K
Khách

Hãy nhập câu hỏi của bạn vào đây, nếu là tài khoản VIP, bạn sẽ được ưu tiên trả lời.

Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question.

As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?

Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system.

In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two.

        The easiest way to protect a system is with a good password, Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time. Even if a hacker steals the password, they won't have the code. Or if the hacker somehow gets the code, they still don't know the password.

Which of the following could best describe the main idea of the passage?

A. Computer security and hackers.

B. Different types of hackers.

C. What a hacker can damage in your computer.

D. The way hackers access to a computer.

1
11 tháng 4 2019

Đáp án A

Câu nào trong các câu sau mô tả hợp lý nhất ý chính của đoạn văn?

A. Bảo mật máy tính và tin tặc

B. Các loại tin tặc khác nhau.

C. Những điều mà một tin tặc có thể gây hại cho máy tính của bạn.

D. Cách mà tin tặc đột nhập vào 1 hệ thống máy tính.

Căn cứ thông tin đoạn 1:

“As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking.” (Khi việc sử dụng máy tính dần trở nên phổ biến thì nhu cầu bảo mật lại quan trọng hơn bao giờ hết. Một trong những mối đe dọa nguy hiểm nhất với thế giới mạng là nạn tin tặc đột nhập vào máy tính.)

Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question. As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can...
Đọc tiếp

Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question.

As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?

Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system.

In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two.

        The easiest way to protect a system is with a good password, Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time. Even if a hacker steals the password, they won't have the code. Or if the hacker somehow gets the code, they still don't know the password.

According to paragraph 2, which information is NOT true about protocols?

A. Protocols are a set of rules controlling the way data is sent between computers.

B. Protocols can try out whether they are legal to access another computer or not.

C. The amount of shared information between two computers depends on the host computer.

D. The data hackers can get from others' computers may be infinite.

1
23 tháng 12 2017

Đáp án C

Theo đoạn 2, thông tin nào sau đây là không đúng về các giao thức?

A. Giao thức là 1 tập hợp các quy tắc dùng để điều khiển cách thức dữ diệu được chia sẻ giữa các hệ thống máy tính.

B. Ciao thức có thể thử liệu chúng có được phép truy cập vào máy tính kia một cách hợp pháp hay không.

C. Lượng thông tin được chia sẻ giữa 2 hệ thống máy tính phụ thuộc vào máy chủ.

D. Dữ liệu mà các tin tặc có thể lấy được từ các máy tính khác có thể là vô hạn.

Từ khóa: not true / protocols

Căn cứ vào thông tin đoạn 2:

“Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system."

(Hầu hết tin tặc sử dụng một loại thông tin được gọi là các giao thức được cài vào trong phần mềm máy tính. Những giao thức này cho phép các máy tính kết nối với một máy tính khác. Các giao thức hoạt động như những cảnh sát máy tính. Khi một máy tính kết nối được với một máy tính khác, các giao thức sẽ kiểm tra xem liệu quyền truy cập có hợp pháp không. Các giao thức này cũng có thể quy định mức thông tin có thể chia sẻ giữa 2 hệ thống máy tính là bao nhiêu. Các tin tặc có thể thao túng các giao thức này để có quyền truy cập vô hạn vào hệ thống máy tính kia.)

Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question. As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can...
Đọc tiếp

Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question.

As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?

Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system.

In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two.

        The easiest way to protect a system is with a good password, Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time. Even if a hacker steals the password, they won't have the code. Or if the hacker somehow gets the code, they still don't know the password.

As suggested in the last paragraph, what is the best way for computer users to prevent hackers?

A. They should use a long and customary password so that hackers cannot guess.

B. They should use different passwords for different accounts to access the sites.

C. They should have an additional secret code to confirm for their access after putting a password.

D. They should not use any code on online services to make sure that hackers have no chance to get your password.

1
21 tháng 9 2018

Đáp án C

Như đã được gợi ý trong đoạn văn cuối, cách tốt nhất để người dùng máy tính ngăn chặn tin tặc là gì?

A. Họi nên sử dụng một mật khẩu dài và thông dụng để tin tặc không thể đoán.

B. Họ nên sử dụng các mật khẩu khác nhau cho các tài khoản khác nhau khi đăng nhập vào các trang mạng.

C. Họ nên có thêm một mã xác nhận bí mật để xác nhận cho quyền truy cập của họ sau khi đã nhập mật khẩu.

D. Họ không nên sử dụng bất kì một mã nào trên các dịch vụ trực tuyến để đảm bảo rằng tin tặc không có cơ hội đánh cắp mật khẩu.

