You are on page 1of 5

MASTER MIND 2A

MM2A EXAM

Name:_________________________________________________________________

Date:________________ Hour:____________________ Teacher:________________


Estimado Alumno(a):

Para la aplicación de la presente evaluación no pidas ayuda a tu profesor(a), ya que él/ella solamente te
ayudará con las instrucciones y nunca con las respuestas debido a que esto iría en contra de la ética y los
valores que promovemos en IMAC Inglés Total.

Grammar A

1. Underline the correct words. (2.5 points each)


Example: A. I believe nobody should have the right to invade / provide / compile
your privacy.
B. I agree. We have to be careful who has surveillance / access / data to our
personal information.

A: Many people (1) find / prove / see privacy very important while they are online.
B: Well, I (2) believe not / don't believe not / don't believe so. I (3) don't think it's an
issue / don't think it isn't an issue / think not it isn't an issue. I found (4) their complaints
ridiculous / ridiculous their complaints / the ridiculous complaints.
A: I (5) don't suppose you aren't interested / aren't suppose you're interested / suppose
you aren't interested in a social networking site group about protecting our privacy.
B: I (6) don't guess so / guess so / guess not. All their arguments (7) keep me angry /
make me angry / prove me an angry man. I mean, I don't give out all my information to
everyone. I (8) keep a secret my password / keep my password secret / keep secret my
password, for example. However, I upload photos of my kids. There are billions of
photos on social networking sites. Do you really think a bad person could find one
photo out of a billion?
A: I (9) don't suppose so / expect not / think so, but can you (10) prove that's true /
prove me a right / find that right, or are you just making up figures?

Grammar B

2. Complete the sentences. Use the correct forms of the words in parentheses. (2.5
points each)
Example: A. If you don’t keep your data secret, a _criminal can find it_ (criminal /
can find) very easy to use it and get you into debt.
B. You’re right. This can make your life (can make / your life) very hard, and it can
be extremely difficult to prove yourself innocent.

Página 1 de 5
MASTER MIND 2A

A: Do celebrities like you (1)


_______________________________________________ (find / frustrating) when
people take photos of you in public?
B: No, I (2) _______________________________________________ (think). I (3)
_______________________________________________ (believe / invasion of
privacy). It's our job.
A: That's interesting. I (4) _______________________________________________
(expect / a celebrity / so open) to the public. I (5)
_______________________________________________ (consider / selfish). They
should (6) _______________________________________________ (make / openness
/ priority).
B: I (7) _______________________________________________ (believe) too.
A: I (8) _______________________________________________ (imagine / many
celebrities / agree) with you.
B: I (9) _______________________________________________ (suppose). I
personally (10) _______________________________________________ (call / self-
centered).

Vocabulary A

3. Complete the sentences with the following words. (2.5 points each)
Example: A. I’ve finished _compiling_ the data.
B. I still have more work to do.
compile, data, database, find, hack, compiling, privacy, ran, sort, surveillance, took

A: I'm hungry. Let's get something to eat.


B: Not now. I have to finish this (1) __________________________. I need to (2)
__________________________ all this (3) __________________________ and then
(4) __________________________ out some problems. What are you working on?
A: I'm developing a (5) __________________________ system for computers. We
want to find out how to keep people from invading other people's (6)
__________________________ online. Too many people (7)
__________________________ into our site. We want to be able to (8)
__________________________ out who they are and stop them. Just last week
someone stole the identity of a woman in California, and they (9)
__________________________ up a really big bill on an online money transfer site,
and they even (10) __________________________ out a loan in her name.

Vocabulary B

4. Match the words a to j to the gaps in sentences 1 to 10. (2.5 points each)

1 I changed my … to ptotect my identity. __K__ a) data


2 I need to get access ... a safe computer. ____ b) database
3 I don't want to use the one at work because they c) invade
have us under ... ____

Página 2 de 5
MASTER MIND 2A

4 I don't want them to find ... I have a large debt. __ d) out

5 I ran ... a large bill by playing online games on e) out


company time. ____

6 I need to sort it ... before the company discovers f) out


what I did. ____
7 They have a large ... on all of us. ____ g) surveillance

8 I think they ... our privacy doing this. ____ h) to

9 Someone said they had tons of ... on all of us. ____ i) up

10 Maybe I can take ... a loan to pay what I owe. j) up


____

11 I'll have to make ... some story about why I left k) password
work early today. ____

Reading

5. Read the text and complete the chart. (20 points each)
Your privacy is being invaded every day. It used to be we kept our privacy by closing
the curtains, unlisting our telephone number, and just using an initial and last name on
the outdoor mailbox. This modern age has made protecting our privacy much more
difficult.

Some of the most public spaces available are social networking sites. People seem to
think these are much more private than they really are. They keep their sites public.
They give their names, addresses, and even telephone numbers. They give out all kinds
of private information, like when they are going out of town. They might as well put a
sign outside their houses saying, “I'm not at home. I'm on vacation. You can rob me
now.” More and more thieves are using social networks to locate houses to rob. So,
even if you leave the lights on inside your house when you go out of town to keep
thieves away, you might come home to an empty house.

Another way people voluntarily give up their privacy is by not having an up-to-date
virus scan and firewall installed on their computers. Many believe these only keep out
viruses and if one gets in, they'll realize it and just reformat everything. In reality,
viruses are only a small part of what can get into an unprotected computer. Using
malware and trojans, hackers and the programs they create can break into your
computer and alter files, attack other files, or steal your credit card or bank information.
Using this information, they can make unauthorized purchases and even steal your
identity.

In reality, many of the privacy dangers on the Internet can be limited if users just

Página 3 de 5
MASTER MIND 2A

followed simple rules: (1) don't believe what you put on the Internet won't be seen and
used by others; and (2) keep your virus scans and firewall up to date.

Example:
Cause described Effect described
People post pivate information Burglars can see their information

Paragraph Function:
number:
1 Introduction: Brief historical summary of privacy.
Cause described: (1) Effect described: (2)
2 _________________________________ _________________________________
_________________________________ _________________________________
Cause described: (3) Effect described: (4)
3 _________________________________ _________________________________
_________________________________ _________________________________
Conclusion: (5)
4
__________________________________________________________________

Writing

6. Write a persuasive e-mail. (100 points)


Read this notice and then write an e-mail to the city government explaining your views
on the increased security measure due to be installed on your street. Explain what you
think the effects of the installation of security cameras will be.
Notice: The City will be installing security cameras on this street beginning Monday,
April 15 th.
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________

Listening

7. Listen and complete the sentences. [CD 1 TRACK 11] (20 points each)

Example: Justine Black is the _manager of an international company._


Justine Black's (1) ______________________________ was stolen. The thief ran up
debts of over $200,000 in her name. She found out about it when she got a letter from a
bank threatening to (2) ______________________________. It was very difficult to
prove herself innocent. The thief got her information from an online (3)
______________________________ and then hacked her computer and (4)
______________________________ a program that told them everything she typed. It's
taken over (5) ______________________________, but she thinks she might have
solved the problem.

Página 4 de 5
MASTER MIND 2A

Speaking (1 to 5 points)

Total_____ x 100 / 5 = _____ ( Average)

GRADES:

Reading______ Writing______ Listening______

Speaking______ Structure (Grammar) and Vocabulary______

AVERAGE_________

Página 5 de 5

You might also like