Advertisements

READING PASSAGE 1

You should spend about 20 minutes on Questions 1-13 which are based on Reading Passage 1 below.

The Igloo

The igloo is the traditional shelter of Inuit living in the far northern regions. They are built of blocks of snow in a circular shape, in which the walls curve inward towards the top to form a snow vault with a self-supporting arched ceiling. An outstanding example of human ingenuity and adaptability to the environment, the igloo retains heat and protects against the cold, since snow and ice act as excellent insulation. The design includes a tunnel entrance that forms a cold trap to preserve heat inside. The sleeping and sitting areas are raised above this and so maintain a higher temperature.

A similar construction is the ‘quinzhee’, which is a shelter made by hollowing out a pile of settled snow, and is only for temporary use. In contemporary times, this type of snow shelter has become popular among those who enjoy winter camping, as well as in survival situations. Some contemporary Inuit though continue to use igloos, especially as temporary shelters while hunting. However, the warming climate of the early twenty-first century has reduced the availability of appropriate snow for igloo construction. Although the traditional art of igloo construction by Inuit natives may have declined, the igloo and variations upon it, such as ice hotels, have gained in popularity among those who enjoy the winter experience.

An igloo in the Inuit language simply means house and the Inuit do not restrict the use of this term exclusively to snow houses, but include traditional tents, sod houses, homes constructed of driftwood, and modern buildings. Although the origin of the igloo may have been lost in antiquity, it is known that Inuit have constructed snow igloos for hundreds of years. Living in an area where snow and ice predominate, particularly in the long dark winter above the Arctic Circle, the igloo is the perfect shelter. Snow is used because the air pockets trapped in it make it an excellent insulator. Outside, temperatures may be as low as minus 45 degrees Celsius, but inside an igloo, the temperature may range from minus 7 degrees Celsius to 16 degrees Celsius when warmed by body heat alone. A highly functional shelter, the igloo is also aesthetically pleasing, with its shape being both strong and beautiful.

In order to build an igloo, there is a fairly standard procedure. The first thing to do is to find a good spot. It is vital to choose a safe location away from avalanche prone slopes. Next, mark a circle in the snow. For two people, a circle of around two metres diameter is needed, and for four people, around four metres. The igloo body is the next step. Shovel a pile of snow into a large, reasonably steep mound and try and keep the sloping sides at an angle of around 35 degrees or higher, which is best for stability. Wide, short snow shelters are more prone to collapse. If possible, mix snow of different temperatures to help it to harden. The entrance is done by digging a trench downwards into the snow towards the mound. This should be on the downhill side and out of the wind. The snow that is being removed from the trench should be placed on top of the mound. In these conditions, make the trench as deep as a standing man. Then, leave everything for about 90 minutes if possible. Next, finish the tunnel entrance. Make the tunnel slightly wider than a body’s width and dig at a slightly upward angle. Ideally, the floor of the snow shelter should be at least 30 centimetres above the entrance, which will help prevent warm air from escaping the shelter. After the initial entrance is made, it is easier to hollow the inside from the top down. The walls should be thirty to sixty centimetres thick, and if the inside walls are smoothed, this will help prevent dripping. Leave an elevated platform for sleeping on. As heat rises, the occupants will be in the warmest part of the igloo for sleeping. A very important point is to make an air vent in the wall of the shelter, which will prevent the occupants from suffocating in the night. Finally, block the entrance with a block of snow or a rucksack.

Igloo hotels are a new variation on the traditional igloo. In several winter destinations, villages of igloos are built for tourists, where the guests use sleeping bags that sit on top of reindeer hides in overnight stays. Ice hotels are found in many places in Norway, Finland, and Sweden, and are constructed each winter and melt in the spring. The Ice Hotel in the village of Jukkasjarvi, located next to the town of Kiruna in Sweden, is a famous attraction. Originally, the creators started out building a simple igloo, which later turned into the elaborate and now famous ‘hotel’. It is made from the waters of the adjacent river Torne, the pure waters of which produce beautiful clear ice used to create interior decorations, which are made entirely of snow and ice.

The igloo is a subject that has fascinated people from all over the world. Although the traditional art of igloo construction by Inuit natives may have declined, the igloo and variations on it have gained in popularity among those who enjoy the novelty and winter experience.

 

Questions 1-3

Do the following statements agree with the information given in the text?

In boxes 1-3 on your answer sheet write:

TRUE               if the statement agrees with the information

FALSE              if the statement contradicts the information

NOT GIVEN    if there is no information on this

1   The quinzhee is constructed for living in long-term.

2   The Canadian government has allocated grants to keep the art of building igloos alive.

3   Although relatively warm, the temperature inside an igloo in winter Arctic conditions will never rise above freezing.

