1 . In the following passage, there are blanks, each of which has been numbered. These numbers are printed below the passage and against each, five words are suggested, one of which fits the blank appropriately. Find out the appropriate word in each case

(71) over the world, rights related to information technology that are already legally recognised are daily being violated, (72) in the name of economic advancement, political stability or for personal greed and interests. Violations of these rights have (73) new problems in human social systems, such as the digital divide, cybercrime, digital security and privacy concerns, all of which have (74) people's lives either directly or indirectly.

It is important that countries come up with the guidelines for action to (75) the incidences of malicious attacks on the confidentiality, integrity and availability of electronic data and systems, computer-related crimes, conte t related offences and violations of intellectual property rights. ( 76) , threats to critical infrastructure and national interests arising from the use of the internet for criminal and terrorist activities are of growing (77). The harm incurred to businesses, governments and individuals in those countries in which the internet is used (78) is gaining in (79) and importance, while in other countries, cybercrime threatens the application of information and communication technology for government services, health care, trade, and banking. As users start losing (80) in online transactions and business, the opportunity costs may become substantial.
Q: 72
A.  scarcely
B.  whether
C.  and
D.  for
E.  hardly
View Answer Discuss in Forum
2 . In the following passage, there are blanks, each of which has been numbered. These numbers are printed below the passage and against each, five words are suggested, one of which fits the blank appropriately. Find out the appropriate word in each case

(71) over the world, rights related to information technology that are already legally recognised are daily being violated, (72) in the name of economic advancement, political stability or for personal greed and interests. Violations of these rights have (73) new problems in human social systems, such as the digital divide, cybercrime, digital security and privacy concerns, all of which have (74) people's lives either directly or indirectly.

It is important that countries come up with the guidelines for action to (75) the incidences of malicious attacks on the confidentiality, integrity and availability of electronic data and systems, computer-related crimes, conte t related offences and violations of intellectual property rights. ( 76) , threats to critical infrastructure and national interests arising from the use of the internet for criminal and terrorist activities are of growing (77). The harm incurred to businesses, governments and individuals in those countries in which the internet is used (78) is gaining in (79) and importance, while in other countries, cybercrime threatens the application of information and communication technology for government services, health care, trade, and banking. As users start losing (80) in online transactions and business, the opportunity costs may become substantial.
Q: 73
A.  created
B.  bent
C.  pressured
D.  risen
E.  stopped
View Answer Discuss in Forum
3 . In the following passage, there are blanks, each of which has been numbered. These numbers are printed below the passage and against each, five words are suggested, one of which fits the blank appropriately. Find out the appropriate word in each case

(71) over the world, rights related to information technology that are already legally recognised are daily being violated, (72) in the name of economic advancement, political stability or for personal greed and interests. Violations of these rights have (73) new problems in human social systems, such as the digital divide, cybercrime, digital security and privacy concerns, all of which have (74) people's lives either directly or indirectly.

It is important that countries come up with the guidelines for action to (75) the incidences of malicious attacks on the confidentiality, integrity and availability of electronic data and systems, computer-related crimes, conte t related offences and violations of intellectual property rights. ( 76) , threats to critical infrastructure and national interests arising from the use of the internet for criminal and terrorist activities are of growing (77). The harm incurred to businesses, governments and individuals in those countries in which the internet is used (78) is gaining in (79) and importance, while in other countries, cybercrime threatens the application of information and communication technology for government services, health care, trade, and banking. As users start losing (80) in online transactions and business, the opportunity costs may become substantial.
Q: 74
A.  distanced
B.  affected
C.  exaggerated
D.  advanced
E.  cropped
View Answer Discuss in Forum
4 . In the following passage, there are blanks, each of which has been numbered. These numbers are printed below the passage and against each, five words are suggested, one of which fits the blank appropriately. Find out the appropriate word in each case

(71) over the world, rights related to information technology that are already legally recognised are daily being violated, (72) in the name of economic advancement, political stability or for personal greed and interests. Violations of these rights have (73) new problems in human social systems, such as the digital divide, cybercrime, digital security and privacy concerns, all of which have (74) people's lives either directly or indirectly.

