Sie sind auf Seite 1von 10

English 11

WORKSHEET No. 4
PART I. LISTENING
Section 1
Questions 1 - 6. Complete the notes below.
Write NO MORE THAN TWO WORDS AND/ OR A NUMBER for each answer
Short Story Competition
Entry details
Cost of entry: £5
Length of story: approximately 1. ___________
story must include: a 2. ___________
Minimum age: 3. ___________
Last entry date: 1st 4. ___________
Web address: www. 5. ___________ .com
Don’t: 6. ___________ the story to the organisers

Questions 7 – 10. Complete the sentences below.


Write NO MORE THAN TWO WORDS for each answer.
Judging and Prize Details
The competition is judged by 7. ___________
The top five stories will be available 8. ___________
The top story will be chosen by the 9. ___________
The first prize is a place at a writers’ workshop in 10. ___________

Section 2
You will hear part of an interview with Harold Mackenzie, who has written a book about early
adolescence. For questions 11-15, choose the correct answer (A, B, C or D) which fits best according
to what you hear.
11. According to Harold, what is the main reason pre-teens are receiving more publicity?
A. Psychologists now understand the importance of the pre-teen years.
B. A great deal of research is being done into the way children develop.
C. Pre-teens are now demanding more attention from the media.
D. People now realise pre-teens have economic power.
12. Harold claims friendships are important to pre-teens because
A. these relationships help them establish their identities.
B. the children are beginning to rebel against their families.
C. friends are starting to replace family members.
D. the children are now capable of reacting to other people.
13. He suggests that an alternative method of academic evaluation would
A. enable parents to be more supportive.
B. be more effective than examinations.
C. mean less stress for pre-teens.
D. delay the onset of tension in adolescence.
14. How does he suggest parents can help pre-teens develop confidence?
A. by allowing them to buy whatever they like
B. by allowing them a certain degree of independence
C. by allowing them to make decisions about their spare time
D. by allowing them to control unimportant aspects of their lives
15. According to Harold, what is the greatest challenge facing parents of pre-teens?
A. deciding what kinds of toys to buy for their children
B. developing the correct approach to material possessions
C. establishing a way of communicating effectively with their children
D. discovering what kind of help their children really need
High School for Gifted Students - HNUE Page 1
English 11

Section 3
Questions 16 and 17. Choose the correct letter, A. B. or C.
16. 'Echo’ is an example of a
A. brand name . B. model name. C. symbol.
17. Calvin Klein and Sara Lee
A. are very popular. B. are nice sounding names. C. have many products.
Questions 18-20. Choose THREE answers from the list, and write the correct letter. A-E. next to the
questions.
What type of name does each company use?
18. Amazon _______ 19. Safe and Sleek ________ 20. Kodak ___________
Type of Name
A. Acronym B. Descriptive C. Evocative
D. Founders’ names E. Neologism F. Rhyming
Questions 21-24. Complete the table.
Write NO MORE THAN TWO WORDS for each answer

Product Logo/Symbol Image


Marlboro a cowboy sponsorship of 21. __________

Nike 22. __________ a single tick power, speed, and freedom

Rolex watches a 23. __________ solid, smart, reliable

put forward by a series of 24. __________


Calvin Klein jeans the name
advertisements

Section 4.
Questions 25 – 30. Choose SIX answers from the box and write the correct letter, A-H, next to
questions 25-30.
A. patterns B. names C. sources D. questions
E. employees F. solutions G. headings H. officials
STAGES IN DOING A TOURISM CASE STUDY

RESEARCH
Locate and read relevant articles, noting key information and also (25.)____________
Identify a problem or need
Select interviewees – these may be site (26.) ____________, visitors or city (27.) ____________
Prepare and carry out interviews. If possible, collect statistics.
Check whether (28.) ____________of interviewees can be used

ANALYSIS
Select relevant information and try to identify (29.) ____________
Decide on the best form of visuals

WRITING THE CASE STUDY


Give some background before writing the main sections
Do NOT end with (30.) ____________

