Keys to training exercises
TM FIT 1-20
I. Give synonyms and/or antonyms:
1. to deny access |
to restrict access, to refuse access, ant. to certify access, to permit access |
2. to assemble |
to put together, ant. to take apart, to disassemble |
3. available data |
accessible data, ant. unavailable data |
4. alias |
nick, pseudonym, ant. real name |
5. background |
ant. foreground |
II. Word family. Fill in the missing words of the same root where possible:
noun |
verb |
adjective |
adverb |
access |
- |
accessible |
- |
adaptation/ adapter |
to adapt |
adaptable/ adaptive |
- |
alternation |
to alternate |
alternate |
alternatively |
authentication |
to authenticate |
authenticated |
- |
availability |
to avail |
available |
- |
III. Make up phrases by matching the words in the left column with those in the right:
1. to certify B |
A. code |
2. alternate C |
B. access |
3. auxiliary E |
C. route |
4. bar A |
D. name |
5. account D |
E. memory |
IV. Fill the web diagram with the words that can be used with the given word:
ACCESS - to certify, to restrict, to deny, to permit, to obtain, authorized, channel, data, direct, fast, information, network, one-touch, random access.
VI. Do a mini-research and classify the types of memory:
AROM, auxiliary memory, available memory, buffer memory, RAM, ROM, etc.
VII. Match the given terms with their definitions:
1. bar code C |
A. a function to level/straighten the text |
2. available data E |
B. an alternative name, nick |
3. alignment A |
C. a line coding given to products to encrypt information about them |
4. alias B |
D. a program which adds additional features to the main program |
5. accessory D |
E. information which a user can access |
VIII. State the type of logical relations between the following words:
Example |
Type of logical relations |
1. to deny access - to permit access C |
A. general and specific |
2. device - auxiliary device A |
B. cause and effect |
3. backup copy - available data B |
C. contrast |
4. account – account name E |
D. method and purpose |
5. identification – bar code D |
E. part and whole |
IX. Say what can be:
1. adapted |
program, any equipment, bus, channels, colors, communication line, disk |
2. amplified |
memory, signal, sound, buffer, electric current (power), driver |
3. allocated |
memory, disk capacity, channels, recourses, processor, space, storage, time |
4. assembled |
computer, any equipment, packets |
5. authenticated |
data, password, response, message, signature |
X. Say what the following is used for:
1. account name |
to identify the user |
2. alignment |
to level, straighten the text/picture |
3. auxiliary memory |
to store auxiliary programs/data |
4. backup copy |
not to lose the file/data |
5. alias |
to enter programs, to use data |
TM FIT 21-40
I. Give synonyms and/or antonyms:
1. binary |
2 digit, ant. decimal |
2. blank |
empty, erased, unformatted, space, ant. full, recorded |
3. bottom-up programming |
ant. top-down programming |
4. bug |
error, defect, breakage, ant. fixed, debugged, bug-ridden |
5. case-insensitive |
ant. case-sensitive |
II. Decode the acronyms:
1. CD-ROM |
compact disk read only memory |
2. CD-E |
compact disk erasable |
3. CD-R |
compact disk recordable |
4. CD-RW |
compact disk rewritable |
5. AROM |
alterable read only memory |
III. Word family. Fill in the missing words of the same root where possible:
Noun |
Verb |
Adjective |
Adverb |
blank |
- |
blank |
blankly |
browser |
to browse |
- |
- |
bug |
- |
buggy |
- |
buffer |
to buffer |
buffer |
- |
sensitivity |
to sense |
sensitive |
sensitively |
IV. Make up phrases by matching the words in the left column with those in the right:
1. batch C |
A. card |
2. bit E |
B. click |
3. button B |
C. file |
4. cache A |
D. address |
5. call D |
E. density |
VI. Do a mini-research and explain the difference between:
1. bottom-up programming – top down programming |
A method of working out a program from modules to result. A method when you first make a frame and then fill it with parts of the program. |
2. break out – break in – break down
|
When you interrupt the program work and stop working with it; when smb crashes your security system; when a computer can’t work and needs repair. |
3. buggy hardware – buggy software
|
Hardware (equipment) that doesn’t work (properly); programs with errors that don’t function properly. |
4. byte – gigabyte – kilobyte - megabyte
|
Byte – a unit of information and memory, 8 bits; kilobyte – 1024 bytes; megabyte – 1048576 bytes; gigabyte – 1024 megabytes. |
5. case sensitive – case insensitive |
Differentiates capital and small letters – does not. |
VII. Match the given terms with their definitions:
1. binary code D |
A. a place where the copied or cut information is temporarily stored |
2. byte G |
B. unformatted disk or a disk without recorded data |
