Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
TM.doc
Скачиваний:
6
Добавлен:
05.11.2018
Размер:
1.58 Mб
Скачать

Keys to training exercises

TM FIT 1-20

I. Give synonyms and/or antonyms:

1. to deny access

to restrict access, to refuse access, ant. to certify access, to permit access

2. to assemble

to put together, ant. to take apart, to disassemble

3. available data

accessible data, ant. unavailable data

4. alias

nick, pseudonym, ant. real name

5. background

ant. foreground

II. Word family. Fill in the missing words of the same root where possible:

noun

verb

adjective

adverb

access

-

accessible

-

adaptation/ adapter

to adapt

adaptable/ adaptive

-

alternation

to alternate

alternate

alternatively

authentication

to authenticate

authenticated

-

availability

to avail

available

-

III. Make up phrases by matching the words in the left column with those in the right:

1. to certify B

A. code

2. alternate C

B. access

3. auxiliary E

C. route

4. bar A

D. name

5. account D

E. memory

IV. Fill the web diagram with the words that can be used with the given word:

ACCESS - to certify, to restrict, to deny, to permit, to obtain, authorized, channel, data, direct, fast, information, network, one-touch, random access.

VI. Do a mini-research and classify the types of memory:

AROM, auxiliary memory, available memory, buffer memory, RAM, ROM, etc.

VII. Match the given terms with their definitions:

1. bar code C

A. a function to level/straighten the text

2. available data E

B. an alternative name, nick

3. alignment A

C. a line coding given to products to encrypt information about them

4. alias B

D. a program which adds additional features to the main program

5. accessory D

E. information which a user can access

VIII. State the type of logical relations between the following words:

Example

Type of logical relations

1. to deny access - to permit access C

A. general and specific

2. device - auxiliary device A

B. cause and effect

3. backup copy - available data B

C. contrast

4. account – account name E

D. method and purpose

5. identification – bar code D

E. part and whole

IX. Say what can be:

1. adapted

program, any equipment, bus, channels, colors, communication line, disk

2. amplified

memory, signal, sound, buffer, electric current (power), driver

3. allocated

memory, disk capacity, channels, recourses, processor, space, storage, time

4. assembled

computer, any equipment, packets

5. authenticated

data, password, response, message, signature

X. Say what the following is used for:

1. account name

to identify the user

2. alignment

to level, straighten the text/picture

3. auxiliary memory

to store auxiliary programs/data

4. backup copy

not to lose the file/data

5. alias

to enter programs, to use data

TM FIT 21-40

I. Give synonyms and/or antonyms:

1. binary

2 digit, ant. decimal

2. blank

empty, erased, unformatted, space, ant. full, recorded

3. bottom-up programming

ant. top-down programming

4. bug

error, defect, breakage, ant. fixed, debugged, bug-ridden

5. case-insensitive

ant. case-sensitive

II. Decode the acronyms:

1. CD-ROM

compact disk read only memory

2. CD-E

compact disk erasable

3. CD-R

compact disk recordable

4. CD-RW

compact disk rewritable

5. AROM

alterable read only memory

III. Word family. Fill in the missing words of the same root where possible:

Noun

Verb

Adjective

Adverb

blank

-

blank

blankly

browser

to browse

-

-

bug

-

buggy

-

buffer

to buffer

buffer

-

sensitivity

to sense

sensitive

sensitively

IV. Make up phrases by matching the words in the left column with those in the right:

1. batch C

A. card

2. bit E

B. click

3. button B

C. file

4. cache A

D. address

5. call D

E. density

VI. Do a mini-research and explain the difference between:

1. bottom-up programming – top down programming

A method of working out a program from modules to result. A method when you first make a frame and then fill it with parts of the program.

2. break out – break in – break down

When you interrupt the program work and stop working with it; when smb crashes your security system; when a computer can’t work and needs repair.

3. buggy hardware – buggy software

Hardware (equipment) that doesn’t work (properly); programs with errors that don’t function properly.

4. byte – gigabyte – kilobyte - megabyte

Byte – a unit of information and memory, 8 bits; kilobyte – 1024 bytes; megabyte – 1048576 bytes; gigabyte – 1024 megabytes.

5. case sensitive – case insensitive

Differentiates capital and small letters – does not.

VII. Match the given terms with their definitions:

1. binary code D

A. a place where the copied or cut information is temporarily stored

2. byte G

B. unformatted disk or a disk without recorded data

3. buffer A

C. a disk for uploading

4. buggy hardware F

D. a system of encoding information with the help of Os and Is

5. blank disk B

E. to get the access to computer system illegally

6. boot disk C

F. a device that doesn’t work because of defects or spoilage

7. break in E

G. the unit of information measurement

VIII. Say what the following is used for:

1. binary code

programming, entering data

2. blank disk

recording data

3. build-in modem

connection to the Internet

4. cable connection

to connect computer peripherals, etc.

5. call address

to find data, programs

IX. Say when and why people do the following:

1. break in

to get smb’s data, information, programs, money illegally

2. break out

to finish work with one program and start with another

3. browse

to get information

4. broadcast

to send smb. information, images, etc.

5. bottom-up programming

to make a program

X. Name the kinds of compact disks:

CD-E, CD-R, CD-RW, CD-ROM, CD-I, CD-PROM, CD-ROM XA, CD-V, CD-WO, CD-WORM.

TM FIT 41-60

I. Give synonyms and/or antonyms:

1. certified

allowed, permitted, ant. uncertified, denied, illegal

2. compatible

ant. incompatible

3. connection

link, switching, ant. disconnection

4. data verification

control, check, authentication, validation

5. data retrieval

selection/search from database

II. Word family. Fill in the missing words of the same root where possible:

noun

verb

adjective

adverb

character

to characterise

characteristic

-

compatibility

-

compatible

-

computer/ computation

to compute/ computerize

computable/ computerized

-

customer

to customize

customized

-

deletion

to delete

deleted

-

III. Make up phrases by matching the words in the left column with those in the right:

1. copyright C

A. key

2. cursor A

B. drive

3. default D

C. law

4. disk B

D. option

5. display E

E. mode

IV. Fill the web diagram with the words that can be used with the given word: DATA

Accessibility, bank, base, authentication, collection, compression, corruption, entry, processing, integrity, management, output, mining, security, specification, transfer, retrieval, transmission, validation, verification, etc.

VII. Match the given terms with their definitions:

1. to compute E

A. to destroy, erase

2. to disconnect G

B. number, figure

3. to customize D

C. searching and selection of information in a computer

4. to delete A

D. to tune, set for the user’s needs

5. digit B

E. to count, calculate

6. data retrieval C

F. a parameter which is pre-installed and not specially set

7. default option F

G. to separate, break

VIII. State the type of logical relations between the following words:

Example

Type of logical relations

1. word – character E

A. equivalence

2. buggy software – incompatibility C

B. general and specific

3. mode – display mode B

C. cause and effect

4. to compute – co calculate A

D. contrast

5. copyright – copyleft D

E. part and whole

IX. Say what can be:

1. connected

computer and peripherals, computer to network, to the Internet, etc.

2. customized

any equipment, program, OS

3. deleted

information, data, file, folder, program

4. computed

data, figures

5. verified

data, information, password, command

X. Say what the following is used for:

1. default option

to use the commonly used options without tuning

2. device adapter

to make a device compatible

3. digital camera

to make pictures/films in the digital format

4. data retrieval

to find the necessary data

5. DVD

for storing digital video

TM FIT 61-80

I. Give synonyms and/or antonyms:

1. downtime

offwork time/period, ant. uptime

2. to drop

delete, erase a program from memory, ant. to download

3. to enhance

to upgrade, to better, ant. to worsen , to spoil, to bug

4. to erase

to delete, to destroy, ant. to restore

5. error-prone

subject to errors, buggy, ant. error-free

II. Word family. Fill in the missing words of the same root where possible:

noun

verb

adjective

adverb

enhancement

to enhance

enhanced

-

eraser/ erasure

to erase

erasable

-

expansion

to expand

expanded/ expandable

-

edit/ editor/ editing/ edition/ editorial

to edit

editorial/ edited

-

extension, extender

to extend

extended/ extendable

-

III. Make up phrases by matching the words in the left column with those in the right:

1. domain B

A. tolerant

2. error D

B. name

3. fault A

C. bar

4. file E

D. log

5. format C

E. handling

IV. Fill the web diagram with the words that can be used with the given word: ERROR

Analysis, correction, detection, handling, error-free, error-log, error-prone, common, constant, correctable, data, fatal, file, input, logical, program error.

VI. Give the terms suiting the definitions below:

1. uptime

A. the time of the work of the system

2. to enhance

B. to improve, make better

3. fault

C. mistake, defect

4. freeware

D. a free program

5. to expand, extend

E. to enlarge, increase

VIII. State the type of logical relations between the following words:

Example

Type of logical relations

1. downtime – uptime C

A. general and specific

2. error detection – error correction B

B. cause and effect

3. domain – domain name E

C. contrast

3. to expand – to extend D

D. equivalence

4. handling – file handling A

E. part and whole

IX. Say what can be:

1. dropped

program, digits, bit

2. enhanced

computer, contrast, image, speed

3. expanded

abbreviation, character, memory, system

4. folded

paper, data, lines

5. edited

text, file, program, etc.

X. Why do you think the following is done:

1. error detection

to keep the program working

2. feedback

to know what the users think about the program/OS, to have interaction between programs, computers (internet), computer and user

3. file handling

to analyze the files, to find, index, classify, copy files

4. text editing

to format the text, to correct the mistakes, to make changes

5. file erasing

to get rid of unnecessary/outdated files

TM FIT 81-100

I. Give synonyms and/or antonyms:

1. hard

firm, solid; difficult, ant. soft, easy

2. input

contribution, participation, ant. output

3. invalid

unacceptable; untrue, ant. valid

4. download

load, charge, ant. upload

5. log in

log on, register in, record in, ant. log off; log out

II. Word family. Fill in the missing words of the same root where possible:

Noun

Verb

Adjective

Adverb

link/ linkage/ linker/ linking

to link

linkable

-----

load/ loading/ loader

to load

loadable/ loaded

-----

maintenance

to maintain

maintainable

-----

monitor

to monitor

monitorial/ monitory

-----

III. Make up phrases by matching the words in the left column with those in the right:

1. hard D

A. distortion

2. image A

B. delivery

3. invalid E

C. guide

4. message B

D. copy

5. maintenance C

E. password

IV. Fill the web diagram with the words that can be used with the given word:

MEMORY - blank, allocation, chip, cell, error, ROM, expansion card, size, unit, upgrade.

VI. Do a mini-research and explain the difference between:

1. hard copy - backup copy - soft copy - master copy

Hard-/soft copy – forms of data representation

Backup-/master copy – forms of keeping information

Hard copy – information printed out on paper from a computer.

Soft copy – electronic form of keeping information in computer, CD etc.

Master copy – an original sample from which copies are made.

Backup copy – reserve copy made to restore deleted/unkept data/information

2. input - output

Input- information that is put into a system (or machine) so it can operate

Output – information produced by a computer

3. laptop – notebook - palmtop

Laptop – large portable, can be rested on user’s lap.

Notebook’s size is one of a sheet of notebook paper.

Palmtop – a small computer that can be held in the palm of one hand.

4. to reload – unload – download - upload

To reload – to put data or a program into a memory of a computer again.

To unload – to take smth. (disk or a tape) off or out a computer.

To download – to copy or move (data or program) into a computer memory, esp. from a larger computer; to copy information from Internet.

To upload – to copy or move (program or information) into a main system (or a larger computer)

5. log in - log off

To log in – to perform the actions that allow you to start using a computer.

To perform actions that allow you to finish using a computer.

VIII. State the type of logical relations between the following words:

Example

Type of logical relations

1. input – processing C

A. part and whole

2. monitor – computer A

B. general and specific

3. computer- notebook B

C. cause and effect

4. junk mail – spam E

D. contrast

4. input – output D

E. equivalence

IX. Say what the following is used for:

1. hard copy

to have information printed out on paper so that to read it

2. keyboard

to input data through keys (as a typewriter does)

3. log in

to perform the actions that allow you to start using a computer system (to gain access to a computer system requiring user identification prior to access).

4. master copy

the original sample to make copies from

5. ROM

for reading data only (content can not be changed)

X. Say what can be:

1. input

data, error, channel, alphabet, block, box, equipment, data processor, area

2. uploaded

program, information, data, files, games, system

3. downloaded

data, program, free software, files, music

4. maintained

command, program, contact-switch, contact type button, wave, user

5. monitored

program, storage, scheme, performance

TM FIT 101-120

I. Give synonyms and/or antonyms:

1. offline mode

online mode

2. to paste

to insert, ant. to cut

3. real memory

ant. virtual memory, RAM

4. recoverable error

ant. irrecoverable error

5. print out

hard copy, ant. soft copy

II. Word family. Fill in the missing words of the same root where possible:

Noun

Verb

Adjective

Adverb

printer/ print

to print

printed

-

program/ programmer

to program

programmable/ programming/ programmed

-

recovery

to recover

ir/recoverable

-

reflection/ reflector

reflect

reflected

-

reference

refer

referred

-

III. Make up phrases by matching the words in the left column with those in the right:

1. mouse C

A. mode

2. network E

B. database

3. offline A

C. pad

4. programmable B

D. memory

5. real D

E. access

IV. Fill the web diagram with the words that can be used with the given word:

POWER - cable, line, supply, point, connector, cut, consumption, failure.

VI. Do a mini-research and explain the difference between:

1. online mode – offline mode

Online is working in real time; under the control of the main equipment; in the Internet.

Offline is working independently from the main equipment.

2. impact printer –

non-impact printer

Non-impact is a printer that prints without striking the paper; for example, a laser printer, thermal or an inkjet printer. Non-impact printers are quieter than impact printers, such as dot matrix printer.

3. print out – hard copy

Print out – material produced in printed form

Hard copy – printed material produced by a computer

4. real memory - ROM

Real memory may include RAM or ROM or their combination

VII. Give the definitions suiting the terms below:

1. netiquette

A. The rules of behaviour in network.

2. peripheral device

B. Device located not on the motherboard

3. programmable database

C. Software-controlled database

4. queue

D. List of the programs expecting their execution

5. recoverable error

E. Error which can be corrected.

VIII. State the type of logical relations between the following words:

Example

Type of logical relations

1. computer – mouse A

A. part and whole

2. error correction – recovery C

B. general and specific

3. online mode – offline mode D

C. cause and effect

4. reference guide – manual E

D. contrast

5. language – netspeak B

E. equivalence

IX. Say what can be:

1. pasted

file, folder, text, image, object

2. printed

circuit, text, picture

3. programmed

database, ROM, device

4. recovered

file, error, system

5. referred to

site, file, directory

X. Name the kinds of printers:

Ball printer, daisywheel printer, line printer, matrix printer, non-impact printer, bubble-jet printer, laser printer, chain printer, thermal, dot matrix printer, inkjet printer.

TM FIT 121-140

I. Give synonyms and/or antonyms:

1. to release

set free, ant. to press

2. to remove

to delete, change place

3. to scale back

to scale down, zoom out, ant. zoom in

4. to scan

to search, look through

5. security

safety, defense

II. Word family. Fill in the missing words of the same root where possible:

Noun

Verb

Adjective

Adverb

removal

to re/move

removed/ removable

-

re/placement

to replace

replaceable

-

selection

to select

selective/ selected

selectively

serviceability/ service

to serve

serviceable

-

reserve

to reserve

reserved

-

III. Make up phrases by matching the words in the left column with those in the right:

1. restricted E

A. border

2. root D

B. browsing

3. screen A

C. environment

4. service C

D. directory

5. server B

E. information

IV. Fill the web diagram with the words that can be used with the given word:

SEARCH - area, criterion, engine, key, time.

VI. Do a mini-research and explain the meaning of the following words beginning with re-:

1. remove

abolish or get rid, take off or away from the position occupied

2. replace

take the place of, provide a substitute for, put back on a previous place or position

3. release

allow information to be generally available, allow to move or flow freely

4. restore

repair or renovate, bring back

5. restrict

put a limit on

VII. Give the definitions suiting the terms below:

1. register

A. very-high-speed memory device in CPU

2. remote access

B. using remote sources as local

3. to scale back

C. proportional change of size

4. screen saver

D. program for protection of the screen

5. search engine

E. service of some sites and net portals to search information, special search sites

VIII. State the type of logical relations between the following words:

Example

Type of logical relations

1. remove – replace E

A. part and whole

2. periphery – scanner B

B. general and specific

3. Internet – search engine A

C. cause and effect

4. restricted information - security C

D. contrast

5. press a button – release a button D

E. equivalence

IX. Say what can be:

1. released

button, source, program,

2. removed

file, text, picture, icon

3. replaced

object, file, filename, icon

4. restored

system, error, program, file

5. scanned

disk, text, file, picture

X. Say what the following is used for:

1. release

for calling a method; button release is one of events which can call program method execution.

2. route

for sending information through it

3. scale

for not distorting image by changing its size

4. security

for saving, protecting information

5. restriction of information

for saving private information from thieves

TM FIT 141-160

I. Give synonyms and/or antonyms:

1. shut down

close, terminate, ant. open

2. soft copy

ant. print out, hard copy

3. bootleg software

pirate software

4. set

kit; choice; group

5. to surf

to browse

II. Word family. Fill in the missing words of the same root where possible:

noun

verb

adjective

adverb

share

to share

shared

-

signature

to sign

signed

-

specification/ specifier

to specify

specific/ specified

specifically

storage

to store

stored/ storing

-

suspension, suspenders

to suspend

suspended/ suspendable

-

III. Make up phrases by matching the words in the left column with those in the right:

1. session B

A. area

2. software D

B. highjacking

3. shadow E

C. mode

4. storage A

D. maintenance

5. suspend C

E. memory

IV. Fill the web diagram with the words that can be used with the given word:

SOFTWARE - compatible, products, data, vendor, development, bootleg, license, maintenance, package, piracy, platform.

VI. Do a mini-research and explain the difference between:

1. hard copy – soft copy – master copy

Soft copy is a digital version of information and hard copy is a printed version. Master copy is a template or original copy.

2. shareware – freeware – pirate software

Shareware is software which is free but you are expected to pay a shareware fee. Freeware is gratis software. Pirate software is software which is used with defiance of the copyright.

3. target language – programming language

Target language is the language that is output when a source(programming) language is translated; also called object language.

4. settings - setup

Settings are the parameters set. Setup is the way in which something is arranged or organized.

VII. Match the given terms with their definitions:

1. settings B

A. a combination of keys for quick work

2. shareware F

B. parameters

3. shortcut A

C. a program which is distributed without the compliance with the copyright law

4. shut down G

D. an image on the screen

5. soft copy D

E. interval

6. bootleg software C

F. programs that are distributed free for users to try them

7. space E

G. completion of the computer work

IX. Say what can be:

1. switched

switchgear, computer, device, equipment

2. specified

account, period, information

3. shifted

bit

4. shared

source, printer, information

X. Say what the following is used for:

1. session log

for identifying network users

2. silicon chip

for making CPU

3. task bar

for watching which programs are running and quick switching between them

4. settings

to customizing environment

5. signature

for certifying access

TM FIT 161-180

I. Give synonyms and/or antonyms:

1. template

copy, sample

2. to terminate

to shut down, ant. to start

3. tool bar

tool box

4. to tune

to adjust

5. tracking

monitoring

II. Word family. Fill in the missing words of the same root:

Noun

Verb

Adjective

Adverb

terminal/ terminator/ termination

to terminate

terminal

-

trail/ trailer

to trail

trailing

-

update

to update

updated/ updatable

-

transmission/ transmitter

to transmit

transmittable/ transmission

-

transaction

to transact

transactional

transactionally

III. Make up phrases by matching the words in the left column with those in the right:

1. throughout B

A. period

2. tool D

B. capacity

3. trial A

C. face

4. turnkey E

D. bar

5. type C

E. system

IV. Fill the web diagram with the words that can be used with the given word:

TRANSFER - error, unit, time, rate.

