Espionage and Intrigue Unit

Ace your homework & exams now with Quizwiz!

Heidi has a writing assignment to connect The Code Book to her own life. Which line from her assignment best demonstrates Heidi's connection with the text? One interesting fact I learned in my reading is that the U.S. uses encryption to catch criminals. A central idea found in The Code Book is the fact that much of the world's information is unprotected. The author shares several examples of codebreaking techniques, including Trojan horses and viruses. After reading The Code Book, I will be more careful about the information I share online.

After reading The Code Book, I will be more careful about the information I share online.

Read the sentence. Albert hopes they decide to reschedule the lecture for a different day. Which sentence corrects the vague pronoun problem in this sentence? He hopes they decide to reschedule it for a different day. Albert hopes the directors decide to reschedule the lecture for a different day. Albert hopes they decide to reschedule it for a different day. He hopes the directors decide to reschedule the lecture for a different day.

Albert hopes the directors decide to reschedule the lecture for a different day.

Which is the strongest thesis statement? The two authors include interesting historical facts in their writing. While both books take a different approach, each encourages readers to understand the importance of codes. I enjoyed both books, but feel that The Dark Game was more interesting. Both The Code Book and The Dark Game explore codebreaking, but they are different in their tone, style, and language.

Both The Code Book and The Dark Game explore codebreaking, but they are different in their tone, style, and language.

Read the excerpt from The Code Book. Although traffic analysis, tempest attacks, viruses and Trojan horses are all useful techniques for gathering information, cryptanalysts realize that their real goal is to find a way of cracking the RSA cipher, the cornerstone of modern encryption.The RSA cipher is used to protect the most important military, diplomatic, commercial and criminal communications—exactly the messages that intelligence gathering organizations want to decipher. If they are to challenge strong RSA encryption, cryptanalysts will need to make a major theoretical or technological breakthrough. What is the central idea of this paragraph? The Trojan horse technique is most effective in data gathering. The RSA cipher secures much of the world's important information. Information gathering will fail without new technology development. Breaking RSA code is the greatest challenge for cryptanalysts.

Breaking RSA code is the greatest challenge for cryptanalysts.

Read the excerpt from The Dark Game by Paul Janeczko. While U.S. intelligence agencies were not prepared to keep track of and stop German operatives who had slipped into this country, their counterparts in England did have the personnel and system to take on the German espionage machine. True, the British had more at stake in the war, but they also were much better prepared to fight Germany in espionage battles, with some of their best work done in the area of codes and ciphers. What topic does Janeczko introduce in this passage? British efforts to challenge German spies the growth of U.S. intelligence agencies ways to crack complex codes German supremacy among international spies

British efforts to challenge German spies

Read the paragraph about carbohydrates. It seems as if every modern diet plan includes an elimination of carbohydrates from one's diet. "Carbs" are being shunned as everyone seeks out "low-carb" foods and diets. But not every carbohydrate is a cookie; not every "carb" should be rejected. Consider a healthy bowl of pasta and vegetables before a swim or a run. Pasta can provide athletes with energy and a feeling of fullness and satisfaction that might not come from vegetables alone. What is the controlling idea? Many people seeking to lose weight eliminate carbohydrates from their diets. Carbohydrates' bad reputation ignores the benefits they can offer. There are many dishes that pair healthy vegetables with pasta. Athletes must increase their carbohydrate intake to improve performance.

Carbohydrates' bad reputation ignores the benefits they can offer.

Read the excerpt from The Code Book. However, as with every technology, there is a dark side to encryption. As well as protecting the communications of law-abiding citizens, encryption also protects the communications of criminals and terrorists. Currently, the police use wiretapping as a way of gathering evidence in serious cases, such as organized crime and terrorism, but this would be impossible if criminals used unbreakable ciphers. As we enter the twenty-first century, the fundamental dilemma for cryptography is to find a way of allowing the public and business to use encryption in order to exploit the benefits of the Information Age without allowing criminals to abuse encryption and evade arrest. There is currently an active and vigorous debate about the best way forward, and much of the discussion has been inspired by the story of Phil Zimmermann, a man whose attempts to encourage the widespread use of strong encryption have panicked America's security experts, threatened the effectiveness of the billion-dollar National Security Agency, and made him the subject of an FBI inquiry and a grand jury investigation. Which detail is most relevant to the claim that there is a "dark side to encryption"? Zimmermann encourages everyone to use strong encryption. Criminals could use encryption to avoid the law and cause terror. Zimmermann has made security experts panic because of his encryption. Encryption software can protect the privacy of law-abiding citizens.

Criminals could use encryption to avoid the law and cause terror.

Which introduction best uses a surprising statistic to hook readers' attention? Butterfly expert Mona Watkins states, "Butterfly bushes can attract butterflies to home gardens." I remember wading through knee-deep grass, eagerly following a butterfly with my net. Despite their delicate wings, Monarch butterflies migrate 2,000 miles to spend the winter in Mexico. Have you ever contemplated the cycle of life when observing a majestic butterfly?

Despite their delicate wings, Monarch butterflies migrate 2,000 miles to spend the winter in Mexico.

Read the sentence. Each of the customers received its own souvenir cup and T-shirt. Choose the sentence that corrects the pronoun shift in this sentence. Each of the customers received our own souvenir cup and T-shirt. Each of the customers received their own souvenir cup and T-shirt. Each of the customers received them own souvenir cup and T-shirt. Each of the customers received his or her own souvenir cup and T-shirt.

