Đề thi Đề thi thử Tiếng Anh 2019 lần 1 trường THPT chuyên Nguyễn Trãi – Hải Dương

Học Lớp

Administrator
Thành viên BQT
7scv giới thiệu lời giải Đề thi thử Tiếng Anh THPTQG 2019 lần 1 trường chuyên Nguyễn Trãi – Hải Dương. Nội dung chính đề thi thử gồm có:

Mark the letter A, B, C, or D on your answer sheet to indicate the word whose underlined part differs from the other three in pronunciation in each of the following questions.
1.
A. prioritise
B. privacy
C. determined
D. strive

2.
A. chooses
B. increases
C. releases
D. practises

Mark the letter A, B, C, or D on your answer sheet to indicate the word that differs from the other three in the position of primary stress in each of the following questions.
3.
A. confusion
B. pollution
C. influence
D. removal

4.
A. renewable
B. influential
C. advantageous
D. beneficial

Read the following passage and mark the letter A, B, C, or D on your answer sheet to indicate the correct answer to each of the questions
As computer use becomes more common, the need for security is more common than ever. One of the greatest security threats in the online world is computer hacking.

Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?

Most hackers use information called protocols that are built into computer software. These protocols allow computer to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system.

In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two.

The easiest way to protect a system is with a good password. Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time. Even if a hacker steals the password, they won’t have the code. Or if the hacker somehow gets the code, they still don’t know the password.

38. What is the main idea of this reading?
A. Famous hackers
B. Funny things that hackers do.
C. Hackers and computer security
D. Good ways to stop hackers.

39. What do hackers do to get into a computer?
A. Spread viruses
B. Change the security programs
C. Make a new password
D. Manipulate codes

40. What is not considered hacking?
A. Releasing a virus
B. Illegally accessing a computer
C. Turning on a private computer
D. Changing unauthorized information

41. Why are active hackers probably considered more dangerous than passive ones?
A. Active hackers are more skilled
B. Passive hackers have more intense personalities.
C. Active hackers do damage.
D. Passive hackers are caught more easily.

42. What does “plus” in “password-plus” probably mean?
A. Extra
B. Long
C. Fast
D. Danger

Read the following passage and mark the letter A, B, C, or D on your answer sheet to indicate the correct answer to each of the questions

Scientists have discovered that for the last 160,000 years, at least, there has been a consistent relationship between the amount of carbon dioxide in the air and the average temperature of the planet. The importance of carbon dioxide in regulating the Earth's temperature was confirmed by scientists working in eastern Antarctica. Drilling down into a glacier, they extracted a mile-long cylinder of ice from the hole. The glacier had formed as layer upon layer of snow accumulated year after year. Thus drilling into the ice was tantamount to drilling back through time.

The deepest sections of the core are composed of water that fell as snow 160,000 years ago. Scientists in Grenoble, France, fractured portions of the core and measured the composition of ancient air released from bubbles in the ice. Instruments were used to measure the ratio of certain isotopes in the frozen water to get an idea of the prevailing atmospheric temperature at the time when that particular bit of water became locked in the glacier.

The result is a remarkable unbroken record of temperature and of atmospheric levels of carbon dioxide. Almost every time the chill of an ice age descended on the planet, carbon dioxide levels dropped. When the global temperature dropped 9°F (5°C), carbon dioxide levels dropped to 190 parts per million or so. Generally, as each ice age ended and the Earth basked in a warm interglacial period, carbon dioxide levels were around 280 parts per million. Through the 160,000 years of that ice record, the level of carbon dioxide in the atmosphere fluctuated between 190 and 280 parts per million, but never rose much higher-until the Industrial Revolution beginning in the eighteenth century and continuing today.

There is indirect evidence that the link between carbon dioxide levels and global temperature change goes back much further than the glacial record. Carbon dioxide levels may have been much greater than the current concentration during the Carboniferous period, 360 to 285 million years ago. The period was named for a profusion of plant life whose buried remains produced a large fraction of the coal deposits that are being brought to the surface and burned today.

43. Which of the following does the passage mainly discuss?
A. Chemical causes of ice ages B. Techniques for studying ancient layers of ice in glaciers
C. Evidence of a relationship between levels of carbon dioxide and global temperature
D. Effects of plant life on carbon dioxide levels in the atmosphere

44. According to the passage, the drilling of the glacier in eastern Antarctica was important because it__ .
A. allowed scientists to experiment with new drilling techniques
B. permitted the study of surface temperatures in an ice-covered region of the Earth
C. provided insight about climate conditions in earlier periods
D. confirmed earlier findings about how glaciers are formed

45. The phrase "tantamount to" in line 5 is closest in meaning to___.
A. complementary to
B. practically the same as
C. especially well suited to
D. unlikely to be confused with

46. According to the passage, scientists used isotopes from the water of the ice core to determine which of following?
A. The amount of air that had bubbled to the surface since the ice had formed
B. The temperature of the atmosphere when the ice was formed
C. The date at which water had become locked in the glacier
D. The rate at which water had been frozen in the glacier

47. The word "remarkable" in line 12 is closest in meaning to ___.
A. genuine
B. permanent
C. extraordinary
D. continuous

48. The passage implies that the warmest temperatures among the periods mentioned occurred ___.
A. in the early eighteenth century
B. 160,000 years ago
C. at the end of each ice age
D. between 360 and 285 million years ago

49. According to the passage, the Carboniferous period was characterized by____ .
A. a reduction in the number of coal deposits
B. the burning of a large amount of coal
C. an abundance of plants
D. an accelerated rate of glacier formation

50. The passage explains the origin of which of the following terms?
A. Glacier
B. Isotopes
C. Industrial Revolution
D. Carboniferous period
 
Sửa lần cuối: