Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Engish

.doc
Скачиваний:
64
Добавлен:
25.02.2016
Размер:
83.46 Кб
Скачать

What is the logical relationship between “device” and “auxiliary device”: General and specific

A waiting line is also called a QUEUE.

Remote” is antonymous to: CLOSE

Template is synonymous to a SAMPLE.

To insert is synonymous to BASLE. или

paste

A combination of keys for quick work is called a SHORCUT.

A computer technology that allows people to watch films and enjoy virtual reality is a/an HMD .

A cooling FAN is a device that prevents the part inside the computer from overheating.

A crime committed with the help of computer. CYBERCRIME

A desktop publisher is a person WHO creates documents with DTP software.

A device that doesn’t work because of defects or spoilage is called buggy hardware.

A digitised copy is referred to as a SOFT copy.

A document copy printed out on paper from a computer is called a _hard_____ copy.

A flowchart is a diagram WHICH shows the successive logical steps of the program.

A function to level/straighten the text is a/an ALAIGMENT.

A list of the programs expecting their execution is called a _queue______.

A long key at the bottom of the keyboard is called SPACE BAR. Each time it is pressed, it produces a blank space.

A mail is used for sending information to another place.

A method of working out a program from modules to result is called BOTTOM-UP.

A method when you first make a frame and then fill it with parts of the program is called ________ programming.

A microscopic robot, built with nanotechnology is a/an NANO .

A mouse is connected to a computer through a mouse PART.

A parameter which is pre-installed and not specially set is called default OPTION.

A peripheral is a device attached to a host computer to expand its capabilities.

A PERIPHERAL is a device which is not located on the motherboard.

A person actively involved in online communities is referred to as a ___netizen____.

A piece of computer equipment used for putting information into a computer is called (a) KEYBORD.

A place where the copied or cut information is temporarily stored is called __buffer___.

A plug IN is a set of software components that adds specific capabilities to a larger software application.

A printout is a HARD copy.

A program distributed in violation of the copyright law is called BOOLEGD software.

A program which adds additional features to the main program is a/n ________.

A query is a request to provide information.

A reserve copy made to restore lost data/information is called a BACK-UP copy.

A small window that provides information about the problem and an interface of communication with the user is called a/an DIALOGUE box.

A specialist who writes and updates computer programs is called SOFTWARE ENGINER.

A system of encoding information with the help of Os and 1s is called ____binary code____.

A template is a MASTER copy.

A type a robot that resembles a human is a/an ANDROID.

A type of slang that Internet users have popularized, and in many cases, have coined may be referred to as _netspeak_______.

A vendor CELLS software.

A/n __irrecoverable_____ error is the one which cannot be corrected.

A/n IMPACT printer acts like a typewriter.

All of these can be uploaded EXCEPT FOR: PROCESSOR

All of these go with the word “password” EXCEPT FOR:connect

All of these prepositions can follow the verb “scale” EXCEPT FOR: SCOLE

An aged password is _invalid______.

An alternative name, nick is a/n ___alias_____.

An electronic form of a document is called a SOFT copy.

An original sample from which copies are made is called a master copy.

Antonym for “deny” is certify.

Antonym to “replaceable” is IIREPLACEABLE.

At the moment, I AM LISTENING to music.

ATMs DISPENSE money to customers by the use of a PIN protected card.

Bob is waiting for me and I THINK he wants to go to the pub.

Carlo’s Italian, but HIS mother is British.

Choose the correct suffix: An eras_able___ disc allows data to be deleted and new data to be recorded on it.

Choose the correct suffix: Bluetooth is a short-range radio technology that allows wireLESS communication between a computer and a keyboard, between mobile phones, etc.

Completion of the computer work is referred to as a(n) SHUT DOWN.

Computer technologies for people with disabilities are called ASSISTIVE.

Computers produce ELECTONIC WASTE, plastic cases and microchips that are not biodegradable and have to be recycled or just thrown away.

Customers are asked to ENTER a four digit PIN, it makes transactions more secure.

.

E-mail is antonymous to SNAIL mail.

Error, defect, breakage may be collectively referred to as a __bug____.

Exact measurements or detailed technical requirements are called SFICATIONSPECI.

Excuse me, is this pen YOURS?

Find the odd word: bed

Find the odd word: BED

Giraffes HAVE got a long neck.

Greg is a software engineer WHICH means he writes computer programs.

Hardware is any electronic or mechanical part of the computer system __which____ you can see or touch.

I didn’t eat ANY cakes. I wasn’t hungry.

I don’t have MUCH free time. I work very hard

I have got a car. It IS yellow.

I usually LISTEN to music in the evenings.

In an Internet discussion group the messages are THREADED in reply to an initial post.

In banks computers enable staff to CARRY OUT financial transactions.

In cyberspace, ___upload____ means to send a file.

It’s a school. ITS name is The English School.

It’s BEN’S pen.

Kazakhtelecom is the largest service PROvIDER in Kazakhstan.

Mark buys A LOT OF fruit. He’s very healthy.

Mark the odd phrase: CONUPAUG

Mark the odd word: SELYP

Mark the odd word: SELYP

Mark the odd word: START

Mobiles let you MAKE voice calls, send texts and email people.

Monitors DISPLAY data and images while you work or play.

More data is HELD on a DVD than on a CD. или defragmented

My cousin IS STAYING with us at the moment.

My friends GO shopping every Saturday.

My optical drive FAILS: it won’t read or write discs.

On Fridays, I sometimes GO to the cinema.

One cannot hijack a TIME.

Open THE door.

PDA is a tiny computer WHERE we can store personal information, take notes, draw diagrams and make calculations.

PIN is used to VERIFY payments.