Each of the customers received his or her own souvenir cup and T-shirt.

In The Dark Game, what is the central idea of the section about Elizabeth Van Lew? Elizabeth Van Lew used her servants to transport information. Elizabeth Van Lew helped many prisoners escape from Libby Prison. Elizabeth Van Lew obtained information from enemy prisoners. Elizabeth Van Lew was a valuable and legendary spy in the Civil War.

Elizabeth Van Lew was a valuable and legendary spy in the Civil War.

Read this paragraph from The Dark Game. But Elizabeth wanted to do more than simply minister and comfort the wounded. A Unionist, believing in "one nation . . . indivisible," she needed to do more. When she learned of Virginia's secession from the Union in 1861, she felt, in the words of one historian, "profoundly betrayed." She believed that the secessionists did not represent the majority of the citizens of Virginia. She was compelled to act in any way she could to help repair a nation torn apart. Which detail belongs in a good summary of this paragraph? Elizabeth followed the words of a historian. Elizabeth did not agree with all the citizens of Virginia. Elizabeth wanted to help put the nation back together. Elizabeth learned that Virginia sided with the South in 1861.

Elizabeth wanted to help put the nation back together.

Which detail best supports the claim that everyone should use encryption software? Encryption software helps protect privacy and freedom. Encryption software has been used by the military. Encryption software is available in many computer stores. Encryption software is made by different companies.

Encryption software helps protect privacy and freedom.

Read the excerpt from The Dark Game. British government leaders didn't present the Zimmermann telegram to Wilson for a few weeks. Hall reminded them that outrage was growing in America over Germany's announcement late in the day of January 31 that the German navy would resume unrestricted submarine warfare. In fact, that policy provoked the U.S. government to cut diplomatic relations with Germany in February. Which can be inferred from the information in the excerpt? Hall wanted to let the American outrage simmer down before revealing the contents of the telegraph. Hall knew that growing outrage among the American public would help Britain's cause. Hall worried that the American public would lose interest in the contents of the telegraph. Hall disagreed with the British government's choice to wait before showing the telegraph to Wilson.

Hall knew that growing outrage among the American public would help Britain's cause.

Read the sentence. Him and me want to attend the festival tomorrow. Which sentence corrects the shift in agreement? Him and me want to attend the festival tomorrow. Him and I want to attend the festival tomorrow. He and me want to attend the festival tomorrow. He and I want to attend the festival tomorrow.

He and I want to attend the festival tomorrow.

How does the first paragraph of The Dark Game best support the central idea that the Civil War was a long war? It shares the detail that the war lasted four years. It states what people believed about the war at the time. It tells how many soldiers actually died in the war. It gives an example of a battle that lasted almost two days.

It shares the detail that the war lasted four years.

Read this quote from Zimmermann in The Code Book. In the past, if the government wanted to violate the privacy of ordinary citizens, it had to expend a certain amount of effort to intercept and steam open and read paper mail, or listen to and possibly transcribe spoken telephone conversations. This is analogous to catching fish with a hook and a line, one fish at a time. Fortunately for freedom and democracy, this kind of labor-intensive monitoring is not practical on a large scale. Today, electronic mail is gradually replacing conventional paper mail, and is soon to be the norm for everyone, not the novelty it is today. Unlike paper mail, e-mail messages are just too easy to intercept and scan for interesting keywords. This can be done easily, routinely, automatically, and undetectably on a grand scale. This is analogous to driftnet fishing—making a quantitative and qualitative Orwellian difference to the health of democracy. What is the purpose of the quote from Zimmermann? It explains how much faster e-mail travels than ordinary mail. It shows how easily digital mail can be monitored by outsiders. It states exactly how many people use e-mail instead of regular mail. It proves that e-mail is better for the health of democracy than regular mail.

It shows how easily digital mail can be monitored by outsiders.

Read this paragraph from The Dark Game. Another thing that changed very little in the years between the wars was the means of obtaining military intelligence. Although the use of photography and the telegraph brought some technological advances, the craft of spying on the enemy's army still relied on fieldwork. For the most part, intelligence was gathered in simple ways. Prisoners of war and deserters were interrogated. The Union army was always interested in hearing what runaway slaves had to report. And, of course, both armies relied on cavalry scouts, signal intercepts, visual observation, and captured correspondence. What is the best summary of this paragraph? During the Civil War, intelligence was gathered in the same ways it had been gathered in previous wars. Photography and the telegraph were some of the technological advances that were used in Civil War espionage. Most espionage during the Civil War was fieldwork that included observation, scouting, and interrogation of prisoners. Enslaved persons that ran away, as well as prisoners from the Union Army, were good sources of information during the Civil War.

Most espionage during the Civil War was fieldwork that included observation, scouting, and interrogation of prisoners.

Read the excerpt from The Dark Game. Mr. H. quickly began talking to his contacts in the city. Soon he heard of a British printer in Mexico City who had been falsely arrested for printing counterfeit money. Mr. H. intervened with the British minister, who got the frightened printer released from custody and the charges against him dropped. The printer, overjoyed to be free, told Mr. H. that he would welcome the opportunity to repay the agent for his intervention. As a matter of fact, Mr. H. told him, there was a favor the printer could do for him. Which inference can a reader make based on the information in the excerpt? Mr. H. knew the printer would help them upon release from prison. Mr. H. was very concerned for the falsely imprisoned printer. Mr. H. and the printer had known each other for a long time. Mr. H. originally had not intended to employ the printer's help.