High School for Gifted Students - HNUE Page 2


English 11

PART II. VOCABULARY AND GRAMMAR


Exercise 1. From the four words or phrases A, B, C or D, choose the one that best completes the sentence.
31. The racing-driver climbed out of the wreckage completely ________.
A. unwounded B. intact C. unscathed D. well-preserved
32. At the end of the day the shopkeeper walked to the bank, carrying the day’s ________ in a special bag.
A. income B. takings C. earnings D. profits
33. The rocks in this area have been ________into strange shapes by the wind and rain.
A. broken B. eroded C. moulded D. deteriorated
34. You must refrain ________ tea or coffee while taking this medicine.
A. to drink B. from drinking C. drink D. drinking
35. William is an authority ________medieval tapestries.
A. on B. with C. about D. in
36. Many of his best photographs of the conflict were taken when he was actually ________fire.
A. on B. under C. in D. to
37. I don’t think that this fashion will _________.
A. catch on B. catch up C. catch out D. catch over
38. He bought the cottage __________ renovating it and then selling at a large profit.
A. with a view to B. with the target of C. aiming to D. his goal being
39. _______ had I left the hotel when I was surrounded by photographers.
A. No sooner B. Immediately C. Just D. Hardly
40. Being alone in the house all day looking after three young children is enough to make anyone’s patience
wear ________.
A. thin B. out C. down D. slim

Exercise 2. Complete each sentence with the correct form of ONE of the multi-word verbs below.
There are two extra words you do not need to use.
drop off hand down pass away part with
get around gamble away butt in
41. The reporter announced solemnly that the President had ____________in his sleep.
42. He’s been to the USA, Australia and India this year. He certainly ______________!
43. Look, I’m sorry to ____________, but I think I can help you.
44. The elaborate bridal costumes of the coastal Indians are_______________ from mother to daughter.
45. He ______________his life’s savings before starting on his wife’s.

Exercise 3. Complete the sentences by finding one word which fits in all three spaces.
46. - The factory was on the ________ of the valley
- A river runs through the centre of the village with the church on one ________ and the market
place on the other.
- Julia was lying on her ________ on the bed.
47. - Ferguson planned to broaden its product ________ to include internet telephones.
- Joan hoped that the others were out of ________ of her mother's voice.
- Prices ________ from around £10 for a basic keyboard, to £50 for an ergonomic one.
48. - You need to ________ all applications before shutting down your computer.
- Should the factory ________ down, 100 people will lose their jobs.
- Mike's had three car accidents, plus a few other pretty ________ shaves.
49. - I can't believe that Colin doesn't ________ like sport.
- Families somehow survived, ________ as they were being torn apart by the war.
- Once in a while why not take advantage of the smooth, ________ surface to concentrate on your
control and technique?
50. - At the age of 17, he went ________ the building trade as an apprentice.
- Eight ________ twenty-four is three.
- I'm really ________ folk music.

High School for Gifted Students - HNUE Page 3


English 11

Exercise 4. Read the text below. Use the word given in brackets to form a word that fits in the gap.
The first one has been done for you as an example.
The other Mozart
Everyone has heard of Wolfgang Amadeus Mozart; few of his musical son Franz Xaver. A new CD
collection (0. title) entitled The Other Mozart celebrates Franz’s music- in all its haunting, (51.
melancholy)_________________ innocence. The 27 songs are brief slivers of ideas, underdeveloped
shadows of what might have been, reaching a beautiful (52. fulfill)_________________ in the later works.
But it is clear that the music never reaches the (53. high)_________________ of his genius father.
Franz was the youngest of Mozart’s children, and his mother’s hopes and ambitions focused on him
following the (54. mature)_________________ death of his father. The very best teachers were
(55.automatic)________________ available to Franz, who made his public debut as a singer, aged five. The
songs bring to light Fran’s pianistic accomplishment; the piano parts are extremely demanding. The songs
hint at Franz’s love for a woman; they speak time and again of (56. attain)_________________ love and
unfulfilled (57. long)_________________.
(58. Realist)_________________, however, the fact remains that this music, had it been written by
a composer of any other name, would probably have remained buried in the archives.

