Tài liệu hỗ trợ

Tải MIỄN PHÍ file Word kèm ma trận và lời giải chi tiết

Liên hệ Zalo 0915347068 để nhận file nhanh chóng.

Liên hệ Zalo 0915347068

ĐỀ VIP 19 - KĐ - MỤC TIÊU 9+ TN THPT MÔN TIẾNG ANH 2026 - MK9

(Đề thi có ... trang)

Môn thi: Tiếng Anh

Năm 2026

Thời gian làm bài: ... phút, không kể thời gian phát đề.

Họ, tên thí sinh:

Số báo danh:

Read the following advertisement and mark the letter A, B, C or D on your answer sheet to indicate the option that best fits each of the numbered blanks from 1 to 6.

Master the Art of Dining: Transform Your Table Manners Today!

        Are you tired of feeling anxious at formal dinners? Our revolutionary guide (1)_________ centuries of dining etiquette into simple, practical lessons. Unlike traditional etiquette books that can consign someone to social (2)_________ for using the wrong fork, we believe in empowering you with cultural understanding.

        The beautifully illustrated handbook, (3)_________ covers dining customs from around the world, teaches you how to navigate any social situation with confidence. (4)_________ of our readers report feeling more comfortable at business lunches and family gatherings after just one week.

        Students (5)_________ in our online course receive personalized feedback and practical exercises. You'll learn not just the "how" but also the "why" behind each (6)_________, transforming your understanding completely.

        Don't let outdated rules hold you back. Join thousands who've discovered that true etiquette is about respect, not perfection!

        Sign up today and receive a FREE dining confidence checklist!

https://www.nationalgeographic.com/am

Question 1:A. plays down
B.
 sums up
C.  
breaks down
D.  
turns over

Xem chi tiếtXem đáp án và lời giải

Question 2:A. oblivion
B.  
estrangement
C.  
scrutiny
D.  
demise

Xem chi tiếtXem đáp án và lời giải

Question 3:A. whom
B.  
that
C.  
who
D.  
which

Xem chi tiếtXem đáp án và lời giải

Question 4:A. Each
B.  
Most
C.  
Many
D.  
Some

Xem chi tiếtXem đáp án và lời giải

Question 5:A. enrolled
B.  
which enrolled
C.  
had enrolled
D.  
was enrolled

Xem chi tiếtXem đáp án và lời giải

Question 6:A. customization 
B.  
customary 
C.  
custom
D.  
customize

 

Xem chi tiếtXem đáp án và lời giải

Read of the following leaflet and mark the letter A, B, C or D on your answer sheet to indicate the option that best fits each of the numbered blanks from 7 to 12.

ROOMMATE HARMONY WORKSHOP

Transform Your Shared Living Experience!

        Are you struggling with roommate conflicts?

        Join our FREE workshop this Saturday and learn how to create a peaceful shared living space!

        Living with roommates doesn't have to be stressful! (7)_________ many students face unexpected daily challenges with different schedules and habits, our proven methods can help you build lasting friendships.

        What You'll Learn:

        Clear communication strategies—Stop (8)_________ on social media about roommate problems and start having productive conversations that actually resolve issues.

        Boundary-setting techniques: Create (9)_________ schedules that work perfectly for everyone involved.

        Conflict resolution skills—Learn to express yourself clearly and calmly so roommates won't (10)_________ your words or intentions.

        Agreement templates - Get our exclusive roommate contract that covers everything from visitors to study hours

        Why Attend?

        Many students try to handle conflicts completely alone, but (11)_________ find that professional guidance makes all the remarkable difference. Don't constantly maintain your peace (12)_________ the expense of healthy communication and mutual understanding.

        Workshop Details:

●        Date: Saturday, March 23rd

●        Time: 2:00 PM - 4:00 PM

●        Location: Student Union, Room 205

●        Cost: FREE (Refreshments provided!)

Limited to 30 participants—register NOW!