Từ khóa: best way/ prevent hackers

Căn cứ vào thông tin đoạn văn cuối:

“The easiest way to protect a system is with a good password. Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have speciaal cards or devices that show them the new code to use the next time. Even ifo hacker steals the password, they won’t have the code. Or if the hacker somehow gets the code, they still don’t know the password.”

(Cách đơn giản nhất để bảo vệ hệ thống là sử dụng 1 mật khẩu tốt. Mật khẩu đài và khác thường sẽ khiến tin tặc khó đoán được. Để bảo mật hơn nữa, một số địch vụ trực tuyến hiện nay đã sử dụng hệ thống “mật khẩu cộng mật khẩu”. Trong trường hợp này, trước hết người dùng nhập mật khẩu, sau đó nhập tiếp một mã thứ hai mà luôn thay đổi sau khi người dùng truy cập vào trang mạng. Người dùng sẽ có các dịch vụ hoặc thẻ đặc biệt cho họ biết mã truy cập mới cho lần đăng nhập tiếp theo. Ngay cả khi tin tặc lấy cắp được mật khẩu, họ cũng sẽ không có mã đăng nhập. Hoặc bằng cách nào đó tin tặc lấy được mã đăng nhập, họ cũng không thể biết mật khẩu là gì.)

Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question. As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can...
Đọc tiếp

Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question.

As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?

Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system.

In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two.

        The easiest way to protect a system is with a good password, Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time. Even if a hacker steals the password, they won't have the code. Or if the hacker somehow gets the code, they still don't know the password.

The author mentioned in the third paragraph that active hackers are more dangerous because ______.

A. they often get access to important networks like a bank or military.

B. they implant viruses or steal private and other vital information in systems.

C. they always remove all the data in the systems they hack.

D. they can do many harmful things for the whole computer network system.

1
9 tháng 12 2017

Đáp án B

Tác giả đề cập trong đoạn 3 rằng tin tặc chủ động thì nguy hiểm hơn bởi vì __________.

A. chúng thường truy cập vào các mạng lưới quan trọng như ngân hàng hay quân đội.

B. chúng cài virus hay lấy trộm các thông tin cá nhân và thông tin quan trọng khác trong các hệ thống.

C. chúng thường xóa bỏ tất cả dữ liệu của hệ thông chúng xâm nhập.

D. chúng có thể làm nhiều thứ gây hại đến toàn bộ hệ thống mạng lưới máy tính.

Từ khóa: active hackers/ more dangerous

Căn cứ thông tin đoạn 3:

“Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two."

(Một loại tin tặc khác cố gắng gây thiệt hại cho hệ thống máy tính mà họ xâm nhập. Sau khi truy cập vào hệ thống, những tin tặc này cấy virus vào hoặc thay đổi, xóa hay lấy trộm thông tin. Chúng được biết đến như là tin tặc chủ động và rõ ràng chúng là loại nguy hiểm hơn trong 2 loại tin tặc).

Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question. As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can...
Đọc tiếp

Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question.

As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?

Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system.

In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two.

        The easiest way to protect a system is with a good password, Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time. Even if a hacker steals the password, they won't have the code. Or if the hacker somehow gets the code, they still don't know the password.

The word "manipulate" in paragraph 2 is closest in meaning to ______.

A. require      

B. modify    

C. transform   

D. influence

1
24 tháng 4 2017

Đáp án D

Từ “manipulate” trong đoạn 2 gần nghĩa nhất với từ _________.

A. yêu cầu                                                          
B. sửa đổi, giảm nhẹ

C. chuyển đổi                                                     
D. thao túng, kiểm soát

Từ đồng nghĩa: manipulate (thao túng, kiểm soát) = influence

“The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system.” (Các giao thức này cũng có thể quy định mức thông tin có thể chia sẻ giữa 2 hệ thống máy tính là bao nhiêu. Các tin tặc có thể thao túng các giao thức này để có quyền truy cập vô hạn vào hệ thống máy tính kia.)

Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question. As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can...
Đọc tiếp

Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question.

As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?

Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system.

In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two.

        The easiest way to protect a system is with a good password, Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time. Even if a hacker steals the password, they won't have the code. Or if the hacker somehow gets the code, they still don't know the password.

The word "unauthorized" in the first paragraph mostly means ______.

A. optional    

B. illegal      

C. permissible            

D. compulsory

1
18 tháng 6 2019

Đáp án B

Từ “unauthorized" trong đoạn đầu tiên có nghĩa là ____________.

A. lựa chọn                                                         
B. bất hợp pháp

C. chấp nhận được                                             
D. bắt buộc

Từ đồng nghĩa: unauthorized (không được phép, không hợp pháp) = illegal

“Computer hacking is the unauthorized access to a computer or network of computers.” (Đột nhập máy tính là truy cập bất hợp pháp vào 1 máy tính hay 1 hệ thống máy tính).

Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question. As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can...
Đọc tiếp

Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question.

As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?

Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system.

In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two.

        The easiest way to protect a system is with a good password, Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time. Even if a hacker steals the password, they won't have the code. Or if the hacker somehow gets the code, they still don't know the password.

It is implied in the passage that ______.

A. it is difficult to protect data from being stolen by hackers.

B. not every hacker is harmful.

C. hackers always damage the information in the host computer.

D. online services have been improving their security system.

1
9 tháng 10 2018

Đáp án D

Người ta hàm ý trong đoạn văn rằng __________.

A. thật khó để bảo vệ dữ liệu khỏi việc bị tin tặc đánh cắp.

B. không phải mọi tin tặc đều có hại.

C. tin tặc luôn gây hại cho các thông tin trong máy chủ.

D. các dịch vụ trực tuyến đã cải thiện được hệ thông bảo mật của họ.

Căn cứ thông tin đoạn cuối:

“For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time.”

(Để bảo mật hơn nữa, một số dịch vụ trực tuyến hiện nay đã sử dụng hệ thống “mật khẩu cộng mật khẩu”. Trong trường hợp này, trước hết người dùng nhập mật khẩu, sau đó nhập tiếp một mã thứ hai mà luôn thay đổi sau khi người dùng truy cập vào trang mạng. Người dùng sẽ có các địch vụ hoặc thẻ đặc biệt cho họ biết mã truy cập mới cho lần đăng nhập tiếp theo.)

Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question. As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can...
Đọc tiếp

Read the following passage and mark the letter A, B, C, or D to indicate the answer to each of the question.

As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?

Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system.

In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two.

        The easiest way to protect a system is with a good password, Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time. Even if a hacker steals the password, they won't have the code. Or if the hacker somehow gets the code, they still don't know the password.

What does the phrase "the two" in paragraph 3 refer to _______?

A. a bank and military network

B. passive and active hackers

C. hackers and viruses   

D. systems and viruses

1
11 tháng 5 2018

Đáp án B

Cụm từ “the two” trong đoạn 3 đề cập đến từ nào?

A. một hệ thống của ngân hàng và quân đội

B. tin tặc chủ động và thụ động

C. tin tặc và các loại virus

D. hệ thống và virus

Căn cứ vào thông tin đoạn 2:

“The two” là cụm từ được nhắc đến để thay thế cho 2 loại tin tặc: chủ động và thụ động trong đoạn văn.

“In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release Viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two."

(Trên thực tế, chỉ cần hành động xâm nhập vào 1 hệ thống máy tính đã bị coi là đột nhập bất hợp pháp. Loại này thường được gọi là xâm nhập thụ động. Tin tặc thụ động tạo ra 1 cơn sốt khi có thể truy cập vào 1 mạng lưới quan trọng như ngân hàng hay quân đội. Một loại tin tặc khác cố gắng gây thiệt hại cho hệ thống máy tính mà họ xâm nhập. Sau khi truy cập vào hệ thống, những tin tặc này tạo ra virus hoặc thay đổi, xóa hay lấy trộm thông tin. Chúng được biết đến như là tin tặc chủ động và rõ ràng chúng là loại nguy hiểm hơn trong 2 loại tin tặc).

Read the following passage and mark the letter A, B, C, or D on your answer sheet to indicate the correct answer to each of the questions. The advent of the Internet may be one of the most important technological developments in recent years. Never before have so many people had access to so many different sources of information. For all of the Internet’s advantages, however, people are currently becoming aware of some of its drawbacks and are looking for creative solutions. Among the current...
Đọc tiếp

Read the following passage and mark the letter A, B, C, or D on your answer sheet to indicate the correct answer to each of the questions.

The advent of the Internet may be one of the most important technological developments in recent years. Never before have so many people had access to so many different sources of information. For all of the Internet’s advantages, however, people are currently becoming aware of some of its drawbacks and are looking for creative solutions. Among the current problems, which include a general lack of reliability and numerous security concerns, the most crucial is speed.

First of all, the Internet has grown very quickly. In 1990, only a few academics had ever heard of the Internet. In 1996, over 50 million people used it. Every year, the number of people with access to the Internet doubles. The rapid growth has been a problem. The computer systems which run the Internet have not been able to keep up with the demand. Also, sometimes a request for information must pass through many routing computers before the information can be obtained. A request for information made in Paris might have to go through computers in New York, Los Angeles and Tokyo in order to obtain the required information. Consequently, service is often slow and unpredictable. Service also tends to be worse when the Internet is busiest - during the business day of the Western Hemisphere - which is also when companies need its service the most.

