Архитектура Аудит Военная наука Иностранные языки Медицина Металлургия Метрология Образование Политология Производство Психология Стандартизация Технологии |
Is done not to distort an image by changing its size. ⇐ ПредыдущаяСтр 3 из 3
a) Scale b) Scaling c) Scale-up d) Scale-down
TM Training Test 141-160
1. A digitised copy is referred to as a ________ copy. a) hard b) soft c) master d) original 2. Target language is the same as _______ language. a) object b) programming c) native d) input 3. Mark the odd word: a) set b) kit c) setup d) group 4. A program distributed in violation of the copyright law is called _______ software. a) licensed b) bootlegged c) copyrighted d) packaged 5. One cannot hijack a _______. a) session b) plane c) time d) taxi 6. A template is a(n) _______ copy. a) hard b) soft c) back-up d) master 7. Mark the odd phrase: a) pirated software b) bootlegged software c) copyrighted software d) buggy software 8. A combination of keys for quick work is called a _______. a) shortcut b) shut down c) parameters d) keyboard 9. Completion of the computer work is referred to as a(n) _______. a) shortcut b) shut down c) parameters d) keyboard Is gratis software. a) Freeware b) Shareware c) Adware d) Malware 11. Which software is limited in time span: a) freeware b) shareware c) adware d) malware 12. Exact measurements or detailed technical requirements are called _______. a) specifics b) specifications c) specimens d) species 13. Mark the odd word: a) shut down b) finish c) terminate d) start 14. An electronic form of a document is called a _____ copy. a) soft b) back-up c) master d) hard 15. Kazakhtelecom is the largest service _______ in Kazakhstan. a) provided b) provider c) provision d) provide 16. A vendor _______ software. a) sells b) programs c) maintains d) operates Are the parameters set. a) Settings b) Setting c) Set-up d) Setdown Is the way in which smth is arranged or organized. a) Settings b) Setting c) Set-up d) Setdown 19. Session _______ is used for identifying network users. a) layer b) log c) protocol d) hijacking 20. A soft error is _______. a) recoverable b) irrecoverable c) corrected d) unrecovered 21. Session timeout concerns its _______. a) starting time b) time limit c) duration d) frequency 22. A piece of computer equipment used for putting info into a computer is called a/n _______. a) shortcut b) shut down c) parameters d) keyboard
TM Training Test 161-180
1. To______ means to work at home using computer connection with the office. a) commute b) commit c) commutation d) telecommute 2. Which of these is done to work at home: a) troubleshooting b) telecommuting c) upgrading d) tuning 3. Which of these is done to customize developers’ environment according to their requirements: a) troubleshooting b) telecommuting c) upgrading d) tuning 4. What is the logical relationship between “to work” and “to telecommute”: a) general and specific b) equivalence c) part and whole d) contrast 5. What is the logical relationship between “to terminate” and “to start” a) general and specific b) equivalence c) part and whole d) contrast 6. What is the logical relationship between “transceiver” and “transmitter” a) general and specific b) equivalence c) part and whole d) contrast 7. “Template” is synonymous to a ________. a) tool b) device c) gadget d) sample 8. The amount of traffic a system can service per unit of time is referred to as its _______ capacity. a) output b) input c) throughput d) put 9. Find the odd word: a) transfer b) transmit c) transcript d) move 10. All of these are nouns EXCEPT FOR: a) terminal b) terminator c) terminate d) termination 11. Which of these goes best with the noun “trial”: a) face b) bar c) period d) transaction 12. To tune means to _______. a) fit b) put c) place d) insert 13. Which of these is done to prevent runtime errors: a) troubleshooting b) telecommuting c) upgrading d) tuning 14. What is the logical relationship between “Tracking” and “monitoring”: a) general and specific b) equivalence c) part and whole d) contrast 15. An electronic device used for inputting and outputting data is called a _______. a) terminate b) terminator c) terminal d) termination 16. All of these go with the word “trial” EXCEPT FOR: a) period b) software c) licence d) trail 17. “Trail” is synonymous to all of these EXCEPT FOR: a) track b) trace c) transmit d) leftover 18. A set of things is referred to as a/n _______. a) block b) kit c) kite d) kitt 19. All of these can be used with the word “kit” EXCEPT FOR: a) upgrade b) tool c) repair d) block
TM Training Test 181-200
1. Which of these is done to increase capacity: a) troubleshooting b) telecommuting c) upgrading d) tuning 2. An experienced, skilled user is called a/n _______ user. a) powerful b) power c) end d) network 3. When you want somebody to do something very urgently, you write _______. a) CUL8R b) ASAP c) PTO d) PS 4. At the end of an sms message you are likely to write _______. a) CUL8R b) ASAP c) PTO d) PS 5. Volatile memory depends on _______. a) storage capacity b) volume c) power supply d) speed 6. A user for whom smth is meant is called a/n _______ user. a) powerful b) power c) end d) network 7. “Volatile” is synonymous to _______. a) changeable b) visible c) stable d) valid 8. A virtual mall is used to _______. a) prevent harm from viruses b) order goods via Internet c) answer voice mailbox without addressee d) sort out how to use a program 9. A virus detection system is used to _______. a) prevent harm from viruses b) order goods via Internet c) answer voice mailbox without addressee d) sort out how to use a program 10. A voice mail is used to _______. a) prevent harm from viruses b) order goods via Internet c) answer voice mailbox without addressee d) sort out how to use a program 11. A user manual is used to _______. a) prevent harm from viruses b) order goods via Internet c) answer voice mailbox without addressee d) sort out how to use a device 12. Antonym to “valid” is _______. a) non-valid b) unvalid c) invalid d) validated 13. To _______ is to show that smth is reasonable or logistic. a) validate b) verify c) certify d) prove |
Последнее изменение этой страницы: 2019-04-19; Просмотров: 172; Нарушение авторского права страницы