![]() |
Архитектура Аудит Военная наука Иностранные языки Медицина Металлургия Метрология Образование Политология Производство Психология Стандартизация Технологии |
Which of these is NOT an adjective from the verb “adapt”:Стр 1 из 3Следующая ⇒
TM Training Test 1-20
1. What is the logical relationship between “device” and “auxiliary device”: a) cause and effect b) general and specific c) contrast d) part and whole 2. To place or arrange things in a straight line means to________ it. a) amplify b) align c) attach d) adapt 3. To make sth suitable for a new use or situation means to________ it. a) amplify b) align c) attach d) adapt 4. What is the logical relationship between “backup copy” and “available data”: a) cause and effect b) general and specific c) contrast d) part and whole 5. To fasten or join sth to sth means to ______ it. a) amplify b) align c) attach d) adapt 6. Antonym for “deny” is ______. a) authenticate b) reject c) permit d) restrict 7. Which of these is used to identify the user: a) account name b) alignment c) auxiliary memory d) backup copy 8. A program which adds additional features to the main program is a/n ________. a) bar code b) alignment c) alias d) accessory 9. An alternative name, nick is a/n ________. a) bar code b) alignment c) alias d) accessory 10. To ________access means to reject sb’s right to enter sth or approach sth. a) restrict b) deny c) permit d) certify 11. To increase in strength or intensity means to_______. a) amplify b) align c) attach d) adapt 12. To confirm sb’s right to enter sth or approach sth means to_____ access. a) certify b) deny c) restrict d) allow 13. The appropriate adjective for the noun “access” is _______. a) accessive b) accessable c) accessible d) accessory 14. A function to level/straighten the text is a/an ________. a) alignment b) alias c) bar code d) accessory 15. Which verb goes with such nouns as memory, disk capacity, channels, recourses, processor, space, storage, time. a) assemble b) authenticate c) allocate d) amplify Which of these is NOT an adjective from the verb “adapt”: a) adaptive b) adaptable c) adaptible d) adapted 17. All of these go with the verb “align” EXCEPT FOR: a) font b) center c) left d) height 18. Array means: a) an impressive display or series b) clothes c) a type of data structure that has multiple values d) all of the above 19. Which verb goes with such nouns as data, password, response, message, signature a) assemble b) authenticate c) allocate d) amplify 20. An alternative name, nick is a/n________ a) bar code b) alignment c) alias d) accessory 21. Modify is closest to ________ a) attach b) authenticate c) certify d) adapt 22. A line coding given to products to encrypt information about them is a/n________. a) accessory b) alignment c) alias d) bar code 23. What is the logical relationship between “identification” and “bar code”: a) method and purpose b) cause and effect c) general and specific d) part and whole 24. Which of these is used not to lose the file/data: a) account name b) alignment c) auxiliary memory d) backup copy 25. “Alternate” means: a) happening or following one after another; b) one of every two c) that can be used instead of another d) all of the above Which verb goes with such nouns as computer, any equipment, packets. a) assemble b) authenticate c) allocate d) amplify 27. The letter "A" in the abbreviation "AROM" stands for: a) alternate b) alterable c) alternative d) alternated 28. Which of these can be authenticated: a) password b) command c) computer d) folder
TM Training Test 21-40
1. The ___disc is unformatted, contains no recorded data: a) boot b) blank c) compact d) optical 2. All of these go with the word "boot" EXCEPT for: a) drive b) disc c) byte d) sector 3. A method of working out a program from modules to result is called ________. a) top down b) bottom-up c) inverse d) reverse 4. The unit of information measurement is called a______. a) bug b) byte c) buffer d) batch 5. A method when you first make a frame and then fill it with parts of the program is called ________ programming. a) top down b) bottom-up c) inverse d) reverse 6. "Error, defect, breakage" may be collectively referred to as a ______. a) bug b) byte c) buffer d) batch 7. A place where the copied or cut information is temporarily stored is called _______. a) bug b) byte c) buffer d) batch 8. A device that doesn’t work because of defects or spoilage is called ______ hardware. a) bug b) bugged c) buggy d) bugger 9. The letter "R" in the abbreviation "CD-R" stands for: a) read-only b) readable c) rewritable d) recordable 10. When you get smb’s data, information, programs, money illegally, you break ______. a) out b) in c) down d) off 11. When you stop doing sth, especially speaking, you break ______. a) out b) in c) down d) off 12. A system of encoding information with the help of Os and Is is called ________. a) binary code b) top down programming c) bottom-up programming d) digital programming TM Training Test 41-60
1. To use the commonly used options without tuning you need a _____. a) device adapter b) default option c) data retrieval d) DVD 2. Find the odd word: a) mistake b) error c) default d) bug 3. This software is not compatible _____ my OS. a) in b) to c) with d) for 4. Which of these goes with the noun "copyright": a) law b) mode c) key d) option 5. What is the logical relationship between "mode – display mode": a) general and specific b) equivalence c) contrast d) part and whole 6. Which of these goes with the noun "cursor": a) law b) mode c) key d) option 7. Which of these means "to tune, set for the user’s needs": a) customize b) customer c) custom d) customized 8. A parameter which is pre-installed and not specially set is called default ______. a) option b) command c) key d) choice 9. What is the logical relationship between "word – character": a) general and specific b) part and whole c) equivalence d) contrast 10. What is the logical relationship between "to compute – to calculate": a) part and whole b) general and specific c) contrast d) equivalence 11. What is the logical relationship between "copyright – copyleft": a) part and whole b) general and specific c) contrast d) equivalence TM Training Test 61-80
