[LỜI GIẢI] Bài đọc và đáp án chi tiết từng câu tiếng anh - Tự Học 365
LUYỆN TẬP TRẮC NGHIỆM 50000+ CÂU HỎI

DÀNH CHO MỌI LỚP 6 ĐẾN 12

TRUY CẬP NGAY
XEM CHI TIẾT

Bài đọc và đáp án chi tiết từng câu tiếng anh

Bài đọc và đáp án chi tiết từng câu tiếng anh

Câu hỏi

Nhận biết

Read the passage, then choose the one best answer. Not All Hackers Are the Same As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking. Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things? Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system. In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two. The easiest way to protect a system is with a good password. Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time. Even if a hacker steals the password, they won’t have the code. Or if the hacker somehow gets the code, they still don’t know the password.

0Câu 6

What is the main idea of this reading?

A. Famous hackers

B.Funny things hackers do

C. Good ways to stop hackers

D. Hackers and computer security

Câu 7

What do hackers do to get into a computer?

A. Make a new password

B.Spread viruses

C. Change security programs

D. Manipulate codes

Câu 8

What is NOT considered hacking?

A. Illegally accessing a computer

B.Turning on a private computer

C. Releasing a virus

D. Changing unauthorized information

Câu 9

Why are active hackers probably considered more dangerous than passive ones?

A. Active hackers do damage

B.Passive hackers are caught more easily.

C. Passive hackers have more intense personalities.

D. Active hackers are more skilled

Câu 10

What does “plus” in “password-plus” probably mean?

A. Fast

B.Extra

C. Danger

D. Long

Câu 11

The word "get a rush" in the fourth paragraph is closest in meaning to

A. be comfortable

B.be busy

C. be thrilled

D. be hurry

Câu 12

The word "by far" in the fourth paragraph is closest in meaning to

A. difficultly

B.actually

C. surely

D. until now


Đáp án đúng:

Lời giải của Tự Học 365

Đáp án Câu 6 : D

4 đoạn đầu bài viết nói về hackers và việc hacking, đoạn 5 về việc đảm bảo an ninh mạng

Đáp án Câu 7 : D

Hackers can manipulate the protocols to get unlimited access to a computer system.

Codes = protocols

Đáp án Câu 8 : B

Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files.

Đáp án Câu 9 : A

Đoạn 4:

“Another kind of hacker tries to do damage to a system”

Đáp án Câu 10 : B

Extra = plus: thêm, cộng

Đáp án Câu 11 : C

Get a rush diễn tả cảm xúc rất hài lòng, thỏa mãn trong thời gian ngắn ( ví dụ như khi chinh phục/đạt được gì đó). Ở đây diễn tả cảm xúc của “passive hackers” khi họ kết nối được vào những hệ thống được bảo mật khắt khe như ngân hàng, quân đội.

Đáp án Câu 12 : D

By far: cho đến nay

Ý kiến của bạn