TEXT C Though England was on the whole prosperous and hopeful, though by comparison with her neighbors she enjoyed internal peace, she could not evade the fact that the world of which she formed a part was torn by hatred and strife as fierce as any in human history. Men were still for from recognizing that two religions could exist side by side in the same society; they believed that the toleration of another religion different from their own. And hence necessarily false, must inevitably destroy such a society and bring the souls of all its members into danger of hell. So the struggle went on with increasing fury within each nation to impose a single creed upon every subject, and within the general society of Christendom to impose it upon every nation. In England the Reformers, or Protestants, aided by the power of the Crown, had at this stage triumphed, but over Europe as a whole Rome was beginning to recover some of the ground it had lost after Martin Luther’s revolt in the earlier part of the century. It did this in two ways, by the activities of its missionaries, as in parts of Germany, or by the military might of the Catholic Powers, as in the Low Countries, where the Dutch provinces were sometimes near their last extremity under the pressure of Spanish arms. Against England, the most important of all the Protestant nations to reconquer, military might was not yet possible because the Catholic Powers were too occupied and divided: and so, in the 1570’s Rome bent her efforts, as she had done a thousand years before in the days of Saint Augustine, to win England back by means of her missionaries. These were young Englishmen who had either never given up the old faith, or having done so, had returned to it and felt called to become priests. There being, of course, no Catholic seminaries left in England, they went abroad, at first quite easily, later with difficulty and danger, to study in the English colleges at Dubai or Rome: the former established for the training of ordinary or secular clergy, the other for the member of the. Society of Jesus, commonly known as Jesuits, a new Order established by St. Ignatius Loyola same thirty years before. The seculars came first; they achieved a success which even the most eager could hardly have expected, Cool minded and well-informed men, like Cecil, had long surmised that the conversion of the English people to Protestantism was for from complete; many—Cecil thought even the majority—had conformed out of fear, self-interest or—possibly the commonest reason of all—sheer bewilderment at the rapid changes in doctrine and forms of worship imposed on them in so short a time. Thus it happened that the missionaries found a welcome, not only with the families who had secretly offered them hospitality if they came, but with many others whom their first hosts invited to meet them or passed them on to. They would land at the ports in disguise, as merchants, courtiers or what not, professing some plausible business in the country, and make by devious may for their first house of refuge. There they would administer the Sacraments and preach to the house holds and to such of the neighbors as their hosts trusted and presently go on to some other locality to which they were directed or from which they received a call. Through what way did the Rome recover some of the lost land
A. Civil and military ways.
B. Propaganda and attack.
C. Persuasion and criticism.
D. Religious and military ways.
TEXT D New and bizarre crimes have come into being with the advent of computer technology. Organized crime to has been directly involved; the new technology offers it unlimited opportunities, such as data crimes, theft of services, property-related crimes, industrial sabotage, politically related sabotage, vandalism, crimes against the individual and financially related crimes... Theft of data, or data crime, has attracted the interest of organized criminal syndicates. This is usually the theft or copying of valuable computer grogram. An international market already exists for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding criminal market. Buyers for stolen programs may range from a firm’s competitors to foreign nations. A competitor sabotages a company’s computer system to destroy or cripple the firm’s operational ability, thus neutralizing its competitive capability either in the private or the government sector. This computer sabotage may also be tied to an attempt by affluent investors to acquire the victim firm. With the growing reliance by firms on computers for their recordkeeping and daily operations, sabotage of their computers can result in internal havoc, after which the group interested in acquiring the firm can easily buy it at a substantially lower price. Criminal groups could also resort to sabotage if the company is a competitor of a business owned or controlled by organized crime. Politically motivated sabotage is on the increase; political extremist groups have sprouted on every continent. Sophisticated computer technology arms these groups with awesome powers and opens technologically advanced nations to their attack. Several attempts have already been made to destroy computer facility at an air force base. A university computer facility involved in national defence work suffered more than $ 2 million in damages as a result of a bombing. Computer vulnerability has been amply documented. One congressional study concluded that neither government nor private computer systems are adequately protected against sabotage. Organized criminal syndicates have shown their willingness to work with politically motivated groups. Investigators have uncovered evidence of cooperation between criminal groups and foreign governments in narcotics. Criminal groups have taken attempts in assassinating political leaders... Computers are used in hospital life-support system, in laboratories, and in major surgery. Criminals could easily turn these computers into tools of devastation. By sabotaging the computer of a life-support system, criminals could kill an individual as easily as they had used a gun. By manipulating a computer, they could guide awesome, tools of terror against large urban centers. Cities and nations could become hostages. Homicide could take a new form. The computer may become the hit man of the twentieth century. The computer opens vast areas of crime to organized criminal groups, both national and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. Although criminals have adapted to computer technology, law enforcement has not. Many still think in terms of traditional criminology. What is the purpose of a competitor to sabotage a company’s computer
A. His purpose is to destroy or weaken the firm’s operational ability.
B. His purpose is to weaken firm’s competitive capability and get it.
C. His purpose is to buy the rival’s company at a relatively low price.
D. His purpose is to steal important data.
Questions 24 and 25 are based on the following news. At the end of the news item, you will be given 10 seconds to answer the questions. Now listen to the news. What had caused the mad rush
An explosion.
B. Rumors.
C. Gunshots.
D. Fighting.