3. buffer A |
C. a disk for uploading |
4. buggy hardware F |
D. a system of encoding information with the help of Os and Is |
5. blank disk B |
E. to get the access to computer system illegally |
6. boot disk C |
F. a device that doesn’t work because of defects or spoilage |
7. break in E |
G. the unit of information measurement |
VIII. Say what the following is used for:
1. binary code |
programming, entering data |
2. blank disk |
recording data |
3. build-in modem |
connection to the Internet |
4. cable connection |
to connect computer peripherals, etc. |
5. call address |
to find data, programs |
IX. Say when and why people do the following:
1. break in |
to get smb’s data, information, programs, money illegally |
2. break out |
to finish work with one program and start with another |
3. browse |
to get information |
4. broadcast |
to send smb. information, images, etc. |
5. bottom-up programming |
to make a program |
X. Name the kinds of compact disks:
CD-E, CD-R, CD-RW, CD-ROM, CD-I, CD-PROM, CD-ROM XA, CD-V, CD-WO, CD-WORM.
TM FIT 41-60
I. Give synonyms and/or antonyms:
1. certified |
allowed, permitted, ant. uncertified, denied, illegal |
2. compatible |
ant. incompatible |
3. connection |
link, switching, ant. disconnection |
4. data verification |
control, check, authentication, validation |
5. data retrieval |
selection/search from database |
II. Word family. Fill in the missing words of the same root where possible:
noun |
verb |
adjective |
adverb |
character |
to characterise |
characteristic |
- |
compatibility |
- |
compatible |
- |
computer/ computation |
to compute/ computerize |
computable/ computerized |
- |
customer |
to customize |
customized |
- |
deletion |
to delete |
deleted |
- |
III. Make up phrases by matching the words in the left column with those in the right:
1. copyright C |
A. key |
2. cursor A |
B. drive |
3. default D |
C. law |
4. disk B |
D. option |
5. display E |
E. mode |
IV. Fill the web diagram with the words that can be used with the given word: DATA
Accessibility, bank, base, authentication, collection, compression, corruption, entry, processing, integrity, management, output, mining, security, specification, transfer, retrieval, transmission, validation, verification, etc.
VII. Match the given terms with their definitions:
1. to compute E |
A. to destroy, erase |
2. to disconnect G |
B. number, figure |
3. to customize D |
C. searching and selection of information in a computer |
4. to delete A |
D. to tune, set for the user’s needs |
5. digit B |
E. to count, calculate |
6. data retrieval C |
F. a parameter which is pre-installed and not specially set |
7. default option F |
G. to separate, break |
VIII. State the type of logical relations between the following words:
Example |
Type of logical relations |
1. word – character E |
A. equivalence |
2. buggy software – incompatibility C |
B. general and specific |
3. mode – display mode B |
C. cause and effect |
4. to compute – co calculate A |
D. contrast |
5. copyright – copyleft D |
E. part and whole |
IX. Say what can be:
1. connected |
computer and peripherals, computer to network, to the Internet, etc. |
2. customized |
any equipment, program, OS |
3. deleted |
information, data, file, folder, program |
4. computed |
data, figures |
5. verified |
data, information, password, command |
X. Say what the following is used for:
1. default option |
to use the commonly used options without tuning |
2. device adapter |
to make a device compatible |
3. digital camera |
to make pictures/films in the digital format |
4. data retrieval |
to find the necessary data |
5. DVD |
for storing digital video |
TM FIT 61-80
I. Give synonyms and/or antonyms:
1. downtime |
offwork time/period, ant. uptime |
2. to drop |
delete, erase a program from memory, ant. to download |
3. to enhance |
to upgrade, to better, ant. to worsen , to spoil, to bug |
4. to erase |
to delete, to destroy, ant. to restore |
5. error-prone |
subject to errors, buggy, ant. error-free |
II. Word family. Fill in the missing words of the same root where possible:
noun |
verb |
adjective |
adverb |
enhancement |
to enhance |
enhanced |
- |
eraser/ erasure |
to erase |
erasable |
- |
expansion |
to expand |
expanded/ expandable |
- |
edit/ editor/ editing/ edition/ editorial |
to edit |
editorial/ edited |
- |
extension, extender |
to extend |
extended/ extendable |
- |
III. Make up phrases by matching the words in the left column with those in the right:
1. domain B |
A. tolerant |
2. error D |
B. name |
3. fault A |
C. bar |
4. file E |
D. log |
5. format C |
E. handling |
IV. Fill the web diagram with the words that can be used with the given word: ERROR
Analysis, correction, detection, handling, error-free, error-log, error-prone, common, constant, correctable, data, fatal, file, input, logical, program error.
