Danh sách câu hỏi

Có 26,342 câu hỏi trên 659 trang

Read the following passage and mark the letter A, B,C or D on your answer sheet to indicate the correct answer to each of the questions

It is not surprising that the birthplace of cola was the hot and humid American South. This region had long specialized in creating delicious soft drinks. A druggist in Atlanta, Georgia named John Pemberton created the most well–known drink brand in the world in the 1880s. However, it seems clear that he had no idea how big it would become.

Like many American pharmacists of the day, Pemberton was opposed to the drinking of alcohol and wanted to produce a stimulating soft drink. First, he made "the French Wine of Coca," made from the coca leaf. Then he began to experiment with the cola nut. Eventually, he managed to make a combination of the two that he thought was sweet, but not too sweet. Deciding that "the two C's would look well in advertising," he named it Coca–Cola.

Pemberton's invention caught on fairly quickly. By 1905, "Coke" was being advertised all over the country as "The Great Natural Temperance Drink." The drink enjoyed additional success since there was a large and popular temperance movement in the US at that time. In the 1920s, alcohol was outlawed, and sales of Coke rose significantly. However, they continued to rise even after the law was repeated.

Another reason for Coke's popularity was good business sense. A year after he invented it, Pemberton had sold Coca–Cola to Asa Griggs Candler for only $283.26! Candler was a marketing genius, and by the time he sold the Coca–Cola Company in1919, it was worth $25 million.

Which of the following would be the best title for the reading?

Read the following passage and mark the letter A, B, C or D on your answer sheet ti indicate the correct answer to each of the questions

NOT ALL HACKERS ARE THE SAME

As computer use becomes more common, the need for security is more important than ever. One of the greatest security threats in the online world is computer hacking.

Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?

Most hackers use information called protocols that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system.

In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two.

The easiest way to protect a system is with a good password. Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time. Even if a hacker steals the password, they won’t have the code. Or if the hacker somehow gets the code, they still don’t know the password.

What is the main idea of this reading?