1. The document provides instructions and questions for an English reading comprehension exam for 8th grade students.
2. It contains 4 passages labeled A, B, C and an intertextual question labeled D, each with multiple choice and short answer questions.
3. Students are instructed to write in blue or black pen, attempt all questions, and that no response will be scored zero.
The document discusses the importance of transparency and humility in small group settings, using examples of "Carl the angry guy" and "Jerry the addicted guy" who hide their true struggles from the group. It argues that small groups should be places where people feel safe to openly share their sins and struggles in order to experience true community and spiritual growth through mutual accountability and support.
1. The document announces the annual meeting of stockholders of The Estée Lauder Companies Inc. to be held on November 10, 2005.
2. Stockholders will vote on electing four directors, approving an amended share incentive plan, and ratifying the appointment of auditors.
3. Stockholders are urged to vote by proxy or in person at the meeting.
This document is a proxy statement from The Estée Lauder Companies Inc. notifying stockholders about the upcoming annual meeting. The meeting will be held on October 31, 2006 to vote on two items: 1) electing five directors with terms expiring in 2009 and 2) ratifying the appointment of KPMG LLP as the independent auditor for fiscal year 2007. The proxy statement provides details on the director nominees up for election, the incumbent directors, stock ownership among directors and executives, and executive compensation.
A lista de cores inclui branco, verde, azul, roxo, vermelho, laranja, amarelo e café. O documento encoraja a continuação da participação e indica que alguém ganhou.
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...BeyondTrust
This presentation examines the types of attacks that try to exploit privileged credentials, particular in a governmental environment, and explores defensive strategies to bring privileges, and the associated threats, under complete visibility and control.
This document discusses evidence based medicine (EBM). It begins by explaining why EBM is important, as medical knowledge doubles every 10 years and clinicians need to answer questions for patients. It then gives an example clinical question and outlines the steps to answer it using EBM, which are: assessing the patient, asking a question, acquiring evidence, appraising evidence, and applying evidence. It discusses the levels of evidence and sources to find guidelines and protocols. The document emphasizes that EBM involves using the best research evidence to make decisions for individual patients.
Managing Unix Accounts in Today's Complex World: Stop the Shadow IT and Be Mo...BeyondTrust
Catch the full webinar at: https://www.beyondtrust.com/resources/webinar/managing-unix-accounts-todays-complex-world-stop-shadow-efficient/
In this presentation from his webinar, InfoSec expert consultant and CISO, Chris Ray, shares his experiences for identifying the potential pitfalls both Unix Administrators and Security teams face when managing user accounts across multiple Unix environments.
Tune in to get insights into:
•Regulatory requirements to watch for;
•What works and what doesn’t work with “sudo”;
•Strategies to lessen the audit impact to Unix administrators; and
•Tips for getting executive buy-in for what you need fixed.
The document discusses the importance of transparency and humility in small group settings, using examples of "Carl the angry guy" and "Jerry the addicted guy" who hide their true struggles from the group. It argues that small groups should be places where people feel safe to openly share their sins and struggles in order to experience true community and spiritual growth through mutual accountability and support.
1. The document announces the annual meeting of stockholders of The Estée Lauder Companies Inc. to be held on November 10, 2005.
2. Stockholders will vote on electing four directors, approving an amended share incentive plan, and ratifying the appointment of auditors.
3. Stockholders are urged to vote by proxy or in person at the meeting.
This document is a proxy statement from The Estée Lauder Companies Inc. notifying stockholders about the upcoming annual meeting. The meeting will be held on October 31, 2006 to vote on two items: 1) electing five directors with terms expiring in 2009 and 2) ratifying the appointment of KPMG LLP as the independent auditor for fiscal year 2007. The proxy statement provides details on the director nominees up for election, the incumbent directors, stock ownership among directors and executives, and executive compensation.
A lista de cores inclui branco, verde, azul, roxo, vermelho, laranja, amarelo e café. O documento encoraja a continuação da participação e indica que alguém ganhou.
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...BeyondTrust
This presentation examines the types of attacks that try to exploit privileged credentials, particular in a governmental environment, and explores defensive strategies to bring privileges, and the associated threats, under complete visibility and control.
