ВУЗ: Не указан
Категория: Не указан
Дисциплина: Не указана
Добавлен: 15.08.2020
Просмотров: 455
Скачиваний: 3
IX. Say what can be:
1. dropped |
|
2. enhanced |
|
3. expanded |
|
4. folded |
|
5. edited |
|
X. Why do you think the following is done:
1. error detection |
|
2. feedback |
|
3. file handling |
|
4. text editing |
|
5. file erasing |
|
TM FIT 81-100
I. Give synonyms and/or antonyms:
1. hard |
|
2. input |
|
3. invalid |
|
4. download |
|
5. log in |
|
II. Word family. Fill in the missing words of the same root where possible:
Noun |
Verb |
Adjective |
Adverb |
|
to link |
|
|
|
|
loadable |
|
maintenance |
|
|
|
|
to monitor |
|
|
III. Make up phrases by matching the words in the left column with those in the right:
1. hard |
A. distortion |
2. image |
B. delivery |
3. invalid |
C. guide |
4. message |
D. copy |
5. maintenance |
E. password |
IV. Fill the web diagram with the words that can be used with the given word:
V. Pick out the appropriate words and add them to your thematic glossary.
VI. Do a mini-research and explain the difference between:
1. hard copy - backup copy - soft copy - master copy |
|
2. input - output |
|
3. laptop – notebook - palmtop |
|
4. to reload – unload – download - upload |
|
5. log in - log off |
|
VII. Crosses and naughts. Play the game in 2 teams.
-
Copy the given table on the board.
-
Team 1: Select a word and give its English equivalent.
-
Team 2: Verify whether or not your opponent's answer is correct and put an X or O in that square for a correct answer.
-
Get 3 crosses or naughts in one row and win the game.
