Selasa, 28 Februari 2012

Contoh Soal Reading Dan jawabannya

Although it seems like the spread of spam-unwanted junk e-mails sent to millions of people each day – is recent problem, spam has been around as long as the Internet has. In fact, the first documented case of spam occurred in 1978, when a computer company sent out 400 e-mails via the Arpanet, the precursor to the modern Internet. Now, spam e-mails account for more than two-thirds of all the e-mails sent over the Internet, and for some unlucky uses, spam makes up 80 percent of the messages they receive. And despite technological innovations such as spam filters and event new legislation designed to combat spam, the problem will not go away easily.
The reason spammers – the people who and businesses that spread spam – are difficult to stop is that spam is so cost effective. It costs a spammer roughly one-hundredth of a send spam, which means that a spammer can still make a profit even with an extremely low response rate, as low as one sale per 100,000 e-mails sent. This low rate gives spammers a tremendous incentive to continue sending out millions and millions and millions of e-mils, even if the average person never purchases anything from them. With so much at stake, spammers have gone to great lengths to avoid or defeat spam blockers and filters.
Most spam filters rely on a fairly primitive “fingerprinting” system. In this system, a program analyzes several typical spam messages and identifies common features in them. Any arriving e-mails that match these features are deleted. But the fingerprinting defense proves quite easy for spammer to defeat. To confuse the program, a spammer simply has to include as series of random characters or number. The additions to the spam message change its “fingerprint” and thus allow the spam to escape detection. And when programmers modify the fingerprint software to look for random strings of letter, spammers respond by including nonrandom content, such as sports scores or stock prices, which again defeats the system.
A second possible solution takes advantage of a computer’s limited learning abilities. So called “smart filters” use complex algorithms, which allow them to recognize new versions of spam messages. These filters may be initially fooled by random characters or bogus content, but they soon learn to identify these features. Unfortunately, spammers have learned how to avoid these smart filters as well.

1. The following statements describe spam, except _____
a. It affects million of internet users
b. It totals more than 80% of e-mail
c. It is beneficial to the general public
d. It is an unwanted message for mass audience
e. It may be a good source of income for spammers
Answer :C

2. The best title for the above text is _____.
a. The Development of Spam Filters
b. The Success of the Development of Spam Filters
c. The Disadvantages of Using E-mails
d. How to Make Profit through Spamming
e. Spam: Problems and Solutions
Answer : E

3. Smart filters are superior to fingerprinting systems because smart filters _____.
a. Are eventually able to recognize new versions of spam
b. Have the ability to learn from their previous mistakes
c. Do not need to find common features to detect spam.
d. Are not fooled by random characters or content
e. Take advantages of computer’s limited learning abilities
Answer : A

4. The word ‘program’ in line 17 refers to _____.
a. A spam message
b. A character or a number
c. A type of spam filter
d. A common feature
e. A fingerprint
Answer : E

5. From the text we can conclude that spammers _____
a. Have always managed to get responses from internet users
b. Produce spam that can never be detected by spam blockers.
c. Have been able to sell cheap products to users
d. Make a big profit from the combat against spam blockers
e. Always send 100,000 e-mail a day to make profit.
Answer : B

Tidak ada komentar:

Poskan Komentar