Exercise 5. The passage below contains 7 mistakes. Identify the mistakes and correct them. Remember
to indicate the line containing the mistake.
Line
1. Original written work and information is protected by copyright laws, like original inventions.
2. Therefore, when you reference or use information you find while making research, you should
3. always give credit to the person or organization which produced it. To plagiarize is to use ideas
4. that are not your own without giving credit to the original source, or to claim that someone else’s
5. ideas are your own. It is akin to steal someone else’s work. Internet-related plagiarism has become
6. such a problem because it is so easy to find and copy information online. There are thousands of
7. resources for students who wish only to copy or cheat. Moreover, the Internet also makes it easier
8. for educators to check for plagiarism. Often a simple Internet search for a quote will be enough to
9. expose copying. Some educators are more concerned about unintended plagiarism. Because
10. copying and pasting is so easy, it is becoming more and more common for well-meaning students
11. to mix up source material with their original ideas. While this kind of plagiarism usually happens
12. innocent, it is still an offense

Line Mistake Correction


59.
60.
61.
62.
63.
64.
65.

PART III. READING


Exercise 1. Read the text below and think of the word which fits each space. Use only ONE word in
each space.
One rather unlikely word that has recently entered the language is "blog", a shortened
(66.)__________ of "web log". A blog is a diary posted on the Internet by the person writing it - the "blogger"
- who presumably expects other people to read it. It is ironical that modern technology is being used to
(67.)__________ new life into such an old-fashioned form as the personal journal. And now, as the
technology (68.)__________ video camera is making them easier to use, we have the video log, or "vlog".
Vlogging does not require highly sophisticated equipment: a digital video camera, a high-speed Internet
connection and a host are all that is needed. Vloggers can put anything that (69.)__________ their fancy

High School for Gifted Students - HNUE Page 4


English 11

onto their personal website. Some vloggers have no ambitions (70.)__________ than to show films they
have while on holiday in exotic places. However, vlogs can also (71.)__________ more ambitious purpose.
For instance, amateur film-makers who want to make a (72.)__________ for themselves might publish their
work on the Internet, eager to receive advice or criticism. And increasingly, vlogs are being used to publicize
political and social issues that are not newsworthy (73.)__________ to warrant coverage by the mass media.
It is still too early to predict (74.)__________ vlogging will ever take off in a major way or if it is just a
passing fad, but (75.)__________ potential is only now becoming apparent.

Exercise 2. Read the text below and decide which answer (A, B, C or D) best fits each gap.
TIGERS AS PETS
They may be (76.)______ extinction in India, China and Siberia, but in the US, tigers have found a
new lease of life – after a fashion. More than 12,000 are kept as pets- double the number thought to exist in
the wild. The craze persists (77.) ______concern among politicians and animal welfare groups. Various
reputable organizations promote ownership of endangered species. Prices are not particularly (78.) ______:
$1,000 for a generic cub, $3,500 for a pair of Bengal tigers.
The private trade originated in zoos. Tiger cubs (79.) ______so popular with the public that zoos
started breeding more than they needed and sold the (80.) ______to private breeders.
The US Endangered Species Act of 1973 outlaws the taking of endangered animals from the wild,
but does not (81.) ______what happens to the offspring of animals captured before the law was (82.)______.
Many owners believe they are saving an endangered species. But their cubs have no (83.)______
among wild tigers. They are a mixture of, (84.)______, Sumatran, Siberian and Bengal tigers, which would
not survive in the wild.
76. A. facing B. reaching C. getting D. meeting
77. A. in contrast to B. nevertheless C. in spite of D. whereas
78. A. forbidding B. prohibitive C. impossible D. restraining
79. A. occurred B. demonstrated C. established D. proved
80. A. surplus B. balance C. residue D. leftovers
81. A. rule B. conduct C. systematize D. regulate
82. A. sentenced B. issued C. passed D. stated
83. A. equivalent B. similarity C. substitute D. correspondent
84. A. imagine B. say C. suppose D. take