This document discusses evidence based medicine (EBM). It begins by explaining why EBM is important, as medical knowledge doubles every 10 years and clinicians need to answer questions for patients. It then gives an example clinical question and outlines the steps to answer it using EBM, which are: assessing the patient, asking a question, acquiring evidence, appraising evidence, and applying evidence. It discusses the levels of evidence and sources to find guidelines and protocols. The document emphasizes that EBM involves using the best research evidence to make decisions for individual patients.
Managing Unix Accounts in Today's Complex World: Stop the Shadow IT and Be Mo...BeyondTrust
Catch the full webinar at: https://www.beyondtrust.com/resources/webinar/managing-unix-accounts-todays-complex-world-stop-shadow-efficient/
In this presentation from his webinar, InfoSec expert consultant and CISO, Chris Ray, shares his experiences for identifying the potential pitfalls both Unix Administrators and Security teams face when managing user accounts across multiple Unix environments.
Tune in to get insights into:
•Regulatory requirements to watch for;
•What works and what doesn’t work with “sudo”;
•Strategies to lessen the audit impact to Unix administrators; and
•Tips for getting executive buy-in for what you need fixed.
The Hacker Playbook: How to Think Like a Cybercriminal to Reduce RiskBeyondTrust
Watch the full webinar recording here: https://www.beyondtrust.com/resources/webinar/hacker-playbook-think-like-cybercriminal-reduce-risk/
In this presentation from her webinar, renowned security expert and speaker, Paula Januszkiewicz, CEO CQURE, takes you inside the mind of a hacker to close security gaps and better manage risk.
As Paula notes, "Some of the best strategies I’ve seen is to rely on experience and learn from actual live hacks!"
Check out her enlightening presentation, and then watch the full webinar here: https://www.beyondtrust.com/resources/webinar/hacker-playbook-think-like-cybercriminal-reduce-risk/
Changing human behavior and motivational interviewing Mohamed Thabet
This document discusses techniques for changing human behavior and motivation. It introduces the "Wheel of Change" model, which outlines stages of behavior change: pre-contemplation, contemplation, decision/preparation, action, and maintenance.
In the contemplation stage, techniques like a profit-loss account and timeline can help people weigh the advantages and disadvantages of a new behavior versus their old one. In the decision stage, demonstrating real cases and providing a suitable environment and motivation can help people take action.
Motivation comes from internal drives and goals. Motivational interviewing aims to draw on a person's existing motivation rather than imposing motivation from outside. Relapse is common, so maintenance plans are important, and
- Mooi Cosmetics seeks to provide natural body butter products at an affordable price point to attract both low and high income consumers.
- The company will launch in major supermarkets and drug stores, promoting through radio, print, and social media ads emphasizing the product's natural ingredients and benefits.
- Research found most consumers prefer natural cosmetics, representing an opportunity for Mooi Cosmetics to position itself as the top natural cosmetics brand.
Vulnerability Management: How to Think Like a Hacker to Reduce RiskBeyondTrust
Watch the full webinar recording here: https://www.beyondtrust.com/resources/webinar/vulnerability-management-how-to-think-like-a-hacker-to-reduce-risk/
This is the presentation from Security MVP, and CEO at CQURE, Paula Januszkiewicz's thought-provoking webinar on how to get inside the mind of a hacker to better manage risk and shore up organizational cyber-defenses.
Pen testing is not enough! And, while identifying, classifying, remediating, and mitigating vulnerabilities are all cornerstones of effective vulnerability management, in practice, they are often inadequately implemented.
Often, the best-designed strategies and VM implementations rely on experience.
Check out the presentation to get a taste of the webinar:
- Learn how to improve vulnerability identification and strengthen your systems
- Look over the shoulder of an expert, as Paula a demo of how to exploit systems and how (from the hacker perspective) you can learn to defuse such exploits!
Watch the webinar: https://www.beyondtrust.com/resources/webinar/vulnerability-management-how-to-think-like-a-hacker-to-reduce-risk/
The document discusses various aspects of human resources management including defining HRM, recruitment and selection processes, training and development, and organizational structures. It provides details on job analysis, different types of recruitment sources, orientation processes, and evaluating the impact of training. Additionally, it examines concepts like centralization vs decentralization, different levels of organizational culture, and factors that influence the choice of organizational structure.
