DIRECTIONS: In the passages that follow, some words and phrases are underlined and numbered. In the answer column, you will find alternatives for the words and phrases that are underlined. Choose the alternative that you think is best, and fill in the corresponding bubble on your answer sheet. If you think that the original version is best, choose “NO CHANGE,” which will always be either answer choice A or F. You will also find questions about a particular section of the passage, or about the entire passage. These questions will be identified either by an underlined portion or by a number in a box. Look for the answer that clearly expresses the idea, is consistent with the style and tone of the passage, and makes the correct use of standard written English. Read the passage through once before answering the questions. For some questions, you should read beyond the indicated portion before you answer.
The following paragraphs may or may not be in the most logical order. You may be asked questions about the logical order of the paragraphs, as well as where to place sentences logically within any given paragraph.
Spies Online
[1]
People who choose to use a personal computer to connect to the Internet should know the risks that this poses. Most computer users have some experience with slow computers, unexplainable program crashes, and indecipherable warnings about missing system files. These same computer users are more likely to wait, until Q1 these problems get too bad to manage. They would buy a new system entirely before trying to fix their current one. Online, the biggest threat is spyware, which is crippling Q2 unsecured computers and data networks around the world.
[2]
Like Q3 a computer virus, a spyware program is not purely malicious. The developer of the spyware program stands to gain from installing it on your computer, often Q4 just in information, but usually financially, too. These programs may monitor your online activity and track your keystrokes and buying habits. This data is sold to marketing agencies for demographic research, and to more unscrupulous firms that will bombard you with email solicitations and sales calls. Not all spyware; however Q5 has legitimate commerce behind it.
[3]
Both computer viruses and spyware can cause problems. Q6 Other programs show up as system messages, luring unaware users to click their way into corrupting their own operating systems and revealing sensitive personal information. Not only do these programs cause a depletion of system resources, Q7 but they waste time and test the nerves of even the most patient user.
[4]
There are plenty of solutions designed to eliminate the spyware problem. The first step is to rid your computer of any unwanted programs. Detection utilities that detect spyware Q8 are widely available, many at no cost, that scans the computer for undesirable programs and then removes them. Q9 Once this is accomplished, the utilities monitor the system constantly to prevent any new installation of spyware. It is important to understand how your computer protects Q10 and to keep your software updated.
[5]
Good web surfing habits are essential, too. Avoid web sites you don’t trust. Spyware originates from many kinds of web sites. Q11 Go online never Q12 without a firewall and active virus and spyware protection. Remember that a computer is just a machine. If you turn it on and never touch it, it Q13 will likely remain fast and reliable. It is generally what the user does to the computer that affects it. Q14 Q15