![](/user_photo/2706_HbeT2.jpg)
- •British technical university
- •Information technologies
- •Training Exercises tm fit 1-20
- •Tm fit 21-40
- •Tm fit 41-60
- •Tm fit 61-80
- •Tm fit 81-100
- •Tm fit 101-120
- •Tm fit 121-140
- •Tm fit 141-160
- •Tm fit 161-180
- •Tm fit 181-200
- •Keys to training exercises tm fit 1-20
- •Tm fit 21-40
- •Tm fit 41-60
- •Tm fit 61-80
- •Tm fit 81-100
- •Tm fit 101-120
- •Tm fit 121-140
- •Tm fit 141-160
- •Tm fit 161-180
- •Tm fit 181-200
Keys to training exercises tm fit 1-20
I. Give synonyms and/or antonyms:
1. to deny access |
to restrict access, to refuse access, ant. to certify access, to permit access |
2. to assemble |
to put together, ant. to take apart, to disassemble |
3. available data |
accessible data, ant. unavailable data |
4. alias |
nick, pseudonym, ant. real name |
5. background |
ant. foreground |
II. Word family. Fill in the missing words of the same root where possible:
noun |
verb |
adjective |
adverb |
access |
- |
accessible |
- |
adaptation/ adapter |
to adapt |
adaptable/ adaptive |
- |
alternation |
to alternate |
alternate |
alternatively |
authentication |
to authenticate |
authenticated |
- |
availability |
to avail |
available |
- |
III. Make up phrases by matching the words in the left column with those in the right:
1. to certify B |
A. code |
2. alternate C |
B. access |
3. auxiliary E |
C. route |
4. bar A |
D. name |
5. account D |
E. memory |
IV. Fill the web diagram with the words that can be used with the given word:
ACCESS - to certify, to restrict, to deny, to permit, to obtain, authorized, channel, data, direct, fast, information, network, one-touch, random access.
VI. Do a mini-research and classify the types of memory:
AROM, auxiliary memory, available memory, buffer memory, RAM, ROM, etc.
VII. Match the given terms with their definitions:
1. bar code C |
A. a function to level/straighten the text |
2. available data E |
B. an alternative name, nick |
3. alignment A |
C. a line coding given to products to encrypt information about them |
4. alias B |
D. a program which adds additional features to the main program |
5. accessory D |
E. information which a user can access |
VIII. State the type of logical relations between the following words:
Example |
Type of logical relations |
1. to deny access - to permit access C |
A. general and specific |
2. device - auxiliary device A |
B. cause and effect |
3. backup copy - available data B |
C. contrast |
4. account – account name E |
D. method and purpose |
5. identification – bar code D |
E. part and whole |
IX. Say what can be:
1. adapted |
program, any equipment, bus, channels, colors, communication line, disk |
2. amplified |
memory, signal, sound, buffer, electric current (power), driver |
3. allocated |
memory, disk capacity, channels, recourses, processor, space, storage, time |
4. assembled |
computer, any equipment, packets |
5. authenticated |
data, password, response, message, signature |
X. Say what the following is used for:
1. account name |
to identify the user |
2. alignment |
to level, straighten the text/picture |
3. auxiliary memory |
to store auxiliary programs/data |
4. backup copy |
not to lose the file/data |
5. alias |
to enter programs, to use data |