ВУЗ: Не указан

Категория: Не указан

Дисциплина: Не указана

Добавлен: 15.08.2020

Просмотров: 428

Скачиваний: 3

ВНИМАНИЕ! Если данный файл нарушает Ваши авторские права, то обязательно сообщите нам.



IX. Say what can be:

1. dropped


2. enhanced


3. expanded


4. folded


5. edited




X. Why do you think the following is done:

1. error detection


2. feedback


3. file handling


4. text editing


5. file erasing




TM FIT 81-100


I. Give synonyms and/or antonyms:

1. hard


2. input


3. invalid


4. download


5. log in



II. Word family. Fill in the missing words of the same root where possible:

Noun

Verb

Adjective

Adverb


to link





loadable


maintenance





to monitor





III. Make up phrases by matching the words in the left column with those in the right:

1. hard

A. distortion

2. image

B. delivery

3. invalid

C. guide

4. message

D. copy

5. maintenance

E. password


IV. Fill the web diagram with the words that can be used with the given word:


V. Pick out the appropriate words and add them to your thematic glossary.


VI. Do a mini-research and explain the difference between:

1. hard copy - backup copy - soft copy - master copy


2. input - output


3. laptop – notebook - palmtop


4. to reload – unload – download - upload


5. log in - log off



VII. Crosses and naughts. Play the game in 2 teams.

  1. Copy the given table on the board.

  2. Team 1: Select a word and give its English equivalent.

  3. Team 2: Verify whether or not your opponent's answer is correct and put an X or O in that square for a correct answer.

  4. Get 3 crosses or naughts in one row and win the game.


главный компьютер


скачать с Интернета

ПЗУ

информационный мусор


вход в систему

оригинал

дорожный компьютер


обычная почта

редактор дискуссии



VIII. State the type of logical relations between the following words:


Example

Type of logical relations

1. input - processing

A. part and whole

2. monitor - computer

B. general and specific

3. computer- notebook

C. cause and effect

4. junk mail - spam

D. contrast

4. input - output

E. equivalence



IX. Say what the following is used for:


1. hard copy


2. keyboard


3. log in


4. master copy


5. ROM




X. Say what can be:


1. input


2. uploaded


3. downloaded


4. maintained


5. monitored




TM FIT 101-120


I. Give synonyms and/or antonyms:

1. offline mode


2. to paste


3. real memory


4. recoverable error


5. print out



II. Word family. Fill in the missing words of the same root where possible:

Noun

Verb

Adjective

Adverb


to print



program





to recover





reflected


reference





III. Make up phrases by matching the words in the left column with those in the right:

1. mouse

A. mode

2. network

B. database

3. offline

C. pad

4. programmable

D. memory

5. real

E. access


IV. Fill the web diagram with the words that can be used with the given word:



V. Pick out the appropriate words and add them to your thematic glossary.



VI. Do a mini-research and explain the difference between:

1. online mode – offline mode


2. impact printer – nonimpact printer


3. print out – hard copy



4. real memory - ROM





VII. Give the definitions suiting the terms below:

1. netiquette

A.

2. peripheral device

B.

3. programmable database

C.

4. queue

D.

5. recoverable error

E.



VIII. State the type of logical relations between the following words:

Example

Type of logical relations

1. computer – mouse

A. part and whole

2. error correction - recovery

B. general and specific

3. online mode – offline mode

C. cause and effect

4. reference guide - manual

D. contrast

5. language - netspeak

E. equivalence




IX. Say what can be:

1. pasted


2. printed


3. programmed


4. recovered


5. referred to




X. Name the kinds of printers.



TM FIT 121-140


I. Give synonyms and/or antonyms:

1. to release


2. to remove


3. to scale back


4. to scan


5. security



II. Word family. Fill in the missing words of the same root where possible:

Noun

Verb

Adjective

Adverb


to remove



replacement







selectively

serviceability






reserved



III. Make up phrases by matching the words in the left column with those in the right:

1. restricted

A. border

2. root

B. browsing

3. screen

C. environment

4. service

D. directory

5. server

E. information


IV. Fill the web diagram with the words that can be used with the given word:





V. Pick out the appropriate words and add them to your thematic glossary.


VI. Do a mini-research and explain the meaning of the following words beginning with re-:

1. remove


2. replace


3. release


4. restore


5. restrict



VII. Give the definitions suiting the terms below:

1. register

A.

