Reading for the Real World 2 Second Edition – Test Bank


Unit 2 Computers and Technology



Download 491 Kb.
bet2/26
Sana31.12.2021
Hajmi491 Kb.
#215604
1   2   3   4   5   6   7   8   9   ...   26
Bog'liq
Reading for the Real World 2 2nd Test Bank

Unit 2

Computers and Technology
Reading 1.1

Fighting Spam


Anyone who has ever had an email account has received spam. Spam is unsolicited email that is sent as part of a larger group of messages, all having substantively identical content. Spam has existed for a long time, but in recent years, the increasing amount of spam has become a much bigger problem than before. Although there are ways to decrease spam, currently the only way to eliminate spam is by not having an email address.
There are several types of spam: junk mail, non-commercial, offensive and pornographic, and scams, to name a few. The most common type is junk email—mass email from legitimate businesses advertising their products.  Although the emails may be legitimate, they are still unsolicited.  Non-commercial spam consists of messages without commercial motive such as chain letters, urban legends, and jokes.  However, people are getting more unwanted phone calls as well.  The emails require the recipient to forward the message to friends in order to receive good fortune.  Offensive and pornographic spam direct the recipient to an adult website, while spam scams are fraudulent messages designed to swindle people out of personal information for the purposes of identity theft or criminal activities.
The most obvious negative effect of spam is irritation. It is very annoying  to get unsolicited email. However, if the only effect of spam  had been irritation, it would not be such a problem. There are other effects of spamming. Since anyone’s email can be used by spammers, it is very possible that a child may receive  either pornographic images or links to such sites on the Internet. Seniors may be cheated out of their life savings by schemes  spread by spam. In addition, spam may also increase the cost of Internet service. Many ISPs (Internet Service Providers) have to increase their bandwidth and server capacity to handle all the spam. This costs more money and may  result in higher fees for customers.
There are various ways for people to fight spam.  One way is to complain directly to the ISP used by the spammer.  Most ISPs will cancel the spammer’s account if they receive complaints.  By the time an ISP gets complaints about spam, the spammer has already moved on to another one.  Another way is to file a complaint with the appropriate government agency enforcing spam laws.  In the United States, the FTC (Federal Trade Commission) investigates all fraudulent spam email. The most obvious way to fight spam is to make sure that personal email addresses do not become publicly available. Email addresses should never be placed on public websites and should only be given out to trusted people and organizations.
Spammers usually get email addresses from newsgroup postings or web-based discussion boards, so if a person wants to use either of these services, it is a good idea to open up a free disposable email account. If the account is bombarded by spam, it can be closed and another one opened. Another way is to “munge” one’s email address. “Munging” is altering the email address so that it can be read by people but cannot be collected automatically by spammers. (A) _________, catjam@home.net can be written out to catjamathomedotnet or c@tj@m at home_net. Although a person reading the email address can guess the right address, a computer program will not be able to authenticate the email address. Since spammers often use software that “guesses” common email addresses, coming up with a unique email address is another way of circumventing spammers. Finally, software that filters spam can also be used. Some ISPs use filtering methods as well. (B) __________, with filtering, there is always the possibility that valid email may be removed by mistake. Whatever method is used, the fact remains that until there are stronger laws against spamming and more effective ways to punish spammers, spam will continue to annoy, irritate, and disturb.


There are several types of spam: junk mail, non-commercial, offensive and pornographic, and scams, to name a few. The most common type is junk email—mass email from legitimate businesses advertising their products.  Although the emails may be legitimate, they are still unsolicited.  Non-commercial spam consists of messages without commercial motive such as chain letters, urban legends, and jokes.  However, people are getting more unwanted phone calls as well.  The emails require the recipient to forward the message to friends in order to receive good fortune.  Offensive and pornographic spam direct the recipient to an adult website, while spam scams are fraudulent messages designed to swindle people out of personal information for the purposes of identity theft or criminal activities.
1. Which sentence does not fit the flow of the passage?




2. What is the purpose of this passage?

 To encourage people not to open spam

 To warn people about offensive spam

 To inform how spam is used for advertising

 To explain the different kinds of spam

 To give reasons why spam is so prevalent







The most obvious negative effect of spam is irritation. It is very annoying  to get unsolicited email. However, if the only effect of spam  had been irritation, it would not be such a problem. There are other effects of spamming. Since anyone’s email can be used by spammers, it is very possible that a child may receive  either pornographic images or links to such sites on the Internet. Seniors may be cheated out of their life savings by schemes  spread by spam. In addition, spam may also increase the cost of Internet service. Many ISPs (Internet Service Providers) have to increase their bandwidth and server capacity to handle all the spam. This costs more money and may  result in higher fees for customers.
3. Choose the grammatically incorrect one.




