Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
IT TM.doc
Скачиваний:
12
Добавлен:
25.02.2016
Размер:
1.29 Mб
Скачать

Training Exercises tm fit 1-20

I. Give synonyms and/or antonyms:

1. to deny access

2. to assemble

3. available data

4. alias

5. background

II. Word family. Fill in the missing words of the same root where possible:

Noun

Verb

Adjective

Adverb

access

to adapt

alternatively

to authenticate

available

III. Make up phrases by matching the words in the left column with those in the right:

1. to certify

A. code

2. alternate

B. access

3. auxiliary

C. route

4. bar

D. name

5. account

E. memory

IV. Fill the web diagram with the words that can be used with the given word:

V. Study the minimum and select the most interesting category. Start a thematic glossary of terms pertaining to the category (not less than 50 words from this and other sources).

VI. Do a mini-research and classify the types of memory.

VII. Match the given terms with their definitions:

1. bar code

A. a function to level/straighten the text

2. available data

B. an alternative name, nick

3. alignment

C. a line coding given to products to encrypt information about them

4. alias

D. a program which adds additional features to the main program

5. accessory

E. information which a user can access

VIII. State the type of logical relations between the following words:

Example

Type of logical relations

1. to deny access - to permit access

A. general and specific

2. device - auxiliary device

B. cause and effect

3. backup copy - available data

C. contrast

4. account – account name

D. method and purpose

5. identification – bar code

E. part and whole

IX. Say what can be:

1. adapted

2. amplified

3. allocated

4. assembled

5. authenticated

X. Say what the following is used for:

1. account name

2. alignment

3. auxiliary memory

4. backup copy

5. alias

Tm fit 21-40

I. Give synonyms and/or antonyms:

1. binary

2. blank

3. bottom-up programming

4. bug

5. case-insensitive

II. Decode the acronyms:

1. CD-ROM

2. CD-E

3. CD-R

4. CD-RW

5. AROM

III. Word family. Fill in the missing words of the same root where possible:

Noun

Verb

Adjective

Adverb

blank

to browse

buggy

buffer

sensitively

IV. Make up phrases by matching the words in the left column with those in the right:

1. batch

A. card

2. bit

B. click

3. button

C. file

4. cache

D. address

5. call

E. density

V. Pick out the appropriate words and add them to your thematic glossary.

VI. Do a mini-research and explain the difference between:

1. bottom-up programming – top down programming

2. break out – break in – break down

3. buggy hardware – buggy software

4. byte – gigabyte – kilobyte - megabyte

5. case sensitive – case insensitive

VII. Match the given terms with their definitions:

1. binary code

A. a place where the copied or cut information is temporarily stored

2. byte

B. unformatted disk or a disk without recorded data

3. buffer

C. a disk for uploading

4. buggy hardware

D. a system of encoding information with the help of Os and Is

5. blank disk

E. to get the access to computer system illegally

6. boot disk

F. a device that doesn’t work because of defects or spoilage

7. break in

G. the unit of information measurement

VIII. Say what the following is used for:

1. binary code

2. blank disk

3. build-in modem

4. certificate

5. call address

IX. Say when and why the following is done:

1. break in

2. break out

3. browse

4. broadcast

5. bottom-up programming

X. Name the kinds of compact disks.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]