career prospects and making friends from all over the world - can make digging out your passport really rewarding.
“Studying abroad is an eye-opening experience,” says Anna Boyd, event manager at The Student World. “Being (26) ______ in another culture, understanding differences and spotting similarities, living on a beach or in the mountains, (27) ______ will have an impact on every student.”
Overseas study comes in many shapes and sizes. It might be a single semester abroad via an Erasmus programme, for example. Or you might elect to follow a full three-or four-year degree programme. Whatever your ambition, the key is starting early. Some countries require specific combinations of A-levels from UK students, Germany looks for four A-levels including maths or science and one modern foreign language, for instance, while others, such as the US, value extracurricular activities. Starting our research well ahead (28) ______time can help you make the right choices. "Getting involved in sports, arts and music is also worth considering, as well as gaining experience through volunteering and work placements," says Boyd. In fact, applying to study abroad could even work to your advantage , for example, you might encounter lower (29) ______ requirements.
Điền vào số (29)
entry
entrance
enter
entered
Read the following passage and mark the letter A, B, C, or II to indicate the answer to each of the question.
As Hurricane Florence zeroes in on the southeastern US, scientists are warning that climate change is exacerbating the effect of tropical storms. The powerful Category 4 Atlantic weather-front is slow moving, an increasingly common phenomenon that poses a different manner of threat to states in its path. In the event that Florence stalls or comes to a halt altogether over land, it has the potential to deposit catastrophic quantities of rainwater, posing a risk of severe flash flooding.
While the high winds and waves generated by faster storms moving inland from the ocean pose a significant danger to human life and property, the effect of heavy rain can be just as devastating, if not more so. When Hurricane Harvey hit in August 2017, it dropped 60 inches of rain over Houston, Texas, flooding the streets, leaving 93 dead and hundreds more having to be rescued by boat, causing millions of dollars-worth of damage.
James Kossin of the National Oceanic and Atmospheric Administration published a study in the journal Nature in June suggesting that slow-moving tropical cyclones, which would include those like Florence and Harvey, have become more common over the last 70 years, dropping in speed by 10 per cent in that time. According to Mr Kossin, global warming as a result of man-made air pollution is causing the poles to become warmer, which in turn reduces the difference in temperature between the Arctic and Antarctic and the equator, altering atmospheric pressure and slowing down the whipping currents of wind that pass between them and drive hurricanes.
The best title for this passage could be _______________.
danger of hurricane in US
climate change and the threat from tropical storms
climate change and people activities
storms cause millions of dollars-worth of damage
Read the following passage and mark the letter A, B, C, or II to indicate the answer to each of the question.
As Hurricane Florence zeroes in on the southeastern US, scientists are warning that climate change is exacerbating the effect of tropical storms. The powerful Category 4 Atlantic weather-front is slow moving, an increasingly common phenomenon that poses a different manner of threat to states in its path. In the event that Florence stalls or comes to a halt altogether over land, it has the potential to deposit catastrophic quantities of rainwater, posing a risk of severe flash flooding.
While the high winds and waves generated by faster storms moving inland from the ocean pose a significant danger to human life and property, the effect of heavy rain can be just as devastating, if not more so. When Hurricane Harvey hit in August 2017, it dropped 60 inches of rain over Houston, Texas, flooding the streets, leaving 93 dead and hundreds more having to be rescued by boat, causing millions of dollars-worth of damage.
James Kossin of the National Oceanic and Atmospheric Administration published a study in the journal Nature in June suggesting that slow-moving tropical cyclones, which would include those like Florence and Harvey, have become more common over the last 70 years, dropping in speed by 10 per cent in that time. According to Mr Kossin, global warming as a result of man-made air pollution is causing the poles to become warmer, which in turn reduces the difference in temperature between the Arctic and Antarctic and the equator, altering atmospheric pressure and slowing down the whipping currents of wind that pass between them and drive hurricanes.
Which statement about Hurricane Harvey is probably TRUE according to the passage ?
It caused the floods in all the streets in US.
It caused a significant danger to people and property.
It made citizens in Texas suffer from floods and damage.
It made residents lose millions of dollars.
Read the following passage and mark the letter A, B, C, or II to indicate the answer to each of the question.
As Hurricane Florence zeroes in on the southeastern US, scientists are warning that climate change is exacerbating the effect of tropical storms. The powerful Category 4 Atlantic weather-front is slow moving, an increasingly common phenomenon that poses a different manner of threat to states in its path. In the event that Florence stalls or comes to a halt altogether over land, it has the potential to deposit catastrophic quantities of rainwater, posing a risk of severe flash flooding.
While the high winds and waves generated by faster storms moving inland from the ocean pose a significant danger to human life and property, the effect of heavy rain can be just as devastating, if not more so. When Hurricane Harvey hit in August 2017, it dropped 60 inches of rain over Houston, Texas, flooding the streets, leaving 93 dead and hundreds more having to be rescued by boat, causing millions of dollars-worth of damage.