Some people are trying to harness the power of networked computers in such a way as to avoid this problem. In 1995, a group of American universities banded together to form what has come to be known as Internet II. Internet II is a smaller, more specialized system intended for academic use. Since it is more specialized, fewer users are allowed access. Consequently, the time required to receive information has decreased.

Businesses are beginning to explore a possible analogue to the Internet II. Many businesses are creating their own “Intranets”. These are systems that can only be used by the members of the same company. In theory, fewer users should translate into a faster system. Intranets are very useful for large national and international companies whose branches need to share information. Another benefit of an Intranet is an increased amount of security. Since only company employees have access to the information on the Intranet, their information is protected from competitors. While there is little doubt that the Internet will eventually be a fast

Which of the following best serves as the title for the passage?

A. Security concerns of the Internet.

B. Internet’s current problems. 

C. The development of the Internet.

D. The disadvantages of the Internet.

1
12 tháng 10 2017

Đáp án C.

Giải thích: Đoạn 1 giới thiệu về Internet. Đoạn 2 nói về việc Internet phát triển nhanh cùng với một vài nhược điểm cần khắc phục; Đoạn 3 nói về Internet II; Đoạn 4 nói về Intranets.

=> Cả bài đọc hiểu đều nói về sự phát triển của Internet.

Read the following passage and mark the letter A, B, C, or D on your answer sheet to indicate the correct answer to each of the questions. The advent of the Internet may be one of the most important technological developments in recent years. Never before have so many people had access to so many different sources of information. For all of the Internet’s advantages, however, people are currently becoming aware of some of its drawbacks and are looking for creative solutions. Among the current...
Đọc tiếp

Read the following passage and mark the letter A, B, C, or D on your answer sheet to indicate the correct answer to each of the questions.

The advent of the Internet may be one of the most important technological developments in recent years. Never before have so many people had access to so many different sources of information. For all of the Internet’s advantages, however, people are currently becoming aware of some of its drawbacks and are looking for creative solutions. Among the current problems, which include a general lack of reliability and numerous security concerns, the most crucial is speed.

First of all, the Internet has grown very quickly. In 1990, only a few academics had ever heard of the Internet. In 1996, over 50 million people used it. Every year, the number of people with access to the Internet doubles. The rapid growth has been a problem. The computer systems which run the Internet have not been able to keep up with the demand. Also, sometimes a request for information must pass through many routing computers before the information can be obtained. A request for information made in Paris might have to go through computers in New York, Los Angeles and Tokyo in order to obtain the required information. Consequently, service is often slow and unpredictable. Service also tends to be worse when the Internet is busiest - during the business day of the Western Hemisphere - which is also when companies need its service the most.

Some people are trying to harness the power of networked computers in such a way as to avoid this problem. In 1995, a group of American universities banded together to form what has come to be known as Internet II. Internet II is a smaller, more specialized system intended for academic use. Since it is more specialized, fewer users are allowed access. Consequently, the time required to receive information has decreased.

Businesses are beginning to explore a possible analogue to the Internet II. Many businesses are creating their own “Intranets”. These are systems that can only be used by the members of the same company. In theory, fewer users should translate into a faster system. Intranets are very useful for large national and international companies whose branches need to share information. Another benefit of an Intranet is an increased amount of security. Since only company employees have access to the information on the Intranet, their information is protected from competitors. While there is little doubt that the Internet will eventually be a fast a reliable service, industry and the academic community have taken their own steps toward making more practical global networks.

According to the author, what is one reason why the Internet is sometimes slow?

A. Phone lines are often too busy with phone calls and fax transmissions to handle Internet traffic. 

B. Most people do not have computers that arc fast enough to take advantage of the Internet. 

C. Often a request must travel through many computers before it reaches its final destination. 

D. Scientists take up too much time on the Internet, thus slowing it down for everyone else.

1
30 tháng 12 2017

Đáp án C.
Ý trong bài: “Also, sometimes a request for information must pass through many routing computers before the information can be obtained. A request for information made in Paris might have to go through computers in New York, Los Angeles and Tokyo in order to obtain the required information. Consequently, service is often slow and unpredictable.” 
(Ngoài ra, đôi khi yêu cầu thông tin phải đi qua nhiều máy tính định tuyến trước khi có thể nhận được thông tin. Yêu cầu thông tin được thực hiện ở Paris có thể phải đi qua các máy tính ở New York, Los Angeles và Tokyo để thu được thông tin được yêu cầu. Do đó, dịch vụ thường chậm và không thể đoán trước.)