Exercise 3. You are going to read a newspaper article about technology and personal privacy. For
questions 85-90, choose the answer (A, B, C or D) which you think fits best according to the text.
What price privacy?
Don’t blame technology for threatening our privacy; it’s the way the institutions choose to use it.
The most depressing moment of my day is first thing in the morning, when I download my overnight
batch of emails. Without fail, it will contain dozens of messages from people who, knowing my interest in
the subject, write to me describing violations of their personal privacy. Throughout the day, the stream
continues, each message in my inbox warning of yet another nail in the coffin of personal privacy.
Throughout the day, the stream continues, each message in my inbox warning of yet another nail in the coffin
of personal privacy. In other centuries, such invasions of liberty would have arisen from religious persecution
or the activities of tax collectors. Nowadays, the invasions take place through the use of information
technology.
So, when those of us who value personal privacy are asked for their view, we will invariably speak
in disparaging terms about such technologies. In an effort to stem the speed and force of the invasion, we
will sometimes argue that the technologies themselves should simply be banned. 'Just stop using the cursed
technology,' we cry, 'then there won't be any privacy issue.' Of course, things are not so simple. Even the
strongest advocate of privacy recognizes that technology can offer enormous benefits to individuals and to
society. To prohibit a technology on the grounds that it is being used to invade privacy would also be to deny
society the benefits of that innovation.

High School for Gifted Students - HNUE Page 5


English 11

The sensible perspective is that technology does not necessarily have to invade privacy. The reality is that it
invariably does. Companies may well argue that customers are prepared to 'trade off a little privacy in return
for better service or a cooler and more sophisticated product. They say that this is a matter of free choice. I
doubt that there is any genuine free choice in the matter. Whether I go with Orange or Vodaphone is indeed
a free choice. But I have no choice over whether my communications data will or will not be stored by my
communications provider. They know the location of my mobile and the numbers from which I received
calls, and the emails I send are routinely stored by all providers, whether I like it or not.
CCTV also gives me no free choice. Its purpose may be to keep me secure, but I have no alternative
but to accept it. Visual surveillance is becoming a fixed component in the design of modern urban centres,
new housing areas, public buildings and even, in Britain at least, throughout the road system. Soon, people
will expect spy cameras to be part of all forms of architecture and design. Of course, there is another side to
the coin, many technologies have brought benefits to the consumer with little or no cost to privacy.
Encryption is one that springs to mind. Many of the most valuable innovations in banking and
communications could never have been deployed without this technique.
The problem with privacy is not technology, but the institutions which make use of it. Governments
are hungry for data, and will use their powers to force companies to collect, retain and yield personal
information on their customers. In recent years, governments have managed to incorporate surveillance into
almost every aspect of our finances, communication and lifestyle. While acknowledging the importance of
privacy as a fundamental right, they argue that surveillance is needed to maintain law and order and create
economic efficiency. The right to privacy, it is always claimed, should not be allowed to stand in the way of
the wider public interest. This argument is sound in principle, but there seems little intellectual or analytical
basis for its universal and unquestioned application.
When the UK government introduced the RIP legislation in 2000, it originally intended to allow an
unprecedented degree of communications interception on the grounds that the dangers of crime on the
Internet warranted increased surveillance. At no time did anyone produce much evidence for this crime wave,
however, nor did anyone in government seem to think any was required. It was left to an eleventh-hour
campaign by civil rights activists to block the more offensive elements of the legislation from a personal
privacy point of view. Such lack of prior justification is a common feature of privacy invasion for law
enforcement and national security purposes.
As I've said, technology does not have to be the enemy of privacy. But while governments insist on
requiring surveillance, and while companies insist on amassing personal information about their customers,
technology will continue to be seen as the enemy of privacy.
85. From the first paragraph, we understand that the writer___________
A. resents receiving such distressing emails from people.
B. is surprised that people should contact him about privacy.
C. finds it hard to cope with the tone of the emails he receives.
D. is resigned to the fact that invasions of privacy are on the increase.
86. What view does the writer put forward in the second paragraph?
A. People should be willing to do without certain forms of technology.
B. It is a mistake to criticize people for the way they use technology.
C. It is unrealistic to deny people the benefits that technology can bring.
D. People shouldn’t be allowed to use technologies that threaten privacy.
87. The writer feels that some companies___________
A. do not really give customers a say in issues related to privacy.
B. fail to recognize that their products may invade people’s privacy.
C. underestimate the strength of their customers’ feelings about privacy.
D. refuse to make compromises with customers concerned about privacy.
88. What point does the writer make about CCTV?
A. People no longer question how necessary it is.
B. People feel more secure the more widely it is used.
C. It ought to be feature of all new building projects.
D. It would be difficult for society to function without it.

