Mark the letter A, B, C, or D on your answer sheet to indicate the sentence that best combines each pair of sentences in the following questions
I will leave a message for you with my secretary. It is possible that I will be out when you telephone
A. As long as it might happen that I am out when you telephone, I will leave a message for you with my secretary
B. I will leave a message for you with my secretary in case I am out when you telephone
C. Unless you telephone when I am out, I will leave a message for you with my secretary
D. Providing that I will leave a message for you with my secretary, I will be out when you telephone
Đáp án B: Tôi sẽ để lại tin nhắn cho bạn với thư kí của tôi trong trường hợp tôi ở ngoài khi bạn gọi.
Giải thích: Câu gốc: Tôi sẽ để lại tin nhắn cho bạn với thư kí của tôi. Có thể rằng tôi sẽ ở ngoài khi bạn gọi.
Các đáp án còn lại sai về nghĩa
Mark the letter A, B, C, or D on your answer sheet to indicate the correct answer to each of the following questions
_____ exhibitions are like huge market places of the sale of goods, and these are often called trade fairs
Mark the letter A, B, C, or D on your answer sheet to indicate the underlined part that needs correction in each of the following questions
Despite the roadblock, the police allowed us to enter the restriction area to search for our friends
Mark the letter A, B, C, or D on your answer sheet to indicate the correct answer to each of the following questions
I was upset to learn that my first opponent would be Sam Muller, who _______ part in tournaments for no less than ten years
Mark the letter A, B, C, or D on your answer sheet to indicate the correct answer to each of the following questions
Of course, we don’t need this dictionary at present, but in the long ____ it may prove useful
Read the following passage and mark the letter A, B, C, or D on your answer sheet to indicate the correct answer to each of the questions from 35 to 42
Scientists have discovered that for the last 160,000 years, at least, there has been a consistent relationship between the amount of carbon dioxide in the air and the average temperature of the planet. The importance of carbon dioxide in regulating the Earth's temperature was confirmed by scientists working in eastern Antarctica. Drilling down into a glacier, they extracted a mile-long cylinder of ice from the hole. The glacier had formed as layer upon layer of snow accumulated year after year. Thus, drilling into the ice was tantamount to drilling back through time.
The deepest sections of the core are composed of water that fell as snow 160,000 years ago. Scientists in Grenoble, France, fractured portions of the core and measured the composition of ancient air released from bubbles in the ice. Instruments were used to measure the ratio of certain isotopes in the frozen water to get an idea of the prevailing atmospheric temperature at the time when that particular bit of water became locked in the glacier.
The result is a remarkable unbroken record of temperature and of atmospheric levels of carbon dioxide. Almost every time the chill of an ice age descended on the planet, carbon dioxide levels dropped. When the global temperature dropped 9°F (5°C), carbon dioxide levels dropped to 190 parts per million or so. Generally, as each ice age ended and the Earth basked in a warm interglacial period, carbon dioxide levels were around 280 parts per million. Through the 160,000 years of that ice record, the level of carbon dioxide in the atmosphere fluctuated between 190 and 280 parts per million, but never rose much higher until the Industrial Revolution beginning in the eighteenth century and continuing today.
There is indirect evidence that the link between carbon dioxide levels and global temperature change goes back much further than the glacial record. Carbon dioxide levels may have been much greater than the current concentration during the Carboniferous period, 360 to 285 million years ago. The period was named for a profusion of plant life whose buried remains produced a large fraction of the coal deposits that are being brought to the surface and burned today
The word "remarkable" in line 12 is closest in meaning to _________.
Mark the letter A, B, C, or D on your answer sheet to indicate the word(s) OPPOSITE in meaning to the underlined word(s) in each of the following questions
It is important for a teacher to be totally impartial when determining which students will pass or fail
Read the following passage and mark the letter A, B, C, or D on your answer sheet to indicate the correct answer to each of the questions from 30 to 34
As computer use becomes more common, the need for security is more common than ever. One of the greatest security threats in the online world is computer hacking.
Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?
Most hackers use information called protocols that are built into computer software. These protocols allow computer to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system.
In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two.
The easiest way to protect a system is with a good password. Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time. Even if a hacker steals the password, they won’t have the code. Or if the hacker somehow gets the code, they still don’t know the password
What is the main idea of this reading?
Mark the letter A, B, C, or D on your answer sheet to indicate the word(s) CLOSEST in meaning to the underlined bold word(s) in each of the following questions
She received a light blow on the side of the head close to the right eye
Mark the letter A, B, C, or D on your answer sheet to indicate the most suitable response to complete each of the following exchanges
Mick: "What a nice watch you're wearing."
