ExamCompetition Forum Question Papers Ask A Question Mock Test Learn & Earn Sign Up Login Menu

Reading comprehension Practice Questions & Answers

0 vote

Read the following passage carefully and choose the most appropriate answer to the question out of the five alternatives. Facebook’s data policy has come under fire after it emerged that more than 50 million users’ information was open to political exploitation. Facebook announced on We

Asked on by | Votes 0

Read the following passage carefully and choose the most appropriate answer to the question out of the five alternatives.

Facebook’s data policy has come under fire after it emerged that more than 50 million users’ information was open to political exploitation. Facebook announced on Wednesday (March 28) that it is reviewing its data policy. Security and legal experts say there is a major flaw in the current policy. Even the highest privacy settings do not prevent Facebook from collecting information about you. These settings affect the way you share content with people on the social network. Facebook collects information about your posts, pictures, the location of pictures, the types of content you view on the social network and how long you dwell on such content. It also collects information about how you use the services, such as the types of content you view or engage with or the frequency and duration of your activities. This results in complete loss of privacy to an unknown source. Facebook collects information about your friends and the groups you are connected to, to build your profile. What they upload about you and the information they tag you with contribute to the detailed profile of you. If you use their services for purchases or financial transactions (like when you buy something on Facebook, make a purchase in a game, or make a donation), they collect information about the purchase or transaction. This includes your payment information, such as your credit or debit card number and other card information, and other account and authentication information, as well as billing, shipping and contact details. All these information have allegedly been used to understand a person's personal choices and rights. Leakage of such data is a major security threat and can change the course of action of this century.


Which word can best replace the word 'leakage' in the passage?
1). emission
2). oozing
3). seepage
4). outflow

0 vote

Read the passage and answer the questions. Domestic crude oil production fell for the fourth straight year in 2015-16, even as oil consumption rocketed 11%, pushing up India's import dependence. A collapse in oil prices coupled with a rapid economic growth has helped push up oil consumption at

Asked on by | Votes 0

Read the passage and answer the questions.

Domestic crude oil production fell for the fourth straight year in 2015-16, even as oil consumption rocketed 11%, pushing up India's import dependence. A collapse in oil prices coupled with a rapid economic growth has helped push up oil consumption at home. More vehicle purchases, increased use of diesel for irrigation due to weak monsoon and rising air traffic chiefly drove up consumption to 183.5 million metric tonne (mmt), compared to 165.5 mmt in the previous year. In comparison, India produced just 36.9 mmt of crude oil in 2015-16, lower than 37.5 mmt in the previous year. The country's largest oil producer, state-run Oil and Natural Gas Corporation BSE -0.35 % (ONGC), witnessed an output decline to 18.5 mmt from 18.6 mmt in the previous year. Oil producers have been struggling with ageing fields where outputs have been falling. Their inability to fresh big reserves into production lately has kept production stagnant. "The bigger problem is that the exploration activity didn't pick up in the last decade," said Gaurav Moda, consultant at KPMG, underlining the need to enhance exploration activity in the country to be able to accelerate output in the future. Without which, Moda says, India's dependence on overseas oil will only grow in future. The government has unveiled new exploration policies for its oil and gas blocks lately, aiming to plug loopholes in its previous policies that encouraged only limited participation of resource-rich foreign oil companies and couldn't dramatically boost the domestic output. India imported 202 mmt of crude oil in 2015-16, nearly 7% higher in volume, but paid just $64 billion, 43% lower due to the global oil collapse. 


What is the reason for stagnant production according to the passage?


1). The producers cannot afford the huge cost of production.
2). There is not enough oil reserves in the country.
3). The producers fail to cope up with the growing demand of oil.
4). Old and obsolete technology along with failure of exploration of newer oil reserves.