It is important that countries come up with the guidelines for action to (75) the incidences of malicious attacks on the confidentiality, integrity and availability of electronic data and systems, computer-related crimes, conte t related offences and violations of intellectual property rights. ( 76) , threats to critical infrastructure and national interests arising from the use of the internet for criminal and terrorist activities are of growing (77). The harm incurred to businesses, governments and individuals in those countries in which the internet is used (78) is gaining in (79) and importance, while in other countries, cybercrime threatens the application of information and communication technology for government services, health care, trade, and banking. As users start losing (80) in online transactions and business, the opportunity costs may become substantial.
Q: 75
A.  engage
B.  conflict
C.  war
D.  combat
E.  struggle
View Answer Discuss in Forum
5 . In the following passage, there are blanks, each of which has been numbered. These numbers are printed below the passage and against each, five words are suggested, one of which fits the blank appropriately. Find out the appropriate word in each case

(71) over the world, rights related to information technology that are already legally recognised are daily being violated, (72) in the name of economic advancement, political stability or for personal greed and interests. Violations of these rights have (73) new problems in human social systems, such as the digital divide, cybercrime, digital security and privacy concerns, all of which have (74) people's lives either directly or indirectly.

It is important that countries come up with the guidelines for action to (75) the incidences of malicious attacks on the confidentiality, integrity and availability of electronic data and systems, computer-related crimes, conte t related offences and violations of intellectual property rights. ( 76) , threats to critical infrastructure and national interests arising from the use of the internet for criminal and terrorist activities are of growing (77). The harm incurred to businesses, governments and individuals in those countries in which the internet is used (78) is gaining in (79) and importance, while in other countries, cybercrime threatens the application of information and communication technology for government services, health care, trade, and banking. As users start losing (80) in online transactions and business, the opportunity costs may become substantial.
Q: 76
A.  But
B.  More
C.  Addition
D.  Beside
E.  Further
View Answer Discuss in Forum
6 . In the following passage, there are blanks, each of which has been numbered. These numbers are printed below the passage and against each, five words are suggested, one of which fits the blank appropriately. Find out the appropriate word in each case

(71) over the world, rights related to information technology that are already legally recognised are daily being violated, (72) in the name of economic advancement, political stability or for personal greed and interests. Violations of these rights have (73) new problems in human social systems, such as the digital divide, cybercrime, digital security and privacy concerns, all of which have (74) people's lives either directly or indirectly.

It is important that countries come up with the guidelines for action to (75) the incidences of malicious attacks on the confidentiality, integrity and availability of electronic data and systems, computer-related crimes, conte t related offences and violations of intellectual property rights. ( 76) , threats to critical infrastructure and national interests arising from the use of the internet for criminal and terrorist activities are of growing (77). The harm incurred to businesses, governments and individuals in those countries in which the internet is used (78) is gaining in (79) and importance, while in other countries, cybercrime threatens the application of information and communication technology for government services, health care, trade, and banking. As users start losing (80) in online transactions and business, the opportunity costs may become substantial.
Q: 77
A.  concern
B.  nature
C.  pattern
D.  important
E.  matter
View Answer Discuss in Forum
7 . In the following passage, there are blanks, each of which has been numbered. These numbers are printed below the passage and against each, five words are suggested, one of which fits the blank appropriately. Find out the appropriate word in each case

(71) over the world, rights related to information technology that are already legally recognised are daily being violated, (72) in the name of economic advancement, political stability or for personal greed and interests. Violations of these rights have (73) new problems in human social systems, such as the digital divide, cybercrime, digital security and privacy concerns, all of which have (74) people's lives either directly or indirectly.