Mr. H. knew the printer would help them upon release from prison.

Which is a compound sentence? We go camping in the mountains with our cousins, neighbors, and friends. If the weather cooperates, we start each day with a hike and a swim. My brother likes to go fishing in the afternoons, but I prefer riding my bike. When evening comes, everyone gathers around the campfire to tell stories.

My brother likes to go fishing in the afternoons, but I prefer riding my bike.

Which excerpt best states the central idea of the second paragraph of The Dark Game? Most of the war was fought in states south of Washington, D.C. . . . For the Union soldiers, this meant they had to fight in unfamiliar and hostile territory. This matter of geography affected the spies who worked behind enemy lines. Confederate spies could usually find a safe house, or at least a sympathetic soul . . .

NOT For the Union soldiers, this meant they had to fight in unfamiliar and hostile territory.

Read the sentence. Mariko decided to bake the cake herself. In this sentence, the word "herself" is acting as a(n) reflexive pronoun. reciprocal pronoun. objective pronoun. intensive pronoun.

NOT reflexive pronoun

Read this excerpt about Elizabeth Van Lew from The Dark Game. She became a spymaster, the person responsible for running a network of agents, couriers, and safe houses that was very active during the war. In addition to the spying, Elizabeth Van Lew continued to maintain her Church Hill home as a safe house and something of a local Union spy headquarters. How does this excerpt develop the central idea that Elizabeth Van Lew helped expand the role of women in society? Choose two answers. It states how Van Lew acted as an important leader and manager at a time when women were generally discouraged from taking on those roles. It shows that Van Lew was dedicated to a cause outside of her family and worked hard for her beliefs. It illustrates how Van Lew became the most successful spy during the war and greatly helped the Union Army, though she was a woman. It describes how Van Lew organized women to fight for their legal rights and equal representation in government.

NOT 1 and 3

What are effective elements to include in introductions? Check all that apply. a statement of the topic a relevant anecdote or tale an in-depth study of the topic a thought-provoking question a suggestion for further research a surprising fact about the topic

NOT 1, 2, 6

Which is an example of point-by-point organization in a comparative essay? The Code Book is written in an expository style. The author uses dense, scientific language to provide information. The Code Book uses historical examples from recent history. Author Simon Singh uses these to emphasize the importance of security. The Dark Game is an example of narrative writing. Author Paul Janeczko weaves historical examples together beautifully. The Dark Game uses historical examples from the Civil War. The Code Book also uses historical examples, but from the Cold War.

NOT The Dark Game is an example of narrative writing. Author Paul Janeczko weaves historical examples together beautifully.

Read the excerpt from The Code Book. The Trojan horse, another software trick, involves Eve designing a program that appears to act like a genuine encryption product, but which actually betrays the user. What part of speech is the underlined word? noun verb adverb adjective

NOT noun

Read the sentence. Andrew told me that his uncle was a World War II veteran when he was in high school. Which revision clarifies the confusing pronoun in this sentence? When Andrew was in high school, he told me that he was a World War II veteran. When Andrew was in high school, he told me that his uncle was a World War II veteran. He told me that his uncle was a World War II veteran when he was in high school. Andrew told myself that his uncle was a World War II veteran when he was in high school.

When Andrew was in high school, he told me that his uncle was a World War II veteran.

Read the excerpt from The Code Book. By this stage, sending a PGP encrypted message is becoming quite complicated. The IDEA cipher is being used to encrypt the message, RSA is being used to encrypt the IDEA key, and another stage of encryption has to be incorporated if a digital signature is required. However, Zimmermann developed his product in such a way that it would do everything automatically, so that Alice and Bob would not have to worry about the mathematics. To send a message to Bob, Alice would simply write her e-mail and select the PGP option from a menu on her computer screen. Next she would type in Bob's name, then PGP would find Bob's public key and automatically perform all the encryption. At the same time PGP would do the necessary jiggery-pokery required to digitally sign the message. Upon receiving the encrypted message, Bob would select the PGP option, and PGP would decrypt the message and verify the author. Nothing in PGP was original—Diffie and Hellman had already thought of digital signatures and other cryptographers had used a combination of symmetric and asymmetric ciphers to speed up encryption—but Zimmermann was the first to put everything together in one easy-to-use encryption product, which was efficient enough to run on a moderately sized personal computer. Which fact most effectively supports the claim that PGP can be used by an ordinary person? PGP is used to encrypt digital messages. PGP is based on complicated mathematics. PGP incorporates a digital signature. PGP works efficiently on a personal computer.

PGP works efficiently on a personal computer.

Becca writes this sentence in her analysis of The Dark Game. The Dark Game is written in a narrative style that includes many fascinating details. Which line from the book best supports her analysis? One of the main functions of the cavalry was reconnaissance. For the most part, intelligence was gathered in simple ways. She did what she could for the wounded soldiers, bringing them messages and money, and no small amount of food. The guards were often careless in their speech when Van Lew was within earshot.

