Будь умным!


У вас вопросы?
У нас ответы:) SamZan.net

Wht is the logicl reltionship between ldquo;devicerdquo; nd ldquo;uxiliry devicerdquo;- b generl nd specific 2

Работа добавлена на сайт samzan.net:

Поможем написать учебную работу

Если у вас возникли сложности с курсовой, контрольной, дипломной, рефератом, отчетом по практике, научно-исследовательской и любой другой работой - мы готовы помочь.

Предоплата всего

от 25%

Подписываем

договор

Выберите тип работы:

Скидка 25% при заказе до 23.11.2024

TM Training Test 1-20

1. What is the logical relationship between “device” and “auxiliary device”:

b) general and specific        

2. To place or arrange things in a straight line means to________ it.

b)  align         

3. To make sth suitable for a new use or situation means to________ it.

d)  adapt

4. What is the logical relationship between “backup copy” and “available data”:

a) cause and effect        

5. To fasten or join sth to sth means to ______ it.  

c) attach       

6. Antonym for “deny” is ______.

c) permit        

7. Which of these is used to identify the user:

a) account name               

8. Which of these is used to get access to programs or data:

b) alias           

9. A program which adds additional features to the main program is a/n ________.

d) accessory

10. An alternative name, nick is a/n ________.

c) alias       

11. To ________access means to reject sb’s right to enter sth or approach sth.

b) deny            

12. To increase in strength or intensity means to_______.

a) amplify               

13. To confirm sb’s right to enter sth or approach sth means to_____ access.

a) certify            

14. The appropriate adjective for the noun “access” is _______.

c) accessible           

15. A function to level/straighten the text is a/an ________.

a) alignment          

16. Which verb goes with such nouns as memory, disk capacity, channels, recourses, processor, space, storage, time.  

c) allocate     

17. Which of these is NOT an adjective from the verb “adapt”:

c) adaptible        

18. All of these go with the verb “align” EXCEPT FOR:  

a) font  

19. Array means: a) an impressive display or series b) clothes c) a type of data structure that has multiple values

d) all of the above

20. Which verb goes with such nouns as data, password, response, message, signature

b) authenticate        

21. An alternative name, nick is a/n________

c) alias 

22. Modify is closest to ________

d) adapt

23. A line coding given to products to encrypt information about them is a/n________.

d) bar code 

24. What is the logical relationship between “identification” and “bar code”:

a) method and purpose   

25. Which of these is used not to lose the file/data:

d) backup copy

26. Which of these is used to enter programs, to use data

b) alias          

27. “Alternate” means:

d) all of the above 

28. Which verb goes with such nouns as computer, any equipment, packets.

a) assemble     

  29. The letter "A" in the abbreviation "AROM" stands for:

b) alterable         

30. Which of these can be authenticated:  

a) password

TM Training Test 21-40

1. The ___disc is unformatted, contains no recorded data:

b) blank             

2. All of these go with the word "boot" EXCEPT for:

c) byte               

3. A method of working out a program from modules to result is called ________.

b) bottom-up     

4. The unit of information measurement is called a______.

b) byte      

5. A method when you first make a frame and then fill it with parts of the program is called ________ programming.

a) top down       

6. "Error, defect, breakage" may be collectively referred to as a ______.

a) bug             

7. A place where the copied or cut information is temporarily stored is called _______.

c) buffer      

8. A device that doesn’t work because of defects or spoilage is called ______ hardware.

c) buggy   

9. The letter "R" in the abbreviation "CD-R" stands for:

d) recordable 

10. When you get smb’s data, information, programs, money illegally, you break ______.

b) in     

11. When you stop doing sth, especially speaking, you break ______.

d) off

12. A system of encoding information with the help of Os and Is is called ________.

a) binary code   

13. ______ sensitivity is differentiation of capital and small letters.

