Welcome to Online English Section in letsstudytogether.co . Here we are providing a set of English Quiz for SBI PO 2017 on Reading Comprehension.
Reading Comprehension
Q.Read the following passage carefully and answer the questions given below it. Certain words are given in bold to help you locate them while answering some of the questions.
Certain words are given in bold to help you locate them while answering some of the questions. Although websites such as Facebook and MySpace experienced exponential growth during the middle of the first decade of the 21st century, some users remain oblivious to the fact that the information they post online can come back to haunt them. First, employers can monitor employees who maintain a blog, photo diary, or website. Employers can look for controversial employee opinions, sensitive information disclosures, or wildly inappropriate conduct. For example, a North Carolina newspaper fired one of its features writers after she created a blog on which she anonymously wrote about the idiosyncrasies of her job and co-workers. The second unintended use of information from social networking websites is employers who check on prospective employees. A June 11, 2006 New York Times article reported that many companies recruiting on college campuses use search engines and social networking websites such as MySpace, Xanga, and Facebook to conduct background checks. Although the use of MySpace or Google to scrutinize a student’s background is somewhat unsettling to many undergraduates, the Times noted that the utilization of Facebook is especially shocking to students who believe that Facebook is limited to current students and recent alumni. Corporate recruiters and prospective employers are not the only people interested in college students’ lives. The third unintended use of social networking websites is college administrators who monitor the Internet—especially Facebook—for student misconduct. For example, a college in Boston’s Back Bay expelled its student Government Association President for joining a Facebook group highly critical of a campus police sergeant. In addition, fifteen students at a state university in North Carolina faced charges in court for underage drinking because of photos that appeared on Facebook. Although more users of websites such as Facebook are becoming aware of the potential pitfalls of online identities, many regular users still fail to take three basic security precautions. First, only make your information available to a specific list of individuals whom you approve. Second, regularly search for potentially harmful information about yourself that may have been posted by mistake or by a disgruntled former associate. Third, never post blatantly offensive material under your name or on your page as, despite the best precautions, this material will likely make its way to the wider world. By taking these simple steps, members of the digital world can realize the many benefits of ecommunity without experiencing some of the damaging unintended consequences.
1.Based upon the passage, the author implies which of the following:
A. Information obtained unwillingly from the Internet is permissible in court.
B. It is impossible to protect yourself from unintended uses of information online.
C. Making information available only to people whom you trust compromises your online community
D. Even if you restrict who can view your data, the government may still access it
E. Done properly, posting prurient information about oneself poses no substantial risk.
2.Which of the following best describes the author’s logical flow in the passage?
A. Define a problem, provide examples of it, offer means of remedying it, and offer a brief evaluation of
the issue at hand
B. Provide examples of a problem, offer a counter point, provide a resolution of the conflicting views, and
offer a brief evaluation of the issue at hand
C. Provide examples of a problem, provide means of remedying it, offer a brief evaluation of the issue at
hand, and provide a contrasting evaluation of the issue at hand
D. Define a problem, provide examples of it, offer a brief evaluation of the issue at hand, and offer
suggestions to support that evaluation
E. Define a problem, offer a contrasting view of the issue at hand, offer a brief evaluation of the issue at
hand, and offer a solution to the conflicting views
3.The author implies that users should take all of the following actions to protect their online privacy
EXCEPT:
A. Know to whom you make your online information available
B. Actively hunt for misinformation or damaging information posted about you or under your name
C. Speak with recruiters to inform them of any misinformation published about you
D. Carefully select and limit who can view your electronic profile
E. Avoid uploading information that would be exceedingly damaging if it were discovered
4.The tone of the passage suggests that the author’s view toward ecommunity and the digital world can best be described as:
A. Largely Pessimistic
B. Frustrated
C. Guardedly Optimistic
D. Distressed
E. Strongly Optimistic
5.According to the passage, all of the following represent a possible threat to privacy or an unintended use of data EXCEPT:
A. Disgruntled past associates posting damaging information online
B. Colleges or universities disciplining students for expressing politically incorrect or institutionally
disowned opinions
C. Government officials using online information, obtained against one’s will, to bring legal proceedings
D. Potential employers conducting unauthorized and potentially invasive background checks via Google
or Facebook
E. Malicious users impersonating one’s identity to commit identity fraud
6.Primary purpose of the passage is to:
A. Explain the growth of the digital world through the lens of privacy
B. Discuss the risks of the digital world and suggest ways to protect yourself
C. Evaluate the pros and cons of active participation in the digital world
D. Propose steps Facebook, MySpace, and Google can take to protect user privacy
E. Illustrate potential unintended uses of private information
7.Choose the word/group of words which is MOST SIMILAR in meaning to the word/ group of words printed in bold as used in the passage. BLATANTLY
A. Palpable
B. insignificant
C. subtle
D. tenuous
E. inconspicuous
8.Choose the word/group of words which is MOST SIMILAR in meaning to the word/ group of words printed in bold as used in the passage. IDIOSYNCRASIES
A. orthodox
B. mainstream
C. peculiar
D. ubiquitous
E. comprehensive
9.Choose the word/group of words which is MOST OPPOSITE in meaning to the word/ group of words printed in bold as used in the passage. DISGRUNTLED
A. aggrieved
B. jocular
C. petulant
D. sullen
E. malcontent
10.Choose the word/group of words which is MOST OPPOSITE in meaning to the word/ group of words printed in bold as used in the passage. PITFALLS
A. hazard
B. snag
C. peril
D. menace
E. advantage
Correct Answer:
- Information obtained unwillingly from the Internet is permissible in court.
- Define a problem, provide examples of it, offer means of remedying it, and offer a brief evaluation of the issue at hand.
- Speak with recruiters to inform them of any misinformation published about you
- Guardedly Optimistic
- Malicious users impersonating one’s identity to commit identity fraud.
- Discuss the risks of the digital world and suggest ways to protect yourself
- Blatantly means (of bad behaviour) done openly and unashamedly hence palpable is the word most similar in meaning.
- Idiosyncrasies means a mode of behaviour or way of thought peculiar to an individual hence peculiar is the word most similar in meaning,.
- Disgruntled means angry or dissatisfied hence jocular is the word most opposite in meaning.
- Pitfall means a hidden or unsuspected danger or difficulty hence advantage is the word most opposite in meaning.
For more details click here
Thank you, all the best. and lets study together.