She did what she could for the wounded soldiers, bringing them messages and money, and no small amount of food.

Read the paragraph about social media. Social media outlets are often criticized as forums for unimportant postings and uniformed rants. Though much of what is posted is conversational drivel, social media outlets also serve as springboards for entrepreneurs. Creative people can advertise their designs or products at a low cost to a wider market than entrepreneurs could have imagined in previous generations. The Internet is the ultimate free marketplace, allowing motivated individuals to share their wares with the world. What is the controlling idea? Every entrepreneur should advertise one's products on the Internet. The Internet has countless forums on which people share meaningless posts. Social media has a valid purpose as an inexpensive, creative marketplace. Advertising products on the Internet is inexpensive compared to television.

Social media has a valid purpose as an inexpensive, creative marketplace.

Read the student's prewriting about The Dark Game by Paul Janeczko. Point: Espionage in the American Civil War relied more on people's skills than on gadgetry and inventions. Which sentence best illustrates this point? Some spies were executed for their involvement in gathering intelligence for the South. Spies gathered intelligence from letters, newspapers, and interviews with prisoners and deserters. Use of photography and the telegraph slowly transformed spying into a scientific vocation. Spying during the Civil War evolved significantly from the amateur efforts of the Revolutionary War.

Spies gathered intelligence from letters, newspapers, and interviews with prisoners and deserters.

Which article is most likely written to entertain readers? Modern Jazz Composers Brass Instrument Distinctions Stories from the Stage How to Tune Your Tuba

Stories from the Stage

Read the excerpt from The Dark Game. On February 24, when Hall sensed that the Zimmermann telegram would tip the balance in favor of the U.S. joining the Allied forces, the British home secretary presented the telegram to President Wilson. One week later, news of the Zimmermann telegram was splashed across the front page of American newspapers. On April 6, 1917, the Congress of the United States declared war on Germany and its allies. This example best supports which statement? The Dark Game includes personal narrative. The Dark Game includes historical detail. The author uses humorous dialogue. The author uses scientific terminology.

The Dark Game includes historical detail.

Read the excerpt from The Dark Game. As a result of the cut cables, Germany lost its most secure long-distance communications system. The Germans now had to rely on radio transmissions from their powerful wireless station at Nauen, a few miles from Berlin. Which was exactly what the British military knew they would have to do. And once the Germans began sending wireless messages, MI8, the British code breakers, began plucking them from the air. Of course, all German correspondence was sent in a complicated cipher system, so that was when the hard work began for the code breakers of MI8. Which piece of textual evidence best supports the inference that the Germans could not lay new cables in the waters of the English Channel? The Germans now had to rely on radio transmissions from their powerful wireless station at Nauen, a few miles from Berlin. Which was exactly what the British military knew they would have to do. And once the Germans began sending wireless messages, MI8, the British code breakers, began plucking them from the air. Of course, all German correspondence was sent in a complicated cipher system, so that was when the hard work began for the code breakers of MI8.

The Germans now had to rely on radio transmissions from their powerful wireless station at Nauen, a few miles from Berlin.

Read the excerpt from The Dark Game. Cable messages from Europe to the United States traveled through transatlantic cables that passed deep in the English Channel. The British saw the cables as an opportunity to gain access to secret diplomatic messages sent from Berlin to its ambassador in Washington, D.C. Knowing they couldn't tap the cables the way they could tap phone lines, the British did the next best thing. The cable ship Telconia cut all five of the cables that carried communications through the channel. To make sure that the sabotage had a lasting effect, the Telconia rolled up a few of the cable ends on her drums and carried them to England. This act of sabotage was Great Britain's first offensive act of the war. Which inference can a reader make based on the information in the excerpt? The Germans often sent important messages concerning their war efforts to their ambassador in Washington, D.C. Although the British cut the underwater cables, the Germans planned to lay new ones as quickly as possible. Without the underwater cables, the Germans had no way of communicating with their ambassadors. The German ambassador in Washington, D.C. was unaware that the cables had been cut by the British.

The Germans often sent important messages concerning their war efforts to their ambassador in Washington, D.C.

Which is the complex sentence from The Dark Game by Paul Janeczko? When the war began, Elizabeth Van Lew was considered a southern "spinster." A true lady managed her servants, prepared parties and gatherings, and blindly supported her husband. She read to them and brought them baskets of goodies. People in Richmond would not soon forget the "Great Yankee Wonder."

When the war began, Elizabeth Van Lew was considered a southern "spinster."

Read the excerpt from The Dark Game. The Russian admiralty decided that their British allies could make better use of the codebook than they could, so it was sent to London. The codebook was a bonanza for the British code breakers. Not only did it contain the columns of code "words"—groups of randomly selected numbers—on which the messages were based, but it also included a changeable key to the cipher systems used to obscure the coded messages. Which piece of textual evidence best supports the inference that the British had better code breakers than the Russians did? The Russian admiralty decided that their British allies could make better use of the codebook than they could, so it was sent to London. The codebook was a bonanza for the British code breakers. Not only did it contain the columns of code "words"—groups of randomly selected numbers—on which the messages were based [B]ut it also included a changeable key to the cipher systems used to obscure the coded messages.

The Russian admiralty decided that their British allies could make better use of the codebook than they could, so it was sent to London.

