- •British technical university
- •Information technologies
- •Training Exercises tm fit 1-20
- •Tm fit 21-40
- •Tm fit 41-60
- •Tm fit 61-80
- •Tm fit 81-100
- •Tm fit 101-120
- •Tm fit 121-140
- •Tm fit 141-160
- •Tm fit 161-180
- •Tm fit 181-200
- •Keys to training exercises tm fit 1-20
- •Tm fit 21-40
- •Tm fit 41-60
- •Tm fit 61-80
- •Tm fit 81-100
- •Tm fit 101-120
- •Tm fit 121-140
- •Tm fit 141-160
- •Tm fit 161-180
- •Tm fit 181-200
Training Exercises tm fit 1-20
I. Give synonyms and/or antonyms:
|
1. to deny access |
|
|
2. to assemble |
|
|
3. available data |
|
|
4. alias |
|
|
5. background |
|
II. Word family. Fill in the missing words of the same root where possible:
|
Noun |
Verb |
Adjective |
Adverb |
|
access |
|
|
|
|
|
to adapt |
|
|
|
|
|
|
alternatively |
|
|
to authenticate |
|
|
|
|
|
available |
|
III. Make up phrases by matching the words in the left column with those in the right:
|
1. to certify |
A. code |
|
2. alternate |
B. access |
|
3. auxiliary |
C. route |
|
4. bar |
D. name |
|
5. account |
E. memory |
IV. Fill the web diagram with the words that can be used with the given word:

V. Study the minimum and select the most interesting category. Start a thematic glossary of terms pertaining to the category (not less than 50 words from this and other sources).
VI. Do a mini-research and classify the types of memory.
VII. Match the given terms with their definitions:
|
1. bar code |
A. a function to level/straighten the text |
|
2. available data |
B. an alternative name, nick |
|
3. alignment |
C. a line coding given to products to encrypt information about them |
|
4. alias |
D. a program which adds additional features to the main program |
|
5. accessory |
E. information which a user can access |
VIII. State the type of logical relations between the following words:
|
Example |
Type of logical relations |
|
1. to deny access - to permit access |
A. general and specific |
|
2. device - auxiliary device |
B. cause and effect |
|
3. backup copy - available data |
C. contrast |
|
4. account – account name |
D. method and purpose |
|
5. identification – bar code |
E. part and whole |
IX. Say what can be:
|
1. adapted |
|
|
2. amplified |
|
|
3. allocated |
|
|
4. assembled |
|
|
5. authenticated |
|
X. Say what the following is used for:
|
1. account name |
|
|
2. alignment |
|
|
3. auxiliary memory |
|
|
4. backup copy |
|
|
5. alias |
|
Tm fit 21-40
I. Give synonyms and/or antonyms:
|
1. binary |
|
|
2. blank |
|
|
3. bottom-up programming |
|
|
4. bug |
|
|
5. case-insensitive |
|
II. Decode the acronyms:
|
1. CD-ROM |
|
|
2. CD-E |
|
|
3. CD-R |
|
|
4. CD-RW |
|
|
5. AROM |
|
III. Word family. Fill in the missing words of the same root where possible:
|
Noun |
Verb |
Adjective |
Adverb |
|
blank |
|
|
|
|
|
to browse |
|
|
|
|
|
buggy |
|
|
buffer |
|
|
|
|
|
|
|
sensitively |
IV. Make up phrases by matching the words in the left column with those in the right:
|
1. batch |
A. card |
|
2. bit |
B. click |
|
3. button |
C. file |
|
4. cache |
D. address |
|
5. call |
E. density |
V. Pick out the appropriate words and add them to your thematic glossary.
VI. Do a mini-research and explain the difference between:
|
1. bottom-up programming – top down programming |
|
|
2. break out – break in – break down
|
|
|
3. buggy hardware – buggy software
|
|
|
4. byte – gigabyte – kilobyte - megabyte
|
|
|
5. case sensitive – case insensitive
|
|
VII. Match the given terms with their definitions:
|
1. binary code |
A. a place where the copied or cut information is temporarily stored |
|
2. byte |
B. unformatted disk or a disk without recorded data |
|
3. buffer |
C. a disk for uploading |
|
4. buggy hardware |
D. a system of encoding information with the help of Os and Is |
|
5. blank disk |
E. to get the access to computer system illegally |
|
6. boot disk |
F. a device that doesn’t work because of defects or spoilage |
|
7. break in |
G. the unit of information measurement |
VIII. Say what the following is used for:
|
1. binary code |
|
|
2. blank disk |
|
|
3. build-in modem |
|
|
4. certificate |
|
|
5. call address |
|
IX. Say when and why the following is done:
|
1. break in |
|
|
2. break out |
|
|
3. browse |
|
|
4. broadcast |
|
|
5. bottom-up programming |
|
X. Name the kinds of compact disks.
