Tm fit 121-140
I. Give synonyms and/or antonyms:
1. to release |
|
2. to remove |
|
3. to scale back |
|
4. to scan |
|
5. security |
|
II. Word family. Fill in the missing words of the same root where possible:
Noun |
Verb |
Adjective |
Adverb |
|
to remove |
|
|
replacement |
|
|
|
|
|
|
selectively |
|
to reflect |
|
|
|
|
reserved |
|
III. Make up phrases by matching the words in the left column with those in the right:
1. restricted |
A. border |
2. root |
B. access |
3. screen |
C. guide |
4. reference |
D. directory |
5. remote |
E. information |
IV. Fill the web diagram with the words that can be used with the given word:
V. Pick out the appropriate words and add them to your thematic glossary.
VI. Do a mini-research and explain the meaning of the following words beginning with re-:
1. remove |
|
2. replace |
|
3. release |
|
4. restore |
|
5. restrict |
|
VII. Give the definitions suiting the terms below:
1. register |
A. |
2. remote access |
B. |
3. to scale back |
C. |
4. screen saver |
D. |
5. search engine |
E. |
VIII. State the type of logical relations between the following words:
Example |
Type of logical relations |
1. remove – replace |
A. part and whole |
2. periphery – scanner |
B. general and specific |
3. Internet – search engine |
C. cause and effect |
4. restricted information - security |
D. contrast |
5. press a button – release a button |
E. equivalence |
IX. Say what can be:
1. released |
|
2. removed |
|
3. replaced |
|
4. restored |
|
5. scanned |
|
X. Say what the following is used for:
1. release |
|
2. route |
|
3. scale |
|
4. security |
|
5. restriction of information |
|
Tm fit 141-160
I. Give synonyms and/or antonyms:
1. shut down |
|
2. soft copy |
|
3. bootleg software |
|
4. set |
|
5. to surf |
|
II. Word family. Fill in the missing words of the same root where possible:
Noun |
Verb |
Adjective |
Adverb |
|
|
shared |
|
signature |
|
|
|
|
|
|
specifically |
storage |
|
|
|
|
to suspend |
|
|
III. Make up phrases by matching the words in the left column with those in the right:
1. session |
A. area |
2. software |
B. highjacking |
3. shadow |
C. mode |
4. storage |
D. maintenance |
5. suspend |
E. memory |
IV. Fill the web diagram with the words that can be used with the given word:
V. Pick out the appropriate words and add them to your thematic glossary.
VI. Do a mini-research and explain the difference between:
1. hard copy – soft copy – master copy |
|
2. shareware – freeware – pirate software |
|
3. target language – programming language |
|
4. settings - setup |
|
VII. Match the given terms with their definitions:
1. settings |
A. a combination of keys for quick work |
2. shareware |
B. parameters |
3. shortcut |
C. a program which is distributed without the compliance with the copyright law |
4. shut down |
D. an image on the screen |
5. soft copy |
E. interval |
6. bootleg software |
F. programs that are distributed free for users to try them |
7. space |
G. completion of the computer work |
VIII. Crosses and naughts. Play the game in 2 teams.
Copy the given table on the board.
Team 1: Select a word and use it in a sentence.
Team 2: Verify whether or not your opponent's answer is correct and put an X or O in that square for a correct answer.
Get 3 crosses or naughts in one row and win the game.
session |
shift |
signature
|
set |
server browsing |
silicon chip
|
shadow memory |
target language |
soft
|
IX. Say what can be:
1. switched |
|
2. specified |
|
3. shifted |
|
4. shared |
|
X. Say what the following is used for:
1. session log |
|
2. silicon chip |
|
3. serviceability |
|
4. settings |
|
5. signature |
|