Rules of behavior on the Internet are referred to as _netiquette______.

Select a group of input devices: SCANER, DIGITAL CAMERA

She eats A LOT OF biscuits. She loves them.

She HAS a lot of work this week.

She HAS got a headache.

Something subject to errors is known to be error-_prone______.

Suzie IS STUDYING now.

Teachers use projectors and interactive whiteboards to GIVE presentations.

That’s my ______ car.

The amount of traffic a system can service per unit of time is referred to as its THOUGHPAT capacity.

The appropriate adjective for the noun “access” is ACCESSIBLE.

The brain of the robot is a/an COMPUTER SYSTEM.

The data in the hard disk should be DEFREGMENTED, so it can be accessed more quickly.

The inbox is the location WHERE emails are kept when they are received.

The information presented to the computer is a/an INPUT.

The letter "R" in the abbreviation "CD-R" stands for: recordable

The MEMORY holds the instructions and data which are processed by the central processing unit.

The most common input device is a/an KEYBOARD.

The science which uses computer technology to identify people based on physical characteristics is BIOMETRICS

The speed at which the CPU processes instructions is called MIPS.

The students are from different countr_IES _ .

The time during which the system is out of order is called _down____ time.

The unit of information measurement is called a binary code.

The words “fixed, integrated” are synonymous to the word EMBEDDED .

These are my _____ books.

They’re students. THEIR names are James and Martha .

They’re watchES.

This is AN international school .

This software is not compatible _____ my OS.

To __upgrade______ means to add or replace hardware to expand the computer power.

To _encrypt________ means to change data into a secret code so that only someone with a key can read it.

To break IN means "to get access to computer system illegally".

To confirm smb’s right to enter smth or approach smth means to CERTIFY access.

To copy or move a program or information into a main system (or a larger computer) means to UP load it.

To copy or move data into a computer memory, esp. from a larger computer means to UP load it.

To DENY access means to reject smb’s right to enter smth or approach smth.

To fasten or join smth to smth means to __attach_____ it.

To increase in strength or intensity means to AMPLIFY.

To make smth suitable for a new use or situation means to___adapt_____ it.

To place or arrange things in a straight line means to___align_____ it.

To put data or a program into a memory of a computer again means to __down__ load it.

To TELECUMUTTE means to work at home using computer connection with the office.

To use the commonly used options without tuning you need a default option.

Volatile memory depends on POWER SUPPLY.

We don’t eat MANY bananas in our house.

We INPUT data through keys.

We’re students. OUR teacher is American.

What is the logical relationship between "compute – calculate": EQUIVALIENT

What is the logical relationship between "domain – domain name":

What is the logical relationship between "downtime – uptime": contrast

What is the logical relationship between "input" and "processing": cause and effect

What is the logical relationship between "junk mail" and "spam": equivalence

What is the logical relationship between "mode – display mode": general and specific

What is the logical relationship between "to expand – to extend": equivalence

What is the logical relationship between "word – character": PART AND WHOLE

What is the logical relationship between “backup copy” and “available data”:general and specific

What is the logical relationship between “computer” and “mouse” part and whole

What is the logical relationship between “identification” and “bar code”: METHOD AND PURPOSE

What is the logical relationship between “periphery” and “scanner”: part and whole

What is the logical relationship between “power supply” and “power consumption”: CONTRAST

What is the logical relationship between “press a button” and “release a button”: contrast

What is the logical relationship between “printer” and “impact printer”: general and specific

What is the logical relationship between “remove” and “replace”: equivalence

What is the logical relationship between “restricted information” and “security”: contrast

What is the logical relationship between “to terminate” and “to start” CONTRAST AND

What is the logical relationship between “to work” and “to telecommute”: GENERAL AND SPECIFIC

What is the logical relationship between “transceiver” and “transmitter” PART AND WHOLE

What’s THIS? It’s an umbrella.

When smth goes wrong and a piece of equipment stops working it breaks _down_____.

When you finish work with one program and start with another, you break OUT.

When you get smb’s data, information, programs, money illegally, you break IN.

When you rapidly press and release the mouse button twice you DOUBLE-CLICK.

When you stop doing smth, especially speaking, you break __off____.

When you want somebody to do something very urgently, you write ASAP.

Which of these goes with the noun "cursor": mouse

Which of these goes with the noun "default" Option, button, value

Which of these has a negative meaning? TECHNOLOGY DEPENDENCE

Which of these is done to correct mistakes: recoverable error

Which of these is done to customize developers’ environment according to their requirements: TUNING

Which of these is done to get rid of unnecessary/outdated data: file erasing

Which of these is done to increase capacity: UPGRADING

Which of these is done to share files:

Which of these is done to work at home: TELECOMMUTING

Which of these is used not to lose files/data: backup copy

Which of these is used to get access to programs or data:

Which of these is used to identify the user: account name

Which of these means "to tune, set for the user’s needs":

Which software is limited in time span: SHAR WARE

WWW is a global hyperlink system.

You cannot replace this file WITH another one.

You place your mouse on a mouse ___pad____.

ARE these flowers ?

CASE sensitivity is differentiation of capital and small letters.

DISK DRIVERS are used to read and write data on disks

FREWARE is gratis software.

HARDWARE is any electronic or mechanical part you can see or touch.

HAS a girl got a doll?

HAVE you got a pen?

HELP desk is a computer support center where people phone to get help with their computer problems.

MPS is a device to maintain the continuous supply of electric power.

Non-volatile memory is able to hold data when the power is switched off.

PLOTTERS are used for construction plans, engineering drawings and other technical illustrations.

RECOVERY tool is a software application to restore your deleted data.

THOSE students are French.

Соседние файлы в предмете Английский язык