Pаssаge 4: One prоblem with used cаrs is that they break dоwn much mоre frequently than new cars. For instance, I have had two used cars and one new car in my life. Both used cars broke down on me at least three times each. Every time one of those used cars broke down, I had to call a tow truck and have the car towed to a service station for repairs. My new car has never broken down on me. I have had it for two years and it has more than fifty thousand miles on it. Another problem presented by used cars is failing to get the driver to work on time. One time, when I was in my first used car, a 1985 Corolla, the chip that controlled the electrical system on the car malfunctioned. Although I got to the parking lot of my work thirty minutes before I was supposed to start my shift, I was an hour and a half late for work because when I turned the engine off, I couldn’t open the doors or windows. Consequently, I was trapped in my car until a repair truck from the Toyota dealer could come and install a new chip. A final drawback of used cars is the unavailability of parts. I bought a used 1989 Ford truck in 1995. The engine developed major problems. When I took the truck in for repair, the repairmen said that the truck needed a new electrical switch of some kind. Unfortunately, Ford had discontinued making this switch, so I had to go to several junkyards to find a replacement. Clearly, used cars have several disadvantages that a prospective buyer should consider. 11. The overall pattern of organization of this passage is
Pаssаge 8: Identity thieves аre a lоt like car thieves, experts say: If they want yоur infоrmation badly enough, they'll probably get it. But taking a few simple precautions can make you a much less attractive target. Here are simple steps for protecting your identity. First, avoid phishing scams. The latest ploy of ID thieves is to send consumers official-looking e-mail messages that appear to come from companies you've done business with. The e-mail messages request passwords and other personal data. The practice -- called "phishing" -- can dupe even savvy consumers. When in doubt, verify by phone or through the company's Web site that the e-mail is real. Second, buy a shredder. This is one of the easiest ways to guard against "Dumpster diving," says Naomi Lefkovitz, an attorney for the FTC's identity theft program. Identity thieves prowl public dumps and big trash bins looking for sensitive documents like credit card statements. Many of those papers contain all the information a thief needs to hijack your identity. Third, keep track of your credit by getting regular credit. It's always a good time to get copies of your credit report from the three major credit bureaus -- Equifax, Experian and TransUnion. It won't protect you from theft, but it will let you spot suspicious activity taking place in your name. They normally charge around $10 for a copy, and consumers are encouraged obtain reports from all three bureaus; some deals offer reports from all three bureaus for a single price. Fourth, protect your social security number. The Social Security number has become a de facto customer ID, but most of the time you don't have to give it away. SSNs are like spun gold to identity thieves. The FTC's Lefkovitz advises consumers to ask companies that request an SSN why they need it. Retail stores, utility companies and insurers are among the sorts of companies that probably don't need your Social Security number -- even if they ask for it. The law doesn't prevent them from asking, but many will back down if you insist on keeping your number private. Finally, practice safe computing by inoculating your home computer against attacks and spying, especially if you trade music or other digital files online. Buy anti-virus software and keep it updated with the latest virus definitions. Also consider firewall software. 22. Which of the following best restates the main idea of this passage?