Training Exercises tm fit 1-20
I. Give synonyms and/or antonyms:
1. to deny access |
|
2. to assemble |
|
3. available data |
|
4. alias |
|
5. background |
|
II. Word family. Fill in the missing words of the same root where possible:
Noun |
Verb |
Adjective |
Adverb |
access |
|
|
|
|
to adapt |
|
|
|
|
|
alternatively |
|
to authenticate |
|
|
|
|
available |
|
III. Make up phrases by matching the words in the left column with those in the right:
1. to certify |
A. code |
2. alternate |
B. access |
3. auxiliary |
C. route |
4. bar |
D. name |
5. account |
E. memory |
IV. Fill the web diagram with the words that can be used with the given word:
V. Study the minimum and select the most interesting category. Start a thematic glossary of terms pertaining to the category (not less than 50 words from this and other sources).
VI. Do a mini-research and classify the types of memory.
VII. Match the given terms with their definitions:
1. bar code |
A. a function to level/straighten the text |
2. available data |
B. an alternative name, nick |
3. alignment |
C. a line coding given to products to encrypt information about them |
4. alias |
D. a program which adds additional features to the main program |
5. accessory |
E. information which a user can access |
VIII. State the type of logical relations between the following words:
Example |
Type of logical relations |
1. to deny access - to permit access |
A. general and specific |
2. device - auxiliary device |
B. cause and effect |
3. backup copy - available data |
C. contrast |
4. account – account name |
D. method and purpose |
5. identification – bar code |
E. part and whole |
IX. Say what can be:
1. adapted |
|
2. amplified |
|
3. allocated |
|
4. assembled |
|
5. authenticated |
|
X. Say what the following is used for:
1. account name |
|
2. alignment |
|
3. auxiliary memory |
|
4. backup copy |
|
5. alias |
|
Tm fit 21-40
I. Give synonyms and/or antonyms:
1. binary |
|
2. blank |
|
3. bottom-up programming |
|
4. bug |
|
5. case-insensitive |
|
II. Decode the acronyms:
1. CD-ROM |
|
2. CD-E |
|
3. CD-R |
|
4. CD-RW |
|
5. AROM |
|
III. Word family. Fill in the missing words of the same root where possible:
Noun |
Verb |
Adjective |
Adverb |
blank |
|
|
|
|
to browse |
|
|
|
|
buggy |
|
buffer |
|
|
|
|
|
|
sensitively |
IV. Make up phrases by matching the words in the left column with those in the right:
1. batch |
A. card |
2. bit |
B. click |
3. button |
C. file |
4. cache |
D. address |
5. call |
E. density |
V. Pick out the appropriate words and add them to your thematic glossary.
VI. Do a mini-research and explain the difference between:
1. bottom-up programming – top down programming |
|
2. break out – break in – break down
|
|
3. buggy hardware – buggy software
|
|
4. byte – gigabyte – kilobyte - megabyte
|
|
5. case sensitive – case insensitive
|
|
VII. Match the given terms with their definitions:
1. binary code |
A. a place where the copied or cut information is temporarily stored |
2. byte |
B. unformatted disk or a disk without recorded data |
3. buffer |
C. a disk for uploading |
4. buggy hardware |
D. a system of encoding information with the help of Os and Is |
5. blank disk |
E. to get the access to computer system illegally |
6. boot disk |
F. a device that doesn’t work because of defects or spoilage |
7. break in |
G. the unit of information measurement |
VIII. Say what the following is used for:
1. binary code |
|
2. blank disk |
|
3. build-in modem |
|
4. certificate |
|
5. call address |
|
IX. Say when and why the following is done:
1. break in |
|
2. break out |
|
3. browse |
|
4. broadcast |
|
5. bottom-up programming |
|
X. Name the kinds of compact disks.