Olio: " ____________"
Mark the letter A, B, C, or D on your answer sheet to indicate the underlined part that needs correction in each of the following questions
When we arrived at the shop to buy the dishes advertise in the newspaper, we learned that all of them had been sold
Mark the letter A, B, C, or D on your answer sheet to indicate the word(s) CLOSEST in meaning to the underlined bold word(s) in each of the following questions
Have you ever tried using hydrogen peroxide as a person to induce vomiting instead of the good old traditional methods?
Read the following passage and mark the letter A, B, C, or D on your answer sheet to indicate the correct answer to each of the questions from 30 to 34
As computer use becomes more common, the need for security is more common than ever. One of the greatest security threats in the online world is computer hacking.
Computer hacking is the unauthorized access to a computer or network of computers. Hackers are people who illegally enter systems. They may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?
Most hackers use information called protocols that are built into computer software. These protocols allow computer to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate the protocols to get unlimited access to a computer system.
In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to access a challenging system like a bank or military network. Another kind of hacker tries to do damage to a system. After hacking into systems, these hackers release viruses or alter, delete, or take information. Known as active hackers, they are, by far, the more dangerous of the two.
The easiest way to protect a system is with a good password. Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users either have special cards or devices that show them the new code to use the next time. Even if a hacker steals the password, they won’t have the code. Or if the hacker somehow gets the code, they still don’t know the password
What does “plus” in “password-plus” probably mean?
Mark the letter A, B, C, or D on your answer sheet to indicate the correct answer to each of the following questions
Stop acting like a child. In a few weeks, you'll be coming of _______ and nobody will tolerate your foolish behavior any longer
Read the following passage and mark the letter A, B, C, or D on your answer sheet to choose the word or phrase that best fits each of the numbered blanks from 25 to 29
Prime Minister Nguyen Xuan Phuc has delivered Vietnam’s strong message, aspiration, and determination to become a “country of renovation and creativity” and an economy with globally extensive (25) _______ when engaging in every activity of the World Economic Forum (WEF) 2019 in Davos, Switzerland.
He participated in 37 activities where he and heads of State and Government leaders of 50 countries and executives from (26) _______ groups around the globe discussed and dialogued matters relating to the forum’s theme “Globalization 4.0: Shaping a Global Architecture in the Age of the Fourth Industrial Revolution”.
Prime Minister Phuc said the Fourth Industrial Revolution is “knocking” on every enterprise and bringing profound changes that no country can be an outsider, and (27) ______ Vietnam’s wish to become one of the passengers at the (28) ________ of the Industry 4.0 train, and enthusiastically work with other countries to build a wealthy world.
In Davos, PM Phuc and WEF President Borge Brende had a dialogue themed “Vietnam and the World”, which is the first-ever event on Vietnam held by the WEF. Through the dialogue, PM Phuc conveyed strong messages about Vietnam’s development and international integration, asserting that (29) _______ the current circumstance, Vietnam has maintained an economic growth and socio-political stability that demonstrates itself a reliable destination for foreign investors coming to do business
Read the following passage and mark the letter A, B, C, or D on your answer sheet to indicate the correct answer to each of the questions from 35 to 42
Scientists have discovered that for the last 160,000 years, at least, there has been a consistent relationship between the amount of carbon dioxide in the air and the average temperature of the planet. The importance of carbon dioxide in regulating the Earth's temperature was confirmed by scientists working in eastern Antarctica. Drilling down into a glacier, they extracted a mile-long cylinder of ice from the hole. The glacier had formed as layer upon layer of snow accumulated year after year. Thus, drilling into the ice was tantamount to drilling back through time.
The deepest sections of the core are composed of water that fell as snow 160,000 years ago. Scientists in Grenoble, France, fractured portions of the core and measured the composition of ancient air released from bubbles in the ice. Instruments were used to measure the ratio of certain isotopes in the frozen water to get an idea of the prevailing atmospheric temperature at the time when that particular bit of water became locked in the glacier.
The result is a remarkable unbroken record of temperature and of atmospheric levels of carbon dioxide. Almost every time the chill of an ice age descended on the planet, carbon dioxide levels dropped. When the global temperature dropped 9°F (5°C), carbon dioxide levels dropped to 190 parts per million or so. Generally, as each ice age ended and the Earth basked in a warm interglacial period, carbon dioxide levels were around 280 parts per million. Through the 160,000 years of that ice record, the level of carbon dioxide in the atmosphere fluctuated between 190 and 280 parts per million, but never rose much higher until the Industrial Revolution beginning in the eighteenth century and continuing today.
There is indirect evidence that the link between carbon dioxide levels and global temperature change goes back much further than the glacial record. Carbon dioxide levels may have been much greater than the current concentration during the Carboniferous period, 360 to 285 million years ago. The period was named for a profusion of plant life whose buried remains produced a large fraction of the coal deposits that are being brought to the surface and burned today
Which of the following does the passage mainly discuss