c) Case    

14. To break _______ means "to get access to computer system illegally".

a) in     

15.  When sth goes wrong and a piece of equipment stops working it breaks ______

b) down

16. All of these go with the word "file" EXCEPT FOR:

a) bit    

17. The smallest unit of information measurement is:

b) bit    

18. The largest unit of information measurement is:

d) megabyte

19. All of these go with the noun "cache" EXCEPT FOR:

d) monitor

20. Antonym to “digital” is _______.

d) analogous     

TM Training Test 41-60

1. To use the commonly used options without tuning you need a _____.

b) default option   

2. Find the odd word:   

c) default      

3. This software is not compatible _____ my OS.

c) with     

4. Which of these goes with the noun "copyright":

a) law      

5. What is the logical relationship between "mode – display mode":

a) general and specific  

6. Which of these goes with the noun "cursor":

c) key      

7. Which of these means "to tune, set for the user’s needs":

a) customize   

8. What is the logical relationship between "domain – domain name":

b) part and whole   

9. A parameter which is pre-installed and not specially set is called default ______.

a) option     

10. What is the logical relationship between "word – character":

a) part and whole   

11. What is the logical relationship between "to compute – to calculate":

d) equivalence

12. What is the logical relationship between "copyright – copyleft":

c) contrast      

13. Which of these can be connected:       

c) computer        

14. The time during which the system is out of order is called _____ time.

a) down    

15. All of these can be retrieved EXCEPT FOR:   

c) computer  

16. To make a device compatible you need a _____.

a) device adapter    

17. To find the necessary data you need a/the _______.

c) data retrieval   

18. All of these can be customized EXCEPT FOR:

a) folder   

19. All of these go with the word "character" EXCEPT FOR:  

c) display           

20. All of these go with the word "circuit" EXCEPT FOR:

b) current 

21. All of these are nouns EXCEPT FOR:

d) connected

23. What is the logical relationship between "data corruption – data integrity":

c) contrast  

24. Find the odd word:   

a) evaluation  

25. Find the odd word:   

c) default   

TM Training Test 61-80

1. What is the logical relationship between "domain – domain name":

b) part and whole   

2. What is the logical relationship between "to expand – to extend":

d) equivalence 

3. What is the logical relationship between "downtime – uptime":

d) contrast 

4. What is the logical relationship between "error detection – error correction":

c) cause and effect   

5. What is the logical relationship between "handling – file handling":

a) general and specific 

6. Which of these goes with the word "domain":  

a) name  

7. Which of these goes with the word "error":      

c) log  

8. Which of these goes with the word "format":   

b) bar   

9. All of these can be dropped EXCEPT FOR:  

a) contrast   

10. To take away a program from memory is synonymous to all of these EXCEPT FOR:

a) to enhance   

11. All of these are antonymous to the verb "restore" EXCEPT FOR:

c) to enlarge     

12. Which of these is NOT a noun:    

a) edit   

13. Mark the odd word:   

d) extendable

14. Which of these is done to get rid of unnecessary/outdated data:

b) erasing    

15. Which of these is done to correct mistakes:

d) editing

16. Something subject to errors is known to be error-_______ .

a) prone    

17. A document copy printed out on paper from a computer is called a ______ copy.

d) hard

18. A computer program that may be distributed and used without payment is called _______.

b) freeware   

19. Choose the correct suffix: An eras____ disc allows data to be deleted and new data to be recorded on it.

d) –able        

20. The time of the work of the system is called ___ time.

a) up       

21. The time during which the system is out of order is called ____ time.

b) down      

22. Mark the odd word:   

d) hardware

23. Which of these is the most general word:  

d) editing

TM Training Test 81-100

1. The noun "input" is synonymous to all of these EXCEPT FOR:

c) distribution   

2. The adjective "invalid" is antonymous to all of these EXCEPT FOR:

d) expired 

3. Which of these nouns DOES NOT exist:  

a) linkor   

4. To put data or a program into a memory of a computer again means to _____ load it.

b) re     

5. What is the logical relationship between "junk mail" and "spam":

c) equivalence   

6. What is the logical relationship between "input" and "processing":

a) cause and effect    

7. E-mail is antonymous to _____ mail.

a) snail    

8. The word "message" goes best with _____ .  

c) delivery    

9. An image can be________ .  

a)  distorted 

10. Laptops, notebooks and palmtops differ mostly in ____.  

c) size 

11. You place your mouse on a mouse _______.

b) pad    

12. What is the logical relationship between “computer” and “mouse”:

b) part and whole    

13. A mouse is connected to a computer through a mouse _______.

b) port    

14. We _____ data through keys.

a) input    

15. Logging in is closest in meaning to logging ___.  

b) on   

16. An original sample from which copies are made is called a _______ copy.

c) master    

17. What is the logical relationship between "monitor" and "computer":

c) part and whole 

19. All of these can be input EXCEPT FOR:  

a) user   

20. The word "host" is synonymous to all of these EXCEPT FOR:

d) minor

21. Laptops, notebooks and palmtops differ mostly in _______.

c) size    