High School for Gifted Students - HNUE Page 6


English 11

89. The writer gives encryption as an example of a technology which___________


A. brings only questionable benefits to society in general.
B. poses much less of a threat to privacy than others.
C. actually helps us to protect personal privacy.
D. is worth losing some personal privacy for.
90. In the fifth paragraph, the writer suggests that governments are_________
A. justified in denying the right of privacy to criminals.
B. mistaken in their view that surveillance prevents crime.
C. wrong to dismiss the individual’s right to privacy so lightly.
D. unreasonable in their attitude towards civil rights campaigners.

Exercise 4. Read the following passage and choose the best answer for each of the following
questions.
COMMUNICATING WITH THE FUTURE
In the 1980s the United States Department of Energy was looking for suitable sites to bury radioactive
waste material generated by its nuclear energy programs. The government was considering burying the
dangerous wastes in deep underground chambers in remote desert areas. The problem, however, was that
nuclear waste remains highly radioactive for thousands of years. The commission entrusted with tackling the
problem of waste disposal was aware that the dangers posed by radioactive emissions must be communicated
to our descendants of at least 10,000 years hence. So the task became one of finding a way to tell future
societies about the risk posed by these deadly deposits.
Of course, human society in the distant future may be well aware of the hazards of radiation.
Technological advances may one day provide solutions to this dilemma. But the belief in constant
technological advancement is based on our perceptions of advances made throughout history and prehistory.
We cannot be sure that society won't have slipped backward into an age of barbarism due to any of several
catastrophic events, whether the result of nature such as the onset of a new ice age or perhaps mankind's
failure to solve the scourges of war and pollution. In the event of global catastrophe, it is quite possible that
humans of the distant future will be on the far side of a broken link of communication and technological
understanding.
The problem then becomes how to inform our descendants that they must avoid areas of potential
radioactive seepage given that they may not understand any currently existing language and may have no
historical or cultural memory. So, any message indicated to future reception and decipherment must be as
universally understandable as possible.
It was soon realized by the specialists assigned the task of devising the communication system that
any material in which the message was written might not physically endure the great lengths of time
demanded. The second law of thermodynamics shows that all material disintegrates over time. Even
computers that might carry the message cannot be expected to endure long enough. Besides, electricity
supplies might not be available in 300 generations. Other media storage methods were considered and
rejected for similar reasons.
The task force under the linguist Thomas Sebeok finally agreed that no foolproof way would be found
to send a message across so many generations and have it survive physically and be decipherable by a people
with few cultural similarities to us. Given this restriction, Sebeok suggested the only possible solution was
the formation of a committee of guardians of knowledge. Its task would be to dedicate itself to maintaining
and passing the knowledge of the whereabouts and dangers of the nuclear waste deposits. This so-called
atomic priesthood would be entrusted with keeping knowledge of this tradition alive through millennia and
in developing the tradition into a kind of mythical taboo forbidding people to tamper in any way with the
nuclear waste sites. Only the initiated atomic priesthood of experts would have the scientific knowledge to
fully understand the danger. Those outside the priesthood would be kept away by a combination of rituals
and legends designed to warn off intruders.
This proposal has been criticized because of the possibility of a break in continuity of the original
message. Furthermore, there is no guarantee that any warning or sanction passed on for millennia would be
obeyed, nor that it could survive with its original meaning intact. To counterbalance this possibility, Sebeok's
group proposed a "relay system" in which information is passed on over relatively short periods of time, just
High School for Gifted Students - HNUE Page 7
English 11

