81
Questions 246 to 250
Complete the form below.
Write
NO MORE THAN TWO WORDS AND/OR A NUMBER
for each answer.
library policy
Maximum number of items that can be borrowed is
246
.
Loan periods:
●
Books: normally 3 weeks
●
New releases:
247
●
Magazines: 10 days
●
DVDs and CDs:
248
.
Renewals: made online, in person or by phone.
Reserved items need to be collected within
249
.
Students cannot reserve
250
.
HOW TO MASTER THE IELTS
82
Section
2
Questions 251 to 257
Choose the correct letter,
A
,
B
or
C
.
Travelling by train
251
The train to Telstar city leaves at
A
15.05 hours.
B
15.15 hours.
C
15.50 hours.
252
Boarding passes are available near
A
the main gate.
B
the main entrance.
C
the main hall.
253
Ticket machines can be found
A
at the green booth.
B
in the main hall.
C
on the platform.
254
Passengers who paid for their tickets online can access the platform via
A
gate B.
B
gate P.
C
gate T.
255
Boarding will start at around
A
15.05 hours.
B
15.09 hours.
C
15.50 hours.
256
Passengers should board either
A
standard or first class.
B
standard or premium class.
C
ordinary or luxury class.
TEST 4
83
257
Reserved seats will not be held after
A
15.40 hours.
B
15.30 hours.
C
15.20 hours.
Questions 258 to 260
Complete the table below.
Write
NO MORE THAN THREE WORDS
for each answer.
TABlE 4.1
Class
Remarks
Standard
Premium
Sleeper
Small choice of
258
Free
259
As premium plus free
260
HOW TO MASTER THE IELTS
84
Section
3
Questions 261 to 265
Choose the correct letter,
A
,
B
or
C
.
Home composting
261
What is the main reason for the current interest in home composting?
A
a lack of landfill space.
B
to reduce greenhouse emissions.
C
it improves the soil.
262
Dr Rotenberg says that landfill sites lead to
A
confusion about composting.
B
increased transportation costs.
C
more emissions from vehicles.
263
Home composting reduces greenhouse gases because
A
there is enough oxygen.
B
there are enough bacteria.
C
there is enough heat.
264
Dr Rotenberg describes organic material as
A
mainly carbon.
B
living.
C
greens and browns.
265
Composting usually requires brown materials to be
A
mixed together with green materials.
B
placed on top of green materials.
C
kept separate from green materials.
TEST 4
85
Questions 266 to 270
Complete the diagram below.
Write
ONE WORD/NUMBER ONLY
for each answer.
Home composter
Composter made from
266
or recyclable plastic
Holds compost for up to
267
months
Container with a
268
for kitchen scraps
Enclosure in the garden to hold
269
Shredded card or screwed up
270
improve the airflow
HOW TO MASTER THE IELTS
86
Section
4
Questions 271 to 280
Complete the notes below.
Write
ONE WORD ONLY
for each answer.
Academic essays
Page set-up
●
Do not change the standard
271
●
Double spaced for the tutor’s remarks and to help with
272
Text
●
Font should be 12 point Times New Roman.
●
The essay must not be
273
Marking
●
The marker knows the candidate’s
274
only.
●
If you write too much it might not be
275
by the examiner.
Referencing
●
Some researchers might want to find the
276
of the
information.
●
There is no need to reference
277
that are common knowledge.
●
Do not quote the author’s
278
name in the main text.
●
The
279
of references need to be alphabetized.
●
The place of and the name of the publisher come
280
.
TEST 4
87
Reading (
4
)
Reading Passage
10
Hacked off
Internet security, or rather the lack of it, is the bane of today’s computer user.
Computer hackers write malicious computer programs (or malware) that infect
vulnerable computers and modify the way they operate. Typically, these programs
are downloaded from the internet inadvertently with a single click of the mouse. The
consequences are detrimental to the user, ranging from a minor nuisance – for
example, slowing the computer’s speed – to a major financial loss for an individual
or company, when login and password details are accessed and fraud ensues.
Examples of malware include viruses, worms, trojans (Trojan horses), spyware,
keystroke logging, scareware and dishonest adware.
A virus can be released when a user opens an email and downloads an attach
ment. The text portion of the email cannot carry any malware but the attachment may
contain a virus, for example in a macro (a short program) embedded in a worksheet
document, such as Excel. Viruses can replicate and if they spread to the host com
puter’s boot sector files they can leave the user with a ‘bluescreen of death’. In this
circumstance, the bluescreen is accompanied by a message that starts ‘A problem
has been detected and Windows has been shut down to prevent damage to your
computer’. Whilst malware cannot physically damage the computer’s hard drive the
information on the boot sector has been destroyed and the computer is unable to
function. In a worst case scenario the hard disk has to be wiped clean by reformatt
ing, before the operating system can be reinstalled, in which case every program and
file will be lost.
Unlike a virus, a worm can infect a computer without the user downloading an
attachment, so it can spread through a network of computers at tremendous
speed. The ability of worms to replicate in this way means that they can infect every
contact in the user’s email address book and potentially every email contact in each
recipient’s computer. Instant messaging programs and social networking sites are
similarly at risk. A main feature of a worm is that it slows the computer down by
consuming memory or hard disk space so that the computer eventually locks up.
The word trojan derives from the Trojan Horse of Greek mythology that tricked the
Trojans into allowing Greek soldiers into the city of Troy, hidden inside a wooden
horse. Today a trojan is a metaphor for malware that masquerades as useful software.
HOW TO MASTER THE IELTS
88
Trojans are unable to replicate but they interfere with the computer surreptitiously,
allowing viruses and worms unfettered access to the system.
Spyware programs monitor a computer user’s internet surfing habits covertly.
Some spyware simply monitors how many visits consumers make to particular web
pages and what they are buying or spending, usually for marketing purposes.
Keystroke logging is the main fraudulent activity linked to spyware. Here, private and
confidential information is obtained from the user’s keystrokes, enabling criminals to
acquire credit card details, or login names and passwords for online bank accounts.
Some keystroke loggers operate legitimately to monitor the internet use of employees
in the office or to keep tabs on children’s surfing activities at home.
Scareware is a form of extortion where a victim is informed that the computer is
infected with a virus and, for a fee, is offered a solution to fix the problem. The user is
tricked into clicking an ‘OK’ button and buys software unnecessarily because there
is usually no virus. In one scam, a scareware popup informs the victim that the
computer’s registry contains critical errors when the problems are actually minor or
even nonexistent. Persuaded by the popup advert, the victim buys the ‘registry
cleaner’, which may not work or could even damage the computer’s registry. There
are of course legitimate registry cleaners that will boost your computer’s speed.
A genuine registry cleaner will normally be endorsed by a reputable company or
recommended in a PC magazine.
Adware popup adverts are similar to scareware but are merely a nuisance rather
than malware (unless dishonest), though they can still download programs that
track your shopping habits and slow your computer down. The adverts pop up auto
matically when the user opens the internet browser and can become irritating
because they conceal information on the opened up page. One answer is to turn
on the Internet Explorer’s popup blocker under the privacy tab because this will
block most automatic popups. More effectively, a user can purchase an allinone
security suite to block any malware. Security software automatically blocks and
deletes any malicious programs for a more secure web experience. Normally, the
software will update itself every day as long as the computer is switched on.
TEST 4
Do'stlaringiz bilan baham: |