Set 15: Rhetorical Synthesis (Advanced)
Explanation
PASSAGE
A student is writing about cybersecurity. The student wants to explain common ways hackers access personal data. Notes: - Phishing emails trick users into revealing passwords. - Weak passwords are easily cracked by software. - Public Wi-Fi can expose data to interception. - Two-factor authentication increases security.
Which choice most effectively uses information from the notes to accomplish the student's goal?
Detailed Answer Explanation
This question asks you to effectively combine information to achieve a goal. The goal is common ways hackers ACCESS data. Phishing, password cracking, and Wi-Fi interception are access methods. The correct synthesis will use relevant details from the notes in a logical, purposeful way. Focus on what the question asks you to accomplish, then choose the answer that best achieves that goal using the provided information. Effective synthesis requires selecting and combining the most relevant information to achieve a specific purpose. Not all provided notes may be equally useful. Focus on what best accomplishes the stated goal while maintaining logical coherence.
Key Evidence:
• "explain common ways hackers access personal data"
• "Phishing emails trick users"
• "Weak passwords are easily cracked"
• "Public Wi-Fi can expose data"
Why others are wrong: D (Discusses corporate investment, not hacker methods.), B (General statement about importance; doesn't explain methods.), A (Describes defense method, not hacker access methods.).
🎯 Keep Practicing!
Master all sections for your best SAT score