Uploaded by Meisstudying

2023 TERM 1 G8 Cycle Test (Comprehension and Language)

advertisement
__________________________________________________________________________________________
GRADE:
8
DATE:
3 February 2023
TIME ALLOCATION: 55 minutes
TOTAL MARKS:
40 marks
EXAMINER:
MODERATOR(S): A. de Lange
S. Motjuwadi
___________________________________________________________________________________
Instruc ons:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
Check that your ques on paper is complete. You may detach the insert from the ques on paper.
Number your answers the same as the numbering of the ques ons. Make sure your ques on
numbers are centred.
Make sure that you have ruled double margins and do NOT write in these margins.
Use both sides of the folio to write your answers.
It is in your own interest to write legibly and to present your work neatly.
Set out your work correctly. Skip two lines a er each ques on.
START EACH SECTION ON A NEW FOLIO and label the sec on clearly in the middle of the page on the
rst line.
Spelling and grammar always count!
Write in full sentences, unless s pulated otherwise.
Look at your mark alloca on!
Write your name on your QUESTION paper as well and place it BEHIND your answer paper.
This paper consists of 5 pages (including this one)
ti
ti
ti
ti
ti
ft
ti
ti
ti
1
ti
fi
English Home Language
Comprehension and Language Cycle Test
QUESTION 1: COMPREHENSION
Read the passage below and answer the questions that follow:
Text A
CYBERCRIME - A DISEASE OF THE INTERNET AGE.
1
A cybercrime is any crime that is committed using a computer, network or
hardware device. The computer and the internet can be used to target victims
as a tool to commit a variety of self-serving crimes. Many people think
cybercrime only affects major companies with millions worth of online assets,
but this is not true. Cybercrime constitutes a lot of other misdeeds such as
5
fraud, unauthorised access, and forgery. The major cybercrimes that
governments, industries, and people around the world are most concerned
about are cracking, piracy, phreaking, cyberstalking, cyber pornography, and
cyber-terrorism.
2
Cybercriminals/hackers can operate either in organised groups or as
individuals. Individual hackers normally engage in cybercrime to prove that
they are good at computer programming and navigating breaching software
whereas organised cyber gangs always engage cybercrime for monetary
purposes like hacking into big companies, business organisations or even
banks. Most of the time, organised hackers are employed by the very
institutions they steal from. However, there are many ways to protect yourself
from becoming a victim of cybercrime, such as: installing licensed antivirus
software, creating complicated electronic passwords, using spam blockers
and updating firewall settings. Embracing these prudent preventative
measures could stop the unthinkable from happening to you and your loved
ones.
10
15
20
3
Fraud is one of the many ways cybercrime takes form. It is when someone
extorts money from other individuals by way of tricking them. Cyber fraudsters
normally do this by impersonating big companies and sending victims emails
requesting their financial and bank details. Criminals then use these details to 25
hack the completely unassuming victim’s account. Cybercriminals also rely on
identity theft to commit their despicable crimes. Identity theft is the use of
someone else's personal data without their knowledge or consent. This can
be very injurious because criminals can use a victim's name, ID number,
birthday or even their international passport to create new credit cards or
30
collect loans which will affect the owners’ record for years to come.
4
Cybercrime is a new and grossly underreported area of investigation for both
police and civilians. Every precaution should, therefore, be taken so that the
public doesn't continue silently falling prey to this incurable disease of the
internet age.
35
Adapted from https://www.unodc.org/e4j/en/cybercrime/module-5/key-issues/
obstacles-to-cybercrime-investigations.html, 26 January 2023.
2
Text B - Image 1
Source: https://www.cartoonstock.com/cartoon?searchID=CG106957, 26 January 2023
Text C - Image 2
Source: https://www.slanecartoon.com/media/af0b58d7-714b-444d-9b48-5005638089a7-authenticatebefore-you-communicate, 26 January 2023
3
1.1
Refer to paragraph 1. In your own words, explain what a cybercrime is.
(2)
1.2
Give two reasons why individuals get involved in cybercrimes.
(2)
1.3
What does the phrase “self-serving” (line 3) tell us about the personalities
of cyber criminals?
(2)
1.4
Explain why people might think that “cybercrime only affects major
companies” (lines 3 - 4).
(2)
1.5
Provide a synonym for “embracing” in the context of line 19.
(1)
1.6
Refer to paragraph 2. State one surprising fact about organised cyber
criminals and elaborate on why you think it is surprising.
(2)
1.7
With reference to the text, as well as Image 1, give reasons as to why
people might believe that piracy is not all that bad.
(3)
1.8
Identify the pronoun in the phrase, “Hey- your boss here.” (Image 2). What
is the function of this part of speech?
(2)
1.9
Identify the interjection in the phrase, “Hmmm… Doesn’t sound like my
boss.” (Image 2). What is the function of this part of speech?
(2)
1.10
Discuss the function of the bolded text in frame four of Image 1.
(1)
1.11
What is the writer’s feelings toward targets of fraud? Quote words from the
text to substantiate your answer.
(3)
Look at the sentence, “Criminals then use these details to hack the
completely unassuming victim’s accounts” (line 25 - 26). Identify the
adjective and its function in this sentence.
(2)
1.12
1.13a
Evaluate how Image 1 supports and relates to what is spoken about in Text
(2)
A.
1.13b
Evaluate how Image 2 further supports what is spoken about in Text A.
(1)
1.14
Discuss whether or not people should be taking more precautions against
cybercrimes and why?
(3)
TOTAL: 30 MARKS
4
QUESTION 2: LANGUAGE
Read the text and answer the questions that follow.
Text D
1
Hacking is the practice of accessing data stored privately by experts. When
programmers make mistakes, those mistakes make the system vulnerable and
these vulnerabilities are being picked by hackers to hack the system. The
hackers who don’t work on principles of ethical hacking are known as unethical
hackers. Hackers are well aware that their activities are illegal and thus criminal 5
activity which is why they are trying to cover their tracks. In other words, we
can say that any effort to attack a computer system or a private network inside
a computer is known as hacking.
2
Ethical hacking are “legal” access to information that is unauthorised for the
rest of the world. This type of hacking is done to protect the system or websites 10
from malicious hackers and viruses. The hackers who work on principles
of ethical hacking are known as ethical hackers. While hackers may be highly
skilled at breaking system programs, professional ethical hackers can restore
the security of a compromised system and catch the criminal with their skills
and abilities.
15
3
Ethical hacking has it’s disadvantages- namely that it is illegal, the techniques
used can harm a person’s privacy. Hacking could at times corrupt the files and
data of the organisation and any information gained may be used for malicious
reasons.
4
Even so, ethical hacking may help fight against cyber terrorism, and national
security breaches. It also helps to build a system that prevents any kind of
penetration by hackers and offers security to banking establishments. Lastly,
ethical hacking may help identify and close the open holes in computer
systems and networks.
20
Adapted from: https://www.geeksforgeeks.org/introduction-to-ethical-hacking/, 26 January 2023
2.1
Provide the parts of speech for the underlined words.
(4)
2.2
Identify the conjunction in the sentence, “Hackers are well aware that their
activities are illegal and thus criminal…” (Line 5)
(1)
2.3
Correct the verb tense error in line 9.
(1)
2.4
Explain the function of an adjective and provide an example of a demonstrative
adjective from the first paragraph.
(2)
2.5
Quote the sentence from paragraph 3 that uses an adverb of time and explain
the use of the adverb in that sentence.
(2)
TOTAL: 10 MARKS
GRAND TOTAL: 40 MARKS
5
Download