10 Steps to Building an Effective Vulnerability Management ProgramBeyondTrust
You can tune in for the full webinar recording here: https://www.beyondtrust.com/resources/webinar/10-steps-to-building-an-effective-vulnerability-management-program/
In this presentation from the webinar by cyber security expert Derek A, Smith, hear a step-by-step overview of how to build an effective vulnerability management program. Whether your network consists of just a few connected computers or thousands of servers distributed around the world, this presentation discusses ten actionable steps you can apply whether its to bolster your existing vulnerability management program--or building one from scratch.
Enemy from Within: Managing and Controlling AccessBeyondTrust
Access the full webinar here: https://www.beyondtrust.com/resources/webinar/enemy-within-managing-controlling-access/?access_code=380c50225d67f81afaf12a795543782a
In this presentation from the webinar of SANS faculty fellow and industry-recognized security expert, Dr. Eric Cole, discover how identity and access management (IAM) and privileged access management work together to reduce the threat surface and contain attacks.
Also, hear how BeyondTrust and SailPoint solutions work together.
Creative Restart 2024: Mike Martin - Finding a way around “no”Taste
Ideas that are good for business and good for the world that we live in, are what I’m passionate about.
Some ideas take a year to make, some take 8 years. I want to share two projects that best illustrate this and why it is never good to stop at “no”.
How to Setup Default Value for a Field in Odoo 17Celine George
In Odoo, we can set a default value for a field during the creation of a record for a model. We have many methods in odoo for setting a default value to the field.
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
Information and Communication Technology in EducationMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 2)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐈𝐂𝐓 𝐢𝐧 𝐞𝐝𝐮𝐜𝐚𝐭𝐢𝐨𝐧:
Students will be able to explain the role and impact of Information and Communication Technology (ICT) in education. They will understand how ICT tools, such as computers, the internet, and educational software, enhance learning and teaching processes. By exploring various ICT applications, students will recognize how these technologies facilitate access to information, improve communication, support collaboration, and enable personalized learning experiences.
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐫𝐞𝐥𝐢𝐚𝐛𝐥𝐞 𝐬𝐨𝐮𝐫𝐜𝐞𝐬 𝐨𝐧 𝐭𝐡𝐞 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭:
-Students will be able to discuss what constitutes reliable sources on the internet. They will learn to identify key characteristics of trustworthy information, such as credibility, accuracy, and authority. By examining different types of online sources, students will develop skills to evaluate the reliability of websites and content, ensuring they can distinguish between reputable information and misinformation.
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxOH TEIK BIN
(A Free eBook comprising 3 Sets of Presentation of a selection of Puzzles, Brain Teasers and Thinking Problems to exercise both the mind and the Right and Left Brain. To help keep the mind and brain fit and healthy. Good for both the young and old alike.
Answers are given for all the puzzles and problems.)
With Metta,
Bro. Oh Teik Bin 🙏🤓🤔🥰
The Hacker Playbook: How to Think Like a Cybercriminal to Reduce RiskBeyondTrust
Watch the full webinar recording here: https://www.beyondtrust.com/resources/webinar/hacker-playbook-think-like-cybercriminal-reduce-risk/
In this presentation from her webinar, renowned security expert and speaker, Paula Januszkiewicz, CEO CQURE, takes you inside the mind of a hacker to close security gaps and better manage risk.
As Paula notes, "Some of the best strategies I’ve seen is to rely on experience and learn from actual live hacks!"
Check out her enlightening presentation, and then watch the full webinar here: https://www.beyondtrust.com/resources/webinar/hacker-playbook-think-like-cybercriminal-reduce-risk/
Changing human behavior and motivational interviewing Mohamed Thabet
This document discusses techniques for changing human behavior and motivation. It introduces the "Wheel of Change" model, which outlines stages of behavior change: pre-contemplation, contemplation, decision/preparation, action, and maintenance.