VI. Give the terms suiting the definitions below:
1. uptime |
A. the time of the work of the system |
2. to enhance |
B. to improve, make better |
3. fault |
C. mistake, defect |
4. freeware |
D. a free program |
5. to expand, extend |
E. to enlarge, increase |
VIII. State the type of logical relations between the following words:
Example |
Type of logical relations |
1. downtime – uptime C |
A. general and specific |
2. error detection – error correction B |
B. cause and effect |
3. domain – domain name E |
C. contrast |
3. to expand – to extend D |
D. equivalence |
4. handling – file handling A |
E. part and whole |
IX. Say what can be:
1. dropped |
program, digits, bit |
2. enhanced |
computer, contrast, image, speed |
3. expanded |
abbreviation, character, memory, system |
4. folded |
paper, data, lines |
5. edited |
text, file, program, etc. |
X. Why do you think the following is done:
1. error detection |
to keep the program working |
2. feedback |
to know what the users think about the program/OS, to have interaction between programs, computers (internet), computer and user |
3. file handling |
to analyze the files, to find, index, classify, copy files |
4. text editing |
to format the text, to correct the mistakes, to make changes |
5. file erasing |
to get rid of unnecessary/outdated files |
TM FIT 81-100
I. Give synonyms and/or antonyms:
1. hard |
firm, solid; difficult, ant. soft, easy |
2. input |
contribution, participation, ant. output |
3. invalid |
unacceptable; untrue, ant. valid |
4. download |
load, charge, ant. upload |
5. log in |
log on, register in, record in, ant. log off; log out |
II. Word family. Fill in the missing words of the same root where possible:
Noun |
Verb |
Adjective |
Adverb |
link/ linkage/ linker/ linking |
to link |
linkable |
----- |
load/ loading/ loader |
to load |
loadable/ loaded |
----- |
maintenance |
to maintain |
maintainable |
----- |
monitor |
to monitor |
monitorial/ monitory |
----- |
III. Make up phrases by matching the words in the left column with those in the right:
1. hard D |
A. distortion |
2. image A |
B. delivery |
3. invalid E |
C. guide |
4. message B |
D. copy |
5. maintenance C |
E. password |
IV. Fill the web diagram with the words that can be used with the given word:
MEMORY - blank, allocation, chip, cell, error, ROM, expansion card, size, unit, upgrade.
VI. Do a mini-research and explain the difference between:
1. hard copy - backup copy - soft copy - master copy |
Hard-/soft copy – forms of data representation Backup-/master copy – forms of keeping information Hard copy – information printed out on paper from a computer. Soft copy – electronic form of keeping information in computer, CD etc. Master copy – an original sample from which copies are made. Backup copy – reserve copy made to restore deleted/unkept data/information |
2. input - output
|
Input- information that is put into a system (or machine) so it can operate Output – information produced by a computer |
3. laptop – notebook - palmtop
|
Laptop – large portable, can be rested on user’s lap. Notebook’s size is one of a sheet of notebook paper. Palmtop – a small computer that can be held in the palm of one hand. |
4. to reload – unload – download - upload
|
To reload – to put data or a program into a memory of a computer again. To unload – to take smth. (disk or a tape) off or out a computer. To download – to copy or move (data or program) into a computer memory, esp. from a larger computer; to copy information from Internet. To upload – to copy or move (program or information) into a main system (or a larger computer) |
5. log in - log off
|
To log in – to perform the actions that allow you to start using a computer. To perform actions that allow you to finish using a computer. |
VIII. State the type of logical relations between the following words:
Example |
Type of logical relations |
1. input – processing C |
A. part and whole |
2. monitor – computer A |
B. general and specific |
3. computer- notebook B |
C. cause and effect |
4. junk mail – spam E |
D. contrast |
4. input – output D |
E. equivalence |
IX. Say what the following is used for:
1. hard copy |
to have information printed out on paper so that to read it |
2. keyboard |
to input data through keys (as a typewriter does) |
3. log in |
to perform the actions that allow you to start using a computer system (to gain access to a computer system requiring user identification prior to access). |