Email: harmony@studentlife.edu | Call: 555-ROOM (7666)

https://mhanational.org/am

Question 7:A. Despite
B.  
However
C.  
Although
D.  
Whereas

Xem chi tiếtXem đáp án và lời giải

Question 8:A. gossiping
B.  
venting
C.  
ranting
D.  
obsessing

Xem chi tiếtXem đáp án và lời giải

Question 9:A. weekly cleaning effective
B.  
effective cleaning weekly 


C.  
cleaning effective weekly
D.  
effective weekly cleaning

Xem chi tiếtXem đáp án và lời giải

Question 10:A. misinterpret
B.  
distort
C.  
dismiss
D.  
undermine

Xem chi tiếtXem đáp án và lời giải

Question 11:A. the others
B.  
others
C.  
another
D.  
other

Xem chi tiếtXem đáp án và lời giải

Question 12:A. in
B.  
for
C.  
at
D.  
to

Xem chi tiếtXem đáp án và lời giải

Mark the letter A, B, C or D on your answer sheet to indicate the best arrangement of utterances or sentences to make a meaningful exchange or text in each of the following questions from 13 to 17.

Question 13:

A.         Maria: Exactly! My grandmother says we're losing our own stories because Netflix doesn't make shows about our culture. Everything looks like Hollywood now.

B.         Maria: I'm worried because my cousin in Brazil stopped listening to Brazilian music. She only listens to what's trending on Spotify from America.

C.         David: I know what you mean! The same thing is happening here. Facebook and Instagram decide what we see every day, so everyone starts thinking the same way.

A.  b-a-c        
B.  
a-c-b
C.  
c-b-a
D.  
b-c-a

Xem chi tiếtXem đáp án và lời giải

Question 14:

A.         Mark: That's smart! I found my book club on Reddit when I was feeling isolated, but now we meet every week through video calls.

B.         Lisa: I agree that it's different, but my virtual community helped me through depression when nobody else knew, so these friendships are definitely real!

C.         Mark: Yes, but sometimes I miss real coffee meetings because typing feels different, although my online friends understand me better than my actual neighbors.

D.         Lisa: I joined a knitting group online because I moved to a new city, and I don't know anyone here yet in real life.

e.        Lisa: Online friends are great because they're always available when you need them, and time zones mean someone is always awake to chat somewhere!

A.  c-e-d-a-b
B.  
d-c-e-b-a
C.
 a-d-b-e-c        
D.  
d-a-e-c-b

Xem chi tiếtXem đáp án và lời giải

Question 15:

Dear Anna,

A.         I'm writing to tell you about our new translation app at work, which understands different cultures when it translates languages between our international teams.

B.         Our company is using AI chatbots that speak 50 languages because they want to help customers everywhere, although sometimes the bot still makes funny mistakes!

C.         Yesterday, it helped me communicate with Japanese colleagues because it explained their polite expressions, so I didn't accidentally offend anyone during our important meeting.

D.         I think technology is getting better at understanding diversity because programmers are learning from different cultures, so AI can finally serve everyone equally now.

e.        The AI also suggests holiday greetings when different festivals happen around the world, which makes our Muslim and Hindu coworkers feel included and respected.

Best wishes,

AM

A.  a-c-e-b-d
B.  
c-d-e-b-a
C.  
e-b-a-c-d
D.  
b-e-c-a-d

Xem chi tiếtXem đáp án và lời giải

Question 16:

A.         Your independence revolution begins when you stop seeking approval from others, because real freedom comes from within, not from likes, shares, or external validation.

B.         Modern life controls us through social media notifications and endless work emails, but we can break free if we choose to act decisively today.

C.         Financial independence matters too, so create multiple income sources through freelancing or investing, even though society expects you to follow traditional employment paths forever.

D.         Start by turning off your phone for two hours daily because this simple action creates space for thinking, while most people remain digitally enslaved.

e.        Learn to say "no" to unnecessary commitments that drain your energy, and instead focus on activities that truly align with your personal goals and values.