0 vote

A passage is given with 5 questions following it. Read the passage carefully and choose the best answer to each question out of the four alternatives. Due to poor rainfall over the past few months, the vadu mangai season is expected to be short this year. There are two distinct varieties available

Asked on by | Votes 0

A passage is given with 5 questions following it. Read the passage carefully and choose the best answer to each question out of the four alternatives.

Due to poor rainfall over the past few months, the vadu mangai season is expected to be short this year. There are two distinct varieties available in the vicinity of Coimbatore. The closest to Coimbatore, and the one that appears in the markets first, is the Thadagam variety. The second and more popular variety is the one from the Thirumoorthy Hills, near Udumalpet. Representatives from commercial pickle brands whisk these mangais away in big lots directly from the wholesalers. Only a small portion of the year's harvest trickles down to the local markets.

Small vendors bring sacks full of these tiny tender mangoes to one particular street corner in Ram Nagar during the season. The corner of Rajaji Road and Sathyamurthy Road plays host to these vendors from as early as 7.00 am every day. Depending on the quantity they have, the mangais are available until around 11.00 am. If the vendors have a good day and their produce is sold quickly, they pack up and leave even as early as 9.00 am.


Which of the following best describes the vadu mangai mangoes?
1). Big and juicy
2). Orange and raw
3). Tiny and tender
4). Sour and sweet

0 vote

Read the passage given below and then answer the questions given below the passage. Some words may be highlighted for your attention. Read carefully. A state of emergency can be directly imposed or it can creep up on you in unexpected ways. Following the Narendra Modi government’s decision to

Asked on by | Votes 0

Read the passage given below and then answer the questions given below the passage. Some words may be highlighted for your attention. Read carefully.

A state of emergency can be directly imposed or it can creep up on you in unexpected ways. Following the Narendra Modi government’s decision to ban the Hindi news channel NDTV India for an entire day (now put on hold) as punishment for its coverage of the terror attack on the Pathankot military base, the question being asked is whether the cumulative actions of this government reflect the same mentality that led Indira Gandhi to impose a state of emergency in 1975—an inability to tolerate opposition or dissent.

The government justifies its action against NDTV India on the grounds that its coverage of the Pathankot anti-terror operation gave away vital information that could have been used by those directing the attack on the military base. It claims the channel contravened rule 6(1)(p) of the programme code under the Cable Television Networks (Amendment) Rules, 2015. But the rule itself is problematic as is the mechanism for enforcing it. The body tasked with deciding whether a channel has transgressed the rule is the Inter-Ministerial Committee. No one with a journalistic background or knowledge of how 24-hour news networks function is on the committee. Yet, the committee judges and pronounces punishment without any judicial oversight.

The provision under which NDTV India has been hauled up is the end result of a process that began after the 26 November 2008 terror attack on Mumbai. Leading television channels, including NDTV, were criticised by the government for helping the minders of the terrorists by giving away precise information even as the attack was on. No action was taken against these channels but discussions began about bringing in a provision prohibiting live coverage of such operations. A committee headed by former Chief Justice J S Verma formed by the News Broadcasters Association, a self-regulatory body, formulated guidelines on coverage of such attacks. However, the United Progressive Alliance (UPA) government at the time was not convinced that this would suffice and instead came up with amendments to the Cable Television Networks Rules, 1994 that would have given the police and government officials arbitrary powers to block live transmission and confiscate equipment if they concluded that the network was going against “national interest.” Fortunately, the government heeded the strong objections of the networks and backed down. In 2009, Prime Minister Manmohan Singh assured heads of news channels that no changes would be made without consultations. Yet, within a year of the Modi government assuming power, rule 6(1)(p) was added to the program code under the Cable Television Networks Rules.

The Modi government appears to have temporarily backed down in the face of strong protests from many journalistic associations and bodies and possibly also because NDTV has moved the Supreme Court. Yet, the threat remains. By picking on NDTV India, known for its critical coverage of the ruling party and government compared to other channels, the government is clearly seeking to send out a message. It is starting from the media questioning of its recent actions such as the “surgical strikes” across the Line of Control in Kashmir. So, perhaps, it has decided that a dose of indirect censorship will have the “chilling effect on the freedom of speech and expression”.  The arbitrary use of power against NDTV India ought to be a wake-up call for the Indian media. 