What sentence has a critical tone? The show will run from March 20 to April 16 at the Landmark Theater in Ashland. The script of My Friend Andy imparts the simple wisdom of small-town folks. The intricate costumes and energetic dance numbers bring energy to the show. The amateur cast is unable to convey the significance of the show's message.

The amateur cast is unable to convey the significance of the show's message.

Which sentences contain a pronoun shift? Check all that apply. The team members will claim its trophy at the luncheon today. The club decided to schedule its first outing for August. The rules are posted, so you should know them well. The doctor was going to be late, so he called his office. The more you study, the more likely a person is to do well in school.

The team members will claim its trophy at the luncheon today. The more you study, the more likely a person is to do well in school.

Read the excerpt from The Dark Game: True Spy Stories from Invisible Ink to CIA Moles. There are theories as to why the Soviets did not "discover" the tunnel sooner. One likely answer is that they waited until Blake was reassigned by MI6 to London in order to protect him from being found out. Since Blake knew about the tunnel from the first day of its planning and was in Berlin while the tunnel was being dug, fingers would soon point to him as a Soviet mole. The KGB did not want to lose Blake. Some historians feel that the KGB waited because they actually wanted the Americans to hear their transmissions, as a way to let it be known that Russia had no intention of invading Germany and going to war with the U.S. On balance, however, some valuable information was gathered from the tapped conversations. The U.S. learned, for example, a great deal about the Soviet and Eastern European order of battle, or its military organization. Others feel that the intelligence was valuable to check against similar information obtained from other sources. Tim Weiner in his recent history of the CIA, Legacy of Ashes, writes that "The evidence suggests that the CIA gained two invaluable and untainted kinds of knowledge from the taps. The agency learned a basic blueprint of the Soviet and East German security systems, and it never picked up a glimmer of warning that Moscow intended to go to war." Which sentence best states the controlling idea of the passage? Blake was a ruthless spy who ruined the Allied efforts to tap Soviet wires beneath the ground in Berlin. The Soviets knew about the Allied plan to tap wires and spy, but they did not stop the effort. The United States learned valuable information from the wire taps that allowed them to defeat the Soviets. The wire taps were never a secret, but they helped the United States gain military intelligence.

The wire taps were never a secret, but they helped the United States gain military intelligence.

What do the body paragraphs in a comparative essay do? They persuade the readers to the writer's point of view. They summarize the main idea and give an overview. They include details and examples supporting the thesis statement. They conclude the essay and restate the thesis statement.

They include details and examples supporting the thesis statement.

Lucy is writing about this excerpt from The Code Book. Only a small fraction of the information flowing around the world is securely encrypted, and the remainder is poorly encrypted, or not encrypted at all. This is because the number of Internet users is rapidly increasing, and yet few of these people take adequate precautions in terms of privacy. In turn, this means that national security organizations, law enforcers and anybody else with a curious mind can get their hands on more information than they can cope with. Which of Lucy's lines best shows that she has made a personal connection to the reading? The author is explaining that much information is not encrypted. The author is explaining that Internet users must be more careful. This book helps me realize that much of my online information is not secure. This book helps me realize that there are too many people using the Internet.

This book helps me realize that much of my online information is not secure.

Read the excerpt from The Code Book. By this stage, sending a PGP encrypted message is becoming quite complicated. The IDEA cipher is being used to encrypt the message, RSA is being used to encrypt the IDEA key, and another stage of encryption has to be incorporated if a digital signature is required. However, Zimmermann developed his product in such a way that it would do everything automatically, so that Alice and Bob would not have to worry about the mathematics. To send a message to Bob, Alice would simply write her e-mail and select the PGP option from a menu on her computer screen. Next she would type in Bob's name, then PGP would find Bob's public key and automatically perform all the encryption. At the same time PGP would do the necessary jiggery-pokery required to digitally sign the message. Upon receiving the encrypted message, Bob would select the PGP option, and PGP would decrypt the message and verify the author. Nothing in PGP was original—Diffie and Hellman had already thought of digital signatures and other cryptographers had used a combination of symmetric and asymmetric ciphers to speed up encryption—but Zimmermann was the first to put everything together in one easy-to-use encryption product, which was efficient enough to run on a moderately sized personal computer. Which sentence is most relevant to the argument that Zimmermann's PGP was easy to use? By this stage, sending a PGP encrypted message is becoming quite complicated. The IDEA cipher is being used to encrypt the message, RSA is being used to encrypt the IDEA key, and another stage of encryption has to be incorporated if a digital signature is required. To send a message to Bob, Alice would simply write her e-mail and select the PGP option from a menu on her computer screen. Nothing in PGP was original—Diffie and Hellman had already thought of digital signatures and other cryptographers had used a combination of symmetric and asymmetric ciphers to speed up encryption . . .

To send a message to Bob, Alice would simply write her e-mail and select the PGP option from a menu on her computer screen.

Read the excerpt about Elizabeth Van Lew from The Dark Game: True Spy Stories from Invisible Ink to CIA Moles. No one in Libby Prison hospital paid much attention to this tiny, birdlike woman with a thin nose and alert blue eyes as she went about her business of visiting the hospitalized soldiers. She read to them and brought them baskets of goodies. The Confederate guards had no idea that this kindhearted woman was gathering military intelligence from the prisoners and laying the groundwork for espionage activities. Which statement best describes the author's viewpoint about Elizabeth Van Lew? Van Lew's modest looks and actions helped her spying success. Van Lew's kindness to Civil War soldiers impressed the prison guards. Van Lew visited wounded soldiers at Libby Prison during the Civil War. Van Lew gathered military information from wounded soldiers.