главный компьютер
|
скачать с Интернета |
ПЗУ |
информационный мусор
|
вход в систему |
оригинал |
дорожный компьютер |
обычная почта |
редактор дискуссии |
VIII. State the type of logical relations between the following words:
Example |
Type of logical relations |
1. input - processing |
A. part and whole |
2. monitor - computer |
B. general and specific |
3. computer- notebook |
C. cause and effect |
4. junk mail - spam |
D. contrast |
4. input - output |
E. equivalence |
IX. Say what the following is used for:
1. hard copy |
|
2. keyboard |
|
3. log in |
|
4. master copy |
|
5. ROM |
|
X. Say what can be:
1. input |
|
2. uploaded |
|
3. downloaded |
|
4. maintained |
|
5. monitored |
|
TM FIT 101-120
I. Give synonyms and/or antonyms:
1. offline mode |
|
2. to paste |
|
3. real memory |
|
4. recoverable error |
|
5. print out |
|
II. Word family. Fill in the missing words of the same root where possible:
Noun |
Verb |
Adjective |
Adverb |
|
to print |
|
|
program |
|
|
|
|
to recover |
|
|
|
|
reflected |
|
reference |
|
|
|
III. Make up phrases by matching the words in the left column with those in the right:
1. mouse |
A. mode |
2. network |
B. database |
3. offline |
C. pad |
4. programmable |
D. memory |
5. real |
E. access |
IV. Fill the web diagram with the words that can be used with the given word:
V. Pick out the appropriate words and add them to your thematic glossary.
VI. Do a mini-research and explain the difference between:
1. online mode – offline mode |
|
2. impact printer – nonimpact printer |
|
3. print out – hard copy |
|
4. real memory - ROM |
|
VII. Give the definitions suiting the terms below:
1. netiquette |
A. |
2. peripheral device |
B. |
3. programmable database |
C. |
4. queue |
D. |
5. recoverable error |
E. |
VIII. State the type of logical relations between the following words:
Example |
Type of logical relations |
1. computer – mouse |
A. part and whole |
2. error correction - recovery |
B. general and specific |
3. online mode – offline mode |
C. cause and effect |
4. reference guide - manual |
D. contrast |
5. language - netspeak |
E. equivalence |
IX. Say what can be:
1. pasted |
|
2. printed |
|
3. programmed |
|
4. recovered |
|
5. referred to |
|
X. Name the kinds of printers.
TM FIT 121-140
I. Give synonyms and/or antonyms:
1. to release |
|
2. to remove |
|
3. to scale back |
|
4. to scan |
|
5. security |
|
II. Word family. Fill in the missing words of the same root where possible:
Noun |
Verb |
Adjective |
Adverb |
|
to remove |
|
|
replacement |
|
|
|
|
|
|
selectively |
serviceability |
|
|
|
|
|
reserved |
|
III. Make up phrases by matching the words in the left column with those in the right:
1. restricted |
A. border |
2. root |
B. browsing |
3. screen |
C. environment |
4. service |
D. directory |
5. server |
E. information |
IV. Fill the web diagram with the words that can be used with the given word:
V. Pick out the appropriate words and add them to your thematic glossary.
VI. Do a mini-research and explain the meaning of the following words beginning with re-:
1. remove |
|
2. replace |
|
3. release |
|
4. restore |
|
5. restrict |
|
VII. Give the definitions suiting the terms below:
1. register |
A. |
2. remote access |
B. |
3. to scale back |
C. |
4. screen saver |
D. |
5. search engine |
E. |
VIII. State the type of logical relations between the following words:
Example |
Type of logical relations |
1. remove – replace |
A. part and whole |
2. periphery – scanner |
B. general and specific |
3. Internet – search engine |
C. cause and effect |
4. restricted information - security |
D. contrast |
5. press a button – release a button |
E. equivalence |
IX. Say what can be:
1. released |
|
2. removed |
|
3. replaced |
|
4. restored |
|
5. scanned |
|
X. Say what the following is used for:
1. release |
|
2. route |
|
3. scale |
|
4. security |
|
5. restriction of information |
|
TM FIT 141-160
I. Give synonyms and/or antonyms:
1. shut down |
|
2. soft copy |
|
3. bootleg software |
|
4. set |
|
5. to surf |
|
II. Word family. Fill in the missing words of the same root where possible:
Noun |
Verb |
Adjective |
Adverb |
|
|
shared |
|
signature |
|
|
|
|
|
|
specifically |
storage |
|
|
|
|
to suspend |
|
|
III. Make up phrases by matching the words in the left column with those in the right:
1. session |
A. area |
2. software |
B. highjacking |
3. shadow |
C. mode |
4. storage |
D. maintenance |
5. suspend |
E. memory |
IV. Fill the web diagram with the words that can be used with the given word:
V. Pick out the appropriate words and add them to your thematic glossary.
VI. Do a mini-research and explain the difference between:
1. hard copy – soft copy – master copy |
|
2. shareware – freeware – pirate software |
|
3. target language – programming language |
|
4. settings - setup |
|
VII. Match the given terms with their definitions:
1. settings |
A. a combination of keys for quick work |
2. shareware |
B. parameters |
3. shortcut |
C. a program which is distributed without the compliance with the copyright law |
4. shut down |
D. an image on the screen |
5. soft copy |
E. interval |
6. bootleg software |
F. programs that are distributed free for users to try them |
7. space |
G. completion of the computer work |
VIII. Crosses and naughts. Play the game in 2 teams.
-
Copy the given table on the board.
-
Team 1: Select a word and use it in a sentence.
-
Team 2: Verify whether or not your opponent's answer is correct and put an X or O in that square for a correct answer.
-
Get 3 crosses or naughts in one row and win the game.
session |
shift |
signature |
set |
task bar |
silicon chip |
shadow memory |
target language |
soft |
IX. Say what can be:
1. switched |
|
2. specified |
|
3. shifted |
|
4. shared |
|
X. Say what the following is used for:
1. session log |
|
2. silicon chip |
|
3. task bar |
|
4. settings |
|
5. signature |
|
TM FIT 161-180
I. Give synonyms and/or antonyms:
1. template |
|
2. to terminate |
|
3. tool bar |
|
4. to tune |
|
5. tracking |
|
II. Word family. Fill in the missing words of the same root:
Noun |
Verb |
Adjective |
Adverb |
|
|
terminal |
|
|
to trail |
|
|
update |
|
|
|
|
to transmit |
|
|
transaction |
|
|
|
III. Make up phrases by matching the words in the left column with those in the right:
1. throughout |
A. period |
2. tool |
B. capacity |
3. trial |
C. face |
4. turnkey |
D. bar |
5. type |
E. system |
IV. Fill the web diagram with the words that can be used with the given word:
V. Pick out the appropriate words and add them to your thematic glossary.
VI. Give the terms suiting the definitions below:
1. |
A. to work at home with the help of computer connection with the office |
2. |
B. to end, stop |
3. |
C. to convey from one place to another |
4. |
D. to adapt to the prevailing conditions |
5. |
E. to fit into current systems |
VII. Crosses and naughts. Play the game in 2 teams.
-
Copy the given table on the board.
-
Team 1: Select a word and give its English equivalent.
-
Team 2: Verify whether or not your opponent's answer is correct and put an X or O in that square for a correct answer.
-
Get 3 crosses or naughts in one row and win the game.