A.  e-b-d-c-a
B.  
b-d-c-e-a
C.  
d-e-c-b-a
D.  
c-b-e-d-a

Xem chi tiếtXem đáp án và lời giải

Question 17:

A.         When tourists choose certified eco-lodges that employ local guides, they support communities directly, so residents protect wildlife instead of exploiting forests for quick profits.

B.         Costa Rica attracts millions of ecotourists annually because its rainforests contain 5% of the world's biodiversity, and tourism revenue helps preserve these natural treasures effectively.

C.         Ecotourism opens doors to incredible biodiversity hotspots where travelers can witness rare species, while their visits fund conservation efforts that protect these fragile ecosystems.

D.         Responsible travelers must follow strict guidelines while observing animals in their habitats, but this mindful approach ensures future generations can experience nature's incredible diversity.

e.        Madagascar's unique lemurs survive because ecotourism provides alternative income for villages, although balancing visitor numbers with environmental protection remains challenging for park managers everywhere.

A.  c-e-b-d-a
B.  
c-e-d-a-b
C.  
c-b-a-e-d
D.  
c-b-e-a-d

 

Xem chi tiếtXem đáp án và lời giải

Read the following passage about Boyan Slat's Revolutionary Approach to Ocean Cleanup and mark the letter A, B, C or D on your answer sheet to indicate the option that best fits each of the numbered blanks from 18 to 22.

Boyan Slat's revolutionary vision for oceanic restoration emerged during his teenage years following a transformative diving experience in Greece. (18)_________, humanity might have continued ignoring this environmental crisis indefinitely. His subsequent establishment of The Ocean Cleanup at eighteen demonstrated remarkable entrepreneurial courage. System 001, the organization's pioneering device, (19)_________, represents a technological breakthrough in marine conservation. The innovation employs sophisticated floating barriers equipped with underwater skirts designed to intercept debris while preserving aquatic ecosystems.

The challenge extends beyond mere collection; the retrieved materials require sustainable processing. Transportation logistics, recycling infrastructure, and market development for recovered plastics pose formidable obstacles. His groundbreaking proposition, (20)_________, reflects visionary environmental leadership rivaling established conservationists. These microscopic fragments infiltrate food chains irreversibly, threatening both marine biodiversity and human health. His ambitious scaling strategy envisions deploying numerous autonomous systems throughout global garbage patches.

Critics question economic viability and potential ecological disruptions, yet supporters emphasize urgency given accelerating pollution rates. Prevention remains paramount; cleanup constitutes damage control. (21)_________. Whether this approach achieves meaningful impact depends on technological refinement, funding sustainability, and international cooperation. Nevertheless, Slat's initiative has catalyzed global awareness, (22)_________.

https://time.com/am

Question 18:

A.  Had the young inventor not witnessed such overwhelming plastic contamination beneath the waves

B.  The cleanup systems, which exclusively targeted microscopic particles instead of larger plastic debris

C.  Having dismissed the environmental crisis after brief underwater exploration without serious concern

D.  The young inventor, whose primary focus remained on theoretical research without practical action

Xem chi tiếtXem đáp án và lời giải

Question 19:

A.  which generates substantial tourist revenue following their 2018 festival near San Francisco

B.  attracts numerous marine wildlife species during their 2018 migration into San Francisco

C.  financial investors withdrew completely before the 2018 bankruptcy near San Francisco

D.  which underwent extensive engineering refinements before its 2018 deployment from San Francisco

Xem chi tiếtXem đáp án và lời giải

Question 20:

A.  whereby governments facilitate extensively through marine ecosystems proliferating with beneficial microparticles

B.  that humanity must act decisively before larger plastics disintegrate into irrecoverable microparticles

C.  what corporations prioritize consistently remains profitable ventures emerging from biodegradable microparticles

D.  whether scientists validate hypothetically before organic compounds synthesize into reversible microparticles

Xem chi tiếtXem đáp án và lời giải

Question 21:

A.  The organization's reluctance to processing salvaged materials into temporary products undermines environmental sustainability goals