Van Lew's modest looks and actions helped her spying success.

To evaluate the text structures used by the author, which questions should a reader ask? Select 3 options. What opinions are conveyed within the text? What important ideas does the text include? What text structures does the author use? How effective is the text structure in sharing the important ideas? How has the author supported the main ideas in the text?

What important ideas does the text include? What text structures does the author use? How effective is the text structure in sharing the important ideas?

To improve understanding of an informational paragraph, which questions are best to ask? Select 5 options. What is this paragraph mostly about? Are there any unfamiliar words I need to learn? What is the author's claim? How does the evidence relate to the claim? How long is this paragraph compared to the others? Is the evidence relevant to the claim? Should the author cut this paragraph from the text?

What is this paragraph mostly about? Are there any unfamiliar words I need to learn? What is the author's claim? How does the evidence relate to the claim? Is the evidence relevant to the claim?

Read the excerpt from The Code Book. Just as Whit Diffie predicted in the early 1970s, we are now entering the Information Age, a postindustrial era in which information is the most valuable commodity. The exchange of digital information has become an integral part of our society. Already, tens of millions of e-mails are sent each day, and electronic mail will soon become more popular than conventional mail. The Internet, still in its infancy, has provided the infrastructure for the digital marketplace, and e-commerce is thriving. Money is flowing through cyberspace, and it is estimated that every day half the world's Gross Domestic Product travels through the Society for Worldwide Interbank Financial Telecommunications network. In the future, democracies that favor referenda will begin to have on-line voting, and governments will use the Internet to help administer their countries, offering facilities such as on-line tax declarations. Which questions best help the reader understand the point that "information is the most valuable commodity" today? Select 3 options. What kind of information is the author talking about? What does the word "commodity" mean? How do I file my taxes online? What role does digital information play in society? Do all companies accept online payments?

What kind of information is the author talking about? What does the word "commodity" mean? What role does digital information play in society?

Read the quote from Zimmermann in The Code Book. A future government could inherit a technology infrastructure that's optimized for surveillance, where they can watch the movements of their political opposition, every financial transaction, every communication, every bit of e-mail, every phone call. Everything could be filtered and scanned and automatically recognized by voice recognition technology and transcribed. It's time for cryptography to step out of the shadows of spies and the military, and step into the sunshine and be embraced by the rest of us. Which question does this paragraph answer? Why does Zimmermann think encryption is important? What kind of encryption did Zimmermann invent? How does Zimmermann's encryption work? Who made encryption based on Zimmermann's work?

Why does Zimmermann think encryption is important?

Read the paragraph about community service. Across the nation, high school students are loading their schedules with rigorous academic courses. Countless hours are being spent conjugating verbs, measuring angles, and memorizing historical facts in attempt to develop their young minds. But what about character? Kids need to look up from their textbooks and consider their communities. Kids who are in service to their neighbors and communities will emerge from high school better prepared than their academic peers. They will not only be prepared for classrooms, but for the life around it. What is the controlling idea? Students with rigorous academic courses spend many hours studying. Community-service opportunities should replace academic courses. Memorizing facts and practicing math skills assures academic success. Youths should prioritize community service in preparation for their future.

Youths should prioritize community service in preparation for their future.

Read the excerpt from The Code Book. More than a hundred million e-mails are sent around the world each day, and they are all vulnerable to interception. Digital technology has aided communication, but it has also given rise to the possibility of those communications being monitored. Which type of evidence is used in the excerpt? an example a story a quote a statistic

a statistic

Read the excerpt from The Code Book. Alternatively, imagine that a bank receives an e-mail from a client, which instructs that all the client's funds should be transferred to a private numbered bank account in the Cayman Islands. Once again, without a handwritten signature, how does the bank know that the e-mail is really from the client? The e-mail could have been written by a criminal attempting to divert the money to his own Cayman Islands bank account. In order to develop trust on the Internet, it is essential that there is some form of reliable digital signature. How does the author support the claim that "it is essential that there is some form of reliable digital signature"? by relating a personal story about how his digital signature was stolen by offering facts about the signatures banks use to prevent stolen accounts by sharing statistics about stolen money that was sent to the Cayman Islands by describing an example of how money could be stolen and sent abroad

by describing an example of how money could be stolen and sent abroad

The central idea of The Dark Game is that women were involved in espionage during the Civil War. How does the author develop this central idea in the text? by stating facts about how many women acted as spies by sharing quotations from women who were spies by discussing the story of a famous woman spy by giving details about how women trained to become spies

by discussing the story of a famous woman spy

In The Dark Game, how does the author develop the central idea that Elizabeth Van Lew was a spymaster during the Civil War? by including details about the work that Van Lew did by recounting an anecdote that Van Lew tells in her own words by citing an example of Van Lew's coded messages by illustrating the technology that Van Lew had available to her

by including details about the work that Van Lew did

Review the excerpt from The Code Book. In 1998, a report by Wayne Madsen revealed that the Swiss cryptographic company Crypto AG had built backdoors into some of its products, and had provided the U.S. Government with details of how to exploit these backdoors. As a result, America was able to read the communications of several countries. In 1991 the assassins who killed Shahpour Bakhtiar, the exiled former Iranian prime minister, were caught thanks to the interception and backdoor decipherment of Iranian messages encrypted using Crypto AG equipment. In this paragraph, the author uses a real-life example to demonstrate how cryptography can help the government. can be dangerous. is a Swiss specialty. is unreasonably expensive.

can help the government.