2. remote access

B.

3. to scale back

C.

4. screen saver

D.

5. search engine

E.


VIII. State the type of logical relations between the following words:

Example

Type of logical relations

1. remove – replace

A. part and whole

2. periphery – scanner

B. general and specific

3. Internet – search engine

C. cause and effect

4. restricted information - security

D. contrast

5. press a button – release a button

E. equivalence


IX. Say what can be:

1. released


2. removed


3. replaced


4. restored


5. scanned



X. Say what the following is used for:

1. release


2. route


3. scale


4. security


5. restriction of information




TM FIT 141-160



I. Give synonyms and/or antonyms:

1. shut down


2. soft copy


3. bootleg software


4. set


5. to surf



II. Word family. Fill in the missing words of the same root where possible:

Noun

Verb

Adjective

Adverb



shared


signature







specifically

storage





to suspend




III. Make up phrases by matching the words in the left column with those in the right:

1. session

A. area

2. software

B. highjacking

3. shadow

C. mode

4. storage

D. maintenance

5. suspend

E. memory


IV. Fill the web diagram with the words that can be used with the given word:


V. Pick out the appropriate words and add them to your thematic glossary.



VI. Do a mini-research and explain the difference between:

1. hard copy – soft copy – master copy


2. shareware – freeware – pirate software


3. target language – programming language


4. settings - setup




VII. Match the given terms with their definitions:

1. settings

A. a combination of keys for quick work

2. shareware

B. parameters

3. shortcut

C. a program which is distributed without the compliance with the copyright law

4. shut down

D. an image on the screen

5. soft copy

E. interval

6. bootleg software

F. programs that are distributed free for users to try them

7. space

G. completion of the computer work



VIII. Crosses and naughts. Play the game in 2 teams.

  1. Copy the given table on the board.

  2. Team 1: Select a word and use it in a sentence.

  3. Team 2: Verify whether or not your opponent's answer is correct and put an X or O in that square for a correct answer.

  4. Get 3 crosses or naughts in one row and win the game.

session

shift

signature


set

task bar

silicon chip


shadow memory

target language

soft




IX. Say what can be:

1. switched


2. specified


3. shifted


4. shared





X. Say what the following is used for:

1. session log


2. silicon chip


3. task bar


4. settings


5. signature








TM FIT 161-180




I. Give synonyms and/or antonyms:

1. template


2. to terminate


3. tool bar


4. to tune


5. tracking




II. Word family. Fill in the missing words of the same root:

Noun

Verb

Adjective

Adverb



terminal



to trail



update





to transmit



transaction






III. Make up phrases by matching the words in the left column with those in the right:

1. throughout

A. period

2. tool

B. capacity

3. trial

C. face

4. turnkey

D. bar

5. type

E. system



IV. Fill the web diagram with the words that can be used with the given word:


V. Pick out the appropriate words and add them to your thematic glossary.



VI. Give the terms suiting the definitions below:

1.

A. to work at home with the help of computer connection with the office

2.

B. to end, stop

3.

C. to convey from one place to another

4.

D. to adapt to the prevailing conditions

5.

E. to fit into current systems



VII. Crosses and naughts. Play the game in 2 teams.

  1. Copy the given table on the board.

  2. Team 1: Select a word and give its English equivalent.

  3. Team 2: Verify whether or not your opponent's answer is correct and put an X or O in that square for a correct answer.