4. master copy |
the original sample to make copies from |
5. ROM |
for reading data only (content can not be changed) |
X. Say what can be:
1. input |
data, error, channel, alphabet, block, box, equipment, data processor, area |
2. uploaded |
program, information, data, files, games, system |
3. downloaded |
data, program, free software, files, music |
4. maintained |
command, program, contact-switch, contact type button, wave, user |
5. monitored |
program, storage, scheme, performance |
TM FIT 101-120
I. Give synonyms and/or antonyms:
1. offline mode |
online mode |
2. to paste |
to insert, ant. to cut |
3. real memory |
ant. virtual memory, RAM |
4. recoverable error |
ant. irrecoverable error |
5. print out |
hard copy, ant. soft copy |
II. Word family. Fill in the missing words of the same root where possible:
Noun |
Verb |
Adjective |
Adverb |
printer/ print |
to print |
printed |
- |
program/ programmer |
to program |
programmable/ programming/ programmed |
- |
recovery |
to recover |
ir/recoverable |
- |
reflection/ reflector |
reflect |
reflected |
- |
reference |
refer |
referred |
- |
III. Make up phrases by matching the words in the left column with those in the right:
1. mouse C |
A. mode |
2. network E |
B. database |
3. offline A |
C. pad |
4. programmable B |
D. memory |
5. real D |
E. access |
IV. Fill the web diagram with the words that can be used with the given word:
POWER - cable, line, supply, point, connector, cut, consumption, failure.
VI. Do a mini-research and explain the difference between:
1. online mode – offline mode
|
Online is working in real time; under the control of the main equipment; in the Internet. Offline is working independently from the main equipment. |
2. impact printer – non-impact printer |
Non-impact is a printer that prints without striking the paper; for example, a laser printer, thermal or an inkjet printer. Non-impact printers are quieter than impact printers, such as dot matrix printer. |
3. print out – hard copy
|
Print out – material produced in printed form Hard copy – printed material produced by a computer |
4. real memory - ROM
|
Real memory may include RAM or ROM or their combination |
VII. Give the definitions suiting the terms below:
1. netiquette |
A. The rules of behaviour in network. |
2. peripheral device |
B. Device located not on the motherboard |
3. programmable database |
C. Software-controlled database |
4. queue |
D. List of the programs expecting their execution |
5. recoverable error |
E. Error which can be corrected. |
VIII. State the type of logical relations between the following words:
Example |
Type of logical relations |
1. computer – mouse A |
A. part and whole |
2. error correction – recovery C |
B. general and specific |
3. online mode – offline mode D |
C. cause and effect |
4. reference guide – manual E |
D. contrast |
5. language – netspeak B |
E. equivalence |
IX. Say what can be:
1. pasted |
file, folder, text, image, object |
2. printed |
circuit, text, picture |
3. programmed |
database, ROM, device |
4. recovered |
file, error, system |
5. referred to |
site, file, directory |
X. Name the kinds of printers:
Ball printer, daisywheel printer, line printer, matrix printer, non-impact printer, bubble-jet printer, laser printer, chain printer, thermal, dot matrix printer, inkjet printer.
TM FIT 121-140
I. Give synonyms and/or antonyms:
1. to release |
set free, ant. to press |
2. to remove |
to delete, change place |
3. to scale back |
to scale down, zoom out, ant. zoom in |
4. to scan |
to search, look through |
5. security |
safety, defense |
II. Word family. Fill in the missing words of the same root where possible:
Noun |
Verb |
Adjective |
Adverb |
removal |
to re/move |
removed/ removable |
- |
re/placement |
to replace |
replaceable |
- |
selection |
to select |
selective/ selected |
selectively |
serviceability/ service |
to serve |
serviceable |
- |
reserve |
to reserve |
reserved |
- |
III. Make up phrases by matching the words in the left column with those in the right:
1. restricted E |
A. border |
2. root D |
B. browsing |
3. screen A |
C. environment |
4. service C |
D. directory |
5. server B |
E. information |
IV. Fill the web diagram with the words that can be used with the given word:
SEARCH - area, criterion, engine, key, time.