In the contemplation stage, techniques like a profit-loss account and timeline can help people weigh the advantages and disadvantages of a new behavior versus their old one. In the decision stage, demonstrating real cases and providing a suitable environment and motivation can help people take action.
Motivation comes from internal drives and goals. Motivational interviewing aims to draw on a person's existing motivation rather than imposing motivation from outside. Relapse is common, so maintenance plans are important, and
- Mooi Cosmetics seeks to provide natural body butter products at an affordable price point to attract both low and high income consumers.
- The company will launch in major supermarkets and drug stores, promoting through radio, print, and social media ads emphasizing the product's natural ingredients and benefits.
- Research found most consumers prefer natural cosmetics, representing an opportunity for Mooi Cosmetics to position itself as the top natural cosmetics brand.
Vulnerability Management: How to Think Like a Hacker to Reduce RiskBeyondTrust
Watch the full webinar recording here: https://www.beyondtrust.com/resources/webinar/vulnerability-management-how-to-think-like-a-hacker-to-reduce-risk/
This is the presentation from Security MVP, and CEO at CQURE, Paula Januszkiewicz's thought-provoking webinar on how to get inside the mind of a hacker to better manage risk and shore up organizational cyber-defenses.
Pen testing is not enough! And, while identifying, classifying, remediating, and mitigating vulnerabilities are all cornerstones of effective vulnerability management, in practice, they are often inadequately implemented.
Often, the best-designed strategies and VM implementations rely on experience.
Check out the presentation to get a taste of the webinar:
- Learn how to improve vulnerability identification and strengthen your systems
- Look over the shoulder of an expert, as Paula a demo of how to exploit systems and how (from the hacker perspective) you can learn to defuse such exploits!
Watch the webinar: https://www.beyondtrust.com/resources/webinar/vulnerability-management-how-to-think-like-a-hacker-to-reduce-risk/
The document discusses various aspects of human resources management including defining HRM, recruitment and selection processes, training and development, and organizational structures. It provides details on job analysis, different types of recruitment sources, orientation processes, and evaluating the impact of training. Additionally, it examines concepts like centralization vs decentralization, different levels of organizational culture, and factors that influence the choice of organizational structure.
10 Steps to Building an Effective Vulnerability Management ProgramBeyondTrust
You can tune in for the full webinar recording here: https://www.beyondtrust.com/resources/webinar/10-steps-to-building-an-effective-vulnerability-management-program/
In this presentation from the webinar by cyber security expert Derek A, Smith, hear a step-by-step overview of how to build an effective vulnerability management program. Whether your network consists of just a few connected computers or thousands of servers distributed around the world, this presentation discusses ten actionable steps you can apply whether its to bolster your existing vulnerability management program--or building one from scratch.
Enemy from Within: Managing and Controlling AccessBeyondTrust
Access the full webinar here: https://www.beyondtrust.com/resources/webinar/enemy-within-managing-controlling-access/?access_code=380c50225d67f81afaf12a795543782a
In this presentation from the webinar of SANS faculty fellow and industry-recognized security expert, Dr. Eric Cole, discover how identity and access management (IAM) and privileged access management work together to reduce the threat surface and contain attacks.
Also, hear how BeyondTrust and SailPoint solutions work together.
Creative Restart 2024: Mike Martin - Finding a way around “no”Taste
Ideas that are good for business and good for the world that we live in, are what I’m passionate about.
Some ideas take a year to make, some take 8 years. I want to share two projects that best illustrate this and why it is never good to stop at “no”.
How to Setup Default Value for a Field in Odoo 17Celine George
In Odoo, we can set a default value for a field during the creation of a record for a model. We have many methods in odoo for setting a default value to the field.
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
Information and Communication Technology in EducationMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 2)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐈𝐂𝐓 𝐢𝐧 𝐞𝐝𝐮𝐜𝐚𝐭𝐢𝐨𝐧:
Students will be able to explain the role and impact of Information and Communication Technology (ICT) in education. They will understand how ICT tools, such as computers, the internet, and educational software, enhance learning and teaching processes. By exploring various ICT applications, students will recognize how these technologies facilitate access to information, improve communication, support collaboration, and enable personalized learning experiences.