4. What is NOT true according to the passage?

 Some people get very irritated when they receive spam.

 Children may be exposed to inappropriate content due to spam.

 Some scams designed to cheat people are spread through spam.

 ISPs are starting to filter out unwanted spam messages.

 People may have to pay higher fees for Internet service because of spam.







There are various ways for people to fight spam.  One way is to complain directly to the ISP used by the spammer.  Most ISPs will cancel the spammer’s account if they receive complaints.  By the time an ISP gets complaints about spam, the spammer has already moved on to another one.  Another way is to file a complaint with the appropriate government agency enforcing spam laws.  In the United States, the FTC (Federal Trade Commission) investigates all fraudulent spam email. The most obvious way to fight spam is to make sure that personal email addresses do not become publicly available. Email addresses should never be placed on public websites and should only be given out to trusted people and organizations.
5. What is the main idea of the passage?

 People should protect their personal information.

 ISPs are responsible for preventing spam.

 People can take actions to fight spam.

 Even trustworthy websites send out spam.

 Government agencies exist to enforce spam laws.


6. Where is the best place to insert the following sentence?

However, this option is becoming less and less practical because spammers quickly change ISPs and email addresses.









Spammers usually get email addresses from newsgroup postings or web-based discussion boards, so if a person wants to use either of these services, it is a good idea to open up a free disposable email account. If the account is bombarded by spam, it can be closed and another one opened. Another way is to “munge” one’s email address. “Munging” is altering the email address so that it can be read by people but cannot be collected automatically by spammers. (A) _________, catjam@home.net can be written out to catjamathomedotnet or c@tj@m at home_net. Although a person reading the email address can guess the right address, a computer program will not be able to authenticate the email address. Since spammers often use software that “guesses” common email addresses, coming up with a unique email address is another way of circumventing spammers. Finally, software that filters spam can also be used. Some ISPs use filtering methods as well. (B) __________, with filtering, there is always the possibility that valid email may be removed by mistake. Whatever method is used, the fact remains that until there are stronger laws against spamming and more effective ways to punish spammers, spam will continue to annoy, irritate, and disturb.
7. Choose the correct words for (A) and (B)
(A) (B)

 Nevertheless Moreover

 Additionally However

 For example Previously

 Additionally Moreover

 For example However


8. What is the best title for the passage?

 Ways to Prevent Spam

 Setting Up an Email Account

 Anti-Spam Laws: Are They Effective?

 Harsher Punishments for Spammers

 Does Munging Email Addresses Work?



Reading 1.2

The Problem With Spammers
The reason for spamming is to make money, but (A) [ironically / surprisingly], most people seem to hate spam and usually delete it without reading it. Thus, it is hard to see how spamming could prove profitable. There is a difference, however, between the companies who advertise with spam and the people who do the actual spamming; the company is _________ than the spammer.
For example, a business that wants to advertise its products or services with spam might be inexperienced, so it will typically contract with a “professional” spammer to do the work for them. Spammers usually charge a lot of money for their services, perhaps $375 to spam 500,000 addresses. Because spammers do not need much money to work—only a dialup Internet account, a program to send spam, and a list of email addresses—they will almost always make a profit, whether the company that hired them does or not.
The people who write spam-sending software may not be spammers themselves, but their software makes it very easy to send spam. The software is simple and easy to write, and it sells for (B) [nominal / exorbitant] fees. One well-known spam-sending program costs almost $300, which is much more than the amount of time and effort to design such a program would usually merit.
Spammers can also make money individually by defrauding the people who receive their spam. A common ruse is to promise some product or service for a very low price, but then refuse to deliver it after the customer has paid for it. Clearly, such types of spammers are not good citizens, and honest companies should not become involved with them. If they do, they can lose not only money but also loyal customers. In cases like these, only the spammers (C) [protest / profit].
1. Choose the correct words for A, B and C.
(A) (B) (C)

