Вы находитесь на странице: 1из 3

ENGLISH WRITTEN EXAM

5th February 2018

I – Reading Comprehension

A Answer the following questions in about 30-40 words:


20p.
Do you think that making free downloads should be considered a crime? In your opinion,
what could be done to solve this situation?

B Read the text.

WHAT IS SOFTWARE PIRACY?

C Scan through the three first paragraphs of the text and find antonyms for the following words.

4X2,5=10p.
1. allowed
2. few
3. formally
4. harmless

Tecnologias Web e Dispositivos Móveis / Redes e Sistemas Informáticos/ Tecnologias e Programação de 1


Sistemas de Informação
ENGLISH WRITTEN EXAM

D Answer the following questions according to the text and in your own words as far as
possible. 4X8=32p.

1. Explain what “copyright” is.


2. Give examples of actions that can be considered copyright infringement.
3. Why have illegal downloads grown so much in the last decade?
4. Who do record companies compare “freeloaders” to? Explain why they make
that comparison.

Explain the meaning of the following words or expressions using your own words. 2X7=14p.
E
6p.

1. mind-boggling scope (l.41)


2. shoplifters (l.49)

Say what the following words refer to in the text. 4X2=8p.


F
1. them (l.25)
2. it (l.27)
3. their (l.34)
4. it (l.39)

II – Grammar and Vocabulary

A Fill in the gaps with words/ expressions from the box. Use each expression only once.
8X2=16p.

network ▪ distances ▪ scammers ▪ criminals ▪ damage ▪ cybercrime


▪ tool ▪ logging into ▪

The Internet is an amazing 1.____ for communication, allowing users to connect instantly over
great 2._____. Unfortunately, the reach and anonymity the network provides is also a great tool for
3.____, who have taken advantage of the global 4.____ to ply their trade. There are many different
types of cybercrime, and understanding the most common crimes and frauds can help you avoid
becoming a victim.
One common form of 5.____ is identity theft. Hackers and 6.____ may use fake emails to trick
victims into giving up passwords and account information, or they may use specialized programs
called keyloggers to track what a user types when 7.____ bank or credit accounts. Once they have
this personal information, they may be able to access existing accounts or make purchases with
the victim’s credit cards. If a hacker can discover a user’s social security number and other
identifying information, he can parlay that data into credit accounts in the victim’s name and cause
considerable 8.____.

B Rephrase these sentences without changing their meaning. Begin with the words 8X5=40p.
given.

1. “I have used downloaded that band´s latest song.”


He said…
2. “Don´t copy that software without the company’s permission!”
I told him…
Tecnologias Web e Dispositivos Móveis / Redes e Sistemas Informáticos/ Tecnologias e Programação de 2
Sistemas de Informação
ENGLISH WRITTEN EXAM
3. Illegal downloading is threatening the music and film industries.
The music and film industries…
4. He paid a heavy fine because committed a serious cybercrime.
If he hadn’t…
5. It´s hard work, but I enjoy it.
Although…
6. I borrowed your laptop. You weren´t using it.
Since…
7. You are not allowed to use your laptop in the classroom.
You…
8. Cybercrimes like piracy are likely to happen every day.
Cybercrimes like piracy…

III – Written Production

A Write a text (about 150 words) about one of the following topics:
60p.

1. Comment on the following quote. Give your opinion about it and refer to the different
cybercrimes that are committed nowadays besides piracy.

The diverse threats we face are increasingly cyber-based. Much of


America's most sensitive data is stored on computers. We are losing data,
money, and ideas through cyber intrusions. This threatens innovation and,
as citizens, we are also increasingly vulnerable to losing our personal
information.
James Comey (Former FBI Director)

2. Write a formal email to a regular customer to tell them that the product/service they want is
not available at the moment. Prepare the situation using the questions below. The
information can be real or imaginary.

• What is your company’s business? What products/services do you offer?


• What is the particular product/service that you normally offer, but is not available at the
moment?
• Why?
• When is it going to be available again?
• Are you going to promise any action, give additional information, offer help, or simply say
that you will tell them when the product/service is available again?

Tecnologias Web e Dispositivos Móveis / Redes e Sistemas Informáticos/ Tecnologias e Programação de 3


Sistemas de Informação

Вам также может понравиться