B.  The organization's commitment to converting salvaged materials into durable products demonstrates circular economy principles

C.  The organization's strategy involves exporting salvaged materials to developing nations rather than domestic manufacturing

D.  The organization's focus remains exclusively on collection while ignoring recycling possibilities and product development

Xem chi tiếtXem đáp án và lời giải

Question 22:

A.  delaying necessary innovations and policy reforms concerning plastic pollution practically rather than theoretically

B.  hindering parallel innovations and policy reforms by creating plastic pollution competition rather than cooperation

C.  inspiring parallel innovations and policy reforms addressing plastic pollution systematically rather than superficially

D.  replacing traditional innovations with policy reforms ignoring plastic pollution temporarily rather than permanently

 

Xem chi tiếtXem đáp án và lời giải

Read the following passage about When Biology Meets Digital Vulnerability and mark the letter A, B, C or D on your answer sheet to indicate the best answer to each of the following questions from 23 to 30.

Recent research has unveiled an unprecedented cybersecurity threat emerging from genetic material. Scientists demonstrated that maliciously engineered deoxyribonucleic acid sequences can serve as sophisticated attack vectors against computational systems. This groundbreaking discovery challenges traditional security paradigms by exploiting the intersection between biological specimens and digital processing infrastructure. The vulnerability arises not from inherent molecular properties but from computational transformation during modern sequencing procedures, where organic matter becomes susceptible data requiring software interpretation and analysis.

The attack mechanism operates through meticulously crafted buffer-overflow exploitation targeting bioinformatics analysis tools. Researchers successfully designed genetic sequences that, when processed by sequencing equipment and converted into FASTQ file formats, trigger malicious code execution within downstream analytical software. This ingenious approach allows arbitrary commands to infiltrate host computer systems. The methodology represents a novel fusion of biological engineering and traditional hacking techniques, demonstrating how seemingly innocuous scientific samples can harbor dangerous digital payloads capable of penetrating secure environments.

However, significant constraints limit practical implementation. The malicious payload must simultaneously satisfy stringent biological requirements, including sequence length restrictions, avoidance of problematic repetitive elements, and maintenance of reliable base-reading compatibility. Additionally, the laboratory demonstration exhibited inconsistent success rates and required researchers to deliberately introduce specific vulnerabilities into open-source programs rather than exploiting naturally occurring flaws. These limitations substantially reduce immediate real-world applicability, though they do not diminish theoretical significance or potential future refinement possibilities.

The implications extend beyond this proof-of-concept, highlighting emerging challenges within the rapidly expanding bioinformatics sector. As sequencing becomes increasingly ubiquitous and genetic data processing shifts toward automated pipelines and third-party cloud services, the attack surface continues expanding. This development necessitates enhanced security protocols, rigorous code auditing practices, and comprehensive vulnerability assessments within software development. The research serves as a crucial warning about evolving cybersecurity threats in our interconnected digital-biological landscape.

https://www.wired.com/am

Question 23: Which constraint was NOT mentioned?

A.  Encryption requirements

B.  Sequence length restrictions

C.  Avoidance of problematic repetitive elements

D.  Maintenance of reliable base-reading compatibility

Xem chi tiếtXem đáp án và lời giải

Question 24: The word “susceptible” in paragraph 1 is OPPOSITE in meaning to _________.

A.  vulnerable                                B. resilient                                        C. coherent                                        D. impervious

Xem chi tiếtXem đáp án và lời giải

Question 25: The word “infiltrate” in paragraph 2 could be best replaced by _________.

A.  compromise                                B. circumvent                                C. penetrate                                        D. exploit

Xem chi tiếtXem đáp án và lời giải

Question 26: The word “they” in paragraph 3 refers to _________.

A.  Theoretical significance and future refinement possibilities

B.  The constraints limiting practical implementation

C.  The researchers conducting the laboratory demonstration

D.  The open-source programs with introduced vulnerabilities

Xem chi tiếtXem đáp án và lời giải

Question 27: Which of the following best paraphrases the underlined sentence in paragraph 4?