 surprisingly nominal protest

 surprisingly exorbitant protest

 ironically exorbitant protest

 ironically exorbitant profit

 ironically nominal profit


2. Which words best fill in the blank?

 more visible to the public

 more likely to face legal action

 more concerned with making a profit

 less knowledgeable about technology

 less likely to make money


Reading 2.1

Using the Body for Identification
 Technological advances have undoubtedly changed the way we engage in commerce and travel, as well as the way we live our lives.  The Internet allows us to shop from locations all over the globe without ever showing our faces or even talking to another person.  Some researchers feel that people’s social skills are negatively affected by these impersonal computer transactions.  We can buy and sell stocks online and move enormous amounts of money from one bank account to another at the touch of a button.  Worldwide travel is commonplace with people visiting foreign countries on a regular basis.
In short, the world is more accessible than it has ever been, but at a cost. How (A) [securely / secure] are our online transactions? With so many people (B) [crossing / cross] borders every day, how do we know we’re not letting dangerous people into our country? Improving security is a top issue for many governments and consumer advocacy groups around the world. Biometric identification technology is developed to recognize individuals, both to protect their own interests and (C) [to identify / identifying] criminals.
Biometric identification is not a new phenomenon. (A) ________, fingerprints are the classic biometric identifier. Police dust a crime scene for fingerprints and then compare their findings to a database of fingerprints of known criminals or to fingerprints of a known suspect. But fingerprints can also be used for security. (B) _________, a fingerprint scanner can be used to grant personnel access to certain areas. Physiological biometrics, such as fingerprints, utilize people’s physical characteristics to identify or recognize them. Other examples include face, palm, and iris identification. Scanning these physical features ensures that the person being scanned is who he or she claims to be. Unlike a personal identification number, which is used to access bank accounts, biometric identifiers cannot be stolen and then used by a thief.
Behavioral biometrics can also be used to (A) [incriminate / identify] people. Certain behaviors are unique to individuals, such as their voices or the way they type. The classic behavioral biometric is the signature. Signatures are used as a guarantee, but with (B) [obvious / obscure] problems. Signatures can be copied, for one thing. Also, people don’t usually scrutinize a signature until a problem is apparent. A person’s voice might be more difficult to (C) [recognize / mimic]. In fact, voice recognition systems do more than just recognize the voice; they recognize the way a person talks. There are subtleties in the way a person speaks that would be very difficult to imitate. Typing patterns, likewise, would be very difficult to observe to the point of mimicking them.
Biometric identification has two potential uses—identification and identity verification. 

Identification occurs when biometric information is used to discover the identity of the person it belongs to.  Again, fingerprints at a crime scene would be an example.  Identity verification is the process of making sure a person is who he or she claims to be.  Today, we use passports to verify our identity when crossing borders.  It would be much more difficult to forge a fingerprint or an iris than it would be to forge a passport.


There are also ethical considerations in developing biometric identification technology. It has the potential to protect consumers when engaging in trade as well as to identify would-be criminals before they can do any harm. However, some worry that individuals’ privacy would be in jeopardy if personal information were to get into the wrong hands. Another danger is that personal information could be __________. When governments have access to people’s personal information, they can use it to control the population. It goes without saying that people’s freedom and right to privacy will have to be protected as technology advances.


 Technological advances have undoubtedly changed the way we engage in commerce and travel, as well as the way we live our lives.  The Internet allows us to shop from locations all over the globe without ever showing our faces or even talking to another person.  Some researchers feel that people’s social skills are negatively affected by these impersonal computer transactions.  We can buy and sell stocks online and move enormous amounts of money from one bank account to another at the touch of a button.  Worldwide travel is commonplace with people visiting foreign countries on a regular basis.
In short, the world is more accessible than it has ever been, but at a cost. How (A) [securely / secure] are our online transactions? With so many people (B) [crossing / cross] borders every day, how do we know we’re not letting dangerous people into our country? Improving security is a top issue for many governments and consumer advocacy groups around the world. Biometric identification technology is developed to recognize individuals, both to protect their own interests and (C) [to identify / identifying] criminals.
1. Choose the grammatically correct ones.
(A) (B) (C)

 securely cross identifying

 securely cross to identify

 secure crossing to identify

 secure crossing identifying

 secure crossing to identify


2. Which sentence does not fit the flow of the passage?










Biometric identification is not a new phenomenon. (A) ________, fingerprints are the classic biometric identifier. Police dust a crime scene for fingerprints and then compare their findings to a database of fingerprints of known criminals or to fingerprints of a known suspect. But fingerprints can also be used for security. (B) _________, a fingerprint scanner can be used to grant personnel access to certain areas. Physiological biometrics, such as fingerprints, utilize people’s physical characteristics to identify or recognize them. Other examples include face, palm, and iris identification. Scanning these physical features ensures that the person being scanned is who he or she claims to be. Unlike a personal identification number, which is used to access bank accounts, biometric identifiers cannot be stolen and then used by a thief.
3. Choose the correct words for (A) and (B)
(A) (B)