  4. Get 3 crosses or naughts in one row and win the game.

пропускная способность канала связи

магистральный кабель

дистанционная передача данных

след перемещения объекта на экране

система «под ключ»

обработка транзакций

приемопередатчик


гарнитура

выключать питание


VIII. State the type of logical relations between the following words:

Example

Type of logical relations

1. to work – to telecommute

A. general and specific

2. to terminate – to start

B. equivalence

3. tracking – monitoring

C. part and whole

4. transceiver - transmitter

D. contrast



IX. Say what can be:

1. terminated


2. tracked


3. transferred


4. updated


5. turned off




X. Say when and why people do the following:

1. telecommute


2. transaction processing


3. troubleshooting


4. upgrade


5. tune





TM FIT 181-200


I. Give synonyms and/or antonyms:

1. usable


2. to verify


3. virtual


4. to zoom


5. valid



II. Decode the acronyms:

1. WWW


2. ASAP


3. ASCII


4. CUL8R


5. VR



III. Word family. Fill in the missing words of the same root where possible:

Noun

Verb

Adjective

Adverb

user






valid



to verify



vision






volatile



IV. Fill the web diagram with the words that can be used with the given word:


V. Pick out the appropriate words and add them to your thematic glossary.


VI. Do a mini-research and explain the difference between:

1. end-user – power user


2. to verify – to validate


3. WWW – the Internet


4. workstation – supercomputer



VII. Give the definitions suiting the given terms:

1. power user

A.

2. volatility

B.

3. wait mode

C.

4. workstation

D.

5. validation

E.

VIII. Crosses and naughts. Play the game in 2 teams.

  1. Copy the given table on the board.

  2. Team 1: Select a word and give its Russian equivalent.

  3. Team 2: Verify whether or not your opponent's answer is correct and put an X or O in that square for a correct answer.

  4. Get 3 crosses or naughts in one row and win the game.

virus detection system

end user

validation

volatile memory

Virtual world

user guide

window layout

wait mode

workstation


IX. Say what can be:

1. valid


2. verified


3. zoomed


4. volatile


5. wrapped



X. Say what the following is used for:

1. virtual mall


2. virus detection system


3. voice mail – answering machine


4. user-friendly interface


5. user manual



















KEYS TO TRAINING EXERCISES


TM FIT 1-20


I. Give synonyms and/or antonyms:

1. to deny access

to restrict access, to refuse access, ant. to certify access, to permit access

2. to assemble

to put together, ant. to take apart, to disassemble

3. available data

accessible data, ant. unavailable data

4. alias

nick, pseudonym, ant. real name

5. background

ant. foreground


II. Word family. Fill in the missing words of the same root where possible:

noun

verb

adjective

adverb

access

-

accessible

-

adaptation/ adapter

to adapt

adaptable/ adaptive

-

alternation

to alternate

alternate

alternatively

authentication

to authenticate

authenticated

-

availability

to avail

available

-


III. Make up phrases by matching the words in the left column with those in the right:

1. to certify B

A. code

2. alternate C

B. access

3. auxiliary E

C. route

4. bar A

D. name

5. account D

E. memory


IV. Fill the web diagram with the words that can be used with the given word:

ACCESS - to certify, to restrict, to deny, to permit, to obtain, authorized, channel, data, direct, fast, information, network, one-touch, random access.



VI. Do a mini-research and classify the types of memory:

AROM, auxiliary memory, available memory, buffer memory, RAM, ROM, etc.


