Professional Documents
Culture Documents
ANH CHUYEN - DE
ANH CHUYEN - DE
ANH CHUYEN - DE
5p)
SỞ GIÁO DỤC VÀ ĐÀO TẠO ĐỀ THI TUYỂN SINH LỚP 10 TRƯỜNG THPT CHUYÊN
Thailand offers near perfect conditions for snorkeling and diving among the beautiful coral NAM ĐỊNH NĂM HỌC 2024-2025 Phòng thi số:
reefs. There are many resorts where you can rent equipment or sign (1) for a diving Môn thi: TIẾNG ANH (Chuyên)
course. Whether you’re snorkeling or diving, you should be aware of your effect on the reef ĐỀ CHÍNH THỨC Thời gian làm bài: 120 phút.
…………
structure. Too (2) human contact with the reefs damages them in a very real way (Đề thi gồm: 08 trang)
so if you are really concerned about saving these delicate systems, you should try not to visit
Điểm bài thi Họ tên, chữ ký của giám khảo Số phách
them at (3) . However, very few people are that commited to environmental Số phách
concerns so the best way to minimize your impact is by not touching the reefs or by asking your Bằng số Bằng chữ
boatman not to anchor in the middle of (4) . Don’t buy coral souvenirs, because 1. ...................................................................
tourist demand only encourages local people to destroy the reefs so as to obtain the coral. As far
2. ...................................................................
as snorkeling equipment goes, the most important thing to do is buy (5) rent a
mask that fits. Before you pay for a diving course or expedition you should check that the diving
center is authorized.
Chú ý: Thí sinh làm bài vào đề thi này.
Trường THCS:.................................................................................................
1. ................................................................................
2. ................................................................................
once again. In response, Germany announced it would close down eight of its nuclear plants
immediately, and close the rest by 2022. Meanwhile, other nations refuse to give up on nuclear II. PART 2: You will hear part of a lecture about the development of suburbs in the USA. Listen
power, stating that these disasters are rare. The debate of whether to use green or nuclear power and circle the correct answer A, B or C. You will hear TWICE. (0.5p)
will likely continue for some time. In the end, it is believed that both energy sources will be used to 1. Rich people have been known to live in suburbs .
th
fuel our planet. A. at least since the 6 century BC
1. What is the main focus of the passage? B. since the 1st century BC
A. Why energy is important C. only in modern times
B. The energy sources used in the past 2. In the 19th century, the development of suburbs was encouraged by .
C. Comparing future energy solutions A. the high quality of suburban housing
D. Discussing how disasters affect power sources B. improvements in public transport
2. The word “finite” in paragraph 2 is closest in meaning to . C. a wish to own weekend homes
A. abundant B. limited C. sufficient D. replaceable 3. European suburbs, unlike those in North America, .
3. According to the passage, what is the main problem with green energy? A. consist largely of low-density housing
A. It creates lots of pollution. B. It costs a lot of money. B. are well planned
C. No one is interested in using it. D. It won’t work at all in many nations. C. have individual characters
PART B. GRAMMAR AND VOCABULARY (2.0 POINTS) 2. All shops were closed, so we couldn’t buy some food.
I. Circle the letter A, B, C or D to indicate the best answer to each of the following 3. It’s worth remember that prices go up on 1 February.
questions. (1.0p) 4. It was not until Mary was eight when she began to read.
1. With more women going out to work, the financial burden of the male breadwinners will be
Thí sinh không viết vào phần gạch chéo này
Trường THCS:.................................................................................................
…………………………………………………………………………………………………………….
IV. Read the following passage and do the tasks that follow. (0.8p)
……………………………………………………………………………………………………………. It is believed that the problem of computer security has changed over a period of time as businesses,
……………………………………………………………………………………………………………. through an increased use of information technology, have become more and more dependent on
information and the associated information systems. At the same time, there has been limited change
…………………………………………………………………………………………………………….
in the implemented security or safeguards to these information systems.
……………………………………………………………………………………………………………. Paragraph A
……………………………………………………………………………………………………………. The Internet has been roughly doubling in size every year, and the associated security incidents have
been running in parity. Even if the percentage of malicious users is small, the increase in size of the
…………………………………………………………………………………………………………….
Internet and in the number of incidents of failed security is significant. The importance of the growth
……………………………………………………………………………………………………………. in the Internet can be highlighted by the fact that in July 1991, 33% of Internet users were from the
1. ................................................................................
2. ................................................................................
Paragraph B
…………The end …………..
In 1988, the Morris “worm” was introduced on the Internet to invade, attack and replicate itself on the
network. The response was to shut down E-mail and connectivity. However, the “fixes” were to be
distributed via E-mail and so the solution was self-defeating. As a result of this worm virus, Computer
Emergency Response Team was formed, with the Australian version starting in 1992.