Read the excerpt from The Dark Game. As a result of the cut cables, Germany lost its most secure long-distance communications system. The Germans now had to rely on radio transmissions from their powerful wireless station at Nauen, a few miles from Berlin. Which was exactly what the British military knew they would have to do. And once the Germans began sending wireless messages, MI8, the British code breakers, began plucking them from the air. Of course, all German correspondence was sent in a complicated cipher system, so that was when the hard work began for the code breakers of MI8. Which type of structure is used in the text? problem and solution cause and effect chronological comparison and contrast

cause and effect

Read the sentence. Ross was chasing his older brother Damien, and he was yelling for him to stop. Which correction would make this sentence more clear? changing "Ross" to "he" changing "he" to "Damien" changing "him" to "them" changing "Damien" to "him"

changing "he" to "Damien"

Read the sentence. Ms. Marx told Alyssa about the promising essay contest, and she was excited at the prospect. Which correction would make this sentence more clear? changing "Alyssa" to "her" changing "Ms. Marx" to "she" changing "she" to "Alyssa" changing "the prospect" to "it"

changing "she" to "Alyssa"

Read the sentence. When Breanna and her sister began baking the cake, she realized they were out of flour. Which correction would make this sentence more clear? changing "her sister" to "the girl" changing "she" to "Breanna" changing "Breanna" to "she" changing "flour" to "it"

changing "she" to "Breanna"

Read the excerpt from The Dark Game. On several occasions Room 40 received an unexpected but welcome gift when a German codebook was recovered after a sea battle and presented to the British code breakers. One such gift was a codebook from the German ship Magdeburg, a light cruiser that ran aground on an island off of Finland. When Russian ships quickly bore down on the cruiser, the captain of the stranded ship immediately did what all naval officers were taught to do: he ordered his signalman to bring him the ship's codebook so he could throw the book, wrapped in lead covers, into the sea. But before the signalman could deliver the book to his captain, he was killed by Russian guns. When the Russians recovered his body, the sailor was still clutching the codebook in his arms. Which type of structure is used in the text? problem and solution cause and effect chronological comparison and contrast

chronological

A reader can ask, "How would I react if the events in this book happened to me?" to put a text into content. context. word order. logical order.

context

Review the paragraph from The Code Book. Ordinarily, if Alice wants to use RSA to encrypt a message to Bob, she looks up his public key and then applies RSA's one-way function to the message. Conversely, Bob decrypts the ciphertext by using his private key to reverse RSA's one-way function. Both processes require considerable mathematical manipulation, so encryption and decryption can, if the message is long, take several minutes on a personal computer. Which transitional word has the same meaning as "on the other hand"? ordinarily conversely manipulation encryption

conversely

Read the excerpt from The Dark Game: True Spy Stories from Invisible Ink to CIA Moles. [T]he Germans committed some blunders in the way they sent their secret radio messages, giving the British help in their task. The first mistake of German intelligence was the error of arrogance, believing that the British were not up to the challenge of deciphering their messages. Another mistake they made was sending duplicates and even triplicates of some of their messages, with each one using a different cipher key. Which word best describes the tone of the passage? critical apologetic objective discouraged

critical

A central idea in The Code Book is the concern that much of the world's information is not secure. Which lines from the passage best support this central idea? Check all that apply. it could be that the laws of mathematics forbid the existence of a significant shortcut only a small fraction of the information flowing around the world is securely encrypted companies are already supplying shielding material that can be used to line the walls of a room few of these people take adequate precautions in terms of privacy law enforcers and anybody else with a curious mind can get their hands on more information

few of these people take adequate precautions in terms of privacy law enforcers and anybody else with a curious mind can get their hands on more information only a small fraction of the information flowing around the world is securely encrypted

A topic sentence is used to bring______ to a paragraph.

focus

Review the excerpt from The Code Book. If Eve parks a van outside Alice's house, she can use sensitive tempest equipment to identify each individual keystroke that Alice makes on her computer. This would allow Eve to intercept the message as it is typed into the computer, before it is encrypted. To defend against tempest attacks, companies are already supplying shielding material that can be used to line the walls of a room to prevent the escape of electromagnetic signals. In this excerpt, the author explains why computers are easily stolen. why keyboards are unsanitary. how computer security can be broken. how friends share secret messages.

how computer security can be broken.

