Making Inferences - Grade 10
View group questions.
To print this group, add it to a test.
All computers have important, non-encrypted, sensitive data on them such as passwords, documents, credit card information, emails, and Web site visit logs. Data on your computer resides in several different hidden places on your hard drive. Deleting a file doesn't really remove it. Emptying your computer's "recycle bin", deleting your Internet browser's cache, deleting your emails and documents, reformatting your hard drive, or even repartitioning your hard drive are all inadequate to erase the data on your computer. Furthermore, many software licensing agreements require that particular programs be removed from a computer before it leaves the original purchaser's ownership. Businesses and other institutions are often required by law to carry out data security actions before computers, their hard disk drives, floppy disks, and other forms of removable media are sent outside of the organization.
Deleting something from your computer or e-mail is similar to removing a card from the library's card catalog but not removing the book from the shelf - information is still in the library if you look for it. In the case of a computer hard drive, the file's location information is removed from the drive's index, but not from its place on the drive, so the file can easily be recovered by someone using sophisticated data recovery software.
(source: http://nepis.epa.gov/Exe/ZyPDF.cgi?Dockey=P1000715.PDF)
Deleting something from your computer or e-mail is similar to removing a card from the library's card catalog but not removing the book from the shelf - information is still in the library if you look for it. In the case of a computer hard drive, the file's location information is removed from the drive's index, but not from its place on the drive, so the file can easily be recovered by someone using sophisticated data recovery software.
(source: http://nepis.epa.gov/Exe/ZyPDF.cgi?Dockey=P1000715.PDF)
A.
What conclusion can the reader draw after reading this passage?
- People should never attempt to delete information from their computers.
- It requires a professional to know when data has been effectively deleted.
- Deleting data appears simple but often requires in-depth knowledge to complete.
- Software companies frequently help computer owners remove information from their computers.
B.
Which statement is most likely true about computer data?
- The data is impossible to completely clear from business and institution computers.
- The data is extremely difficult to thoroughly delete all of it from the average computer.
- The data is usually held in the recycle bin until a time when it can be completely deleted.
- The data can only be removed if taken directly off of the computer's hard drive.
C.
Why does the author of this passage refer to the concept of removing a card from a library's card catalog?
- To illustrate the complexity of deleting computer data
- To contrast the amount of data on computers to that in books
- To demonstrate why libraries are falling behind online information
- To indicate how often people fail to effectively delete their private data
D.
What does an e-reader have that a book does not?
- hundreds of pages
- a table of contents
- a far lower price tag
- multiple print sizes
E.
What is the major difference between e-readers and books?
- E-readers are harder to damage.
- E-readers require an energy source.
- E-readers have limited available titles.
- E-readers cost loss than regular books.