A.  Growing sequencing prevalence and migration to automated systems and cloud platforms increase potential security vulnerability points.

B.  Growing sequencing prevalence and migration to automated systems and cloud platforms concentrate potential security vulnerability points.

C.  Declining sequencing prevalence and migration to automated systems and cloud platforms reduce potential security vulnerability points.

D.  Controlled sequencing prevalence and migration to automated systems and cloud platforms stabilize potential security vulnerability points.

Xem chi tiếtXem đáp án và lời giải

Question 28: Which of the following is TRUE according to the passage?

A.  Malicious DNA exploits molecular properties to attack computational systems.

B.  Attack method showed consistent success against natural software vulnerabilities.

C.  Implementation faces minimal constraints from biological and digital requirements.

D.  Researchers deliberately introduced vulnerabilities into open-source programs for testing.

Xem chi tiếtXem đáp án và lời giải

Question 29: In which paragraph does the writer mention what file format is mentioned in the attack process?

A.  Paragraph 3                                B. Paragraph 1                                C. Paragraph 2                                D. Paragraph 4

Xem chi tiếtXem đáp án và lời giải

Question 30: Which paragraph does the writer suggest is necessary for bioinformatics software development?

A.  Paragraph 1                                B. Paragraph 3                                C. Paragraph 4                                D. Paragraph 2

 

Xem chi tiếtXem đáp án và lời giải

Read the following passage about the The Psychology Behind Digital Outrage and mark the letter A, B, C or D on your answer sheet to indicate the best answer to each of the following questions from 31 to 40.

In today's hyperconnected world, "rage bait"—deliberately provocative content engineered to trigger emotional responses—has become increasingly pervasive across social platforms. Psychologist Bethany Teachman reveals why individuals go down a rabbit hole of inflammatory posts despite recognizing the manipulation. [I] Our neurological architecture inherently prioritizes threatening stimuli as evolutionary survival mechanisms. This predisposition intensifies within overwhelming information ecosystems, where attention becomes currency, and outrage generates revenue through algorithmic amplification systems designed to maximize user engagement metrics.

Anger transcends mere emotional discomfort; it signals perceived injustices or obstructed objectives, fundamentally differing from withdrawal-inducing emotions. [II] This biochemical activation prompts commenting, debating, and sharing behaviors—precisely what platforms monetize. Unlike sadness or fear, which encourage retreat, anger mobilizes confrontational tendencies, making rage-inducing material structurally compatible with engagement-driven algorithms. Consequently, provocative content proliferates exponentially, creating feedback loops where inflammatory posts dominate feeds while nuanced perspectives vanish.

Chronic exposure to such material yields substantial psychological consequences. Perpetual indignation cycles foster sustained stress responses, constrict cognitive flexibility, and distort interpersonal perception patterns. These effects gradually erode empathetic capacity, transforming potential collaborators into adversaries. Individuals experiencing constant triggering develop heightened threat detection, misinterpreting neutral interactions as hostile. [III] This vigilance paradoxically increases vulnerability to manipulation, as emotional exhaustion impairs critical thinking abilities necessary for distinguishing legitimate concerns from manufactured controversies.

Teachman advocates proactive strategies for reclaiming cognitive autonomy. Recognizing emotionally charged framing lacking complexity represents crucial initial awareness. Monitoring repetitive triggering patterns within personalized feeds illuminates algorithmic manipulation tactics. Physical and emotional self-assessment during scrolling sessions provides valuable feedback about consumption impacts. When digital interactions consistently generate frustration or depletion, establishing boundaries becomes essential. [IV] Diversifying information sources, practicing mindfulness techniques—acknowledging feelings without reflexive reactions—and intentionally scheduling offline periods help restore psychological equilibrium and behavioral control.

https://news.virginia.edu/am

Question 31: The phrase “go down a rabbit hole” in paragraph 1 has the closest meaning to _________.