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐫𝐞𝐥𝐢𝐚𝐛𝐥𝐞 𝐬𝐨𝐮𝐫𝐜𝐞𝐬 𝐨𝐧 𝐭𝐡𝐞 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭:
-Students will be able to discuss what constitutes reliable sources on the internet. They will learn to identify key characteristics of trustworthy information, such as credibility, accuracy, and authority. By examining different types of online sources, students will develop skills to evaluate the reliability of websites and content, ensuring they can distinguish between reputable information and misinformation.
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxOH TEIK BIN
(A Free eBook comprising 3 Sets of Presentation of a selection of Puzzles, Brain Teasers and Thinking Problems to exercise both the mind and the Right and Left Brain. To help keep the mind and brain fit and healthy. Good for both the young and old alike.
Answers are given for all the puzzles and problems.)
With Metta,
Bro. Oh Teik Bin 🙏🤓🤔🥰
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
Brand Guideline of Bashundhara A4 Paper - 2024khabri85
It outlines the basic identity elements such as symbol, logotype, colors, and typefaces. It provides examples of applying the identity to materials like letterhead, business cards, reports, folders, and websites.
1. ER8A Front Cover
90
ADEC Examinations
2010-2011
Required text sheet.
Read these instructions first:
1. Complete the box above
2. Write in blue or black pen
3. The paper consists of four sections
4. Attempt every question and read each one carefully
5. A non-attempt score zero (0)
English Reading : Grade 8
ER8A
ER8A
2. A1. What was Dhaid? [1]
A. A yacht
B. A dhow
C. A fish
D. A person
A2. What had Dhaid and his master searched for? [1]
A. Sunken treasure
B. Deepest ocean
C. Best fishing spots
D. Finest seaweed
A3. What did Dhaid long for? [1]
A. His master
B. Days of the past
C. Magnificence at sea
D. His master’s family
A4. Where was the young man searching for shells? [1]
A. Among the rocks
B. Out at sea
C. Along the shoreline
D. In the fishing basket
A5. What did the young man give to Dhaid? [1]
A. Dreams of days gone by
B. New boards and a powerful engine
C. Precious shells and good advice
D. New white sails and a shining coat of paint
ER8A page 2 of 8
For questions A1-A5, choose one answer and circle it : A
If you make a mistake, cross out the first answer and circle
the correct on A C
Read Text A and answer questions A1 - A9
5
3. [1]
[1]
[1]
[1]
[1]
ER8A page 3 of 8
For questions A6-A9, write your answers in the spaces provided.
A6. In the last sentence of the text which phrase is an example of personification? [1]
.................................................................................................................................................................
.................................................................................................................................................................
A7. How did Dhaid feel about the ocean? [1]
.................................................................................................................................................................
.................................................................................................................................................................
A8. What happened to Dhaid’s appearance after his master came no more? [1]
.................................................................................................................................................................
.................................................................................................................................................................
A9. How can we describe the young man? Justify with ideas from the text. [3]
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
5 6
4. B1. Which words rhyme in the second stanza? [1]
A. Hums and thumbs
B. Baby and happily
C. Hums and happily
D. Thumbs and happily
B2. Which poetic feature is used in the first line of each stanza? [1]
A. Simile
B. Metaphor
C. Alliteration
D. Personification
B3. Which of the following is an example of personification? [1]
A. The river’s a singer
B. The river’s a baby
C. As he dances along
D. The river’s a monster
For question B4 write your answer in the space provided
B4. What does the poet compare the river to in stanza 4? In your own words, explain this comparison with [3]
evidence from the text.
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
ER8A page 4 of 8
Read Text B and answer questions B1 - B4
6
For questions B1-B3, choose one answer and circle it : A
5. View Text C and answer questions C1 - C2
C1. What is the message in this visual text? [2]
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
C2. Identify one visual feature and explain how this feature supports the message. [2]
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
[1]
[1]
[1]
[3]
ER8A page 5 of 8
6 4
6. ER8A page 6 of 8
Intertextual
D1. In your own words explain the relationship between Text A and Text C.
Identify the common idea inText A and Text C. Discuss the importance of the idea with evidence [4]
from the text and your own knowledge.
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
4