[et_pb_section bb_built=”1″ admin_label=”section”][et_pb_row admin_label=”row”][et_pb_column type=”4_4″][et_pb_text admin_label=”Text” background_layout=”light” text_orientation=”left” use_border_color=”off” border_color=”#ffffff” border_style=”solid”]
Directions (1-10): In the passage given below there are 10 blanks, each followed by a word given in bold. Each blank has four alternative words given in options (A),(B),(C) and (D). You have to tell which word will best suit the respective blank. Mark (E) as your answer if the word given in bold after the blank is your answer i.e “No change required”.
During the cold war in 1982, the CIA found a way to (1) disturb the operation of a Siberian gas pipeline of Russia without using (2) conventional, explosive devices such as missiles or bombs. Instead, they caused the Siberian gas pipeline to (3) fly apart using a portion of a code in the computer system that controlled its operation in what they tagged as ‘logic bomb’. The chaos that ensued was so monumental that the resulting fire was (4) see from space.
In 1988, the Morris worm – one of the first recognised worms to affect the world’s (5) new cyber infrastructure – spread around computers largely in the US. The worm used (6) delicacy in the UNIX system Noun 1 and (7) copy itself regularly. It slowed down computers to the point of being unusable.
And in May 1998, the Federation of Small Businesses (FSB) first briefed the UK Government on the upcoming (8) dangers of cyber-attacks on small businesses summarizing: “For some years, the average UK small business has (9) be an unlikely target for a (10) advanced digital attack.
1.
(A)Disrupt
(B)Use
(C)Attack
(D)Support
(E)Interrupt
2.
(A)Large
(B)Nuclear
(C)Standard
(D)Traditional
(E)Modern
3.
(A) Control
(B)Separate
(C)Explode
(D)Stop
(E)Use
4.
(A)Seeing
(B)Watched
(C)Looked
(D)Seen
(E)Saw
5.
(A)Newly
(B)Nascent
(C)Novice
(D)Tyro
(E)Advance
6.
(A)Code
(B)Design
(C)Weaknesses
(D)Sickness
(E)Tiredness
7.
(A)Replicate
(B)Duplicate
(C)Repeat
(D)Replicated
(E)Paste
8.
(A)Worms
(B)Opportunity
(C)Perils
(D)Threat
(E)Virus Attack
9.
(A)Being
(B)Done
(C)Victim
(D)Been
(E)Suffer
10.
(A)Sophisticated
(B)Revolutionary
(C)Digitized
(D) Cyber
(E)Weapon Grade
[/et_pb_text][et_pb_toggle admin_label=”Toggle” title=”Click Here to View the Answers ” open=”off” closed_toggle_background_color=”#0c82d1″ closed_toggle_text_color=”#ffffff” icon_color=”#ffffff” title_font_size=”18″ use_border_color=”off” border_color=”#ffffff” border_style=”solid”]
Answers:
- (a)
- (D)
- (C)
- (D)
- (B)
- (C)
- (D)
- (C)
- (D)
- (A)
For detailed answer ( with explanation ) you can watch this video CLICK HERE
[/et_pb_toggle][et_pb_divider admin_label=”Divider” color=”#ffffff” show_divider=”off” divider_style=”solid” divider_position=”top” hide_on_mobile=”on” /][/et_pb_column][/et_pb_row][et_pb_row admin_label=”Row” parallax_method_1=”off” parallax_method_2=”off” global_module=”1986″][et_pb_column type=”1_2″][et_pb_button admin_label=”Button” global_parent=”1986″ button_url=”https://www.youtube.com/channel/UCSxd8i0Imrz3qwh0jyR1CcQ?sub_confirmation=1″ url_new_window=”on” button_text=”Subscribe to Youtube Channel” button_alignment=”center” custom_button=”on” button_text_size=”16″ button_text_color=”#f7241d” button_border_color=”#f7241d” button_border_radius=”1″ button_text_color_hover=”#ffffff” button_bg_color_hover=”#ff2b23″ background_color=”#00a8ff” /][/et_pb_column][et_pb_column type=”1_2″][et_pb_button admin_label=”Button” global_parent=”1986″ button_url=”https://play.google.com/store/apps/details?id=nitin.studysmart&hl=en” url_new_window=”on” button_text=”Download App from PlayStore” button_alignment=”center” custom_button=”on” button_text_size=”16″ button_border_radius=”1″ button_text_color_hover=”#ffffff” button_bg_color_hover=”#0fa7ff” background_color=”#00a8ff” /][/et_pb_column][/et_pb_row][/et_pb_section]
5