A.  back away from                        B. get sucked into                        C. look down on                        D. break away from

Xem chi tiếtXem đáp án và lời giải

Question 32: According to the passage, all of the following are mentioned EXCEPT _________.

A.  Anger signals perceived injustices or obstructed objectives

B.  Emotional exhaustion impairs critical thinking abilities

C.  Mindfulness techniques help restore psychological equilibrium

D.  Social media companies are developing policies to eliminate rage bait

Xem chi tiếtXem đáp án và lời giải

Question 33: The word “it” in paragraph 2 refers to _________.

A.  Anger                                        B. emotional discomfort                C. rage bait                                        D. stimulation

Xem chi tiếtXem đáp án và lời giải

Question 34: Where in the paragraph does the following sentence best fit?

This stimulation energizes approach-oriented behavioral patterns.

A. [I]
B. [II]
C. [III]
D. [IV]

Xem chi tiếtXem đáp án và lời giải

Question 35: Which of the following best summarises paragraph 3?

A.  Chronic rage bait exposure creates stress and defensive behaviors, causing people to misinterpret neutral interactions as hostile while increasing engagement with inflammatory content.

B.  Continuous consumption damages wellbeing through sustained stress, reduced empathy, and heightened threat detection that paradoxically increases manipulation vulnerability.

C.  Regular exposure causes psychological harm: chronic stress, cognitive rigidity, eroded empathy, and paradoxically greater manipulation susceptibility due to depleted critical thinking.

D.  Persistent engagement generates stress reactions and distorted perceptions, leading to confrontational tendencies and misreading neutral communications as threatening.

Xem chi tiếtXem đáp án và lời giải

Question 36: The word “adversaries” in paragraph 3 is OPPOSITE in meaning to _________.

A.  antagonists                                B. detractors                                        C. dissenters                                        D. confederates

Xem chi tiếtXem đáp án và lời giải

Question 37: Which of the following best paraphrases the underlined sentence in paragraph 4?

A.  Monitoring your physical and emotional states while browsing gives useful information about content effects.

B.  Evaluating your bodily and psychological responses during scrolling reveals important behavioral consumption patterns.

C.  Assessing your physiological and mental conditions while browsing identifies potential vulnerability to manipulation.

D.  Examining your emotional and physical wellness during engagement generates awareness of cognitive processing.

Xem chi tiếtXem đáp án và lời giải

Question 38: Which of the following is TRUE according to the passage?

A.  Sadness and anger both mobilize confrontational tendencies that platforms monetize through their engagement metrics.

B.  Anger energizes approach-oriented behaviors while sadness and fear encourage withdrawal responses from threatening situations.

C.  Algorithmic systems prioritize nuanced perspectives over inflammatory content to maintain long-term trust among users.

D.  Emotional exhaustion actually enhances critical thinking abilities necessary for distinguishing legitimate concerns from manufactured controversies.

Xem chi tiếtXem đáp án và lời giải

Question 39: Which of the following can be inferred from the passage?

A.  Evolutionary survival mechanisms have become obsolete in modern digital environments requiring complete elimination.

B.  Platform algorithms inadvertently create rage bait through unintended consequences of user preference optimization.

C.  Individuals exposed to rage bait will inevitably lose all capacity for empathy toward opposing viewpoints.

D.  Successfully managing rage bait consumption demands multiple coordinated strategies rather than single-solution approaches.

Xem chi tiếtXem đáp án và lời giải

Question 40: Which of the following best summarsies the passage?

A.  Evolutionary mechanisms make humans vulnerable to rage bait, which platforms exploit for profit, causing psychological harm requiring regulatory intervention.

B.  Social media algorithms accidentally create rage bait through optimization, leading to unintended consequences that users can overcome through awareness.

C.  Rage bait exploits evolutionary survival instincts, enabling platform monetization through engagement, causing psychological damage requiring multiple management strategies.

D.  Digital platforms deliberately engineer inflammatory content to maximize revenue, creating psychological harm that individuals can prevent through mindful consumption.

Xem chi tiếtXem đáp án và lời giải