GRAMMAR TEST 11 класс
Module 6
READING
Read the passage, then choose the correct answer (A,B,C or D) for questions 1-7
It’s a Secret
Throughout history and in every civilization, people have felt the need to communicate in secret. In wartime, military secrets need to be transferred securely to commanders without being understood by the enemy. During revolutions, those plotting to overthrow the establishment need to ensure their communication remain undisclosed. The history of secret communication is long and fascinating. World events have changed on many occasions because of secret messages – secrets that were kept and secrets that were not!
There are two ways to communicate in secret – either you conceal the fact that you are sending a message at all, (‘steganography’) or you obscure the meaning of your message rather than its actual existence (‘crytology’). Steganography is very old. In 440 BC, the Greek ruler, Histiaeus, sent a message to a fellow plotter in a revolt by shaving off the hair of his most loyal slave, tattooing a message on his head, allowing the slave’s hair to grow back, then sending him to deliver the message. The slave passed through enemy lines easily since he seemed to be carrying no communication. Another very old form of steganography is invisible ink. Inks made of simple organic materials such as milk or lemon juice, which turn dark when held over a flame, were used as early as the first century AD for very serious communications. During the Second World War, both sides raced to create new secret inks and to find developers for the enemy’s inks, although in the end this form of steganography became impractical due to the large amount of communications involved.
Although steganography is a very clever way to communicate in secret, it does have an Achilles heel. If the messenger does not do a particularly good job concealing their message and someone finds it, all its secrets will be immediately revealed. This weakness soon led to idea of hiding the actual meaning of messages, so that they could not be read, even if they were discovered. The result was the development of cryptology.
Cryptology hides the meaning of messages by using codes. Codes are essentially secret languages. Julius Caesar invented one. He replaced every letter in a world by the letter three places away from it in the alphabet. A was D, B was E, and so on. Later on, any code that used a system of letter replacement such as this was referred to as a ‘Caesar code’. Of course, it doesn’t take much brain power to figure out most of these codes! Today, code makers devise practically unbreakable codes using highly sophisticated mathematics and computer power.
Are cryptology and steganography used now? Well, you may be surprised to learnt that secret communication is a part of everyday life! For example, every time you use your credit card to buy something from company over the Internet, cryptology is employed. Very complicated codes turn your credit card number into a pile of gibberish that only the retailer can decipher, not anyone else. Steganpgraphy is also thriving in the digital world. Secret messages can easily be hidden in email, audio and image files. This is because most digital documents contain useless areas of data, so some of their information can be altered without obvious effect. This is of concern to government as they fear that criminals may be concealing messages in files sent over the Internet.
One thing is certain – secret communication is still just as much a part of life today as it was millennia ago!
Secret information 5. ‘Caesar Codes’
A was only used in the past. A were all invented by Julius Caesar.
B has altered the course of history at times. B only use certain letters of the alphabet.
C can lead to revolutions or wars. C are usually quite easy to break.
D was first used by military commanders. D use sophisticated mathematics.
In 440 BC, the Greek ruler, Histiaeus 6. Internet credit card transactions
A secretly communicated with the enemy. A use steganographic techniques.
B started a revolt by sending a hidden message. B are made secure by cryptology.
C learnt of a plot through a secret message. C make a retailer’s job easier.
D sent a secret message past the enemy. D are hidden in digital files.
Invisible ink 7. Steganography is still used a lot today
because
A is the oldest form of steganography. A secret communication is more important
B was used the most effectively duringWW2. than ever before.
C must be made from organic materials. B governments use it to send information
D can sometimes be made visible with heat. securely.
C it can help to catch criminals.
Stenography does not D it’s easy to hide secret messages in digital
Documents.
A have any disadvantages.
B depend on the skill of the messenger.
C hide the meaning of the message.
D pre-date cryptology.
LISTENING
Listen and choose A,B or C for statements 1-7.
Susan won’t be able to let Mike know if she’s going to be late.
A true B false C not stated
Mike has never had a mobile phone.
A true B false C not stated
Susan’s grandparents have just bought a mobile phone.
A true B false C not stated
Mike is usually at home when Susan calls.
A true B false C not stated
Susan doesn’t like sending emails.
A true B false C not stated
Susan has her mobile phone switched on all the time.
A true B false C not stated
In the end Susan convinces Mike to buy a mobile phone.
A true B false C not stated
USE OF ENGLISH
Complete the gaps with the correct word(s) formed from the words in bold.
What’s in a Name?
You might think that a name is just a
name, but the reality is much more
interesting than that and goes back to the
1)_______________________of human society. BEGIN
To start with, everyone has a first name, a
surname and 2)______________a middle name, don’t OCCASION
they? Not always. In Mongolia, until recently,
people only had a first name, something that
probably caused a lot of confusion. Also, not
all 3)_____________are addressed by a given first NATION
name. In China, the family name comes first
with the given name following.
Your family name says a lot about your
ancestors. Common English surnames, like
Baker and Butcher, tell us what 4)_____________ a OCCUPY
long-dead relative had. Names like Hill, Field
and Rivers tell us where people used to live.
Johnson means son of John, and in Scotland
the prefix Mac means the same.
Given first names often refer to a 5)____________ CHARACTER
that parents would like their children to have
such as Sophia, which stands for wisdom, or
Anna meaning grace. Perhaps something royal
is more 6)______________? How about Steven and Sara, PREFER
meaning crown and princess.
Whichever name you go by, one thing is
certain, it goes with you for life. Even if you
are one of the 7)_________________ ones (Abbie Birthday or LUCK
Robin Banks), your name is something you’re
just going to have to live with.
WRITING
Comment on the following statement:
Our lives would all be enriched greatly if we could have a chip planted in our brains enabling us to speak any language we wished. However, this idea could have some disadvantages too.
What can you say for and against this idea? Write an essay of 120-180 words using the plan below.
Para 1: Introduction (state the problem)
Para 2: State arguments ‘for’
Para 3: State arguments ‘against’
Para 4: Draw a conclusion
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Нормы оценивания ЗУН по английскому языку при выполнении данной контрольной работы:
Контрольная работа состоит из 4 заданий:
Задание 1 LISTENING (Аудирование) – 7 баллов
Задание 2 READING (Чтение) – 7 баллов
Задание 3 USE OF ENGLISH - 7 баллов
Задание 4 WRITING (Письмо) – 10 баллов
Всего: 31 баллов
30 - 28 баллов - оценка «5»
27 - 25 баллов - оценка «4»
24 - 20 баллов - оценка «3»