Paragraph C
One of the problems with Internet security is the fact that the incidents are increasing in
sophistication. One of the reasons for this has been the increasing availability of toolkits. Although
these toolkits are designed to assist computer systems designers to protect and develop their sites,
they also allow relatively ignorant intruders to carry out increasingly complex incidents with the
utilization of many routers and disguises to reach their target. According to a US Department of
Defence report, less than 1% of incidents are identified but 65% of these are successful. Another
thing to bear in mind with intruders and hackers is that they do not respect geographical or
administrative boundaries, or time zones. They may be geographically dislocated from the point of
attack and therefore operating in “off-duty” hours.
Trang 8/8 Trang 5/8
Paragraph D 1. “I must have made a mistake in the calculations,” Ann said.
The thing to remember with security is that the system administrators must get it right all the Ann admitted .
time; the intruder must get it right just once. Evidence of this is easy to find. In 1997, a teenager 2. John is exhausted today because he didn’t sleep last night.
hacked into a Bell Atlantic network. His hacking crashed the computer and resulted in 600 If .
homes, a regional airport and emergency services being without telephone communications for 3. Tim was suspected of selling stolen goods. The police have investigated him for days.
six hours. And what was the punishment for this offence? Two years probation, community Suspected .
service and a fine of US$5,000. 4. Immediately after his arrival, things went wrong.
Paragraph E Hardly .
Governments are getting tough on cyber crimes, especially in the wake of September 11 th. 5. Jack doesn’t know all the answers, though he pretends to.
These crimes are being linked to national security, which in the US is now of major concern to Jack acts .
government officials and the general public alike. And the government has been swift to act. In
late 2001, the US Patriot Act was introduced. This Act increased the maximum sentence for II. Complete the second sentence so that it has a similar meaning to the first
breaking into a computer from five to ten years. Then in July 2002, the House of sentence, using the word given. Do not change the word given. You must use NO
Representatives approved the Cyber Security Enhancement Act. Now if a cyber crime results MORE THAN FIVE WORDS, including the word given. (0.5p)
in the death of an individual, the offender could face a life sentence. There has been additional 1. Laura’s teacher says she doesn’t have a serious enough attitude to her work.
fall-out from the September 11th attacks with the FBI and other government security agencies (SERIOUSLY)
dramatically escalating their monitoring of the Internet. This has pushed some hackers further Laura doesn’t take according to her teacher.
underground, fearful that what they had previously been doing out of boredom or challenge 2. The collision didn’t damage his car much. (DONE)
could now be viewed as an act of terrorism. Not a great to his car in the collision.
Paragraph F 3. Because he was injured, he couldn’t play in the next game. (PREVENTED)
On the other hand, the events of September 11 th have led to some ex-hackers using their His in the next game.
Thí sinh không viết vào phần gạch chéo này
extensive knowledge and experience to join forces with security forces to aid the fight against 4. He was not given details of the company’s new plans. (DARK)
terrorism. He was details of the company’s new plans.
Task 1: Choose the correct heading for each paragraph from the list of headings below. 5. David tried to remain impartial in the quarrel between his two sisters. (SIDES)
Write your answers in the space provided. David tried the quarrel between his two sisters.
List of Headings Paragraphs
i. A positive aspect of hacking 0. Paragraph D vi III. Write an essay on the following topic (1.5p)
ii. Tougher punishments for hackers 1. Paragraph A
Some people believe that advanced technology has made it easier for students to
iii. Response to Internet security 2. Paragraph B
learn English but it also has had negative impact on English language learning.
iv. Growth of the Internet 3. Paragraph C
To what extent do you agree or disagree with this statement?
v. Responsibilities of managers 4. Paragraph E
Give reasons for your answer and include any relevant examples from your own knowledge
vi. Hackers vs administrators 5. Paragraph F
or experience.
vii. Difficulty of detection Your writing must be between 200 and 220 words.
viii. Government agencies
………………………………………………………………………………………………………......
ix. Common security measure
………………………………………………………………………………………………………......
Task 2: Do the following statements agree with the information given in the reading ………………………………………………………………………………………………………......
passage? Write: ………………………………………………………………………………………………………......
True (T) if the statement agrees with the information
………………………………………………………………………………………………………......
False (F) if the statement contradicts the information
Write your answers in the boxes provided. ………………………………………………………………………………………………………......
Statements Answers ………………………………………………………………………………………………………......
6. In July 1996, commercial sector constituted 50% of Internet usage. ………………………………………………………………………………………………………......
7. The teenager who hacked into Bell Atlantic got a prison sentence of 10 years.
………………………………………………………………………………………………………......
8. Some hackers are scared that government authorities could now consider
them to be terrorists. ………………………………………………………………………………………………………......
………………………………………………………………………………………………………......
PART D. WRITING (2.5 POINTS) ………………………………………………………………………………………………………......
I. Rewrite each of the following sentences in such a way that it has the same meaning as
………………………………………………………………………………………………………......
the first sentence, using the cues at the beginning of each sentence. (0.5p)
………………………………………………………………………………………………………......
………………………………………………………………………………………………………......
Trang 6/8
Trang 7/8