VII. Match the given terms with their definitions:

1. bar code C

A. a function to level/straighten the text

2. available data E

B. an alternative name, nick

3. alignment A

C. a line coding given to products to encrypt information about them

4. alias B

D. a program which adds additional features to the main program

5. accessory D

E. information which a user can access


VIII. State the type of logical relations between the following words:

Example

Type of logical relations

1. to deny access - to permit access C

A. general and specific

2. device - auxiliary device A

B. cause and effect

3. backup copy - available data B

C. contrast

4. account – account name E

D. method and purpose

5. identification – bar code D

E. part and whole


IX. Say what can be:

1. adapted

program, any equipment, bus, channels, colors, communication line, disk

2. amplified

memory, signal, sound, buffer, electric current (power), driver

3. allocated

memory, disk capacity, channels, recourses, processor, space, storage, time

4. assembled

computer, any equipment, packets

5. authenticated

data, password, response, message, signature


X. Say what the following is used for:

1. account name

to identify the user

2. alignment

to level, straighten the text/picture

3. auxiliary memory

to store auxiliary programs/data

4. backup copy

not to lose the file/data

5. alias

to enter programs, to use data




TM FIT 21-40



I. Give synonyms and/or antonyms:

1. binary

2 digit, ant. decimal

2. blank

empty, erased, unformatted, space, ant. full, recorded

3. bottom-up programming

ant. top-down programming

4. bug

error, defect, breakage, ant. fixed, debugged, bug-ridden

5. case-insensitive

ant. case-sensitive


II. Decode the acronyms:

1. CD-ROM

compact disk read only memory

2. CD-E

compact disk erasable

3. CD-R

compact disk recordable

4. CD-RW

compact disk rewritable

5. AROM

alterable read only memory




III. Word family. Fill in the missing words of the same root where possible:

Noun

Verb

Adjective

Adverb

blank

-

blank

blankly

browser

to browse

-

-

bug

-

buggy

-

buffer

to buffer

buffer

-

sensitivity

to sense

sensitive

sensitively



IV. Make up phrases by matching the words in the left column with those in the right:

1. batch C

A. card

2. bit E

B. click

3. button B

C. file

4. cache A

D. address

5. call D

E. density



VI. Do a mini-research and explain the difference between:

1. bottom-up programming – top down programming

A method of working out a program from modules to result. A method when you first make a frame and then fill it with parts of the program.

2. break out – break in – break down


When you interrupt the program work and stop working with it; when smb crashes your security system; when a computer can’t work and needs repair.

3. buggy hardware – buggy software


Hardware (equipment) that doesn’t work (properly); programs with errors that don’t function properly.

4. byte – gigabyte – kilobyte - megabyte


Byte – a unit of information and memory, 8 bits; kilobyte – 1024 bytes; megabyte – 1048576 bytes; gigabyte – 1024 megabytes.

5. case sensitive – case insensitive

Differentiates capital and small letters – does not.



VII. Match the given terms with their definitions:

1. binary code D

A. a place where the copied or cut information is temporarily stored

2. byte G

B. unformatted disk or a disk without recorded data

3. buffer A

C. a disk for uploading

4. buggy hardware F

D. a system of encoding information with the help of Os and Is

5. blank disk B

E. to get the access to computer system illegally

6. boot disk C

F. a device that doesn’t work because of defects or spoilage

7. break in E

G. the unit of information measurement


VIII. Say what the following is used for:

1. binary code

programming, entering data

2. blank disk

recording data

3. build-in modem

connection to the Internet

4. cable connection

to connect computer peripherals, etc.

5. call address

to find data, programs


IX. Say when and why people do the following:

1. break in

to get smb’s data, information, programs, money illegally

2. break out

to finish work with one program and start with another

3. browse

to get information

4. broadcast

to send smb. information, images, etc.

5. bottom-up programming

to make a program


X. Name the kinds of compact disks:

CD-E, CD-R, CD-RW, CD-ROM, CD-I, CD-PROM, CD-ROM XA, CD-V, CD-WO, CD-WORM.





TM FIT 41-60



I. Give synonyms and/or antonyms:

1. certified

allowed, permitted, ant. uncertified, denied, illegal

2. compatible

ant. incompatible

3. connection

link, switching, ant. disconnection

4. data verification

control, check, authentication, validation

5. data retrieval

selection/search from database


II. Word family. Fill in the missing words of the same root where possible:

noun

verb

adjective

adverb

character

to characterise

characteristic

-

compatibility

-

compatible

-

computer/ computation

to compute/ computerize

computable/ computerized

-

customer

to customize

customized

-

deletion

to delete

deleted

-



III. Make up phrases by matching the words in the left column with those in the right:

1. copyright C

A. key

2. cursor A

B. drive

3. default D

C. law

4. disk B

D. option

5. display E

E. mode