Unit Review & Progress Test
End-of-unit mixed review with grammar, vocabulary, skills practice and self-assessment.
Lesson objectives
- Consolidate the grammar, vocabulary and skills from cybersecurity, privacy & digital rights.
- Complete a mixed C1 progress test with answers and self-assessment.
- Identify weak points before moving to the next unit.
Unit review — Cybersecurity, Privacy & Digital Rights
Al finalizar esta unidad, deberías ser capaz de discutir temas complejos relacionados con la seguridad digital, la ética de la inteligencia artificial y el derecho a la privacidad con un vocabulario especializado y preciso. Habrás desarrollado la capacidad de navegar entre registros formales (para ensayos o informes) e informales (para debates o correos electrónicos), manteniendo la cohesión necesaria para un nivel C1.
Además, habrás perfeccionado el uso de estructuras gramaticales avanzadas para expresar hipótesis, arrepentimientos o énfasis, permitiéndote argumentar con autoridad sobre temas de actualidad tecnológica. Ahora deberías poder identificar matices sutiles en textos técnicos y responder de manera estructurada a preguntas de examen de tipo Use of English y Writing.
Grammar consolidation
Complete the following tasks. Focus on shifting between formal and informal registers, as well as correcting grammatical errors typical of C1 learners.
Part 1: Sentence Transformation (Rewrite the sentence so it has a similar meaning, using the word provided. Do not change the word provided.)
-
I'm sure he didn't mean to leak the data. (HAVE) He ______ the data.
-
It is possible that the hackers entered through a weak password. (MIGHT) The hackers ______ through a weak password.
-
"I didn't steal the files!" said the employee. (DENIED) The employee ______ the files.
Part 2: Error Correction (Identify and correct the single error in each sentence.)
- If the company would have updated its software, the breach wouldn't have happened.
- Despite they had strong encryption, the data was still compromised.
- It is essential that every user understands the importance of two-factor authentication.
Part 3: Controlled Rewriting (Rewrite the informal sentences into a formal, academic style suitable for a report.)
-
Informal: We think that the new law is going to be a bit of a problem for tech companies. Formal: It is anticipated that...
-
Informal: They've got a lot of problems with how they handle user info. Formal: The organisation faces significant...
-
Informal: You should definitely change your passwords more often. Formal: It is highly recommended that...
-
Informal: I'll look into the security flaws right away. Formal: I shall undertake...
Vocabulary activation
Part 1: Word Formation (Use the word in capitals to form a word that fits in the gap.)
- The ___ of personal data without consent is a major ethical concern. (PRIVACY)
- We must ensure the ___ of our digital infrastructure. (RESILIENT)
- The sudden ___ of the database caused widespread panic. (BREACH)
- Cybercriminals often use ___ methods to trick unsuspecting users. (SOPHISTICATED)
Part 2: Collocations (Complete the sentences with the correct verb/noun collocation from the list: breach, data, identity, cyber, vulnerability.)
- To prevent a security _____, we must update our firewalls.
- He fell victim to _____ theft after his social media was hacked.
- The company suffered a massive _____ leak last month.
- We need to conduct a _____ audit to find weaknesses in the system.
Part 3: Register Choice (Choose the most appropriate word for a formal C1 report.)
- The recent malware attack was _____ (devastating / really bad).
- Authorities are working to _____ (stop / mitigate) the effects of the virus.
- There is a _____ (huge / substantial) risk of data loss.
- The policy was _____ (put in place / implemented) to protect user rights.
Integrated skills task
Source Text: The Double-Edged Sword of Connectivity
The rapid integration of Internet of Things (IoT) devices into our daily lives has brought unprecedented convenience. From smart thermostats to wearable health monitors, our homes and bodies are increasingly digitised. However, this connectivity comes at a steep price: the erosion of privacy. Every device acts as a potential entry point for malicious actors, turning a domestic sanctuary into a surveillance hub.
Furthermore, the collection of vast amounts of data by corporations raises profound questions about digital rights. While data harvesting can lead to personalised services, it also enables intrusive profiling and manipulation. As we move further into a hyper-connected era, the line between utility and intrusion becomes increasingly blurred. We must decide whether the convenience of a smart life is worth the loss of our digital autonomy.
Writing Task (Instrucciones en español)
Basándote en el texto anterior, escribe un ensayo de respuesta (response essay) de entre 180 y 220 palabras. En tu texto, debes: 1. Resumir los puntos principales del autor sobre los riesgos de la conectividad. 2. Argumentar si estás de acuerdo o no con la idea de que la conveniencia justifica la pérdida de privacidad. 3. Utilizar vocabulario avanzado y estructuras gramaticales de nivel C1 (como inversiones o condicionales mixtos).
Speaking checkpoint
Prepare to answer these prompts. For a full simulation, record yourself or practice with a partner.
- Compare: Compare the security risks of using a smartphone versus using a traditional desktop computer.
- Speculate: How might the concept of "privacy" change in fifty years if AI becomes even more integrated into our lives?
- Evaluate: Evaluate the effectiveness of government regulations in protecting citizens' digital rights compared to corporate self-regulation.
- Justify: "Personal privacy is a luxury we can no longer afford in the digital age." To what extent do you agree with this statement?
- Speculate: If a major global power suffered a total blackout due to a cyberattack, what would be the immediate social consequences?
- Evaluate: Is it the responsibility of the individual or the tech company to ensure data security? Justify your position.
Self-assessment rubric
| Criterion | Needs work (B2/Below) | Solid (C1) | Exam-ready (C1+/C2) |
|---|---|---|---|
| Accuracy | Frequent errors in grammar and spelling. | Generally accurate; errors are rare and do not impede meaning. | High level of precision; sophisticated control of complex structures. |
| Range | Uses basic vocabulary and repetitive structures. | Uses a wide range of vocabulary and varied sentence structures. | Uses highly sophisticated, nuanced, and idiomatic language. |
| Fluency | Frequent pauses and hesitation. | Speaks at a natural pace with some hesitation when searching for complex terms. | Smooth, natural flow with minimal hesitation. |
| Task Achievement | Does not fully address the prompt or stays too brief. | Addresses all parts of the task clearly and appropriately. | Provides a deep, nuanced, and well-structured response. |
Answer key
Grammar consolidation 1. He must not have leaked the data. 2. The hackers might have entered through a weak password. 3. The employee denied stealing the files. 4. If the company had updated its software... 5. Despite having strong encryption... (or: Despite the fact that they had...) 6. It is essential that every user understand (Subjunctive) / Note: 'understands' is acceptable in modern English, but 'understand' is the formal C1 subjunctive. 7. It is anticipated that the new law will pose significant challenges for tech companies. 8. The organisation faces significant issues regarding its handling of user information. 9. It is highly recommended that users change their passwords more frequently. 10. I shall undertake an immediate investigation into the security flaws.
Vocabulary activation 1. privacy 2. resilience 3. breach 4. sophisticated 5. vulnerability 6. identity 7. data 8. cyber 9. devastating 10. mitigate 11. substantial 12. implemented