0% found this document useful (0 votes)
79 views

Uas Big

The document discusses hackers targeting smaller companies instead of larger ones now. Smaller companies may have less robust security systems and be less vigilant about changing passwords regularly, making them easier targets. A breach at a smaller company also may not attract much attention from investigators.

Uploaded by

nicol
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
79 views

Uas Big

The document discusses hackers targeting smaller companies instead of larger ones now. Smaller companies may have less robust security systems and be less vigilant about changing passwords regularly, making them easier targets. A breach at a smaller company also may not attract much attention from investigators.

Uploaded by

nicol
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Read the passage for Question number Q10-Q14

Are you the new target for hackers

Is your company a sitting duck for hackers? When did you last change your password? How
complete are your security systems? Have you ever been broken into before?
According to IANS, the Inter-national Association for Network Security, there’s a new breed
of hacker out there. And, there’s a new target.
In the past, hackers gained notoriety from breaking into big companys’ networks. In fact, the
bigger the company, the bigger the success. When hackers broke into Infelmax’s notoriously
secure sys-tem in 1999, they made headline news around the world.
The big “successes” came with a major drawback. These headline break-ins came with
international teams of investigators and serious criminal charges. Several former hackers are
now sitting behind bars or working overtime to pay off hefty fines in penalties and damages.
So, hackers of the new decade have turned to a new target: smaller companies. Smaller
companies often spend less on their security systems. If they have never been broken into
before, they may be lulled into a feeling of security. They are often lax about changing their
password frequently enough. And that spells trouble.
Also, a breached system in a smaller company may attract little public attention.
Investigations may be brief and superficial, as overloaded investigators pursue bigger
problems.
But if you do fall victim to hackers, it will definitely attract your own attention. These thieves
can gain access to your files, destroying, copying, or altering them. They can create havoc
with your data. And if they do, you’ll surely wish you had changed your password once more
often.

Q10. Which is a likely victim for the new breed of hackers?


Select one:
a. Large Companies
b. Small companies
c. International companies
d. Companies without a security system
Q11. What might have been one motive for hackers of Infelmax's Network?
Select one:
a. Money
b. Power
c. Fame
d. Fun
Q12. What has happened to some big-name hackers?
Select one:
a. They're in jail
b. Nothing
c. They got better jobs
d. They're paying off investigators
Q13. What might help hackers to succeed?
Select one:
a. They've never broken into a company before
b. They feel secure
c. Their targeted network is old
d. Their targets rarely change their secret code
Q14. The word 'havoc' in paragraph 7 line 6 is the closest meaning to ...
Select one:
a. Order
b. Copies
c. Confusion
d. Documents
Read the passage below to answer question number Q15-Q18

Q15. What is indicated about advertising space on the Mooringtown Library notice board?
Select one:
a. It is available at no charge.
b. It can be used for any length of time.
c. It is open to all area businesses.
d. It is intended mainly for sporting events.
Q16. What is NOT a stated requirement for a notice to be placed on the board?
Select one:
a. It must meet certain size requirements.
b. It must be marked with posting dates.
c. It must be reviewed beforehand.
d. It must be signed by a librarian.
Q17. What should an advertiser bring to the library when making a submission?
Select one:
a. An outline of proposed content
b. A final version of the notice
c. A completed submission form
d. A letter from an organization
Q18. In which of the positions marked [1], [2], [3], and [4] does the following sentence best
belong? “The name and telephone number of the person posting the notice must be clearly
marked on the back.”
Select one:
a. [1]
b. [2]
c. [3]
d. [4]

Already as a child Mozart ____ play the piano beautifully.


Select one:
a. Could
b. Should
c. Would
d. Need
Define wheter the following sentence is true or false : My neighbor is very proud of her new
grandson who born last week.
Select one:
a. True
b. False
I met him at the door just at the time boss ____ to the employees.
Select one:
a. was talking
b. talked
c. is talking
d. talks
______ is one of the most important textile fibers in the world.
Select one:
a. Cottons
b. The cotton
c. Cotton
d. A cotton
I wanted ______ if there were other elements, giving out rays of the same kind.
Select one:
a. am knowing
b. knowing
c. know
d. to know
Sorry, she can't come to the phone. She ..... a bath!
Select one:
a. is having
b. having
c. have
d. has

You might also like