James Kossin of the National Oceanic and Atmospheric Administration published a study in the journal Nature in June suggesting that slow-moving tropical cyclones, which would include those like Florence and Harvey, have become more common over the last 70 years, dropping in speed by 10 per cent in that time. According to Mr Kossin, global warming as a result of man-made air pollution is causing the poles to become warmer, which in turn reduces the difference in temperature between the Arctic and Antarctic and the equator, altering atmospheric pressure and slowing down the whipping currents of wind that pass between them and drive hurricanes.
The word “which” in paragraph 3 refers to ______.
tropical cyclones
a study
Florence
Harvey
Read the following passage and mark the letter A, B, C, or II to indicate the answer to each of the question.
As Hurricane Florence zeroes in on the southeastern US, scientists are warning that climate change is exacerbating the effect of tropical storms. The powerful Category 4 Atlantic weather-front is slow moving, an increasingly common phenomenon that poses a different manner of threat to states in its path. In the event that Florence stalls or comes to a halt altogether over land, it has the potential to deposit catastrophic quantities of rainwater, posing a risk of severe flash flooding.
While the high winds and waves generated by faster storms moving inland from the ocean pose a significant danger to human life and property, the effect of heavy rain can be just as devastating, if not more so. When Hurricane Harvey hit in August 2017, it dropped 60 inches of rain over Houston, Texas, flooding the streets, leaving 93 dead and hundreds more having to be rescued by boat, causing millions of dollars-worth of damage.
James Kossin of the National Oceanic and Atmospheric Administration published a study in the journal Nature in June suggesting that slow-moving tropical cyclones, which would include those like Florence and Harvey, have become more common over the last 70 years, dropping in speed by 10 per cent in that time. According to Mr Kossin, global warming as a result of man-made air pollution is causing the poles to become warmer, which in turn reduces the difference in temperature between the Arctic and Antarctic and the equator, altering atmospheric pressure and slowing down the whipping currents of wind that pass between them and drive hurricanes.
In the 3rd paragraph, James Kossin suggests that ______.
over the last 70 years, human activities have made global warming worse.
over the last 70 years, people cause the poles to become hotter.
over the last 70 years, Florence and Harvey are common in Texas.
over the last 70 years, slow-moving tropical cyclones have become more common.
Read the following passage and mark the letter A, B, C, or II to indicate the answer to each of the question.
As Hurricane Florence zeroes in on the southeastern US, scientists are warning that climate change is exacerbating the effect of tropical storms. The powerful Category 4 Atlantic weather-front is slow moving, an increasingly common phenomenon that poses a different manner of threat to states in its path. In the event that Florence stalls or comes to a halt altogether over land, it has the potential to deposit catastrophic quantities of rainwater, posing a risk of severe flash flooding.
While the high winds and waves generated by faster storms moving inland from the ocean pose a significant danger to human life and property, the effect of heavy rain can be just as devastating, if not more so. When Hurricane Harvey hit in August 2017, it dropped 60 inches of rain over Houston, Texas, flooding the streets, leaving 93 dead and hundreds more having to be rescued by boat, causing millions of dollars-worth of damage.
James Kossin of the National Oceanic and Atmospheric Administration published a study in the journal Nature in June suggesting that slow-moving tropical cyclones, which would include those like Florence and Harvey, have become more common over the last 70 years, dropping in speed by 10 per cent in that time. According to Mr Kossin, global warming as a result of man-made air pollution is causing the poles to become warmer, which in turn reduces the difference in temperature between the Arctic and Antarctic and the equator, altering atmospheric pressure and slowing down the whipping currents of wind that pass between them and drive hurricanes.
The word “altering” in paragraph 3 means ______.
fastening
changing
remaining
keeping
Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question.
As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?
Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system.
In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two.
The easiest way to protect a system is with a good password, Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time. Even if a hacker steals the password, they won't have the code. Or if the hacker somehow gets the code, they still don't know the password.
Which of the following could best describe the main idea of the passage?
Computer security and hackers.
Different types of hackers.
What a hacker can damage in your computer.
The way hackers access to a computer.
Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question.
As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?
Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system.
In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two.
The easiest way to protect a system is with a good password, Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time. Even if a hacker steals the password, they won't have the code. Or if the hacker somehow gets the code, they still don't know the password.
The word "unauthorized" in the first paragraph mostly means ______.
optional
illegal
permissible
compulsory
Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question.
As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?
Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system.
In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two.
The easiest way to protect a system is with a good password, Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time. Even if a hacker steals the password, they won't have the code. Or if the hacker somehow gets the code, they still don't know the password.