VI. Do a mini-research and explain the meaning of the following words beginning with re-:
1. remove |
abolish or get rid, take off or away from the position occupied |
2. replace |
take the place of, provide a substitute for, put back on a previous place or position |
3. release |
allow information to be generally available, allow to move or flow freely |
4. restore |
repair or renovate, bring back |
5. restrict |
put a limit on |
VII. Give the definitions suiting the terms below:
1. register |
A. very-high-speed memory device in CPU |
2. remote access |
B. using remote sources as local |
3. to scale back |
C. proportional change of size |
4. screen saver |
D. program for protection of the screen |
5. search engine |
E. service of some sites and net portals to search information, special search sites |
VIII. State the type of logical relations between the following words:
Example |
Type of logical relations |
1. remove – replace E |
A. part and whole |
2. periphery – scanner B |
B. general and specific |
3. Internet – search engine A |
C. cause and effect |
4. restricted information - security C |
D. contrast |
5. press a button – release a button D |
E. equivalence |
IX. Say what can be:
1. released |
button, source, program, |
2. removed |
file, text, picture, icon |
3. replaced |
object, file, filename, icon |
4. restored |
system, error, program, file |
5. scanned |
disk, text, file, picture |
X. Say what the following is used for:
1. release |
for calling a method; button release is one of events which can call program method execution. |
2. route |
for sending information through it |
3. scale |
for not distorting image by changing its size |
4. security |
for saving, protecting information |
5. restriction of information |
for saving private information from thieves |
TM FIT 141-160
I. Give synonyms and/or antonyms:
1. shut down |
close, terminate, ant. open |
2. soft copy |
ant. print out, hard copy |
3. bootleg software |
pirate software |
4. set |
kit; choice; group |
5. to surf |
to browse |
II. Word family. Fill in the missing words of the same root where possible:
noun |
verb |
adjective |
adverb |
share |
to share |
shared |
- |
signature |
to sign |
signed |
- |
specification/ specifier |
to specify |
specific/ specified |
specifically |
storage |
to store |
stored/ storing |
- |
suspension, suspenders |
to suspend |
suspended/ suspendable |
- |
III. Make up phrases by matching the words in the left column with those in the right:
1. session B |
A. area |
2. software D |
B. highjacking |
3. shadow E |
C. mode |
4. storage A |
D. maintenance |
5. suspend C |
E. memory |
IV. Fill the web diagram with the words that can be used with the given word:
SOFTWARE - compatible, products, data, vendor, development, bootleg, license, maintenance, package, piracy, platform.
VI. Do a mini-research and explain the difference between:
1. hard copy – soft copy – master copy
|
Soft copy is a digital version of information and hard copy is a printed version. Master copy is a template or original copy. |
2. shareware – freeware – pirate software
|
Shareware is software which is free but you are expected to pay a shareware fee. Freeware is gratis software. Pirate software is software which is used with defiance of the copyright. |
3. target language – programming language
|
Target language is the language that is output when a source(programming) language is translated; also called object language. |
4. settings - setup |
Settings are the parameters set. Setup is the way in which something is arranged or organized. |
VII. Match the given terms with their definitions:
1. settings B |
A. a combination of keys for quick work |
2. shareware F |
B. parameters |
3. shortcut A |
C. a program which is distributed without the compliance with the copyright law |
4. shut down G |
D. an image on the screen |
5. soft copy D |
E. interval |
6. bootleg software C |
F. programs that are distributed free for users to try them |
7. space E |
G. completion of the computer work |
IX. Say what can be:
1. switched |
switchgear, computer, device, equipment |
2. specified |
account, period, information |
3. shifted |
bit |
4. shared |
source, printer, information |
X. Say what the following is used for:
1. session log |
for identifying network users |
2. silicon chip |
for making CPU |
3. task bar |
for watching which programs are running and quick switching between them |
4. settings |
to customizing environment |
5. signature |
for certifying access |
TM FIT 161-180
I. Give synonyms and/or antonyms:
1. template |
copy, sample |
2. to terminate |
to shut down, ant. to start |
3. tool bar |
tool box |
4. to tune |
to adjust |
5. tracking |
monitoring |
II. Word family. Fill in the missing words of the same root:
Noun |
Verb |
Adjective |
Adverb |
terminal/ terminator/ termination |
to terminate |
terminal |
- |
trail/ trailer |
to trail |
trailing |
- |
update |
to update |
updated/ updatable |
- |
transmission/ transmitter |
to transmit |
transmittable/ transmission |
- |
transaction |
to transact |
transactional |
transactionally |
III. Make up phrases by matching the words in the left column with those in the right:
1. throughout B |
A. period |
2. tool D |
B. capacity |
3. trial A |
C. face |
4. turnkey E |
D. bar |
5. type C |
E. system |
IV. Fill the web diagram with the words that can be used with the given word:
TRANSFER - error, unit, time, rate.