three generations ahead. The message is then to be renewed and redesigned if necessary for the following
three generations and so on over the required time span. In this way information could be relayed into the
future and avoid the possibility of physical degradation.
A second defect is more difficult to dismiss, however. This is the problem of social exclusiveness
brought about through possession of vital knowledge. Critics point out that the atomic priesthood could use
its secret knowledge to control those who are scientifically ignorant. The establishment of such an association
of insiders holding powerful knowledge not available except in mythic form to nonmembers would be a
dangerous precedent for future social developments.
91. The word “chambers” in the passage is closest in meaning to ________.
A. partitions B. openings C. cavities D. fissures
92. What problem faced the commission assigned to deal with the burial of nuclear waste?
A. How to reduce the radioactive life of nuclear waste materials
B. How to form a committee that could adequately express various nuclear risks
C. How to notify future generations of the risks of nuclear contamination
D. How to choose burial sites so as to minimize dangers to people.
93. In paragraph 2, the author explains the possible circumstances of future societies ________.
A. to warn about the possible natural catastrophe
B. to question the value of advances
C. to highlight humankind’s inability to resolve problems
D. to demonstrate the reason nuclear hazards must be communicated
94. The word “scourges” in the passage is closest in meaning to _______.
A. pressures B. afflictions C. worries D. annoyances
95. In paragraph 4, the author mentions the second law of thermodynamics _________.
A. to support the view that nuclear waste will disperse with time
B. to show that knowledge can be sustained over millennia
C. to give the basic scientific reason behind the breakdown of material objects
D. to contrast the potential life span of knowledge with that of material objects
96. The word “Its” in the passage refers to_________.
A. knowledge B. committee C. solution D. guardians
97. In paragraph 5, why is the proposed committee of guardians referred to as the “atomic priesthood”?
A. Because they would be an exclusive group with knowledge about nuclear waste sites.
B. Because they would use rituals and legends to maintain their exclusiveness.
C. Because they would be an exclusive religious order.
D. Because they would develop mythical taboos surrounding their traditions.
98. According to the author, why did the task force under Sebeok propose a relay system for passing
on information?
A. To show that Sebeok’s ideas created more problems than they solved
B. To support the belief that breaks in communication are inevitable over time
C. To contrast Sebeok’s ideas with those proposed by his main critics
D. To compensate for the fact that meaning will not stable over long periods of time
99. According to paragraph 7, the second defect of the atomic priesthood proposal is that it could lead
to_________.
A. the nonmembers turning knowledge into dangerous mythical forms
B. the possible misuse of exclusive knowledge
C. the establishment of a scientifically ignorant society
D. the priesthood’s criticism of points concerning vital knowledge
100. All of the following are mentioned in the passage as difficulties in devising a communication
system with the future EXCEPT ________.
A. the failure to maintain communication link
B. the loss of knowledge about today’s civilization
C. the inability of materials to endure over time
D. the exclusiveness of priesthood

High School for Gifted Students - HNUE Page 8


English 11

Exercise 5. Read the passage and do the tasks that follow.


Choose the correct heading for paragraphs B-G from the list of headings below.
List of headings Example Answer
i. The prevalence of numerical “codes” in modern life Paragraph A iii
ii. How RSA works 101. Paragraph B ________
iii. A brief history of keeping things safe 102. Paragraph C ________
iv. “New math” vs “medieval math” 103. Paragraph D ________
v. Proof that RSA is effective 104. Paragraph E ________
vi. The illusion of security 105. Paragraph F ________
vii. Cryptography: the modern key for the lock 106. Paragraph G ________
viii. Why RSA is effective
ix. In defence of medieval security systems
x. A new approach to system security