пропускная способность канала связи |
магистральный кабель |
дистанционная передача данных |
след перемещения объекта на экране |
система «под ключ» |
обработка транзакций |
приемопередатчик
|
гарнитура |
выключать питание |
VIII. State the type of logical relations between the following words:
Example |
Type of logical relations |
1. to work – to telecommute |
A. general and specific |
2. to terminate – to start |
B. equivalence |
3. tracking – monitoring |
C. part and whole |
4. transceiver - transmitter |
D. contrast |
IX. Say what can be:
1. terminated |
|
2. tracked |
|
3. transferred |
|
4. updated |
|
5. turned off |
|
X. Say when and why people do the following:
1. telecommute |
|
2. transaction processing |
|
3. troubleshooting |
|
4. upgrade |
|
5. tune |
|
TM FIT 181-200
I. Give synonyms and/or antonyms:
1. usable |
|
2. to verify |
|
3. virtual |
|
4. to zoom |
|
5. valid |
|
II. Decode the acronyms:
1. WWW |
|
2. ASAP |
|
3. ASCII |
|
4. CUL8R |
|
5. VR |
|
III. Word family. Fill in the missing words of the same root where possible:
Noun |
Verb |
Adjective |
Adverb |
user |
|
|
|
|
|
valid |
|
|
to verify |
|
|
vision |
|
|
|
|
|
volatile |
|
IV. Fill the web diagram with the words that can be used with the given word:
V. Pick out the appropriate words and add them to your thematic glossary.
VI. Do a mini-research and explain the difference between:
1. end-user – power user |
|
2. to verify – to validate |
|
3. WWW – the Internet |
|
4. workstation – supercomputer |
|
VII. Give the definitions suiting the given terms:
1. power user |
A. |
2. volatility |
B. |
3. wait mode |
C. |
4. workstation |
D. |
5. validation |
E. |
VIII. Crosses and naughts. Play the game in 2 teams.
-
Copy the given table on the board.
-
Team 1: Select a word and give its Russian equivalent.
-
Team 2: Verify whether or not your opponent's answer is correct and put an X or O in that square for a correct answer.
-
Get 3 crosses or naughts in one row and win the game.
virus detection system |
end user |
validation |
volatile memory |
Virtual world |
user guide |
window layout |
wait mode |
workstation |
IX. Say what can be:
1. valid |
|
2. verified |
|
3. zoomed |
|
4. volatile |
|
5. wrapped |
|
X. Say what the following is used for:
1. virtual mall |
|
2. virus detection system |
|
3. voice mail – answering machine |
|
4. user-friendly interface |
|
5. user manual |
|
KEYS TO TRAINING EXERCISES
TM FIT 1-20
I. Give synonyms and/or antonyms:
1. to deny access |
to restrict access, to refuse access, ant. to certify access, to permit access |
2. to assemble |
to put together, ant. to take apart, to disassemble |
3. available data |
accessible data, ant. unavailable data |
4. alias |
nick, pseudonym, ant. real name |
5. background |
ant. foreground |
II. Word family. Fill in the missing words of the same root where possible:
noun |
verb |
adjective |
adverb |
access |
- |
accessible |
- |
adaptation/ adapter |
to adapt |
adaptable/ adaptive |
- |
alternation |
to alternate |
alternate |
alternatively |
authentication |
to authenticate |
authenticated |
- |
availability |
to avail |
available |
- |
III. Make up phrases by matching the words in the left column with those in the right:
1. to certify B |
A. code |
2. alternate C |
B. access |
3. auxiliary E |
C. route |
4. bar A |
D. name |
5. account D |
E. memory |
IV. Fill the web diagram with the words that can be used with the given word:
ACCESS - to certify, to restrict, to deny, to permit, to obtain, authorized, channel, data, direct, fast, information, network, one-touch, random access.
VI. Do a mini-research and classify the types of memory:
AROM, auxiliary memory, available memory, buffer memory, RAM, ROM, etc.
