You are on page 1of 3

CTT de los Andes Language Center

English Program

Unit 7: A hacker’s life.

Names:
CTT de los Andes Language Center
English Program

1. Read the article and answer the questions.

a) What do DEF CON hackers do to help improve internet security?


Answer:
b) What is a common misconception about who hackers are?
Answer:
c) What do hackers look at apart from online security?
Answer:
d) What do hackers do with the information they find?
Answer:
e) What does the writer like about the people at DEF CON?
Answer:
f) What phrase sums up what Capture the Flag is?
Answer:
g) What does the writer think about the passwords used by most internet users?
Answer:
h) What really motivates the hackers at DEF CON?
Answer:

2. . Find collocations in the article that mean the following:


a) feeling of pride in achieving something (para 1) __________
b) a very false description (para 2) ______________
c) a lack of politeness (para 5) _________
d) with poor lighting (para 6) ___________
e) a person who is expert in (and obsessed with) computer technology (para 8)
__________
f) large-scale or important commercial activity (para 9) ________

3. The word “accomplishment” in paragraph 6 is the opposite of:

a) Achievement
b) Opportunity
c) Failure
d) Frustration

4. The relative pronoun “who” in line 18, refers to:

a) The hackers.
b) Computer addicts.
c) Love the challenge.
d) Security hacks.
CTT de los Andes Language Center
English Program

5. The pronoun “it” in line 5, refers to:


e) An amateur.
f) Breaking into your own home.
g) A professional.
h) Five minutes faster.

6. The pronoun “this” in line 41, refers to:

i) Capture the flag.


j) Competition.
k) Conference.
l) Most famous.

7. Why does the author say” But that is actually a gross misrepresentation of what
most hackers do” in paragraph 2:

m) To persuade the reader to carry on reading the passage.


n) To point out the result of an action.
o) To introduce the general idea of the following paragraph.
p) To demonstrate that a portrayal is erroneous.

8. Why does the author say” But it isn’t just criminals we need to protect our data
from” in paragraph 9:

q) To mention that there are more dangers to be aware of.


r) To illustrate an example of a possible danger.
s) To restate an idea followingly mentioned.
t) To recall a previously mentioned endangerment.

You might also like