img
Thoát

Đề thi chính thức tiếng anh thi vào lớp 10 Sơn La 2023 2024

img
Nộp bài
20
Question 20. I asked them when _____________ changed.
had the timetable been
was the timetable
the timetable is
the timetable had been
40
Question 40. What should be the main title of the passage? One of the greatest security threats in the online world is computer hacking. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things? Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system. In fact, just the act of entering a computer network is commonly considered passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are the more dangerous of the two. The easiest way to protect a system is with a good password. Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them new code to use the next time. Even if a hacker steals the password, they won’t have the code. Or if the hacker somehow gets the code, they still don’t know the password.
A Convicted Suspect
Famous Hackers
Cybercrime
Ways to Stop Hackers
41
Question 41. The word "They” in paragraph 1 refers to __________. One of the greatest security threats in the online world is computer hacking. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things? Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system. In fact, just the act of entering a computer network is commonly considered passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are the more dangerous of the two. The easiest way to protect a system is with a good password. Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them new code to use the next time. Even if a hacker steals the password, they won’t have the code. Or if the hacker somehow gets the code, they still don’t know the password.
Systems
Computers
Hackers
People
42
Question 42. What do hackers do to get into a computer? One of the greatest security threats in the online world is computer hacking. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things? Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system. In fact, just the act of entering a computer network is commonly considered passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are the more dangerous of the two. The easiest way to protect a system is with a good password. Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them new code to use the next time. Even if a hacker steals the password, they won’t have the code. Or if the hacker somehow gets the code, they still don’t know the password.
spreading viruses
manipulating its codes
making a new password
replacing security programs
43
Question 43. Which of the following can NOT be inferred about active hackers? One of the greatest security threats in the online world is computer hacking. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things? Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system. In fact, just the act of entering a computer network is commonly considered passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are the more dangerous of the two. The easiest way to protect a system is with a good password. Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them new code to use the next time. Even if a hacker steals the password, they won’t have the code. Or if the hacker somehow gets the code, they still don’t know the password.
They take over the computers systematically
They deactivate the protocols in computers.
They are more warning than passive ones.
They make use of the hacked information.
44
Question 44. The word "assesses” in paragraph 4 refers to __________. One of the greatest security threats in the online world is computer hacking. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things? Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system. In fact, just the act of entering a computer network is commonly considered passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are the more dangerous of the two. The easiest way to protect a system is with a good password. Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them new code to use the next time. Even if a hacker steals the password, they won’t have the code. Or if the hacker somehow gets the code, they still don’t know the password.
connects
designs
forgets
invents
45
Question 45. Her explanation was clear. I didn’t understand it.
Although her clear explanation, I didn’t understand it.
In spite her clear explanation, I didn’t understand it.
As clear as her explanation was, I didn’t understand it.
Despite her clear explanation, I don’t understand it.
46
Question 46. Nam La is a stream. It flows through Son La city.
Nam La is a stream, that flows through Son La city.
Nam La is a stream who flows through Son La city.
Nam La is a stream which flows through Son La city.
Nam La is a stream what flows through Son La city.
47
Question 47. Mary spent many hours a day surfing Tik Tok. She got badly short-sighted.
Mary spent many hours a day surfing Tik Tok because she got badly short-sighted.
Mary spent many hours a day surfing Tik Tok, or she got badly short-sighted.
Mary spent many hours a day surfing Tik Tok, so she got badly short-sighted.
Mary spent many hours a day surfing Tik Tok, but she got badly short-sighted.
48
Question 48. “I'm going back to work next week.”, said Harry.
Harry said that he was going back to work the following week.
Harry said that I was going back to work the following.
Harry said that he was going back to work next week.
Harry said that lam going back to work the following week.
49
Question 49. If I were you, I would do workout everyday to keep fit.
I would rather you to do workout everyday to keep fit.
I prefer you do workout everyday to keep fit.
I suggest you doing workout everyday to keep fit.
It is advisable that you do workout everyday to keep fit.
50
Question 50. Tom bought that book at the bookshop yesterday.
That book was bought yesterday by Tom at bookshop.
That book was bought at the bookshop by Tom yesterday.
That book yesterday is bought by Tom at bookshop.
That book is bought by Tom at bookshop yesterday.
Chế độ Từng Câu
img
Chế độ Từng Câu: img
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
Đóng
Download đề thi
Download