1 . In the following passage, there are blanks, each of which has been numbered. These numbers are printed below the passage and against each, five words are suggested, one of which fits the blank appropriately. Find out the appropriate word in each case

(71) over the world, rights related to information technology that are already legally recognised are daily being violated, (72) in the name of economic advancement, political stability or for personal greed and interests. Violations of these rights have (73) new problems in human social systems, such as the digital divide, cybercrime, digital security and privacy concerns, all of which have (74) people's lives either directly or indirectly.

It is important that countries come up with the guidelines for action to (75) the incidences of malicious attacks on the confidentiality, integrity and availability of electronic data and systems, computer-related crimes, conte t related offences and violations of intellectual property rights. ( 76) , threats to critical infrastructure and national interests arising from the use of the internet for criminal and terrorist activities are of growing (77). The harm incurred to businesses, governments and individuals in those countries in which the internet is used (78) is gaining in (79) and importance, while in other countries, cybercrime threatens the application of information and communication technology for government services, health care, trade, and banking. As users start losing (80) in online transactions and business, the opportunity costs may become substantial.
Q: 71
A.  Entire
B.  Lot
C.  Great
D.  All
E.  Much
View Answer Discuss in Forum
2 . In the following passage, there are blanks, each of which has been numbered. These numbers are printed below the passage and against each, five words are suggested, one of which fits the blank appropriately. Find out the appropriate word in each case

(71) over the world, rights related to information technology that are already legally recognised are daily being violated, (72) in the name of economic advancement, political stability or for personal greed and interests. Violations of these rights have (73) new problems in human social systems, such as the digital divide, cybercrime, digital security and privacy concerns, all of which have (74) people's lives either directly or indirectly.

It is important that countries come up with the guidelines for action to (75) the incidences of malicious attacks on the confidentiality, integrity and availability of electronic data and systems, computer-related crimes, conte t related offences and violations of intellectual property rights. ( 76) , threats to critical infrastructure and national interests arising from the use of the internet for criminal and terrorist activities are of growing (77). The harm incurred to businesses, governments and individuals in those countries in which the internet is used (78) is gaining in (79) and importance, while in other countries, cybercrime threatens the application of information and communication technology for government services, health care, trade, and banking. As users start losing (80) in online transactions and business, the opportunity costs may become substantial.
Q: 72
A.  scarcely
B.  whether
C.  and
D.  for
E.  hardly
View Answer Discuss in Forum
3 . In the following passage, there are blanks, each of which has been numbered. These numbers are printed below the passage and against each, five words are suggested, one of which fits the blank appropriately. Find out the appropriate word in each case

(71) over the world, rights related to information technology that are already legally recognised are daily being violated, (72) in the name of economic advancement, political stability or for personal greed and interests. Violations of these rights have (73) new problems in human social systems, such as the digital divide, cybercrime, digital security and privacy concerns, all of which have (74) people's lives either directly or indirectly.

It is important that countries come up with the guidelines for action to (75) the incidences of malicious attacks on the confidentiality, integrity and availability of electronic data and systems, computer-related crimes, conte t related offences and violations of intellectual property rights. ( 76) , threats to critical infrastructure and national interests arising from the use of the internet for criminal and terrorist activities are of growing (77). The harm incurred to businesses, governments and individuals in those countries in which the internet is used (78) is gaining in (79) and importance, while in other countries, cybercrime threatens the application of information and communication technology for government services, health care, trade, and banking. As users start losing (80) in online transactions and business, the opportunity costs may become substantial.
Q: 73
A.  created
B.  bent
C.  pressured
D.  risen
E.  stopped
View Answer Discuss in Forum
4 . In the following passage, there are blanks, each of which has been numbered. These numbers are printed below the passage and against each, five words are suggested, one of which fits the blank appropriately. Find out the appropriate word in each case

(71) over the world, rights related to information technology that are already legally recognised are daily being violated, (72) in the name of economic advancement, political stability or for personal greed and interests. Violations of these rights have (73) new problems in human social systems, such as the digital divide, cybercrime, digital security and privacy concerns, all of which have (74) people's lives either directly or indirectly.

