Vous êtes sur la page 1sur 2

INSTITUTO CELAYENSE

MIDDLE SCHOOL JUNE EXAM


NAME: __________________________________ DATE: ____________

LISTENING
Listen to a discussion about responsible tourism and choose the best answer.

0) Responsible tourism holidays are concerned with ________

A) wildlife conservation B) wildlife trade

1) People go on a responsible tourism holiday if they ___________

A) enjoy looking at wildlife from afar B) want to experience local life

2) According to the article, people prefer

A) a sustainable holiday destination B) a popular tourist destination

3)__________________ has destroyed some important environmental destinations.

A) Land development B) Agriculture

4) Responsible tourism is most beneficial for _______________

A) local communities B) tourists

5) The Australian government gave the piece of land at Uluru to ________________

A) a conservation organization B) native Aboriginal people

READING
The dangers of a Connected Lifestyle: Tech Scams to Watch Out For
Social media and our connected lifestyles gave made it easier for unwanted cyber-
criminals to use technology and steal important data from unsuspecting victims. Be careful!
Make sure you don’t get taken in by these scams.

Tech Support? Think again


When Jason received a phone call from someone claiming to work for his internet
security provider, he was surprised to hear something could be wrong with his new laptop. The
woman said they had tracked a virus to his computer. He couldn’t remember updating his virus
protection software. Recently so he thought that must have been the problem.
The woman told me to download some software so that she would be able to access my
computer remotely and she could remove the virus, he said. Once I had downloaded it, she
asked me to pay a fee into a Pay Pal account. He’s embarrassed at the memory, I willingly did it
because I thought to myself she might be able to fix my computer quickly, he said.
Once Jason had granted her access, a window to his data was left wide open that allowed
thieves to help themselves to his personal and financial information.

Fake Social Media Messages. Be Careful!


Fake social media messages are a common cam. You get an email from your social
network, from a name you recognize. The email refers to a photo posted on the social network
that the sender has tagged you in. The email says the photo is embarrassing in some way, so of
course, you click on the link, but only to find there is an error and you are instructed to update
software or install a plug-in. However, installing this infects your computer with a virus that
allows hackers to steal passwords and credit card numbers.

This is what happened to Allison Mitchell. “When I then tried to use my computer, it had
Rosen. After restarting it, I noticed my files were missing. The thieves must have hacked into
my computer. It must have happened while I was unable to use it. I shouldn’t have installed
software that came from a suspicious link and instead I should have marked the email as
spam”, she said, “I could have avoided all this mess”.

2 Read the text and answer the questions

0) What has made stealing information online easier?

1) Did Jason know something was wrong with his laptop?

2) What did the woman say was the problem?

3) What had Jason not remembered doing recently?

4) Why did the woman ask Jason to download software?

5) What did Jason do when he was asked to pay a fee?

6) What mistake had Jason made?

7) What is a fake social media message?

8) Why would someone click on a link in such an email?

9) What happens when you update your software from a link in these emails?

10) What does Allison say she shouldn’t have done?

Vous aimerez peut-être aussi