Defult mode n originl smple from which copies re mde is clled mster copy.html
Работа добавлена на сайт samzan.net:
What is the logical relationship between “device” and “auxiliary device”:
Part and whole
To place or arrange things in a straight line means to align it.
To make smth suitable for a new use or situation means to adapt it.
A method of working out a program from modules to result is called bottom-up programming.
The unit of information measurement is called a byte.
This software is not compatible with my OS.
Which of these goes with the noun "default" mode
An original sample from which copies are made is called a master copy.
All of these canbe uploaded EXCEPT FOR: processor
Which of theseis done to get rid of unnecessary/outdated data: erasing
Which of these is done to correct mistakes: editing
To encrypt means to change data into a secret code so that only someone with a key can read it.
Non-volatile memory is able to hold data when the power is switched off.
Choose the correct suffix: Bluetooth is a short-range radio technology that allows wireless communication between a computer and a keyboard, between mobile phones, etc.
What is the logical relationship between “backup copy” and “available data”: causes and effects
To fasten or join smth to smth means to attach it.
Antonym for “deny” is permit.
A method when you first make a frame and then fill it with parts of the program is called top-down programming.
"Error, defect, breakage" may be collectively referred to as a bug.
A place where the copied or cut information is temporarily stored is called buffer.
A device that doesnt work because of defects or spoilage is called buggy hardware.
Which of these goes with the noun "cursor": key
Which of these means "to tune, set for the users needs": customize
Which of these is done to share files: shareware
Something subject to errors is known to be error-prone.
A document copy printed out on paperfrom a computer is called a hard copy.
To put data or a program into a memory of a computer again means to download it.
In cyberspace, transmitmeans to send a file.
To upload means to add or replace hardwareto expand the computer power.
Choose the correct suffix: An erasable disc allows data to be deleted and new data to be recorded on it.
Which of these is used to identify the user: password
Which of these is used not to lose files/data:
Which of these is used to get access to programs or data: user name
A program which adds additional features to the main program is a/n accessory.
An alternative name, nick is a/n alias.
The letter "R" in the abbreviation "CD-R" stands for: recordable
When you get smbs data, information, programs, money illegally, you break in.
When you stop doing smth, especially speaking, you break off
To use the commonly used options without tuning you need a default options.
When smth goes wrong and a piece of equipment stops working it breaks down.
Find the odd word:
What is the logical relationship between "domain domain name": general specific
What is the logical relationship between "to expand to extend": equivalence
What is the logical relationship between "downtime uptime": contrast
What is the logical relationship between "junk mail" and "spam": equivalence
What is the logical relationship between "input" and "processing": cause and effect
E-mail is antonymous to snail mail.
You place your mouse on a mouse pad.
Rules of behavior on the Internet are referred to as netiquette.
A person actively involved in online communities is referred to as a netizen.
A type of slang that Internet users have popularized, and in many cases, have coined may be referred to as netspeak.
A peripheral is a device attached to a host computer to expand its capabilities.
A list of the programs expecting their execution is called a queue.
A query is a request to provide information.
All of these go with the word “password” EXCEPT FOR: connect
A plug in is a set of software components that adds specific capabilities to a larger software application.
A/n impact printer acts like a typewriter.
A/n irrecoverable error is the one which cannot be corrected.
Aperipheralis a device which is not located on the motherboard.
“To insert" is synonymous to paste.
“A waiting line” is also called a queue.
An aged password is invalid
What is the logical relationship between “power supply” and “power consumption”: contrast
What is the logical relationship between “printer” and “impact printer”: general and specific
What is the logical relationship between “computer” and “mouse” part and whole
A mouse is connected to a computer through a mouse port.
Mark the odd word: start
What is the logical relationship between “periphery” and “scanner”: part and whole
What is the logical relationship between “restricted information” and “security”: cause and effect
What is the logical relationship between “press a button” and “release a button”: contrast
What is the logical relationship between “remove” and “replace”: equivalence
A program distributed in violation of the copyright law is called bootleggedsoftware.
One cannot hijack a time.
Antonym to “replaceable” is irreplaceable.
You cannot replace this file with another one.
All of these prepositions can follow the verb “scale” EXCEPT FOR: on
A route is used for sending information to another place.
Kazakhtelecom is the largest service provider in Kazakhstan.
“Remote” is antonymous to: close
Mark the odd word: protect
A vendor sells software.
A digitised copy is referred to as a soft copy.
A printout is a hard copy.
A template is a master copy.
Mark the odd phrase: buggy software
A combination of keys for quick work is called a shortcut.
Completion of the computer work is referred to as a(n) workstation.
Freeware is gratis software.
Which software is limited in time span: shareware
Exact measurements or detailed technical requirements are called specifications.
A piece of computer equipment used for putting information into a computer is called (a) keyboard .
Mark the odd word: transcript
To telecommute means to work at home using computer connection with the office.