Questions 4-10

Complete the flow chart below.

Write NO MORE THAN TWO WORDS from the text for each answer.

Write your answers in boxes 4-10 on your answer sheet.

Building An Igloo

Choose a good spot, away from places with 4………………… potential.

Mark a circle in the snow (2m diameter for 2 people and 4m for 4 people)

Create a large mound of snow with 35-degree side angles for robust 5………………… Use snow with various 6………………… to help it set.

Dig an entrance tunnel on the downhill side and away from the wind. Place dug snow on top of the mound – leave everything for 90 minutes.

Continue and finish the entrance tunnel – wider than a body and slightly upwards, as the igloo floor should be approx. 30cm higher than the entrance to keep the 7………………… in.

Hollow the igloo from the inside – the walls should be 30-60cm thick.

Smooth the inside walls to stop 8…………………; the sleeping area should be 9…………………; it is vital to make an 10…………………; block the entrance with snow or a rucksack.

Questions 11-13

Complete the summary below.

Write NO MORE THAN TWO WORDS from the text for each answer.

Write your answers in boxes 11-13 on your answer sheet.

The Jukkasjarvi Ice Hotel

Igloo hotels are popular novelties, where guests can sleep in sleeping bags on 11………………… These hotels (in northern countries) are built every year and 12………………… when it warms. The famous Jukkasjarvi Ice Hotel is completely made from nearby river water – even the 13…………………

READING PASSAGE 2

You should spend about 20 minutes on Questions 14-26 which are based on Reading Passage 2 below. 

Computer Viruses

Computers can do anything: from running spread sheets, word processors and power stations to music synthesisers and missile control systems. And because computers can do anything, they can in particular run viruses and any other nasty software.

Viruses are unique in their abilities, as they can stop many computers at once. This would be much more serious for a small company than normal faults that affect only one PC at a time. Thus, viruses rank with hazards like power cuts and fire in their effect and speed of action. Worse than fire though, people may find that they cannot take their work elsewhere, for if they did, they might simply take the virus infection with them and bring more systems down. Secondly, viruses can distribute disinformation and bring shame to individuals or organisations: viruses may send malicious email apparently on behalf of the person whose computer has been infected.

A computer virus is a piece of program code that attaches copies of itself to other programs, incorporating itself into them, so that the modified programs, while still possibly performing their intended function, surreptitiously do other things. Programs so corrupted seek others to which to attach the virus, and so the infection circulates. Successful viruses lie low until they have thoroughly infiltrated the system, and only reveal their presence when they cause damage. The effect of a virus is rarely linked back to its originator, so viruses make attractive weapons for vandals. Computer viruses generally work by altering files that contain otherwise harmless programs. This is infection. When an infected program is invoked, it seeks other programs stored in files to which it has write permission, and infects them by modifying the files to include a copy of itself and inserting an instruction to branch to that code at the old program’s starting point. Then the virus starts up the original program, so that the user is unaware of its intervention. Viruses are classified as being one of two types: ‘research’ or ‘in the wild’. A research virus is one that has been written for research or study purposes and has received almost no distribution to the public. On the other hand, viruses that have been seen with any regularity are termed ‘in the wild’.

Before the spread of the Internet, most computer viruses were spread by removable media, predominantly floppy disks. Some viruses spread by infecting programs stored on these disks, while others installed themselves into the disk boot sector. Until floppy disks were replaced by other removable media, this was the most successful infection strategy and boot sector viruses were the most common in the wild for many years.

The term ‘computer virus’ is a popular catchall for all kinds of malicious software. A logic bomb is a destructive program activated by a certain combination of circumstances, or on a certain date, to delete information. A Trojan horse is any bug inserted into a computer program that takes advantage of the trusted status of its host by surreptitiously performing unintended functions. A worm is a distributed program that invades computers on a network. It consists of several processes or segments that keep in touch through the network; when one is lost, the others conspire to replace it on another server.

Viruses today have no distinct identity, but typically undergo mutation each time they copy themselves to other files. This, combined with various cryptographic techniques, makes modern viruses difficult to detect. False alarms have become an increasing problem, particularly with users sending chain email warning about supposed virus problems; ironically, the panics may cause more problems than the viruses they warn about. Email though has become the most popular way to disperse viruses today, because powerful commercial email packages are themselves programmable and users often configure email systems to helpfully run programs automatically.

Viruses are not difficult to develop. The majority of viruses are simple variants of others and many virus construction kits are readily available on the Internet. Viruses have been created since the 1960’s, although the term ‘computer virus’ was only formally defined by Fred Cohen in 1983. One of the first virus attacks occurred in late 1987 when, over a two-month period, a virus quietly insinuated itself into programs at a Middle East university. It was noticed because it caused programs to grow longer. Once discovered, it was analysed and an antidote devised. It was designed to slow processors down on certain Fridays, and to erase all files on Friday, 13 May.

It is common that certain viruses have been given names. Once discovered and named, programmers can create ‘antidotes’ that delete the viruses from the system. The obvious, but generally impractical defence against viruses is never to use anyone else’s software and never to connect with anyone else’s computer. A more practical approach to protect computers is to regularly or continuously run programs that recognise viruses and try to eliminate virus infections before they do too much damage. Because new viruses are being devised every day, it is important and sensible to keep detection programs up to date, by, for example, a regular subscription from a reputable firm, and to minimise risky procedures, such as sharing information as infrequently as possible.

All protection approaches are trade-offs. Eternal vigilance on the part of users is important, and, above all, education of users to the possible results of their actions.

 

Questions 14-18

Complete the summary using the words in the box below.

Write your answers in boxes 14-18 on your answer sheet.

COMPUTER VIRUSES

Computers today can perform all tasks, including running computer viruses. Viruses are worse than other computer problems, due to their ability to 14…………….. to other systems. Viruses can also circulate misrepresentations and the 15…………….. of people and groups can be harmed.

Computer viruses are pieces of program code that become part of programs and then spread to other programs and computers. They usually 16…………….. themselves within systems before creating harm and their 17…………….. are difficult to trace.

Viruses also distribute themselves around files and computers without being noticed. Viruses can be ‘research’ or ‘in the wild’, the former usually creating no 18………………

recipes            kill                   spread             origins             die

cures               reputations     hide                 jobs                 risks

Questions 19-23

Answer the questions below.

Write NO MORE THAN THREE WORDS from the text for each answer.

Write your answers in boxes 19-23 on your answer sheet.

19   What type of removable media was first responsible for the distribution of computer viruses?

20   What type of computer virus can be set to delete information at a particular time?

21   What type of computer virus attacks networked computers?

22   What combines with various cryptographic techniques to make a modern computer virus difficult to discover?

23   What is the most common way to distribute a computer virus nowadays?

Questions 24-26

Complete the sentences below.

Write NO MORE THAN THREE WORDS from the text for each answer.

Write your answers in boxes 24-26 on your answer sheet.

24   Most viruses are just simple ………… of pre-existing viruses.

25   ………… to a trustworthy company that deals in virus protection is a practical precaution against computer viruses.

26   The key action to avoid computer viruses is the ………….., so that they appreciate

the potential consequences of what they do.

Advertisements

READING PASSAGE 3

You should spend about 20 minutes on Questions 27-40 which are based on Reading Passage 3 below.

Homeschooling

Paragraph A

Homeschooling is a method of education where children do not attend a traditional school. Instead, usually parents take over the responsibility for the education of their children, either doing it all themselves or by using a company that specialises in providing homeschooling curricula and materials. Homeschooled children can excel in standardised testing and universities and colleges have no qualms about accepting them. Supporters also claim that because they have been trained early on to be independent learners, homeschooled individuals grow up to become reliable, resourceful individuals.

Paragraph B

Homeschooling offers various benefits. Almost all homeschooling families say that homeschooling has played an essential role in bringing their family closer, as the time that parents spend teaching their children, and the time the children spend learning together, can foster a loving relationship in the family. Homeschooled children do not have to worry about bullying, peer pressure and spiteful competition, so their self-esteem does not have to suffer needlessly, and many parents with children who have been the target of bullying have resorted to homeschooling to protect their children from the harmful effects of harassment. Another key advantage of homeschooling is that parents and children no longer have to work their lives around homework and school hours. They usually accomplish in a few hours each day what typically takes a week or more to complete in a classroom setting. Because they spend more time in hands-on learning, homeschooled children can do away with homework, which is what usually keeps public schooled children up late at night. Additionally, families can schedule offseason vacations, go on field trips or visit museums, zoos and parks during the week as part of their learning experience. A more controversial benefit of homeschooling is that parents have frequently much more say in what is taught to their children, so that they can avoid subjects which they disapprove of.

Paragraph C

Homeschooling is, however, sharply criticised in some quarters. A common criticism is that homeschooled children may not have as many opportunities to interact with other children in comparison to children who attend regular schools. Forming bonds and socialising with children his or her own age is important for a child’s developmental health and development of social skills. If homeschooled, children may be deprived of the chance to form friendships and may suffer socially. The lack of socialisation may affect them in later stages of life.

