Professional Documents
Culture Documents
MM2A EXAM
Name:_________________________________________________________________
Para la aplicación de la presente evaluación no pidas ayuda a tu profesor(a), ya que él/ella solamente te
ayudará con las instrucciones y nunca con las respuestas debido a que esto iría en contra de la ética y los
valores que promovemos en IMAC Inglés Total.
Grammar A
A: Many people (1) find / prove / see privacy very important while they are online.
B: Well, I (2) believe not / don't believe not / don't believe so. I (3) don't think it's an
issue / don't think it isn't an issue / think not it isn't an issue. I found (4) their complaints
ridiculous / ridiculous their complaints / the ridiculous complaints.
A: I (5) don't suppose you aren't interested / aren't suppose you're interested / suppose
you aren't interested in a social networking site group about protecting our privacy.
B: I (6) don't guess so / guess so / guess not. All their arguments (7) keep me angry /
make me angry / prove me an angry man. I mean, I don't give out all my information to
everyone. I (8) keep a secret my password / keep my password secret / keep secret my
password, for example. However, I upload photos of my kids. There are billions of
photos on social networking sites. Do you really think a bad person could find one
photo out of a billion?
A: I (9) don't suppose so / expect not / think so, but can you (10) prove that's true /
prove me a right / find that right, or are you just making up figures?
Grammar B
2. Complete the sentences. Use the correct forms of the words in parentheses. (2.5
points each)
Example: A. If you don’t keep your data secret, a _criminal can find it_ (criminal /
can find) very easy to use it and get you into debt.
B. You’re right. This can make your life (can make / your life) very hard, and it can
be extremely difficult to prove yourself innocent.
Página 1 de 5
MASTER MIND 2A
Vocabulary A
3. Complete the sentences with the following words. (2.5 points each)
Example: A. I’ve finished _compiling_ the data.
B. I still have more work to do.
compile, data, database, find, hack, compiling, privacy, ran, sort, surveillance, took
Vocabulary B
4. Match the words a to j to the gaps in sentences 1 to 10. (2.5 points each)
Página 2 de 5
MASTER MIND 2A
11 I'll have to make ... some story about why I left k) password
work early today. ____
Reading
5. Read the text and complete the chart. (20 points each)
Your privacy is being invaded every day. It used to be we kept our privacy by closing
the curtains, unlisting our telephone number, and just using an initial and last name on
the outdoor mailbox. This modern age has made protecting our privacy much more
difficult.
Some of the most public spaces available are social networking sites. People seem to
think these are much more private than they really are. They keep their sites public.
They give their names, addresses, and even telephone numbers. They give out all kinds
of private information, like when they are going out of town. They might as well put a
sign outside their houses saying, “I'm not at home. I'm on vacation. You can rob me
now.” More and more thieves are using social networks to locate houses to rob. So,
even if you leave the lights on inside your house when you go out of town to keep
thieves away, you might come home to an empty house.
Another way people voluntarily give up their privacy is by not having an up-to-date
virus scan and firewall installed on their computers. Many believe these only keep out
viruses and if one gets in, they'll realize it and just reformat everything. In reality,
viruses are only a small part of what can get into an unprotected computer. Using
malware and trojans, hackers and the programs they create can break into your
computer and alter files, attack other files, or steal your credit card or bank information.
Using this information, they can make unauthorized purchases and even steal your
identity.
In reality, many of the privacy dangers on the Internet can be limited if users just
Página 3 de 5
MASTER MIND 2A
followed simple rules: (1) don't believe what you put on the Internet won't be seen and
used by others; and (2) keep your virus scans and firewall up to date.
Example:
Cause described Effect described
People post pivate information Burglars can see their information
Paragraph Function:
number:
1 Introduction: Brief historical summary of privacy.
Cause described: (1) Effect described: (2)
2 _________________________________ _________________________________
_________________________________ _________________________________
Cause described: (3) Effect described: (4)
3 _________________________________ _________________________________
_________________________________ _________________________________
Conclusion: (5)
4
__________________________________________________________________
Writing
Listening
7. Listen and complete the sentences. [CD 1 TRACK 11] (20 points each)
Página 4 de 5
MASTER MIND 2A
Speaking (1 to 5 points)
GRADES:
AVERAGE_________
Página 5 de 5