22. To take smth (disk or tape) off a computer means to ___ load it.

a) un     

23. To copy or move data into a computer memory, esp from a larger computer means to ___ load d) down

24.  To copy a program or information into a main system means to ___ load it.

c) up      

25. All of these can be uploaded EXCEPT FOR:

b) processor      

TM Training Test 101-120

1. Rules of behavior on the Internet are referred to as _______.

c) netiquette   

2. A person actively involved in online communities is referred to as (a) _______.

a) netizen    

3. A type of slang that Internet users have popularized, and in many cases, have coined may be referred to as _______.   

b) netspeak      

4. A _______ is a device attached to a host computer to expand its capabilities.

b) peripheral   

5. A list of the programs expecting their execution is called a _______.

d) queue

6. A _______ is a request to provide information.

a) query    

7. All of these go with the word “password” EXCEPT FOR:

d) connect

8. A plug ___ is a set of software components that adds specific capabilities to a larger software application.   

 a) in    

9. A/n _______ printer acts like a typewriter.

b) impact    

10. A/n _______ error is the one which cannot be corrected.

b) irrecoverable   

11. A _______ is a device which is not located on the motherboard.

a) peripheral   

12. “To insert" is synonymous to _______.

b) paste     

13. “A waiting line” is also called a _______.

d) queue

14. An aged password is _______.   

b) invalid    

15. What is the logical relationship between “power supply” and “power consumption”:

c) contrast    

16. What is the logical relationship between “printer” and “impact printer”:

a) general and specific   

17. Network ______ occurs when a link or node is carrying so much data that its quality of service goes down.  

c) congestion  

18. What is the logical relationship between “impact printer” and “dot matrix printer”:

a) general and specific   

19. A mouse is a/n _______ storage device.

b) offline   

20. A printout is a _______ copy.

a) hard     

21. A group of computers and devices interconnected by communication channels that allows users to share resources is referred to as _______.

d) network

TM Training Test 121-140

1. What is the logical relationship between “periphery” and “scanner”:

d) general and specific

2. What is the logical relationship between “restricted information” and “security”:

b) cause and effect   

3. What is the logical relationship between “press a button” and “release a button”:

c) contrast   

4. What is the logical relationship between “remove” and “replace”:

d) equivalence

5. You cannot replace this file ____ another one.

a) with    

6. All of these prepositions can follow the verb “scale” EXCEPT FOR:

b) on

7. A _______ is used for sending information to another place.

a) route    

8. “Remote” is antonymous to:

b) close    

9. Mark the odd word:

d) protect

10. The beta version of the program was due for _______ at the end of 1990.

c) release    

11. All of these can be remote EXCEPT FOR:

b) relief 

12. Antonym to “replaceable” is _______.

c) irreplaceable   

13. These options should be used _______.

c) selectively    

14. All of these can be released EXCEPT FOR:

b) menu

15. Root directory _______.

a) has a catalogue of roots        

c) contains all other directories in a system of organizing information       

16. They reside along this _______.

a) route  

17. _______ is done not to distort an image by changing its size.

b) Scaling    

TM Training Test 141-160

1. A digitised copy is referred to as a ________ copy.

b) soft    

2. Target language is the same as _______ language.

a) object    

3. Mark the odd word:

c) setup     

4. A program distributed in violation of the copyright law is called _______ software.

b) bootlegged    

5. One cannot hijack a _______.

c) time    

6. A template is a(n) _______ copy.

d) master

7. Mark the odd phrase:

d) buggy software

8. A combination of keys for quick work is called a _______.

a) shortcut 

9. Completion of the computer work is referred to as a(n) _______.

b) shut down    

10. _______ is gratis software.

a) Freeware 

11. Which software is limited in time span:

b) shareware    

12. Exact measurements or detailed technical requirements are called _______.

b) specifications

13. Mark the odd word:

d) start 

14. An electronic form of a document is called a _____ copy.

a) soft  _______

15. Kazakhtelecom is the largest service in Kazakhstan.

b) provider    

16. A vendor _______ software.

a) sells  

17. _______ are the parameters set.

a) Settings     

18.  _______ is the way in which smth is arranged or organized.

c) Set-up     

19. Session _______ is used for identifying network users.

b) log   

20. A soft error is _______.

a) recoverable   

21. Session timeout concerns its _______.

b) time limit    

22. A piece of computer equipment used for putting info into a computer is called a/n _______.

d) keyboard

TM Training Test 161-180

1. To______ means to work at home using computer connection with the office.

d) telecommute

2. Which of these is done to work at home:

b) telecommuting   

3. Which of these is done to customize developers’ environment according to their requirements:

d) tuning

4. What is the logical relationship between “to work” and “to telecommute”:

a) general and specific   

5. What is the logical relationship between “to terminate” and “to start”

d) contrast

6. What is the logical relationship between “transceiver” and “transmitter”

c) part and whole   

7. “Template” is synonymous to a ________.