It is important that countries come up with the guidelines for action to (75) the incidences of malicious attacks on the confidentiality, integrity and availability of electronic data and systems, computer-related crimes, conte t related offences and violations of intellectual property rights. ( 76) , threats to critical infrastructure and national interests arising from the use of the internet for criminal and terrorist activities are of growing (77). The harm incurred to businesses, governments and individuals in those countries in which the internet is used (78) is gaining in (79) and importance, while in other countries, cybercrime threatens the application of information and communication technology for government services, health care, trade, and banking. As users start losing (80) in online transactions and business, the opportunity costs may become substantial.
Q: 78
A.  really
B.  figuratively
C.  widely
D.  never
E.  tandem
View Answer Discuss in Forum
8 . In the following passage, there are blanks, each of which has been numbered. These numbers are printed below the passage and against each, five words are suggested, one of which fits the blank appropriately. Find out the appropriate word in each case

(71) over the world, rights related to information technology that are already legally recognised are daily being violated, (72) in the name of economic advancement, political stability or for personal greed and interests. Violations of these rights have (73) new problems in human social systems, such as the digital divide, cybercrime, digital security and privacy concerns, all of which have (74) people's lives either directly or indirectly.

It is important that countries come up with the guidelines for action to (75) the incidences of malicious attacks on the confidentiality, integrity and availability of electronic data and systems, computer-related crimes, conte t related offences and violations of intellectual property rights. ( 76) , threats to critical infrastructure and national interests arising from the use of the internet for criminal and terrorist activities are of growing (77). The harm incurred to businesses, governments and individuals in those countries in which the internet is used (78) is gaining in (79) and importance, while in other countries, cybercrime threatens the application of information and communication technology for government services, health care, trade, and banking. As users start losing (80) in online transactions and business, the opportunity costs may become substantial.
Q: 79
A.  fear
B.  days
C.  positivity
D.  width
E.  scope
View Answer Discuss in Forum
9 . In the following passage, there are blanks, each of which has been numbered. These numbers are printed below the passage and against each, five words are suggested, one of which fits the blank appropriately. Find out the appropriate word in each case

(71) over the world, rights related to information technology that are already legally recognised are daily being violated, (72) in the name of economic advancement, political stability or for personal greed and interests. Violations of these rights have (73) new problems in human social systems, such as the digital divide, cybercrime, digital security and privacy concerns, all of which have (74) people's lives either directly or indirectly.

It is important that countries come up with the guidelines for action to (75) the incidences of malicious attacks on the confidentiality, integrity and availability of electronic data and systems, computer-related crimes, conte t related offences and violations of intellectual property rights. ( 76) , threats to critical infrastructure and national interests arising from the use of the internet for criminal and terrorist activities are of growing (77). The harm incurred to businesses, governments and individuals in those countries in which the internet is used (78) is gaining in (79) and importance, while in other countries, cybercrime threatens the application of information and communication technology for government services, health care, trade, and banking. As users start losing (80) in online transactions and business, the opportunity costs may become substantial.
Q: 80
A.  tracks
B.  measure
C.  confidence
D.  mind
E.  grip
View Answer Discuss in Forum
10 . Rearrange the following six sentences (A), (B), (C), (D) and (E) in a proper sequence to form a meaningful paragraph; then answer the equations given below them.

(A) The policy makers in most of the developing economies recognise this importance andhave been implementing a host of programmes and measures to achieve rural development objectives.

(B) While some of these countries have achieved impressive results from those programmes and measures, other have failed to make a significant dent in the problem of persistent rural underdevelopment.

(C) The socio-economic disparities between rural and urban areas are widening and creating tremendous pressure on the social and economic fabric of many such developing economies.

(D) These factors, among many others, tend to highlight the importance of rural development.

(E) Although millions of rural people have escaped poverty as a result of rural development in many Asian countries, a large majority of rural people continue to suffer from persistent poverty
Which of the following should be the THIRD sentence after rearrangement?
A.  A
B.  B
C.  C
D.  D
E.  E
View Answer Discuss in Forum

Test 21 Test 23


Sponsored Links
500
Write your Comment or Discuss..
    Log in | Sign up
    Test 21 Test 23 Test 24 Test 25 Test 26 Test 27
    Advertisements

    Copyright 2019-2020 | Privacy Policy | Terms and Conditions | Contact us | Advertise