New Model Question Class 12 Subject : C. English
Attempt ALL the questions.
1. Read the text and do the activities that follow.
[15]
Nowadays most people realise that it's risky to use
credit card numbers online. However, from time to time, we all use passwords
and government ID numbers on the Internet. We think we are safe, but that may
not be true! A new kind of attack is being used by dishonest people to steal
IDs and credit card numbers from innocent websurfers. This new kind of attack
is called "phishing."
Phishing sounds the same as the word
"fishing" and it implies that a thief is trying to lure people into
giving away valuable information. Like real fishermen, phishers use bait in the
form of great online deals or services. For example, phishers might use fake
emails and false websites to con people into revealing credit card numbers,
account usernames, and passwords. They imitate well-known banks, online
sellers, and credit card companies. Successful phishers may convince as many as
five percent of the people they contact to respond and give away their personal
financial information.
Is this really a big problem? Actually, tricking
five percent of the online population is huge! Currently, more than 350 million
people have access to the Internet, and seventy five percent of those Internet
users live in the wealthiest countries on Earth. It has been estimated that
phishers send more than three billion scam messages each year. Even by tricking
only five percent of the people, phishers can make a lot of money.
Since there is so much money to make through this
kind of scam, it has caught the interest of more than just small-time crooks.
Recently, police tracked down members of an organized phishing group in Eastern
Europe, who had stolen hundreds of thousands of dollars from people online. The
group created official-looking email messages requesting people to update their
personal information at an international bank's website. However, the link to
the bank in the message actually sent people to the phishers' fake website. To
make matters worse, further investigation revealed that this group had
connections to a major crime gang in Russia.
How can innocent people protect themselves? Above
all, they have to learn to recognise email that has been sent by a phisher.
Always be wary of any email with urgent requests for personal financial
information. Phishers typically write upsetting or exciting, but fake,
statements in their emails so that people will reply right away. Also, messages
from phishers will not address recipients by name because they really don't
know who the recipients are yet. On the other hand, valid messages from your
bank or other companies you normally deal with will typically include your
name.
A. Choose the correct answer. [5x1=5]
a) 'Some dishonest people try to steal other
people's credit card numbers. What does 'dishonest' mean here?
i) truthful
ii) having honesty ii) untruthful
b) When the box is delivered, you should open
it.......................
i) track down
ii) right away iii) con into
c) The comedian can imitate the voice of the
president well. Here the word imitate' is synonymous with the
word.................
i) convince
ii) copy ii) change
d) What can I do to convince you that I'm not
lying?" Here the word 'convince' is opposite to.................
i) persuade
ii) induce ii) dissuade
e) Phishers send more than three billion scam
messages each year. What does 'scam' mean?
i) an illegal trick, usually to steal money
ii) a thing used to attract or tempt
ii) needing immediate attention
B. Fill in the blanks with the correct words from
the list. [0.5x10 = 5]
financial, private, gangs, Internet, lure, tracked,
convince, wary, risky, crooks
Giving personal information over the Internet has
always been.........., now it's even more so with the new..............scam,
phishing. Phishers first but.................innocent people into a scam by
making up fake emails. With this bait, they..............some of the people
they contact to give away...........information. These Internet criminals are
not just small-time...................... Police investigations have
recently................... down organised phishing groups in Eastern Europe
with connections to crime............... in Russia. People must be..............of
any urgent emails requesting................information.
C. Answer the following questions.[5x1=5]
a) What is the main purpose of the reading?
b) To which activity is phishing compared?
c) What is implied about the people who get caught in
phishing scams?
d) Who was behind the Eastern European phishing
scam?
e) What could be the suitable title of this text?
2. Write short answers to the following questions.
[5x2=10]
a) Who were Evan and Hooker and where were they
heading? (The Treasure in the Forest)
b) How does Lu Xun create a feeling of nostalgia in
the story? (My Old Home)
c) How does the speaker describe the morning sun? (A
Day)
d) What is the theme of the poem I was my Own Route?
(I was my Own Route)
e) How is the relationship between Monsieur and his
wife? (Facing Death)
3. Write long answers to the following questions.
[2x5=10]
a) How do you think that 'A Very Old Man with
Enormous Wings' is a work of magical realism? Discuss. (A Very Old Man with
Enormous Wings)
b) How is marriage a social institution? Discuss.
(Marriage as a Social Institution)
4. Write a short story using the outline in about
150 words. Give a suitable title. [7]
midnight..heard a sound...backyard...strange
creature...in bushes..frightened the creature spoke...requested.....helped the
creature...to go back to his world
5. Write a letter to the editor about the growing
misuse of social media. [8]
6. Write a travelogue about your visit to a new
place (in about 300 words). [10]
7. Do as instructed. [10x1=10]
a) What does the modal verb 'could' express in the
sentence "The beautiful Himalayan could be seen from my room?"
i) ability
ii) permission iii) possibility
iv) deduction
b) The government............high taxes.
i) charge
ii) charges iii) both a and b
iv) neither a nor b
c) It rained a lot. We enjoyed our picnic. (Make one
sentence by using in spite of)
d) Can you tell me where your father works? (Change
into direct question)
e) Rabi said to Hem, "Where have you been all
these days?" (Change into indirect speech)
f) We..........arrive earlier if we had not missed
the bus. (Rewrite the sentence with the correct form of the verb.)
g) I think they should offer Dipa the job. (Change
into passive)
h) Did you come here. a taxi or on foot? (Complete
the sentence with the correct preposition.)
i) Raju works in a finance company. I met him
yesterday. (Join the sentences by using the relative pronoun whom)
j) Put the adjective leather' in the correct order
in the phrase 'a black Chinese jacket'.
8. Do as instructed. [5x1=5]
a) Which one of the following words has a different
vowel sound?
i) bread ii)
break iii) deaf iv) said
b) What is the root of the word truthfulness?
i) truth
ii) ful iii) ness iv) true
c) What is the word class of the word 'whose' in the
sentence 'I met the man whose car was stolen last night?'
i) adjective ii) pronoun iii) noun iv) determiner
d) Which is not true about "proximity in the
sentence "The best thing about the location of the school is its
'proximity' from my house?
i) nearness
ii) vicinity iii) adjacency iv)
distance
e) Which one is not the content word in the sentence
'My Chinese chair might have been stolen from the room?'
i) Chinese ii) chair iii) have iv) stolen
The End
Comments
Post a Comment