d) sample

8. The amount of traffic a system can service per unit of time is referred to as its _______ capacity.

c) throughput   

9. Find the odd word:  

c) transcript   

10. All of these are nouns EXCEPT FOR:

c) terminate    

11. Which of these goes best with the noun “trial”:

c) period    

12.  _______ means to work at home using computer connection with the office.

d) Telecommute

13. To tune means to _______.

a) fit    

14. Which of these is done to prevent runtime errors:

a) troubleshooting   

15. What is the logical relationship between “Tracking” and “monitoring”:

b) equivalence  

16. An electronic device used for inputting and outputting data is called a _______.

c) terminal    

17. The amount of traffic a system can service per unit of time is referred to as its _______ capacity.

c) throughput    

18. All of these go with the word “trial” EXCEPT FOR:

d) trail

19. “Trail” is synonymous to all of these EXCEPT FOR:

c) transmit    

20. A set of things is referred to as a/n _______.

b) kit    

21. All of these can be used with the word “kit” EXCEPT FOR:

d) block

TM Training Test 181-200

1. Which of these is done to increase capacity:

c) upgrading    

2. An experienced, skilled user is called a/n _______ user.

b) power   

3. When you want somebody to do something very urgently, you write _______.

b) ASAP    

4. At the end of an sms message you are likely to write _______.

d) CUL8R

5. Volatile memory depends on _______.

c) power supply  

6. A user for whom smth is meant is called a/n _______ user.

c) end    

7. “Volatile” is synonymous to _______.

a) changeable   

8.  A virtual mall is used to _______.

b) order goods via Internet   

9.  A virus detection system is used to _______.

a) prevent harm from viruses                              

10. A voice mail is used to _______.

c) answer voice mailbox without addressee     

11. A user manual is used to _______.

d) sort out how to use a device

12. Antonym to “valid” is _______.

c) invalid    

13.  To _______ is to show that smth is reasonable or logistic.

a) validate   b) verify    c) certify    d) prove

14.  _______ is a global hyperlink system.

a) WWW    

15. ____ is a transport facility.

c) The Internet     

16.  A user-friendly device is ______ to use.

b) easy     

17. To _______ means to state officially that smth is true, accurate or of satisfactory standard.

c) certify   

18. The condition in which a computer at idle time consumes less electric power, but is available for immediate use is called a/n _______ mode.

b) wait    

19. A _______ is a one person computer that is more powerful and faster than most personal computers, and is typically used foe graphics, scientific computing.

b) workstation    

20. “Wireless” is opposite to ________.

c) wireline    

21. HTML is decoded as _______.

a) Hypertext Mark




1. Можно ли научиться быть успешным учителем
2. American Revolution and War for Independence.html
3. ІСІ корпоративний інпостиційний фонд далі КіФ або пайовий інвестиційний фонд далі МІФ який провадит
4. реферат диссертации на сокскайие ученой степени кандидата юридических наук Подписано в печать 24
5. Cm Трепещет всё трепещет всё
6. Дипломная работа Студента 5 курса Допущена к защите Дн
7. Законодавство України про цивільну оборону
8. ПОВЫШЕНИЕ ИНВЕСТИЦИОННОЙ ПРИВЛЕКАТЕЛЬНОСТИ И УЛУЧШЕНИЕ ИНВЕСТИЦИОННОГО КЛИМАТА ХАБАРОВСКОГО КРАЯ НА ПЕ
9. по теме курсовой работы необходимо подобрать соответствующую литературу ~ монографии и статьи в научных жур
10. Курсовая работа- Использование количественных методов анализа для принятия управленческих решений
11. Интернет-зависимость - новая форма аддиктивного поведения у подростков
12. Office 2007- новые возможност
13. і Немає кращого за ліс місця для відпочинку з його красою та величчю
14. 2013 р. Робоча програма дисципліни ldquo;Міжнародна економікаrdquo; для студентів освітньоква
15. Физическое и эмоциональное очищение с помощью фэншуй отрывок из книги Глава 9
16. а и рентгенологическими признаками недавних очаговоинфильтративных изменений в лёгких при отсутствии очев
17. темах и сетях КОНТРОЛЬНАЯ РАБОТА Тема- Компьютерная безопасность
18. Тема- Приготовление сладких блюд
19. Реферат Рынки ресурсов и распределение доходов
20. Вариант 2 АВТОРСКИЙ ДОГОВОР на литературное произведение