Using Mathematics to Secure Our Money


A. Up until very recently people’s wealth, mostly coins and jewels, was kept safe under lock and key.
Rich medieval families would keep a strong box with a large key, both of which were carefully hidden
in different places. Later the box may have been kept in a bank. In either case, potential thieves would
need to find both the box and the key. A similar principle was used for sending secret diplomatic and
military messages. The messages were written in code with both the sender and the receiver having
the key to the code. Thus, while the message could be discovered its meaning could only be found if
the “key” was also known. And so began a long-running battle between code-makers who tried to
make better keys, and code-breakers who sought ways of finding them.
B. Nowadays, cryptography is central to how our money is kept secure, even though we may not be
aware of it. Our money is no longer in a tangible form, but in the form of information kept with our
banks. To keep everyone involved happy, the messages initiated by our plastic cards have to be sent
and received safely and the entire operation must be carried out with a high level of confidentiality
and security.
C. On a practical level, it is clear that the work of code-makers has been introduced into our daily
financial lives. Our credit cards have 16-digit numbers on the front and a 3-digit number on the back.
They also contain a “chip” that can do all sorts of mysterious operations with these numbers. Finally,
we also have a Personal Identification Number which we all need to memorize. All these numbers
form a type of cryptographic key. However, as we shall see, the modern crypto systems are very
different in the way the keys are used.
D. The main feature of the traditional systems was that only one key was needed by both the sender and
the receiver to understand the message. However the main problem was that the key itself needed to
be communicated to both parties before they could use it. Obviously a major security risk. A very
different approach was developed in the 1970s, based on a different way of using the keys. Now the
main idea is that the typical user, let us call him Amir, has two keys; a “public key” and a “private
key”. The public key is used to encrypt messages that other people wish to send to Amir, and the
private key is used by Amir to decrypt these messages. The security of the system is based on keeping
Amir’s private key secret.
E. This system of public-key cryptography, known as RSA-from the names of the developers (Ronald
Rivest, Adi Shamir and Leonard Adleman) – was developed in the late 1970sand is based on a
collection of several mathematical algorithms. The fist is a process that allows the users, Amir, to
calculate two numerical keys: private and public, based on two prime numbers. To complete the RSA
system, two more algorithms are then needed: one for encrypting messages and one for decrypting
them.
F. The effectiveness of RSA depends on two things. It is efficient, because the encryption and
decryption algorithms used by participants are easy, in a technical sense they can be made precise.
On the other hand, it is believed to be secure, because no one has fund an easy way of decrypting the
encrypted message without knowing Amir’s private key.

High School for Gifted Students - HNUE Page 9


English 11

G. When the RSA system was first written about in Scientific American, the strength of the system was
shown by challenging the readers to find the prime factors- the two original numbers- of a certain
number with 129 digits. It took 17 years to solve this problem, using the combined efforts of over
600 people. So clearly it is a very secure system. Using mathematics in this way, scientists and
technologists have enabled us to keep our money as secure as the rich medieval barons with their
strong boxes and hidden keys.
Do the following statements agree with the views of the writer in the Reading passage? Write
YES : if the statement agrees with the views of the writer
NO : if the statement contradicts the views of the writer
NOT GIVEN : if it is impossible to say what the writer think about this
107. Online banking makes most people nervous.
108. The way keys are used in modern cryptograph is quite different from the past.
109. The main problem with traditional cryptography systems is that neither party can decode the message.
110. The RSA system represents the most secure cryptography we are ever likely to develop.

PART IV. WRITING


Exercise 1. Finish each of the following sentences in such a way that it means the same as the sentence printed
before it, using the word provided at the end of the sentence.

111. I think he’s at last beginning to agree with me. ROUND


→ I suppose he’s ____________________________________________________________.
112. When he won the scholarship, Alan began to realize just how lucky he was. DAWN
→ When he won the scholarship, it began ____________________________________.
113. Do you have any idea about how Jack made enough money to buy that new sports car? LIGHT
→ Can you ________________________________________________ to buy that new sports car?
114. Anne complained about the weather throughout the holiday. ENTIRE
→ Anne _______________________________________________________________.
115. He said there was no way the government would send financial aid to the region. RULED
→ He __________________________________ sending financial aid to the region.
116. Did you see how concerned Jessie was? EXPRESSION
→ Did you see__________________________________________________________.
117. I only called the police when I had tried everything else. RESORT
→ I only _______________________________________________________________.
118. Would you take freelance work if it was offered to you?
→ Were _______________________________________________________________?
119.A rise in temperature in the next century seems likely.
→ In all _______________________________________________________________.
120. It was an impressive building but it wasn’t to my taste.
→ Impressive ___________________________________________________________.

----------THE END---------

High School for Gifted Students - HNUE Page 10

Das könnte Ihnen auch gefallen