Compulsory English Grade 12 Model Question – New Course/Curriculum

Model Questions  Compulsory English – XII 

Subject: Compulsory English (ENG. 004) Full Marks: 75 Grade: XII 

Time: 3 hours 

Attempt ALL the questions. 

Read the text and do the activities that follow. [15] 

Nowadays most people realise that it’s risky to use credit card numbers online.  However, from time to time, we all use passwords and government ID numbers on the Internet. We think we are safe, but that may not be true! A new kind of attack is being used by dishonest people to steal IDs and credit card numbers from innocent websurfers. This new kind of attack is called “phishing.” Phishing sounds the same as the word “fishing,” and it implies that a thief is trying to lure people into giving away valuable information. Like real fishermen, phishers use bait in the form of great online deals or services. For example, phishers might use fake emails and false websites to con people into revealing credit card numbers,  account usernames, and passwords. They imitate well-known banks, online sellers,  and credit card companies. Successful phishers may convince as many as five per cent of the people they contact to respond and give away their personal financial information. 

Is this really a big problem? Actually, tricking five per cent of the online population is huge! Currently, more than 350 million people have access to the Internet, and seventy-five per cent of those Internet users live in the wealthiest countries on  Earth. It has been estimated that phishers send more than three billion spam messages each year. Even by tricking only five per cent of the people, phishers can make a lot of money. 

Since there is so much money to make through this kind of scam, it has caught the interest of more than just small-time crooks. Recently, police tracked down members of an organized phishing group in Eastern Europe, who had stolen hundreds of thousands of dollars from people online. The group created official-looking email messages requesting people to update their personal information at an international bank’s website. However, the link to the bank in the message actually sent people to the phishers’ fake websites. To make matters worse, further investigation revealed that this group had connections to a major crime gang in  Russia. 

How can innocent people protect themselves? Above all, they have to learn to recognise email that has been sent by a phisher. Always be wary of any email with urgent requests for personal financial information. Phishers typically write 

upsetting or exciting, but fake, statements in their emails so that people will reply right away. Also, messages from phishers will not address recipients by name because they really don’t know who the recipients are yet. On the other hand, valid messages from your bank or other companies you normally deal with will typically include your name.

A. Choose the correct answer. [5×1 = 5]

a) ‘Some dishonest people try to steal other people’s credit card numbers.’ What does ‘dishonest’ mean here? 

i)truthful              ii) having honesty          iii) untruthful 

b) When the box is delivered, you should open it ………………………….

i) track down        ii) right away        iii) con into 

c) ‘The comedian can imitate the voice of the president well.’ Here the word  ‘imitate’ is synonymous with the word…………….. 

i) convince           ii) copy                 iii) change 

d) ‘What can I do to convince you that I’m not lying?’ Here the word ‘convince’ is opposite to………. 

i) persuade             ii) induce             iii) dissuade 

e) ‘Phishers send more than three billion scam messages each year.’ What does  ‘scam’ mean? 

i) an illegal trick, usually to steal money 

ii) a thing used to attract or tempt 

iii) needing immediate attention

B. Fill in the blanks with the correct words from the list. [0.5×2 = 5]

financial,   private,     gangs,       Internet,       lure,     tracked,      convince,       wary,       risky,     crooks 

Giving personal information over the Internet has always been ………………, but now it’s even more so with the new ………..scam, phishing. Phishers first  ………………innocent people into a scam by making up fake emails. With this bait, they ………………some of the people they contact to give away ………………  information. These Internet criminals are not just small-time ……………….  Police investigations have recently ……………… down organised phishing groups in Eastern Europe with connections to crime……………… in Russia.  People must be ……………… of any urgent emails requesting …………..  information. 

C. Answer the following questions. [5×1 = 5] 

a) What is the main purpose of the text? 

b) Which activity is phishing compared to? 

c) What is implied about the people who get caught in phishing scams?

d) Who was behind the Eastern European phishing scam?

e) What could be the suitable title of this text? 

 Write short answers to the following questions. [5×2 = 10] 

a) Who were Evan and Hooker and where were they heading? (The Treasure in  the Forest) 

b) How does Lu Xun create a feeling of nostalgia in the story? (My Old Home)

c) How does the speaker describe the morning sun? (A Day) 

d) What is the theme of the poem ‘I was my Own Route’? (I was my Own Route)

e) How is the relationship between Monsieur and his wife? (Facing Death) 

Write long answers to the following questions. [2×5 =10] 

a) How do you think that ‘A Very Old Man with Enormous Wings’ is a work of magical realism? Discuss. (A Very Old Man with Enormous Wings)

b) How is marriage a social institution? Discuss. (Marriage as a Social  Institution) 

Write a short story using the outline in about 150 words. Give a suitable title. [7] 

midnight…heard a sound…backyard…strange creature…in bushes…frightened  …the creature spoke….requested…helped the creature…to go back to his world 

Write a letter to the editor about the growing misuse of social media. [8] 

Write a travelogue about your visit to a new place (in about 300 words).   [10] 

Do as instructed. [10×1=10] 

a) What does the modal verb ‘could’ express in the sentence ‘The beautiful  Himalayan could be seen from my room’? 

i) ability           ii) permission             iii) possibility             iv) deduction 

b) The government ………..high taxes.  

i) charge           ii) charges                iii) both a and b             iv) neither a nor b 

c) It rained a lot. We enjoyed our picnic. (Make one sentence by using ‘in spite of’) 

d) Can you tell me where your father works? (Change into direct question) 

e) Rabi said to Hem, “Where have you been all these days?” (Change into indirect  speech) 

f) We………….(arrive) earlier if we had not missed the bus. (Rewrite the sentence  with the correct form of the verb.) 

g) I think they should offer Dipa the job. (Change into passive) 

h) Did you come here …….. a taxi or on foot? (Complete the sentence with the  correct preposition.)

i) Raju works in a finance company. I met him yesterday. (Join the sentences by  using the relative pronoun ‘whom’.) 

j) Put the adjective ‘leather’ in the correct order in the phrase ‘a Black Chinese jacket’. 

Do as instructed. [5×1=5] 

a) Which one of the following words has a different vowel sound? 

i) bread       ii) break           iii) deaf          iv) said

b) What is the root of the word ‘truthfulness’? 

i) truth           ii) full        iii) ness        iv) true

c) What is the word class of the word ‘whose’ in the sentence ‘I met the man whose car was stolen last night’? 

i) adjective          ii) pronoun              iii) noun             iv) determiner

d) Which is not true about ‘proximity’ in the sentence ‘The best thing about the location of the school is its ‘proximity from my house? 

i) nearness              ii) vicinity            iii) adjacency             iv) distance

e) Which one is not the content word in the sentence ‘My Chinese chair might have been stolen from the room’? 

i) Chinese        ii) chair            iii) have          iv) stolen 

The End