1.
Directions(Q.1 to Q.6 ):

Read the following passage carefully and answer the questions given below it. Certain words are given in bold to help you locate them while answering some of the questions.

ABOUT 1.3 billion people use one or other version of Microsoft’s Windows operating systems, and well over a billion have downloaded Mozilla’s Firefox web browser. Minor variations aside, every copy of these products—like all other mass-market software—has exactly the same bits in it. This makes such software a honeypot for hackers, who can write attack code that will cause precisely the same damage to, say, every copy of Windows 7 it infects. Worse, the bad guys can hone their attacks by practising on their own machines, confident that what they see will be what their victims get

This computing monoculture—which also extends to the widespread use of particular pieces of hardware, such as microprocessors from Intel and ARM—has long been the bane of technologists. In the face of a near constant onslaught from hackers, antivirus software is frequently several steps behind the foe. Symantec, one of the commercial pioneers of online security, estimates that antivirus software now stops only 45% of attacks. The firm recently declared that this approach was “dead” and a new one was needed

Michael Franz, a computer scientist at the University of California, Irvine, agrees. And he believes the answer is to learn from nature. Lots of species are composed of individuals which are, the occasional set of identical twins apart, all slightly different genetically from each other. Sexual reproduction ensures this. Indeed, it is probably the reason sex evolved in the first place, for it means that no bacterium or virus can wipe out an entire population, since some are almost certain to be genetically immune to any given pathogen

Applying the idea of genetic diversity to software is not a new idea. High-security systems, such as the fly-by-wire programs used in aeroplanes, are designed from the outset with code that differs between installations. But this approach is too costly for large-scale use. Some mass market software companies have instead introduced modest diversity to deter attackers, such as randomly choosing the starting addresses of big blocks of memory, but this is not enough to defeat a determined hacker.

Dr Franz is therefore taking a novel approach by tweaking the programs, called compilers, that convert applications written in languages such as C++ and Java into the machine code employed by a computer’s processor. Most compilers are designed to optimise things such as the speed of the resulting machine code. That leads to a single answer. Dr Franz’s “multi compiler” trades a bit of this optimality for diversity in the compiled code. This leeway, which diminishes the code’s speed of execution by an amount imperceptible to the user, enables a multi compiler to create billions of different, but functionally identical, interpretations of the original program. When a user requests a specific application from a cloud-based “app store”, the appropriate multi compiler in the store generates a unique version for him, thus making a hacker’s task nigh impossible


Which is the most suitable title for the passage?


a

Preclusion from Hacking

b

Divided we Stand

c

Genetic Diversity and Software

d

Learning from Nature

e

The appropriate Multi compiler


2.

What is the author’s tone in the passage?


a

Sarcastic

b

Enthusiastic

c

Impersonal

d

Hostile

e

Grieving


3.

Which of the following is false in context of the passage?


a

The firm declared that the antivirus approach to protect the software from hackers is not effective.

b

Antivirus software stops only 45% of attacks.

c

Dr. Franz’s multicompiler approach is productive as it enhances the speed of the code’s execution.

d

Sexual reproduction ensures the genetic difference in identical twins of species.

e

All are true.


4.

Which efforts of software companies are found unsuccessful to secure the software from being hacked?

(i) Antivirus Symantec is one of the unsuccessful efforts which stop only 45% of the attacks.

(ii) Randomly choosing the starting addresses of big Block of memory is one such effort.

(iii) Optimising the things such as speed of resulting machine code.


a

Both (i) and (ii) are true

b

Only (i) is true

c

Only (ii) is true

d

Both (ii) and (iii) are true

e

All are true


5.

According to the passage, what makes the software easily attacked by hackers?


a

Optimization of the speed of resulting machine code.

b

The widespread use of particular pieces of hardware.

c

The replica of the software containing same bits.

d

Similar coding instructions in all programs.

e

All of the above


6.

According to the passage, how the Dr.Franz’s multicompiler makes hacker’s task impossible?

(i) By converting the applications written in languages into the machine code.

(ii) By creating billions of different interpretations of the original program.

(iii) By extending the code’s speed of execution.


a

Only (ii) is true

b

Both (i) and (ii) are true

c

Only (i) is true

d

Both (ii) and (iii) are true

e

All are correct


7.
Directions(Q.7 to Q.16 ):

Which of the phrases (a), (b), (c) and (d) given below each sentence should replace the phrase printed in bold letters to make the sentence grammatically correct? If the sentence is correct as it is, mark (e) i.e., "No correction required" as the answer.


If you talk towards someone in authority such as a parent or teacher, you answer them in a rude way


a

talk back to

b

talk down with

c

talk over with

d

talk around of

e

No correction required


8.

It was dominated by Franklin Roosevelt, the cunning, determined, good-natured president called forth by the crisis of the Depression.


a

called out by

b

call forth on

c

called out upon

d

called upon by

e

No correction required


9.

It was great to think back of not just that experience, but on why that film still resonates with people.


a

Think back on

b

think about

c

think back about

d

think it through

e

No correction required


10.

Shah Rukh Khan has expressed his disappointment for being detained by US authorities at Los Angeles International Airport.


a

for detaining

b

at being detained

c

owing to be detained

d

because of detaining

e

No correction required


11.

Good instructors will look upon early signs of failure in their students


a

look up with

b

look for

c

look out for

d

look in

e

No correction required


12.

The teacher asked the pupils to get going at some work quietly as she had to leave the classroom.


a

get on with

b

get even with

c

get hold of

d

get wind of

e

No correction required


13.

In Castle town, Rose met the doctor who wanted to know if Freddie was managing to keep off her ankle


a

to keep up with

b

to keep out

c

to keep of

d

to keep away

e

No correction required


14.

Don’t give it into despair just because you didn’t get into the college that was at the top of your wishlist.


a

Give off in

b

give up in

c

Give yourself up in

d

give in to

e

No correction required


15.

After our month-long trip, it was time to get along with the neighbors and the news around town.


a

keep track on

b

catch up with

c

get going with

d

catch hold of

e

No correction required


16.

Before we take this farther, let’s consider something the Internet has taught us about ourselves.


a

take that farther

b

took it farther

c

took it further

d

take that further

e

No correction required


17.
Directions(Q.17 to Q.18 ):

Choose the word/group of words which is most similar in meaning to the word/group of words printed in bold as used in passage.


Nigh


a

deserving

b

clear

c

nearly

d

distant

e

progressing


18.

Bane


a

boon

b

scourge

c

corruption

d

death

e

content


19.
Directions(Q.19 to Q.20 ):

Choose the word/group of words which is most opposite in meaning to the word/group of words printed in bold as used in passage.


Onslaught


a

offense

b

assault

c

defense

d

approximate

e

violation


20.

Hone


a

wreck

b

whet

c

practice

d

secure

e

perfect


21.
Directions(Q.21 to Q.30 ):

In the following passage there are blanks, each of which has been numbered and one word has been suggested alongside the blank. These numbers are printed below the passage and against each, five options are given. In four options, one word is suggested in each option. Find out the appropriate word which fits the blank appropriately. If the word written alongside the blank fits the passage, choose option ’e’ (No correction required) as the correct choice. CHINA has long ___(91)____[moved] between the urge to ____(92)____[enrich] its elite with foreign knowledge and skills, and an opposing instinct to turn inward and rebuff such __(93)_____[importance]. In the 1870s the Qing imperial court ended centuries of educational isolation by sending young men to America, only for the Communist regime to shut out the world again a few decades later. Today record numbers of Chinese study abroad: over half a million people left in 2015 alone, many for America. The Communist Party officially endorses international exchanges in education while at the same time preaching the dangers of Western ideas on Chinese campuses. A new front in this battlefield is ____(94)_____[emerging], as the government cracks down on international schools catering to Chinese citizens. Only holders of foreign passports used to be allowed to go to international schools in China: children of expat workers or the foreignborn offspring of Chinese returnees. Chinese citizens are still ___(95)_____[illicit] from attending such outfits, but more recently a new type of school has proliferated on the mainland, ___(96)___ [proposing] an international curriculum to Chinese nationals planning to study at foreign universities. Their number has more than doubled since 2011, to over 500. Many are clustered on the wealthy eastern seaboard, but even poor interior provinces such as Gansu, Guizhou and Yunnan have them. Some international schools are ___(97)_____[privately run], including offshoots of famous foreign institutions such as Dulwich College in Britain or Haileybury in Australia. Even wholly Chinese ventures often __(98)___ [taken up] foreign-sounding names to increase their appeal: witness “Etonkids”, a Beijing-based chain which has no link with the illustrious British boarding school. Since 2003 some 90 state schools have _____(99)____[enabled] international programmes too, many of them at the top high schools in China, including those _____(100)____[acquainted] with Peking.


Q:93


a

impact

b

influences

c

instrument

d

prevalence

e

No correction.


22.

Q:96


a

presenting

b

providing

c

offering

d

contributing

e

No correction.


23.

Q:98


a

Refrain

b

Outcast

c

adopt

d

select

e

No correction.


24.

Q:97


a

distinctly run

b

confidentially run

c

Personally run

d

Publically run

e

No correction.


25.

Q:100


a

conversant

b

affiliated

c

accorded

d

provisioned

e

No correction


26.

Q:92


a

equip

b

supply

c

appoint

d

endow

e

No correction.


27.

Q:94


a

eminent

b

obligatory

c

requisite

d

elusive

e

No correction.


28.

Q:95


a

apprehended

b

Forbidden

c

elicited

d

prohibit

e

No correction.


29.

Q:91


a

wavered

b

rotated

c

wobbled

d

oscillated

e

No correction.


30.

Q:99


a

extended

b

opened

c

conducted

d

convoyed

e

No correction.


Rate This:
NaN / 5 - 1 votes