VI. Give the terms suiting the definitions below:

1. to telecommute

A. to work at home with the help of computer connection with the office

2. terminate

B. to end, stop

3. to transmit

C. to convey from one place to another

4. to upgrade

D. to adapt to the prevailing conditions

5. to tune

E. to fit into current systems

VIII. State the type of logical relations between the following words:

Example

Type of logical relations

1. to work – to telecommute A

A. general and specific

2. to terminate – to start D

B. equivalence

3. tracking – monitoring B

C. part and whole

4. transceiver – transmitter C

D. contrast

IX. Say what can be:

1. terminated

process, program, access

2. tracked

information, object

3. transferred

file, information, data, image

4. updated

information, web page, system, software

5. turned off

computer, printer, device

X. Say when and why people do the following:

1. telecommute

to communicate fast, to work at home

2. transaction processing

to send and retrieve information

3. troubleshooting

to prevent runtime errors

4. upgrade

to increase capacity

5. tune

to customize developers’ environment according to their requirements

TM FIT 181-200

I. Give synonyms and/or antonyms:

1. usable

fit, suitable, ant. unsuitable

2. to verify

to validate

3. virtual

unreal, ant. real

4. to zoom

to scale

5. valid

actual, effective, right, ant. invalid, wrong

II. Decode the acronyms:

1. WWW

World Wide Web

2. ASAP

As Soon As Possible

3. ASCII

American Standard Code for Information Interchange

4. CUL8R

see you later

5. VR

Virtual Reality

III. Word family. Fill in the missing words of the same root where possible:

Noun

Verb

Adjective

Adverb

user/ usage

to use

usable/ used

-

validation/ validity

to validate

in/valid

-

verification

to verify

verified/ verifiable

-

vision/ visibility/ visualization

to visualize

visible/ visual

visibly/ visually

volatility

-

volatile

-

IV. Fill the web diagram with the words that can be used with the given word:

USER - default, power account, base, id, login, interface, manual, guide, policy, profile, wizards, mode.

VI. Do a mini-research and explain the difference between:

1. end-user – power user

Power user is an experienced, skilled user. End user is a user for whom smth. is worked out.

2. to verify – to validate

to verify is to check or confirm; to validate is to show that something is reasonable or logistic.

3. WWW – the Internet

WWW is global hyperlink system using Internet as a transport facility.

4. workstation – supercomputer

Workstation is a one-person computer that is more powerful and faster than most personal computers, and is typically used for graphics, scientific computing, but its capacity is less than supercomputers capacity, which is used for computing a big number of information.

VII. Give the definitions suiting the given terms:

1. power user

A. an experienced, skilled user

2. volatility

B. dependency from power supply

3. wait mode

C. the Condition, in which computer at idle time consumes electric powers less, but keeps open for immediate using.

4. workstation

D. A one-person computer that is more powerful and faster than most personal computers, and is typically used for graphics, scientific computing, CAD, CAE, and other applications requiring high performance and memory

5. validation

E. checking data

IX. Say what can be:

1. valid

password, data, login

2. verified

data, password

3. zoomed

document, image

4. volatile

memory, object

5. wrapped

word, text

X. Say what the following is used for:

1. virtual mall

to order goods via Internet

2. virus detection system

to prevent harm from virus

3. voice mail – answering machine

to answer voice mailbox without addressee

4. user-friendly interface

to make the means of communication easy to use

5. user manual

to solve problems with the help of program

92

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]