ExplanationQ. 1 Based upon the passage, the author implies which of the following:
A) Information obtained unwillingly from the Internet is permissible in court - True. If you go and read it carefully the students were charged for the crime. Means it can be used a proof in court at least as per author. In real word it may be debatable.
B) It is impossible to protect yourself from unintended uses of information online - Impossible is not the right word
C) Making information available only to people whom you trust compromises your online community - Wrong
D) Even if you restrict who can view your data, the government may still access it - Well that is true in general but author is not implying this.
E) Done properly, posting prurient information about oneself poses no substantial risk - No risk is not true.
Q. 2 Which of the following best describes the author's logical flow in the passage?A) Define a problem, provide examples of it, offer means of remedying it, and offer a brief evaluation of the issue at hand - Keep it.
B) Provide examples of a problem, offer a counter point, provide a resolution of the conflicting views, and offer a brief evaluation of the issue at hand - Conflicting views? The only view we have is author's view.
C) Provide examples of a problem, provide means of remedying it, offer a brief evaluation of the issue at hand, and provide a contrasting evaluation of the issue at hand - Compared with A, It skips define the problem which is not good and contrasting evaluation of the issue is again not true.
D) Define a problem, provide examples of it, offer a brief evaluation of the issue at hand, and offer suggestions to support that evaluation - No suggestions
E) Define a problem, offer a contrasting view of the issue at hand, offer a brief evaluation of the issue at hand, and offer a solution to the conflicting views - there is no one good happy solution.
Q. 3 The author implies that users should take all of the following actions to protect their online privacy EXCEPT:A) Know to whom you make your online information available - Mentioned
B) Actively hunt for misinformation or damaging information posted about you or under your name - Mentioned
C) Speak with recruiters to inform them of any misinformation published about you - Does not mention
D) Carefully select and limit who can view your electronic profile - Mentioned
E) Avoid uploading information that would be exceedingly damaging if it were discovered - Mentioned
Note : May be I got too thoughtful about this, wasting 2 minutes and getting the wrong answer. But it is a 10 second answer if you are not thinking too much.
Q. 4 The tone of the passage suggests that the author's view toward e-community and the digital world can best be described as:If you read the passage and identified the flow of ideas, author is like Problem, bad thing, bad thing, possible ways to overcome it and conclusion.
A) Largely Pessimistic - No
B) Frustrated - Hell No. May be we are but not the author :P
C) Guardedly Optimistic - True. Very True.
D) Distressed - No
E) Strongly Optimistic - No. Only you are optimistic about your answer not author :P
Q.5 According to the passage, all of the following represent a possible threat to privacy or an unintended use of data EXCEPT:A) Disgruntled past associates posting damaging information online - Mentioned not explicitly but mentioned.
B) Colleges or universities disciplining students for expressing politically incorrect or institutionally disowned opinions - Mentioned
C) Government officials using online information, obtained against one’s will, to bring legal proceedings - - Mentioned
D) Potential employers conducting unauthorized and potentially invasive background checks via Google or Facebook - - Mentioned
E) Malicious users impersonating one's identity to commit identity fraud - No mention of this. Don't use external knowledge on this one.
Q.6 The primary purpose of the passage is to:Explanation: One of those days when you get this question right with almost 100% certainty. If you read carefully, answer B stands out.
A) Explain the growth of the digital world through the lens of privacy
B) Discuss the risks of the digital world and suggest ways to protect yourself
C) Evaluate the pros and cons of active participation in the digital world
D) Propose steps Facebook, MySpace, and Google can take to protect user privacy
E) Illustrate potential unintended uses of private information
Q. 7 Which of the following best describes the relationship of the fourth paragraph to the remainder of the passage?Explanation: Even though you did not know the meaning of ameliorate just like me you still know that is the right answer because you know other 4 are wrong.
A) It offers detailed examples to support previous assertions - No. There are no more examples just remedies.
B) It provides suggestions to ameliorate the previously mentioned problems
C) It summarizes the points of the preceding paragraphs - It does but that is not the only thing it does.
D) It offers counter evidence and an alternative point of view to the claims made earlier in the passage - evidence?
E) It reconciles conflicting claims- Again no other claims.