The word "manipulate" in paragraph 2 is closest in meaning to ______.
require
modify
transform
influence
Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question.
As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?
Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system.
In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two.
The easiest way to protect a system is with a good password, Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time. Even if a hacker steals the password, they won't have the code. Or if the hacker somehow gets the code, they still don't know the password.
According to paragraph 2, which information is NOT true about protocols?
Protocols are a set of rules controlling the way data is sent between computers.
Protocols can try out whether they are legal to access another computer or not.
The amount of shared information between two computers depends on the host computer.
The data hackers can get from others' computers may be infinite.
Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question.
As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?
Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system.
In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two.
The easiest way to protect a system is with a good password, Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time. Even if a hacker steals the password, they won't have the code. Or if the hacker somehow gets the code, they still don't know the password.
What does the phrase "the two" in paragraph 3 refer to _______?
a bank and military network
passive and active hackers
hackers and viruses
systems and viruses
Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question.
As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?
Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system.
In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two.
The easiest way to protect a system is with a good password, Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time. Even if a hacker steals the password, they won't have the code. Or if the hacker somehow gets the code, they still don't know the password.
The author mentioned in the third paragraph that active hackers are more dangerous because ______.
they often get access to important networks like a bank or military.
they implant viruses or steal private and other vital information in systems.
they always remove all the data in the systems they hack.
they can do many harmful things for the whole computer network system.
Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question.
As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?
Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system.
In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two.
The easiest way to protect a system is with a good password, Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time. Even if a hacker steals the password, they won't have the code. Or if the hacker somehow gets the code, they still don't know the password.
As suggested in the last paragraph, what is the best way for computer users to prevent hackers?
They should use a long and customary password so that hackers cannot guess.
They should use different passwords for different accounts to access the sites.
They should have an additional secret code to confirm for their access after putting a password.
They should not use any code on online services to make sure that hackers have no chance to get your password.
Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question.
As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?
Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system.
In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two.
The easiest way to protect a system is with a good password, Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time. Even if a hacker steals the password, they won't have the code. Or if the hacker somehow gets the code, they still don't know the password.
It is implied in the passage that ______.
it is difficult to protect data from being stolen by hackers.
not every hacker is harmful.
hackers always damage the information in the host computer.
online services have been improving their security system.
Mark the letter A, B, C or D to indicate the underlined part that needs correction in each of the following questions.
More research is needed to find out if acupuncture is helped with other side effects such as pain, anxiety or shortness of breath.
is needed
is helped
such as
shortness
Mark the letter A, B, C or D to indicate the underlined part that needs correction in each of the following questions.
ASEAN aims at promoting economic growth, regional peace as well as provide opportunities for its members.
aims at
economic growth
provide
its
Mark the letter A, B, C or D to indicate the underlined part that needs correction in each of the following questions.
She complained that her husband never paid her any complements anymore.
complained
never
any complements
anymore
Mark the letter A, B, C, or D to indicate the sentence that is closest in meaning to each of the following questions.
I have never read a better book about cultural diversity than this book.
This book is a good book about cultural diversity I have ever read.
This is the best book about cultural diversity I have ever read.
This book is as good as the one about cultural diversity I have ever read.
The book about cultural diversity I have ever read isn't better than this one
Mark the letter A, B, C, or D to indicate the sentence that is closest in meaning to each of the following questions.
"You'd better not waste your time, Tommy," Mum said.
Mum urged Tommy to waste time.
Mum advised Tommy not to waste your time.
Mum advised Tommy not to waste his time.
Mum advised Tommy not to waste her time.
Mark the letter A, B, C, or D to indicate the sentence that is closest in meaning to each of the following questions.
If I had known about their wedding plan earlier, I would have been able to make time to attend the reception party.
I knew their wedding would be planned earlier so I made some time to attend the reception party.
I wish I had known their wedding plan sooner so that I could arrange time to attend the reception party.
I don't know their wedding plan earlier so I can't make time to attend the reception party.
When I knew their wedding party, it was too late to attend the reception party.
Mark the letter A, B, C, or D to indicate the sentence that best combines each pair of sentences in the following questions.
I had ability of learning many foreign languages. My mother herself recognized it.
I had ability of learning many foreign languages though my mother herself recognized it.
It was my mother who recognized my ability of learning many foreign languages.
I had ability of learning many foreign languages unless my mother herself recognized it.
It was my mother's ability of learning many foreign languages that she herself recognized.
Mark the letter A, B, C, or D to indicate the sentence that best combines each pair of sentences in the following questions.
We don't have to wash the dishes any more. We have just bought a new dishwasher.
It is not necessary for us to wash the dishes, even when we have bought a new dishwasher.
No longer do we have to wash the dishes because we have just bought a new dishwasher.
The new dishwasher we have just bought needs doing the washing-up.
With the help of the new dishwasher, we won't have to do the washing-up very often.

