Professional Documents
Culture Documents
Đề Kiểm Tra Học Kì 2 - No.1
Đề Kiểm Tra Học Kì 2 - No.1
1)
I. Phonetics:
* Choose the word whose underlined part is pronounced differently from others: (0.5p)
1. A. society B. delegate C. president D. protection
2. A. challenge B. characteristic C. exchange D. charity
* Which word has the main stress different from others: (0.5p)
3. A. disappearance B. circulation C. conservation D. environment
4. A. nature B. power C. damage D. defense
III. Reading:
A. Read the passage carefully and choose the correct answer: (1.25 p)
Although computers are considered the most perfect and effective devices in our modern time, we cannot
avoid some certain problems when we are working on a computer. Letters and phone conversations are private. It
is against the law to open someone's mail without permission or to listen secretly to someone's telephone
conversation. And now there are laws to protect the privacy of e-mail. It is also against the law to read the
messages that a person sends or receives on a computer. Although each person has a secret password for his or
her e-mail, sometimes the passwords are discovered by hackers and the mail box is opened. Recently several
companies that do business on the Internet have been attacked. The attackers sent huge amounts of useless e-
mails to the Web sites of these companies. The effect was to slow or stop the ability of the companies to do their
business. Such actions are known as "denial of service" attacks. The companies say they may have lost millions
of dollars because they were not able to provide goods and services during the attacks. Most of the companies
were able to solve the problem in about three hours. The victims of the attacks included some of the largest and
most successful companies on the Internet, such as Yahoo, Amazon, and Corn and E-Trade. The police have
investigated the attackers. The computer industry leaders have discussed the electronic attacks and the problems
of computer crime. They suggest that a person who is found guilty of such a crime should be sentenced to at least
10 years in prison.
1. Which sentence is true?
A. It is quite secret to send or receive messages through the Internet.
B. We need a password to open an e-mail box.
C. We never have problems with e-mail.
D. E-mails on the Internet are open letters.
2. It is ____ to read the messages that a person sends or receives on a computer.
A. legal B. illegal C. encouraged D. advisable
3. What happened to some companies that do business on the Internet?
A. They were electronically attacked.B. They were closed because they are broke.
C. They stopped working because all computers were out of order
D. They stopped working because of no power.
4. Most of the companies ______.
A. could solve the problem
B. could not solve the problem
C. closed
D. were sentenced to about ten years in prison
5. What did the hackers do?
A. They attacked the network by computer viruses.
B. They made a lot of order through the Internet.
C. They sent a lot of e-mails to the companies.
D. They sent useless e-mails to the Web sites of these companies.
IV. Writing:
A. Find out the mistake in the following sentences: (1p)
1. Wedding expenses these days are greater much than in the past.
A B C D
2. This novel, which written by a well known writer, should be read.
A B C D
3. Rabbit is a small wild furry animal with long ears.
A B C D
4. A laptop computer, which is a small mobile personal computer, usually weighing from one to three
A B C D
kilograms.