 Indeed For instance

 On one hand On the other hand

 In addition Consequently

 Indeed However

 In addition On the other hand


4. What is the purpose of this passage?

 To describe places where biometric identification is used

 To introduce different methods of biometric identification

 To give reasons why biometric identification systems are foolproof

 To explain how biometric identification systems were developed

 To contrast the various types of biometric identification systems








Behavioral biometrics can also be used to (A) [incriminate / identify] people. Certain behaviors are unique to individuals, such as their voices or the way they type. The classic behavioral biometric is the signature. Signatures are used as a guarantee, but with (B) [obvious / obscure] problems. Signatures can be copied, for one thing. Also, people don’t usually scrutinize a signature until a problem is apparent. A person’s voice might be more difficult to (C) [recognize / mimic]. In fact, voice recognition systems do more than just recognize the voice; they recognize the way a person talks. There are subtleties in the way a person speaks that would be very difficult to imitate. Typing patterns, likewise, would be very difficult to observe to the point of mimicking them.
Biometric identification has two potential uses—identification and identity verification. 

Identification occurs when biometric information is used to discover the identity of the person it belongs to.  Again, fingerprints at a crime scene would be an example.  Identity verification is the process of making sure a person is who he or she claims to be.  Today, we use passports to verify our identity when crossing borders.  It would be much more difficult to forge a fingerprint or an iris than it would be to forge a passport.


5. Where is the best place to insert the following sentence?

However, passports can be stolen or forged, while an effective biometric identification system should be difficult to fool.




6. Choose the correct words for A, B and C.


(A) (B) (C)

 incriminate obvious recognize

 incriminate obvious mimic

 identify obvious mimic

 identify obscure mimic

 identify obscure recognize







There are also ethical considerations in developing biometric identification technology. It has the potential to protect consumers when engaging in trade as well as to identify would-be criminals before they can do any harm. However, some worry that individuals’ privacy would be in jeopardy if personal information were to get into the wrong hands. Another danger is that personal information could be __________. When governments have access to people’s personal information, they can use it to control the population. It goes without saying that people’s freedom and right to privacy will have to be protected as technology advances.
7. What is the main idea of the passage?

 Governments place too many restrictions on people.

 There are drawbacks to biometric identification.

 Criminals are becoming more technologically advanced.

 Biometric identification should be regulated by the government.

 Biometric identification is an effective crime deterrent.


8. What words best complete the blank?

 used by criminals

 posted on the Internet

 given out to companies

 abused by authorities

 leaked to the general population


Reading 2.2

Face Recognition Technology
(A) While it is reliable, facial recognition presents a risk of invasion of people’s privacy. Face scanners can be placed in public places, and people’s images can be scanned without their knowledge. This allows their movements to be tracked and can also give criminals information that will help them victimize people.
(B) We generally recognize people by their faces, or photos, which are typically unique to individuals. However, this type of identification can be faulty. People’s appearance changes, and we do not tend to scrutinize photos very closely. Today, biometric technology is being developed to perfect the process of facial identification. Face recognition technology can scan the face for certain features and measure the distances between different parts of the face. These things do not change, so growing a beard or wearing glasses will not fool the scanner. Since it is very difficult to mimic another person’s face, this type of identification is quite reliable.
(C) On the other hand, security can be improved by using face scanners in public places. For example, at a large sporting event, cameras can be used to monitor the crowds, secretly capturing images of individuals. These images can then be compared to photos of known terrorists. If a match comes up, the terrorist can be located and removed from the premises before he or she can do any harm. One problem with this idea is that the accuracy of face scanners diminishes when they are tracking people in large crowds. Because the people aren’t posing, the angle may be off. This increases the chances of false positives, putting people’s rights in jeopardy.
1. What is NOT true according to the passage?

 Facial recognition technology may be an invasion of privacy.

 Face scanners are accurate although people’s appearances change.

 Face scanners can measure distances between facial features.

 Face scanners can be used to monitor large crowds of people.

 The accuracy of facial scans decreases when people aren’t posing.

2. What is the correct order of the paragraphs?

 (B) (A) (C)

 (C) (B) (A)

 (C) (A) (B)

 (A) (B) (C)

 (A) (C) (B)



Download 491 Kb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   ...   26




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish