Direction :-
Each passage below is accompanied by a number of questions. For some questions, you will consider how the passage might be revised to improve the expression of ideas. For other questions, you will consider how the passage might be edited to correct errors in sentence structure, usage, or punctuation. A passage or a question may be accompanied by one or more graphics (such as a table or graph) that you will consider as you make revising and editing decisions.
Some questions will direct you to an underlined portion of a passage. Other questions will direct you to a location in a passage or ask you to think about the passage as a whole.
After reading each passage, choose the answer to each question that most effectively improves the quality of writing in the passage or that makes the passage conform to the conventions of standard written English. Many questions include a “NO CHANGE” option. Choose that option if you think the best choice is to leave the relevant portion of the passage as it is.
An Official, Certified…Criminal?
[1] The image is as old as computers themselves. [2] These are the hackers, immortalized in the 1995 cult classic film Hackers. [3] Of late, these "cybercriminals" have become the scourge of the American public in recent years Q1 because of huge security breaches at major businesses. [4] "Hackers" are the reason we password-protect our WiFi networks and feel a twinge of skepticism every time we pay for something with a credit card. [5] A ponytailed group of geeks, their computer monitors reflecting brightly off of their glasses, breaks into some "mainframe" from an evil corporation.
Q2 While the popular image of the hacker might not have changed ,Q3 it has, in some cases, been given a bit of a makeover. Schools like Hack Reactor in San Francisco teach aspiring software engineers and wear the name "Hack" proudly, as if it's a sign of authenticity.Q4
In this line, a "hacker" is now seen as one whose powers can be used for good as well as ill. There is a new crop of hackers, called Certified Ethical Hackers (CEH), who can help to protect against our Q5 evil counterparts and make computers safer for us all.
Certified Ethical Hackers follow a course of study either at an Accredited Training Center or by self-study. The final exam is a 125 multiple-choice exam: it takes four hours and requires 70% correct to receive a passing score. There is another certification Certified Network Defense Architect Q6 which has the same basic course and test but is available only for certain U.S. Government agents. Q7 CEHs combine many facets of computer study into one typically. A company Q8 will hire a CEH to ensure maximum security of that company's network, whether that's company secrets or customer payment information or anything in between. Essentially, an ethical hacker does everything that an unethical one does, but he or she does so at the request of a particular organization. "We want you to hack us," says that organization, "so we will have known Q9 how to avoid being hacked." It's kind of like the old saying, "It takes a crook to catch a thief," except in this case the "crook" is not a crook at all.
Q10 Some in the computing community disparage the term. They say that "hacker" is a criminal designation, so saying "ethical hacker" is like saying "ethical thief," that is, a contradiction of terms. Q11
This objection is of course overstated, and overwhelmingly, companies are happy to have "hackers" on staff. That designation can help to overcome the stodgy, impersonal image that corporations tend to have, and it can tap in to a kind of underground energy that many find irresistible.