New Model Question Class 12 Subject : C. English

 

Attempt ALL the questions.

1. Read the text and do the activities that follow. [15]

Nowadays most people realise that it's risky to use credit card numbers online. However, from time to time, we all use passwords and government ID numbers on the Internet. We think we are safe, but that may not be true! A new kind of attack is being used by dishonest people to steal IDs and credit card numbers from innocent websurfers. This new kind of attack is called "phishing."

Phishing sounds the same as the word "fishing" and it implies that a thief is trying to lure people into giving away valuable information. Like real fishermen, phishers use bait in the form of great online deals or services. For example, phishers might use fake emails and false websites to con people into revealing credit card numbers, account usernames, and passwords. They imitate well-known banks, online sellers, and credit card companies. Successful phishers may convince as many as five percent of the people they contact to respond and give away their personal financial information.

Is this really a big problem? Actually, tricking five percent of the online population is huge! Currently, more than 350 million people have access to the Internet, and seventy five percent of those Internet users live in the wealthiest countries on Earth. It has been estimated that phishers send more than three billion scam messages each year. Even by tricking only five percent of the people, phishers can make a lot of money.

Since there is so much money to make through this kind of scam, it has caught the interest of more than just small-time crooks. Recently, police tracked down members of an organized phishing group in Eastern Europe, who had stolen hundreds of thousands of dollars from people online. The group created official-looking email messages requesting people to update their personal information at an international bank's website. However, the link to the bank in the message actually sent people to the phishers' fake website. To make matters worse, further investigation revealed that this group had connections to a major crime gang in Russia.

How can innocent people protect themselves? Above all, they have to learn to recognise email that has been sent by a phisher. Always be wary of any email with urgent requests for personal financial information. Phishers typically write upsetting or exciting, but fake, statements in their emails so that people will reply right away. Also, messages from phishers will not address recipients by name because they really don't know who the recipients are yet. On the other hand, valid messages from your bank or other companies you normally deal with will typically include your name.

A. Choose the correct answer. [5x1=5]

a) 'Some dishonest people try to steal other people's credit card numbers. What does 'dishonest' mean here?

i) truthful  ii) having honesty  ii) untruthful

b) When the box is delivered, you should open it.......................

i) track down  ii) right away  iii) con into

c) The comedian can imitate the voice of the president well. Here the word imitate' is synonymous with the word.................

i) convince   ii) copy    ii) change

d) What can I do to convince you that I'm not lying?" Here the word 'convince' is opposite to.................

i) persuade      ii) induce      ii) dissuade

e) Phishers send more than three billion scam messages each year. What does 'scam' mean?

i) an illegal trick, usually to steal money

ii) a thing used to attract or tempt

ii) needing immediate attention

B. Fill in the blanks with the correct words from the list. [0.5x10 = 5]

financial, private, gangs, Internet, lure, tracked, convince, wary, risky, crooks

Giving personal information over the Internet has always been.........., now it's even more so with the new..............scam, phishing. Phishers first but.................innocent people into a scam by making up fake emails. With this bait, they..............some of the people they contact to give away...........information. These Internet criminals are not just small-time...................... Police investigations have recently................... down organised phishing groups in Eastern Europe with connections to crime............... in Russia. People must be..............of any urgent emails requesting................information.

C. Answer the following questions.[5x1=5]

a) What is the main purpose of the reading?

b) To which activity is phishing compared?

c) What is implied about the people who get caught in phishing scams?

d) Who was behind the Eastern European phishing scam?

e) What could be the suitable title of this text?

2. Write short answers to the following questions. [5x2=10]

a) Who were Evan and Hooker and where were they heading? (The Treasure in the Forest)

b) How does Lu Xun create a feeling of nostalgia in the story? (My Old Home)

c) How does the speaker describe the morning sun? (A Day)

d) What is the theme of the poem I was my Own Route? (I was my Own Route)

e) How is the relationship between Monsieur and his wife? (Facing Death)

3. Write long answers to the following questions. [2x5=10]

a) How do you think that 'A Very Old Man with Enormous Wings' is a work of magical realism? Discuss. (A Very Old Man with Enormous Wings)

b) How is marriage a social institution? Discuss. (Marriage as a Social Institution)

4. Write a short story using the outline in about 150 words. Give a suitable title. [7]

midnight..heard a sound...backyard...strange creature...in bushes..frightened the creature spoke...requested.....helped the creature...to go back to his world

5. Write a letter to the editor about the growing misuse of social media. [8]

6. Write a travelogue about your visit to a new place (in about 300 words). [10]

7. Do as instructed. [10x1=10]

a) What does the modal verb 'could' express in the sentence "The beautiful Himalayan could be seen from my room?"

i) ability  ii) permission  iii) possibility iv) deduction

b) The government............high taxes.

i) charge   ii) charges    iii) both a and b

iv) neither a nor b

c) It rained a lot. We enjoyed our picnic. (Make one sentence by using in spite of)

d) Can you tell me where your father works? (Change into direct question)

e) Rabi said to Hem, "Where have you been all these days?" (Change into indirect speech)

f) We..........arrive earlier if we had not missed the bus. (Rewrite the sentence with the correct form of the verb.)

g) I think they should offer Dipa the job. (Change into passive)

h) Did you come here. a taxi or on foot? (Complete the sentence with the correct preposition.)

i) Raju works in a finance company. I met him yesterday. (Join the sentences by using the relative pronoun whom)

j) Put the adjective leather' in the correct order in the phrase 'a black Chinese jacket'.

8. Do as instructed. [5x1=5]

a) Which one of the following words has a different vowel sound?

i) bread  ii) break   iii) deaf   iv) said

b) What is the root of the word truthfulness?

i) truth    ii) ful     iii) ness      iv) true

c) What is the word class of the word 'whose' in the sentence 'I met the man whose car was stolen last night?'

i) adjective ii) pronoun iii) noun iv) determiner

d) Which is not true about "proximity in the sentence "The best thing about the location of the school is its 'proximity' from my house?

i) nearness  ii) vicinity  iii) adjacency iv) distance

e) Which one is not the content word in the sentence 'My Chinese chair might have been stolen from the room?'

i) Chinese  ii) chair  iii) have  iv) stolen               

         The End

Comments

Popular posts from this blog

CITY LIFE VS VILLAGE LIFE

My visit to Lumbini

My Visit to Bhaktapur Durbar Square