Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
IT TM.docx
Скачиваний:
17
Добавлен:
25.02.2016
Размер:
243.53 Кб
Скачать

Keys to training exercises tm fit 1-20

I. Give synonyms and/or antonyms:

1. to deny access

to restrict access, to refuse access, ant. to certify access, to permit access

2. to assemble

to put together, ant. to take apart, to disassemble

3. available data

accessible data, ant. unavailable data

4. alias

nick, pseudonym, ant. real name

5. background

ant. foreground

II. Word family. Fill in the missing words of the same root where possible:

noun

verb

adjective

adverb

access

-

accessible

-

adaptation/ adapter

to adapt

adaptable/ adaptive

-

alternation

to alternate

alternate

alternatively

authentication

to authenticate

authenticated

-

availability

to avail

available

-

III. Make up phrases by matching the words in the left column with those in the right:

1. to certify B

A. code

2. alternate C

B. access

3. auxiliary E

C. route

4. bar A

D. name

5. account D

E. memory

IV. Fill the web diagram with the words that can be used with the given word:

ACCESS - to certify, to restrict, to deny, to permit, to obtain, authorized, channel, data, direct, fast, information, network, one-touch, random access.

VI. Do a mini-research and classify the types of memory:

AROM, auxiliary memory, available memory, buffer memory, RAM, ROM, etc.

VII. Match the given terms with their definitions:

1. bar code C

A. a function to level/straighten the text

2. available data E

B. an alternative name, nick

3. alignment A

C. a line coding given to products to encrypt information about them

4. alias B

D. a program which adds additional features to the main program

5. accessory D

E. information which a user can access

VIII. State the type of logical relations between the following words:

Example

Type of logical relations

1. to deny access - to permit access C

A. general and specific

2. device - auxiliary device A

B. cause and effect

3. backup copy - available data B

C. contrast

4. account – account name E

D. method and purpose

5. identification – bar code D

E. part and whole

IX. Say what can be:

1. adapted

program, any equipment, bus, channels, colors, communication line, disk

2. amplified

memory, signal, sound, buffer, electric current (power), driver

3. allocated

memory, disk capacity, channels, recourses, processor, space, storage, time

4. assembled

computer, any equipment, packets

5. authenticated

data, password, response, message, signature

X. Say what the following is used for:

1. account name

to identify the user

2. alignment

to level, straighten the text/picture

3. auxiliary memory

to store auxiliary programs/data

4. backup copy

not to lose the file/data

5. alias

to enter programs, to use data

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]