(29) _____________, threats to critical infrastructure and national interests arising from the use of the internet for criminal and terrorist activities are a growing (30) _________
A. concern
B. apathy
C. pattern
D. insouciance
Chọn đáp án A
- concern (n): mối quan tâm
- apathy /ˈæpəθi/ (n): tính thờ ơ, thiếu quan tâm
- pattern (n): kiểu mẫu, mô hình
- insouciance /ɪnˈsuːsiəns/ (n): tính vô tâm
"Hơn nữa, các mối đe dọa đối với cơ sở hạ tầng quan trọng và lợi ích quốc gia phát sinh từ việc sử dụng Internet cho các hoạt động tội phạm và khủng bố đang là mối quan tâm ngày càng tăng."
Gói VIP thi online tại VietJack (chỉ 400k/1 năm học), luyện tập gần 1 triệu câu hỏi có đáp án chi tiết
Mark the letter A, B, C, or D on your answer sheet to indicate the correct answer to each of the following questions.
My mother made me_____________him next week.
More than 80,000 people_____________coronavirus in China in late 2019.
Finally, she_____________a new idea for increasing sales figures.
It must be true. She heard it straight from the_____________mouth.
We are_____________no obligation to change goods which were not purchased here.
(A) The lion has (B) long been (C) a symbol of strength, power, and (D) it is very cruel.
Although he received intensive treatment, there was no_____________improvement in his condition.
Lisa: "It was very kind of you to help me out, Mark"
Mark:" _____________"
Read the following passage and mark the letter A, B, C, or D on your answer sheet to indicate the correct word or phrase that best fits each of the numbered blanks from 26 to 30.
Around the world, rights related to information technology that are already legally recognized are daily being violated, (26) _____________in the name of economic advancement, political stability or for personal greed and interests. Violations of these rights have (27) _____________new problems in human social systems, such as the digital divide, cybercrime, digital security and privacy concerns, all of which have affected people's lives either directly or indirectly. It is important that countries come up with guidelines for action to (28) _____________the incidences of malicious attacks on the confidentiality, integrity, and availability of electronic data and systems, computer-related crimes, content related offences and violations of intellectual property rights. (29) _____________, threats to critical infrastructure and national interests arising from the use of the internet for criminal and terrorist activities are a growing (30) _____________.
Mark the letter A, B, C, or D on your answer sheet to indicate the option that best completes each of the following exchanges.
"Well, I hope you enjoyed your meal." - "_____________"