Which of the following is incorrect according to the passage?


1). NDTV was being punished for its coverage of Pathankot attack
2). UPA government was contended with the formation of rules under by JS Verma Committee
3). Author has been very critical of the working of Modi government
4). The implementation of rule 6(1)(p) was erroneous

0 vote

Read the passage given below and then answer the questions that follow the passage. Some words may be highlighted for your attention. Read carefully. Computer security is not a problem that technology can solve. Security solutions have a technological component, but security is fundamentally a peop

Asked on by | Votes 0

Read the passage given below and then answer the questions that follow the passage. Some words may be highlighted for your attention. Read carefully.

Computer security is not a problem that technology can solve. Security solutions have a technological component, but security is fundamentally a people problem. Businesses approach security as they do any other business uncertainty: in terms of risk management. Organizations optimize their activities to minimize their cost-risk product, and understanding those motivations is key to understanding computer security today. It makes no sense to spend more on security than the original cost of the problem, just as it makes no sense to pay liability compensation for damage done when spending money on security is cheaper. Businesses look for financial sweet spots - adequate security for a reasonable cost, for example, and if a security solution doesn't make business sense, a company won't do it.

This way of thinking about security explains some otherwise puzzling security realities. For example, historically most organizations haven't spent a lot of money on network security. Why? Because the costs have been significant: time, expense, reduced functionality, frustrated end-users (Increasing security regularly frustrates end-users). On the other hand, the costs of ignoring security and getting hacked have been, in the scheme of things, relatively small. Those in the computer security field like to think they're enormous, but they haven't really affected a company's bottom line. From the CEO's perspective, the risks include the possibility of bad press and angry customers and network downtime-none of which is permanent. And there's some regulatory pressure, from audits or lawsuits, which adds additional costs. The result: a smart organization does what everyone else does, and no more. Things are changing; slowly, but they're changing. The risks are increasing, and as a result, spending is increasing.

This same kind of economic reasoning explains why software vendors spend so little effort securing their own products. Those in computer security think that the vendors are all a bunch of idiots, but they're behaving completely rationally from their own point of view. The costs of adding good security to software products are essentially the same ones incurred in increasing network security-large expenses, reduced functionality, delayed product releases, annoyed users - while the costs of ignoring security are minor, occasional bad press and maybe some users switching to competitors' products. The financial losses to industry worldwide due to vulnerabilities in the Microsoft Windows operating system are not borne by Microsoft, so Microsoft doesn't have the financial incentive to fix them. If the CEO of a major software company told his board of directors that he would be cutting the company's earnings per share by a third because he was going to really-no more pretending-take security seriously, the board would fire him.

Think about why firewalls succeeded in the marketplace. It's not because they're effective; most firewalls are configured so poorly that they're barely effective, and there are many more efficient security products that have never seen widespread deployment (such as e-mail encryption). Firewalls are ubiquitous because corporate auditors started demanding them. This changed the cost equation for businesses. The cost of adding a firewall was an expense and user annoyance, but the cost of not having a firewall was failing an audit. And even worse, a company without a firewall could be accused of not following industry best practices in a lawsuit. The result: everyone has firewalls all over their network, whether they do any actual good or not.

The scientists are awash in security technologies. They know how to build much more secure operating systems. They know how to build much more secure access control systems. They know how to build much more secure networks. To be sure, there are still technological problems, and hence, the research continues. But in the real world, network security is a business problem. The only way to fix it is to concentrate on the business motivations. We need to change the economic costs and benefits of security. We need to make the organizations in the best position to fix the problem if we really want to fix the problem.


What is the overall tonality of the passage? 
1). Humanistic 
2). Descriptive 
3). Ironical
4). Enigmatic