It is important that countries come up with the guidelines for action to (75) the incidences of malicious attacks on the confidentiality, integrity and availability of electronic data and systems, computer-related crimes, conte t related offences and violations of intellectual property rights. ( 76) , threats to critical infrastructure and national interests arising from the use of the internet for criminal and terrorist activities are of growing (77). The harm incurred to businesses, governments and individuals in those countries in which the internet is used (78) is gaining in (79) and importance, while in other countries, cybercrime threatens the application of information and communication technology for government services, health care, trade, and banking. As users start losing (80) in online transactions and business, the opportunity costs may become substantial.
Q: 74
A.  distanced
B.  affected
C.  exaggerated
D.  advanced
E.  cropped
View Answer Discuss in Forum
5 . In the following passage, there are blanks, each of which has been numbered. These numbers are printed below the passage and against each, five words are suggested, one of which fits the blank appropriately. Find out the appropriate word in each case

(71) over the world, rights related to information technology that are already legally recognised are daily being violated, (72) in the name of economic advancement, political stability or for personal greed and interests. Violations of these rights have (73) new problems in human social systems, such as the digital divide, cybercrime, digital security and privacy concerns, all of which have (74) people's lives either directly or indirectly.

It is important that countries come up with the guidelines for action to (75) the incidences of malicious attacks on the confidentiality, integrity and availability of electronic data and systems, computer-related crimes, conte t related offences and violations of intellectual property rights. ( 76) , threats to critical infrastructure and national interests arising from the use of the internet for criminal and terrorist activities are of growing (77). The harm incurred to businesses, governments and individuals in those countries in which the internet is used (78) is gaining in (79) and importance, while in other countries, cybercrime threatens the application of information and communication technology for government services, health care, trade, and banking. As users start losing (80) in online transactions and business, the opportunity costs may become substantial.
Q: 75
A.  engage
B.  conflict
C.  war
D.  combat
E.  struggle
View Answer Discuss in Forum
6 . In the following passage, there are blanks, each of which has been numbered. These numbers are printed below the passage and against each, five words are suggested, one of which fits the blank appropriately. Find out the appropriate word in each case

(71) over the world, rights related to information technology that are already legally recognised are daily being violated, (72) in the name of economic advancement, political stability or for personal greed and interests. Violations of these rights have (73) new problems in human social systems, such as the digital divide, cybercrime, digital security and privacy concerns, all of which have (74) people's lives either directly or indirectly.

It is important that countries come up with the guidelines for action to (75) the incidences of malicious attacks on the confidentiality, integrity and availability of electronic data and systems, computer-related crimes, conte t related offences and violations of intellectual property rights. ( 76) , threats to critical infrastructure and national interests arising from the use of the internet for criminal and terrorist activities are of growing (77). The harm incurred to businesses, governments and individuals in those countries in which the internet is used (78) is gaining in (79) and importance, while in other countries, cybercrime threatens the application of information and communication technology for government services, health care, trade, and banking. As users start losing (80) in online transactions and business, the opportunity costs may become substantial.
Q: 76
A.  But
B.  More
C.  Addition
D.  Beside
E.  Further
View Answer Discuss in Forum
7 . In the following passage, there are blanks, each of which has been numbered. These numbers are printed below the passage and against each, five words are suggested, one of which fits the blank appropriately. Find out the appropriate word in each case

(71) over the world, rights related to information technology that are already legally recognised are daily being violated, (72) in the name of economic advancement, political stability or for personal greed and interests. Violations of these rights have (73) new problems in human social systems, such as the digital divide, cybercrime, digital security and privacy concerns, all of which have (74) people's lives either directly or indirectly.