Which of these is done to work at home: telecommuting
Which of these is done to increase capacity: upgrading
Which of these is done to customize developers environment according to their requirements: tuning
What is the logical relationship between “to work” and “to telecommute”: general and specific
What is the logical relationship between “to terminate” and “to start” contrast
What is the logical relationship between “transceiver” and “transmitter” part and whole
“Template” is synonymous to a sample.
The amount of traffic a system can service per unit of time is referred to as its throughput capacity.
A flowchart is a diagram that shows the successive logical steps of the program.
A desktop publisher is a person who creates documents with DTP software.
The inbox is the location where emails are kept when they are received.
Hardware is any electronic or mechanical part of the computer system which you can see or touch.
PDA is a tiny computer where we can store personal information, take notes, draw diagrams and make calculations.
Greg is a software engineer which means he writes computer programs.
The data in the hard disk should be defragmented, so it can be accessed more quickly.
More data is availableon a DVD than on a CD.
In an Internet discussion group the messages are ______ in reply to an initial post.
A small window that provides information about the problem and an interface of communication with the user is called a/an drop down combo box.
The speed at which the CPU processes instructions is called instruction per second.
Help desk is a computer support center where people phone to get help with their computer problems.
A cooling fan is a device that prevents the part inside the computer from overheating.
UPSis a device to maintain the continuous supply of electric power.
Recovery tool is a software application to restore your deleted data.
My optical drive fails: it wont read or write discs.
What is the logical relationship between “identification” and “bar code”: cause and effect
To deny access means to reject smbs right to enter smth or approach smth.
To increase in strength or intensity means toamplify.
A system of encoding information with the help of Os and 1s is called binary code.
Case sensitivity is differentiation of capital and small letters.
When you finish work with one program and start with another, you break off.
A parameter which is pre-installed and not specially set is called default option
What is the logical relationship between "word character": part and whole
What is the logical relationship between "compute calculate": equivalence
An electronic form of a document is called a soft copy.
To copy or move data into a computer memory, esp. from a larger computer means to download it.
A specialist who writes and updates computer programs is called software engineer.
To confirm smbs right to enter smth or approach smth means to permit/accept access.
The appropriate adjective for the noun “access” is accessible.
A function to level/straighten the text is a/an alignment.
To break in means "to get access to computer system illegally".
What is the logical relationship between "mode display mode": general and specific
The time during which the system is out of order is called down time.
A reserve copy made to restore lost data/information is called a backup copy.
To copy or move a program or information into a main system (or a larger computer) means to upload it.
We input data through keys.
Www is a global hyperlink system.
When you want somebody to do something very urgently, you write ASAP.
Volatile memory depends on power supply.
Computers produce electronic waste, plastic cases and microchips that are not biodegradable and have to be recycled or just thrown away.
The CPU holds the instructions and data which are processed by the central processing unit.
In banks computers enable staff to carry out financial transactions.
ATMs dispense money to customers by the use of a PIN protected card.
Mobiles let you make voice calls, send texts and email people.
Monitors display data and images while you work or play.
Customers are asked to enter a four digit PIN, it makes transactions more secure.
Teachers use projectors and interactive whiteboards to give presentations.
PIN is used to verify payments.
Whats It? Its an umbrella.
Theyrewatching.
Open the door.
ThosestudentsareFrench.
The students are from different countries .
This is an international school .
Theyre students. Their names are James and Martha .
Carlos Italian, but his mother is British.
Its a school. Its name is The English School.
Were students. Our teacher is American.
Its a pen.
These are my _____ books.
Thats my ______ car.
Excuse me, is this pen yours?
Are these flowers?
I have got a car. It is yellow.
Have you got a pen?
She has got a headache.
Has a girl got a doll?
Giraffes have got a long neck.
I usually listen to music in the evenings.
On Fridays, I sometimes go to the cinema.
Suzie ________ now.
She has a lot of work this week.
My cousin is with us at the moment.
At the moment, I am listening to music.
Bob is waiting for me and I but he wants to go to the pub.
We dont eat any bananas in our house.
I didnt eat any cakes. I wasnt hungry.
I dont have any free time. I work very hard
My friends are shopping every Saturday.
Find the odd word: Bed
_________are used to read and write data on disks.
Hardware is any electronic or mechanical part you can see or touch.
The information presented to the computer is a/an input.
When you rapidly press and release the mouse button twice you open a document.
The most common input device is a/an keyboard.
Plotters are used for construction plans, engineering drawings and other technical illustrations.
Select a group of input devices:
A long key at the bottom of the keyboard is called blank. Each time it is pressed, it produces a blank space.
Computer technologies for people with disabilities are called assistive technology.
A computer technology that allows people to watch films and enjoy virtual reality is a/an HMD.
A crime committed with the help of computer.
Which of these has a negative meaning?
A microscopic robot, built with nanotechnology is a/anASIMO, Hondas.
A type a robot that resembles a human is a/an android.
The science which uses computer technology to identify people based on physical characteristics is biometrics
The brain of the robot is a/anArtificial intelligence.
The words “fixed, integrated” are synonymous to the word embedded.