Архитектура Аудит Военная наука Иностранные языки Медицина Металлургия Метрология
Образование Политология Производство Психология Стандартизация Технологии


Is done not to distort an image by changing its size.



a) Scale b) Scaling c) Scale-up d) Scale-down

 

TM Training Test 141-160

 

1. A digitised copy is referred to as a ________ copy.

a) hard b) soft c) master d) original

2. Target language is the same as _______ language.

a) object b) programming c) native d) input

3. Mark the odd word:

a) set b) kit c) setup d) group

4. A program distributed in violation of the copyright law is called _______ software.

a) licensed b) bootlegged c) copyrighted d) packaged

5. One cannot hijack a _______.

a) session b) plane c) time d) taxi

6. A template is a(n) _______ copy.

a) hard b) soft c) back-up d) master

7. Mark the odd phrase:

a) pirated software b) bootlegged software c) copyrighted software d) buggy software

8. A combination of keys for quick work is called a _______.

a) shortcut b) shut down c) parameters d) keyboard

9. Completion of the computer work is referred to as a(n) _______.

a) shortcut b) shut down c) parameters d) keyboard

Is gratis software.

a) Freeware b) Shareware c) Adware d) Malware

11. Which software is limited in time span:

a) freeware b) shareware c) adware d) malware

12. Exact measurements or detailed technical requirements are called _______.

a) specifics b) specifications c) specimens d) species

13. Mark the odd word:

a) shut down b) finish c) terminate d) start

14. An electronic form of a document is called a _____ copy.

a) soft b) back-up c) master d) hard            

15. Kazakhtelecom is the largest service _______ in Kazakhstan.

a) provided b) provider c) provision d) provide

16. A vendor _______ software.

a) sells b) programs c) maintains d) operates

Are the parameters set.

a) Settings b) Setting c) Set-up d) Setdown

Is the way in which smth is arranged or organized.

a) Settings b) Setting c) Set-up d) Setdown

19. Session _______ is used for identifying network users.

a) layer b) log c) protocol d) hijacking

20. A soft error is _______.

a) recoverable b) irrecoverable c) corrected d) unrecovered

21. Session timeout concerns its _______.

a) starting time b) time limit c) duration d) frequency

22. A piece of computer equipment used for putting info into a computer is called a/n _______.

a) shortcut b) shut down c) parameters d) keyboard

 

TM Training Test 161-180

 

1. To______ means to work at home using computer connection with the office.

a) commute b) commit c) commutation d) telecommute

2. Which of these is done to work at home:

a) troubleshooting b) telecommuting c) upgrading d) tuning

3. Which of these is done to customize developers’ environment according to their requirements:

a) troubleshooting b) telecommuting c) upgrading d) tuning

4. What is the logical relationship between “to work” and “to telecommute”:

a) general and specific b) equivalence c) part and whole d) contrast

5. What is the logical relationship between “to terminate” and “to start”

a) general and specific b) equivalence c) part and whole d) contrast

6. What is the logical relationship between “transceiver” and “transmitter”

a) general and specific b) equivalence c) part and whole d) contrast

7. “Template” is synonymous to a ________.

a) tool b) device c) gadget d) sample

8. The amount of traffic a system can service per unit of time is referred to as its _______ capacity.

a) output b) input c) throughput d) put

9. Find the odd word:                                                                                      a) transfer b) transmit c) transcript d) move

10. All of these are nouns EXCEPT FOR:

a) terminal b) terminator c) terminate d) termination

11. Which of these goes best with the noun “trial”:

a) face b) bar c) period d) transaction

12. To tune means to _______.

a) fit b) put c) place d) insert

13. Which of these is done to prevent runtime errors:

a) troubleshooting b) telecommuting c) upgrading d) tuning

14. What is the logical relationship between “Tracking” and “monitoring”:

a) general and specific b) equivalence c) part and whole d) contrast

15. An electronic device used for inputting and outputting data is called a _______.

a) terminate b) terminator c) terminal d) termination

16. All of these go with the word “trial” EXCEPT FOR:

a) period b) software c) licence d) trail

17. “Trail” is synonymous to all of these EXCEPT FOR:

a) track b) trace c) transmit d) leftover

18. A set of things is referred to as a/n _______.

a) block b) kit c) kite d) kitt

19. All of these can be used with the word “kit” EXCEPT FOR:

a) upgrade b) tool c) repair d) block

 

 

 

TM Training Test 181-200

 

1. Which of these is done to increase capacity:

a) troubleshooting b) telecommuting c) upgrading d) tuning

2. An experienced, skilled user is called a/n _______ user.

a) powerful b) power c) end d) network

3. When you want somebody to do something very urgently, you write _______.

a) CUL8R b) ASAP c) PTO d) PS

4. At the end of an sms message you are likely to write _______.

a) CUL8R b) ASAP c) PTO d) PS

5. Volatile memory depends on _______.

a) storage capacity b) volume c) power supply d) speed

6. A user for whom smth is meant is called a/n _______ user.

a) powerful b) power c) end d) network

7. “Volatile” is synonymous to _______.

a) changeable b) visible c) stable d) valid

8. A virtual mall is used to _______.

a) prevent harm from viruses                         b) order goods via Internet  

c) answer voice mailbox without addressee d) sort out how to use a program

9. A virus detection system is used to _______.

a) prevent harm from viruses                         b) order goods via Internet  

c) answer voice mailbox without addressee d) sort out how to use a program

10. A voice mail is used to _______.

a) prevent harm from viruses                         b) order goods via Internet  

c) answer voice mailbox without addressee d) sort out how to use a program

11. A user manual is used to _______.

a) prevent harm from viruses                         b) order goods via Internet  

c) answer voice mailbox without addressee d) sort out how to use a device

12. Antonym to “valid” is _______.

a) non-valid b) unvalid c) invalid d) validated

13. To _______ is to show that smth is reasonable or logistic.

a) validate b) verify c) certify d) prove


Поделиться:



Последнее изменение этой страницы: 2019-04-19; Просмотров: 172; Нарушение авторского права страницы


lektsia.com 2007 - 2024 год. Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав! (0.037 с.)
Главная | Случайная страница | Обратная связь