VII. Match the given terms with their definitions:
1. bar code C |
A. a function to level/straighten the text |
2. available data E |
B. an alternative name, nick |
3. alignment A |
C. a line coding given to products to encrypt information about them |
4. alias B |
D. a program which adds additional features to the main program |
5. accessory D |
E. information which a user can access |
VIII. State the type of logical relations between the following words:
Example |
Type of logical relations |
1. to deny access - to permit access C |
A. general and specific |
2. device - auxiliary device A |
B. cause and effect |
3. backup copy - available data B |
C. contrast |
4. account – account name E |
D. method and purpose |
5. identification – bar code D |
E. part and whole |
IX. Say what can be:
1. adapted |
program, any equipment, bus, channels, colors, communication line, disk |
2. amplified |
memory, signal, sound, buffer, electric current (power), driver |
3. allocated |
memory, disk capacity, channels, recourses, processor, space, storage, time |
4. assembled |
computer, any equipment, packets |
5. authenticated |
data, password, response, message, signature |
X. Say what the following is used for:
1. account name |
to identify the user |
2. alignment |
to level, straighten the text/picture |
3. auxiliary memory |
to store auxiliary programs/data |
4. backup copy |
not to lose the file/data |
5. alias |
to enter programs, to use data |
TM FIT 21-40
I. Give synonyms and/or antonyms:
1. binary |
2 digit, ant. decimal |
2. blank |
empty, erased, unformatted, space, ant. full, recorded |
3. bottom-up programming |
ant. top-down programming |
4. bug |
error, defect, breakage, ant. fixed, debugged, bug-ridden |
5. case-insensitive |
ant. case-sensitive |
II. Decode the acronyms:
1. CD-ROM |
compact disk read only memory |
2. CD-E |
compact disk erasable |
3. CD-R |
compact disk recordable |
4. CD-RW |
compact disk rewritable |
5. AROM |
alterable read only memory |
III. Word family. Fill in the missing words of the same root where possible:
Noun |
Verb |
Adjective |
Adverb |
blank |
- |
blank |
blankly |
browser |
to browse |
- |
- |
bug |
- |
buggy |
- |
buffer |
to buffer |
buffer |
- |
sensitivity |
to sense |
sensitive |
sensitively |
IV. Make up phrases by matching the words in the left column with those in the right:
1. batch C |
A. card |
2. bit E |
B. click |
3. button B |
C. file |
4. cache A |
D. address |
5. call D |
E. density |
VI. Do a mini-research and explain the difference between:
1. bottom-up programming – top down programming |
A method of working out a program from modules to result. A method when you first make a frame and then fill it with parts of the program. |
2. break out – break in – break down |
When you interrupt the program work and stop working with it; when smb crashes your security system; when a computer can’t work and needs repair. |
3. buggy hardware – buggy software |
Hardware (equipment) that doesn’t work (properly); programs with errors that don’t function properly. |
4. byte – gigabyte – kilobyte - megabyte |
Byte – a unit of information and memory, 8 bits; kilobyte – 1024 bytes; megabyte – 1048576 bytes; gigabyte – 1024 megabytes. |
5. case sensitive – case insensitive |
Differentiates capital and small letters – does not. |
VII. Match the given terms with their definitions:
1. binary code D |
A. a place where the copied or cut information is temporarily stored |
2. byte G |
B. unformatted disk or a disk without recorded data |
3. buffer A |
C. a disk for uploading |
4. buggy hardware F |
D. a system of encoding information with the help of Os and Is |
5. blank disk B |
E. to get the access to computer system illegally |
6. boot disk C |
F. a device that doesn’t work because of defects or spoilage |
7. break in E |
G. the unit of information measurement |
VIII. Say what the following is used for:
1. binary code |
programming, entering data |
2. blank disk |
recording data |
3. build-in modem |
connection to the Internet |
4. cable connection |
to connect computer peripherals, etc. |
5. call address |
to find data, programs |
IX. Say when and why people do the following:
1. break in |
to get smb’s data, information, programs, money illegally |
2. break out |
to finish work with one program and start with another |
3. browse |
to get information |
4. broadcast |
to send smb. information, images, etc. |
5. bottom-up programming |
to make a program |
X. Name the kinds of compact disks:
CD-E, CD-R, CD-RW, CD-ROM, CD-I, CD-PROM, CD-ROM XA, CD-V, CD-WO, CD-WORM.
TM FIT 41-60
I. Give synonyms and/or antonyms:
1. certified |
allowed, permitted, ant. uncertified, denied, illegal |
2. compatible |
ant. incompatible |
3. connection |
link, switching, ant. disconnection |
4. data verification |
control, check, authentication, validation |
5. data retrieval |
selection/search from database |
II. Word family. Fill in the missing words of the same root where possible:
noun |
verb |
adjective |
adverb |
character |
to characterise |
characteristic |
- |
compatibility |
- |
compatible |
- |
computer/ computation |
to compute/ computerize |
computable/ computerized |
- |
customer |
to customize |
customized |
- |
deletion |
to delete |
deleted |
- |
III. Make up phrases by matching the words in the left column with those in the right:
1. copyright C |
A. key |
2. cursor A |
B. drive |
3. default D |
C. law |
4. disk B |
D. option |
5. display E |
E. mode |