Read the sentence. The president himself made an appearance at the company picnic. What is the case of the underlined pronoun? reflexive objective intensive subjective

intensive

Will is writing a comparative essay about two texts. He would like to write about three different topics, comparing the texts throughout the essay. Which organizational style would work best for Will? point-by-point blocking chronological historical

point-by-point

Read the excerpt from The Dark Game: True Spy Stories from Invisible Ink to CIA Moles. One week later, news of the Zimmermann telegram was splashed across the front page of American newspapers. On April 6, 1917, the Congress of the United States declared war on Germany and its allies. If the underlined word were replaced with the word "typed," the tone of the excerpt would be more judgmental. more optimistic. less intellectual. less dramatic.

less dramatic

The Code Book is ________than The Dark Game because it is written in technical terms.

more scientific

Which excerpt best states the central idea of the third paragraph of The Dark Game? most . . . spies of the Civil War were amateurs spying was . . . easy for both sides . . . the chances of getting caught were low as the war progressed . . . some spies were caught and executed

most . . . spies of the Civil War were amateurs

Fortify is a verb that means "to protect and strengthen." A fortification is a _________ that means "something that protects."

noun

Read the excerpt from The Dark Game. Cable messages from Europe to the United States traveled through transatlantic cables that passed deep in the English Channel. The British saw the cables as an opportunity to gain access to secret diplomatic messages sent from Berlin to its ambassador in Washington, D.C. Knowing they couldn't tap the cables the way they could tap phone lines, the British did the next best thing. The cable ship Telconia cut all five of the cables that carried communications through the channel. Which types of structures are used in the text? Select 2 options. problem and solution cause and effect chronological comparison and contrast

problem and solution chronological

Read the introduction. Harbortown's Arbor Day Festival is a celebration of trees. Local nurseries sell saplings, the horticultural extension office provides educational materials, and children play among the trees in the town square. "The tree climbing contest is my favorite," exclaimed ten-year-old Jack Diamond when he was asked about the festival. To best capture the reader's attention, the author includes statistical evidence. quotes from locals. facts about the festival. relevant anecdotes.

quotes from locals.

Read the excerpt from The Dark Game by Paul Janeczko. As a result of the cut cables, Germany lost its most secure long-distance communications system. The Germans now had to rely on radio transmissions from their powerful wireless station at Nauen, a few miles from Berlin. Which was exactly what the British military knew they would have to do. And once the Germans began sending wireless messages, MI8, the British code breakers, began plucking them from the air. Of course, all German correspondence was sent in a complicated cipher system, so that was when the hard work began for the code breakers of MI8. To introduce the topic, Janeczko includes relevant historical facts. quotations from military sources. statistics from code breakers. surprising personal anecdotes.

relevant historical facts.

Read the excerpt from The Dark Game: True Spy Stories from Invisible Ink to CIA Moles. Armed with invisible ink, a cipher system, and a passion to end the war and preserve the Union, Elizabeth Van Lew became Butler's eyes and ears in the Confederate capital city. Truth be told, however, she became much more than that. She became a spymaster, the person responsible for running a network of agents, couriers, and safe houses that was very active during the war. Which word best describes the tone of the passage? curious nostalgic triumphant respectful

respectful

The way a text is built, arranged, and organized is referred to as

structure

Read Melissa's thesis statement. Both The Dark Game and The Code Book explain the importance of codebreaking. Which addition would strengthen Melissa's statement? main ideas of each book subtopics explained in later paragraphs other books written about codebreaking historical facts from each text

subtopics explained in later paragraphs

Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that infects PGP software and sits quietly inside Alice's computer. When Alice uses her private key to decrypt a message, the virus would wake up and make a note of it. The next time that Alice connects to the Internet, the virus would surreptitiously send the private key to Eve, thereby allowing her to decipher all subsequent messages sent to Alice. One way to better connect with this excerpt is to tell about an experience with a computer virus. define the specific details of a PGP virus. research decryption viruses on the Internet. contrast viruses with Trojan horse attacks.

tell about an experience with a computer virus.

Trina is writing a summary of an article on global warming. To write a good summary, what should Trina do? Select four options. think about what the central ideas of the article are paraphrase the central ideas of the article write the central ideas of the article in her own words make the summary the same length as the article condense the central ideas into a shorter form use sentences from the article without quotation marks include as many details from the article as she can

think about what the central ideas of the article are paraphrase the central ideas of the article write the central ideas of the article in her own words condense the central ideas into a shorter form

Read the writing assignment. Write an essay that evaluates how Janeczko introduces a topic and creates interest in The Dark Game. What is the purpose of this writing assignment? to entertain readers with stories about Janeczko to persuade people to read Janeczko's work to analyze Janeczko's writing techniques to inform readers about spy techniques

to analyze Janeczko's writing techniques

Read the excerpt from The Dark Game: True Spy Stories from Invisible Ink to CIA Moles by Paul Janeczko. The United States wanted desperately to know what the Soviets were thinking. The big fear for the U.S. was that the Soviets would attack West Germany without warning, or in diplomatic language, with "a cold start." The U.S. knew that the Soviets possessed nuclear weapons. Would they use them on the West? This question and others would need to be answered by U.S. intelligence agents. Janeczko includes a question in the passage to determine reader opinion. inquire about personal experiences. illustrate the Soviets' confusion. voice the U.S. leaders' uncertainty.

voice the U.S. leaders' uncertainty.


Related study sets

Meat Inspection Act(Theodore Roosevelt)

View Set

ATI med surge 1 (med admin, surgical aspesis, resp)

View Set

BF Section 7: Contraindications in breastfeeding

View Set

Sec 9.10 Secure Protocols SSL/ TLS/IPsec/HTTPS

View Set

European Union Privacy Law Basics

View Set

Zhen Li's Microeconomics Final Exam Review

View Set