VI. Give the terms suiting the definitions below:
1. to telecommute |
A. to work at home with the help of computer connection with the office |
2. terminate |
B. to end, stop |
3. to transmit |
C. to convey from one place to another |
4. to upgrade |
D. to adapt to the prevailing conditions |
5. to tune |
E. to fit into current systems |
VIII. State the type of logical relations between the following words:
Example |
Type of logical relations |
1. to work – to telecommute A |
A. general and specific |
2. to terminate – to start D |
B. equivalence |
3. tracking – monitoring B |
C. part and whole |
4. transceiver – transmitter C |
D. contrast |
IX. Say what can be:
1. terminated |
process, program, access |
2. tracked |
information, object |
3. transferred |
file, information, data, image |
4. updated |
information, web page, system, software |
5. turned off |
computer, printer, device |
X. Say when and why people do the following:
1. telecommute |
to communicate fast, to work at home |
2. transaction processing |
to send and retrieve information |
3. troubleshooting |
to prevent runtime errors |
4. upgrade |
to increase capacity |
5. tune |
to customize developers’ environment according to their requirements |
TM FIT 181-200
I. Give synonyms and/or antonyms:
1. usable |
fit, suitable, ant. unsuitable |
2. to verify |
to validate |
3. virtual |
unreal, ant. real |
4. to zoom |
to scale |
5. valid |
actual, effective, right, ant. invalid, wrong |
II. Decode the acronyms:
1. WWW |
World Wide Web |
2. ASAP |
As Soon As Possible |
3. ASCII |
American Standard Code for Information Interchange |
4. CUL8R |
see you later |
5. VR |
Virtual Reality |
III. Word family. Fill in the missing words of the same root where possible:
Noun |
Verb |
Adjective |
Adverb |
user/ usage |
to use |
usable/ used |
- |
validation/ validity |
to validate |
in/valid |
- |
verification |
to verify |
verified/ verifiable |
- |
vision/ visibility/ visualization |
to visualize |
visible/ visual |
visibly/ visually |
volatility |
- |
volatile |
- |
IV. Fill the web diagram with the words that can be used with the given word:
USER - default, power account, base, id, login, interface, manual, guide, policy, profile, wizards, mode.
VI. Do a mini-research and explain the difference between:
1. end-user – power user
|
Power user is an experienced, skilled user. End user is a user for whom smth. is worked out. |
2. to verify – to validate
|
to verify is to check or confirm; to validate is to show that something is reasonable or logistic. |
3. WWW – the Internet
|
WWW is global hyperlink system using Internet as a transport facility. |
4. workstation – supercomputer
|
Workstation is a one-person computer that is more powerful and faster than most personal computers, and is typically used for graphics, scientific computing, but its capacity is less than supercomputers capacity, which is used for computing a big number of information. |
VII. Give the definitions suiting the given terms:
1. power user |
A. an experienced, skilled user |
2. volatility |
B. dependency from power supply |
3. wait mode |
C. the Condition, in which computer at idle time consumes electric powers less, but keeps open for immediate using. |
4. workstation |
D. A one-person computer that is more powerful and faster than most personal computers, and is typically used for graphics, scientific computing, CAD, CAE, and other applications requiring high performance and memory |
5. validation |
E. checking data |
IX. Say what can be:
1. valid |
password, data, login |
2. verified |
data, password |
3. zoomed |
document, image |
4. volatile |
memory, object |
5. wrapped |
word, text |
X. Say what the following is used for:
1. virtual mall |
to order goods via Internet |
2. virus detection system |
to prevent harm from virus |
3. voice mail – answering machine |
to answer voice mailbox without addressee |
4. user-friendly interface |
to make the means of communication easy to use |
5. user manual |
to solve problems with the help of program |