It is important that countries come up with the guidelines for action to (75) the incidences of malicious attacks on the confidentiality, integrity and availability of electronic data and systems, computer-related crimes, conte t related offences and violations of intellectual property rights. ( 76) , threats to critical infrastructure and national interests arising from the use of the internet for criminal and terrorist activities are of growing (77). The harm incurred to businesses, governments and individuals in those countries in which the internet is used (78) is gaining in (79) and importance, while in other countries, cybercrime threatens the application of information and communication technology for government services, health care, trade, and banking. As users start losing (80) in online transactions and business, the opportunity costs may become substantial.
Q: 77
A.  concern
B.  nature
C.  pattern
D.  important
E.  matter
View Answer Discuss in Forum
8 . In the following passage, there are blanks, each of which has been numbered. These numbers are printed below the passage and against each, five words are suggested, one of which fits the blank appropriately. Find out the appropriate word in each case

(71) over the world, rights related to information technology that are already legally recognised are daily being violated, (72) in the name of economic advancement, political stability or for personal greed and interests. Violations of these rights have (73) new problems in human social systems, such as the digital divide, cybercrime, digital security and privacy concerns, all of which have (74) people's lives either directly or indirectly.

It is important that countries come up with the guidelines for action to (75) the incidences of malicious attacks on the confidentiality, integrity and availability of electronic data and systems, computer-related crimes, conte t related offences and violations of intellectual property rights. ( 76) , threats to critical infrastructure and national interests arising from the use of the internet for criminal and terrorist activities are of growing (77). The harm incurred to businesses, governments and individuals in those countries in which the internet is used (78) is gaining in (79) and importance, while in other countries, cybercrime threatens the application of information and communication technology for government services, health care, trade, and banking. As users start losing (80) in online transactions and business, the opportunity costs may become substantial.
Q: 78
A.  really
B.  figuratively
C.  widely
D.  never
E.  tandem
View Answer Discuss in Forum
9 . In the following passage, there are blanks, each of which has been numbered. These numbers are printed below the passage and against each, five words are suggested, one of which fits the blank appropriately. Find out the appropriate word in each case

(71) over the world, rights related to information technology that are already legally recognised are daily being violated, (72) in the name of economic advancement, political stability or for personal greed and interests. Violations of these rights have (73) new problems in human social systems, such as the digital divide, cybercrime, digital security and privacy concerns, all of which have (74) people's lives either directly or indirectly.

It is important that countries come up with the guidelines for action to (75) the incidences of malicious attacks on the confidentiality, integrity and availability of electronic data and systems, computer-related crimes, conte t related offences and violations of intellectual property rights. ( 76) , threats to critical infrastructure and national interests arising from the use of the internet for criminal and terrorist activities are of growing (77). The harm incurred to businesses, governments and individuals in those countries in which the internet is used (78) is gaining in (79) and importance, while in other countries, cybercrime threatens the application of information and communication technology for government services, health care, trade, and banking. As users start losing (80) in online transactions and business, the opportunity costs may become substantial.
Q: 79
A.  fear
B.  days
C.  positivity
D.  width
E.  scope
View Answer Discuss in Forum
10 . In the following passage, there are blanks, each of which has been numbered. These numbers are printed below the passage and against each, five words are suggested, one of which fits the blank appropriately. Find out the appropriate word in each case

(71) over the world, rights related to information technology that are already legally recognised are daily being violated, (72) in the name of economic advancement, political stability or for personal greed and interests. Violations of these rights have (73) new problems in human social systems, such as the digital divide, cybercrime, digital security and privacy concerns, all of which have (74) people's lives either directly or indirectly.

It is important that countries come up with the guidelines for action to (75) the incidences of malicious attacks on the confidentiality, integrity and availability of electronic data and systems, computer-related crimes, conte t related offences and violations of intellectual property rights. ( 76) , threats to critical infrastructure and national interests arising from the use of the internet for criminal and terrorist activities are of growing (77). The harm incurred to businesses, governments and individuals in those countries in which the internet is used (78) is gaining in (79) and importance, while in other countries, cybercrime threatens the application of information and communication technology for government services, health care, trade, and banking. As users start losing (80) in online transactions and business, the opportunity costs may become substantial.
Q: 80
A.  tracks
B.  measure
C.  confidence
D.  mind
E.  grip
View Answer Discuss in Forum

Test 70 Test 72


Sponsored Links
500
Write your Comment or Discuss..
    Log in | Sign up
    Test 70 Test 72 Test 73 Test 74 Test 75 Test 76
    Advertisements

    Copyright 2019-2020 | Privacy Policy | Terms and Conditions | Contact us | Advertise