Paragraph D

Parents choosing to homeschool their children may also be faced with the common problem of time. Parents need to set aside time to make it work. The task of homeschooling a child is certainly not easy, whether for working parents, single parents or stay-at-home parents. They have to take time to organise and prepare lessons, teach, give tests, and plan field trips. Also, in comparison to public schools, where education is free, homeschooling can also be costly, as purchasing the newest curriculum and teaching tools can be very expensive. Parents may choose to use a pre-prepared paid homeschooling program, but, in spite of the possible added benefits of such programs, they may increase the cost of the child’s education. There are also other costs to keep in mind, like project materials, stationery, books, computer software, and field trips.

Paragraph E

There is also the issue of the different relationships between parents and their children and teachers and their students. Public and private schools provide for many children a safe haven, in which they are both regarded and respected independently and individually. Family love is intense, and children need it to survive and thrive. It is also deeply contingent on the existence and nature of the family ties. The unconditional love children receive at home is actually anything but unconditional: it is conditioned on the fact that they are their parents’ children. School, either public or private, ideally provides a welcome respite. Children are regarded and respected at school not because they are their parents’ children, but because they are students. They are valued for traits and for status that are independent of their status as the parents’ genetic or adoptive offspring. The ideal teacher cares about a child as an individual, a learner and an actively curious person. The teacher does not care about the child because the child is his or hers, and the child is regarded with respect equal to all the children in the class. In these ways, the school classroom, ideally, and the relations within it, is a model of some core aspects of citizenship.

Paragraph F

A final criticism of homeschooling is that there is a public health risk. Children who attend public schools are required to have immunisations in order to begin classes. It is hard in many countries to ensure that mandatory immunisation is verified. Thus, deregulated homeschooling means that homeschooled children are basically exempted from immunisation requirements. The children are more susceptible to the diseases against which immunisation gives some protection, and others around them, particularly the elderly, are also consequently in danger.

Paragraph G

Even given these potential harms, there remain good reasons to permit homeschooling in plenty of circumstances. Parents often justifiably wish to shield their children from public schools that too often ill serve children who are at risk of bullying, or who are hurt by the culture of middle and high schools. Some children also have special abilities or needs, or simply idiosyncratic learning styles or habits, and many of these children can best or even only be educated by those who know them best.

 

Questions 27-33

The text on the previous pages has 7 paragraphs A – G.

Which paragraph contains the following information?

Write your answers in boxes 27-33 on your answer sheet.

27   The traditional school environment can sometimes be a good model for living in today’s society.

28   Homeschooling has been accused of hindering children’s social development.

29   Homeschooling can sometimes better adapt to a child’s special learning needs.

30   There are companies that focus on providing homeschooling materials, guidance and curricula.

31   Homeschooling can be a financial burden for some families.

32   Homeschooling has been accused of spreading disease.

33   Homeschooling families can benefit from cheaper holidays outside the peak seasons of regular school holiday times.

Questions 34-37

Choose the correct letter A, B, C or D.

Write the correct letter in boxes 34-37 on your answer sheet.

34   Homeschooled children will often

A   have no problem entering university.

B   have difficulties with universities accepting them.

C   have to attend universities that offer similar teaching styles to the children’s childhood education experiences.

D   not need to attend university.

35   Homeschooled children can

A   often become bullies when they meet other children.

B   be bullied more often.

C   be bullied less often.

D   be often subject to a special type of parental bullying.

36   Homeschooling classes

A   generally take up more time than those at traditional schools.

B   take up more or less the same time as those at traditional schools.

C   generally take up a lot less time than those at traditional schools.

D   generally take place in the mornings.

37   Homeschooling parents can often choose not to

A   make their children sit exams.

B   study certain subjects they do not favour.

C   have any holidays away from education.

D   share their children’s results with universities.

Questions 38-40

Do the following statements agree with the views of the writer of the text?

In boxes 38-40 on your answer sheet write:

YES                  if the statement agrees with the writer’s views

NO                   if the statement doesn’t agree with the writer’s views

NOT GIVEN    if it is impossible to say what the writer thinks about this

38   Many parents are challenged by the parental time required of them to homeschool their children.

39   Parents’ love for their children is unconditional.

40   US law should require that parents who choose homeschooling are inspected at least once a year.

Passage 1

1. FALSE

2. NOT GIVEN

3. FALSE

4. avalanche

5. stability

6. temperatures

7. warm

8. dripping

9. elevated

10. (air) vent

11. (reindeer) hides

12. melt

13. (interior) decorations

Passage 2

14. spread

15. reputations

16. hide

17. origins

18. risks

19. (Floppy) disks

20. (A) logic bomb

21. (A) worm

22. Mutation

23. Email

24. variants

25. (A) (regular) subscription

26. education of users

Passage 3

27. E

28. C

29. G

30. A

31. D

32. F

33. B

34. A

35. C

36. C

37. B

38. YES

39. NO

40. NOT GIVEN

Share This