1. What is the logical relationship between "to expand – to extend": a) general and specific b) part and whole c) cause and effect d) equivalence 2. What is the logical relationship between "downtime – uptime": a) general and specific b) part and whole c) cause and effect d) contrast 3. What is the logical relationship between "error detection – error correction": a) general and specific b) part and whole c) cause and effect d) equivalence 4. What is the logical relationship between "handling – file handling": a) general and specific b) part and whole c) cause and effect d) equivalence 5. Which of these goes with the word "domain": a) name b) bar c) log d) handle 6. Which of these goes with the word "error": a) name b) bar c) log d) handle 7. Which of these goes with the word "format": a) name b) bar c) log d) handle 8. All of these can be dropped EXCEPT FOR: a) contrast b) program c) digits d) bit 9. To take away a program from memory is synonymous to all of these EXCEPT FOR: a) to enhance b) to delete c) to erase d) to drop 10. All of these are antonymous to the verb "restore" EXCEPT FOR: a) to delete b) to destroy c) to enlarge d) to erase 11. Which of these is NOT a noun: a) edit b) editor c) edition d) editorial 12. Mark the odd word: a) expansion b) extension c) extend d) extendable 13. Which of these is done to get rid of unnecessary/outdated data: a) handling b) erasing c) formatting d) editing 14. Which of these is done to correct mistakes: a) handling b) erasing c) formatting d) editing 15. Something subject to errors is known to be error-_______ . a) prone b) free c) log d) detection 16. A document copy printed out on paper from a computer is called a ______ copy. a) back-up b) master c) soft d) hard 17. A computer program that may be distributed and used without payment is called _______. a) spyware b) freeware c) malware d) shareware 18. Choose the correct suffix: An eras____ disc allows data to be deleted and new data to be recorded on it. a) –ful b) –ible c) –er d) –able 19. The time of the work of the system is called ___ time. a) up b) down c) offwork d) free 20. The time during which the system is out of order is called ____ time. a) up b) down c) offwork d) free 21. Mark the odd word: a) freeware b) shareware c) software d) hardware TM Training Test 81-100
1. The noun "input" is synonymous to all of these EXCEPT FOR: a) contribution b) participation c) distribution d) addition 2. The adjective "invalid" is antonymous to all of these EXCEPT FOR: a) efficient b) true c) acceptable d) expired TM Training Test 101-120
1. Rules of behavior on the Internet are referred to as _______. a) netizen b) netspeak c) netiquette d) network 2. A person actively involved in online communities is referred to as (a) _______. a) netizen b) netspeak c) netiquette d) network 3. A type of slang that Internet users have popularized, and in many cases, have coined may be referred to as _______. a) netizen b) netspeak c) netiquette d) network 4. A _______ is a device attached to a host computer to expand its capabilities. a) periphery b) peripheral c) reflector d) reference 5. A list of the programs expecting their execution is called a _______. a) query b) key c) queu d) queue 6. A _______ is a request to provide information. a) query b) key c) queu d) queue 7. All of these go with the word “password” EXCEPT FOR: a) identify b) protect c) change d) connect 8. A plug ___ is a set of software components that adds specific capabilities to a larger software application. a) in b) on c) out d) at 9. A/n _______ printer acts like a typewriter. a) jet b) impact c) non-impact d) laser 10. A/n _______ error is the one which cannot be corrected. a) recoverable b) irrecoverable c) unrecoverable d) non-recoverable 11. A _______ is a device which is not located on the motherboard. a) peripheral b) peripherial c) reflector d) reference 12. “To insert" is synonymous to _______. a) cut b) paste c) place d) pace 13. “A waiting line” is also called a _______. a) query b) key c) queu d) queue 14. An aged password is _______. a) valid b) invalid c) non-valid d) unvalid 15. What is the logical relationship between “power supply” and “power consumption”: a) general and specific b) part and whole c) contrast d) equivalence 16. What is the logical relationship between “printer” and “impact printer”: a) general and specific b) part and whole c) contrast d) equivalence 17. Network ______ occurs when a link or node is carrying so much data that its quality of service goes down. a) connection b) traffic c) congestion d) access 18. What is the logical relationship between “impact printer” and “dot matrix printer”: a) general and specific b) part and whole c) contrast d) equivalence 19. A mouse is a/n _______ storage device. a) online b) offline c) line d) line-up 20. A printout is a _______ copy. a) hard b) soft c) master d) original 21. A group of computers and devices interconnected by communication channels that allows users to share resources is referred to as _______. a) netizen b) netspeak c) netiquette d) network
TM Training Test 121-140
1. What is the logical relationship between “periphery” and “scanner”: a) part and whole b) cause and effect c) contrast d) general and specific 2. What is the logical relationship between “restricted information” and “security”: a) part and whole b) cause and effect c) contrast d) general and specific 3. What is the logical relationship between “press a button” and “release a button”: a) part and whole b) cause and effect c) contrast d) general and specific 4. What is the logical relationship between “remove” and “replace”: a) part and whole b) cause and effect c) contrast d) equivalence 5. You cannot replace this file ____ another one. a) with b) for c) at d) on 6. All of these prepositions can follow the verb “scale” EXCEPT FOR: a) up b) down c) back d) on 7. A _______ is used for sending information to another place. a) route b) root c) rout d) rote 8. “Remote” is antonymous to: a) far away b) close c) distant d) preceding Mark the odd word: a) security b) safety c) defense d) protect 10. The beta version of the program was due for _______ at the end of 1990. a) regain b) retake c) release d) remove 11. All of these can be remote EXCEPT FOR: a) release b) DVD c) boot d) control 12. Antonym to “replaceable” is _______. a) unreplaceable b) inreplaceable c) irreplaceable d) desreplaceable 13. These options should be used _______. a) selected b) selective c) selectively d) selection 14. All of these can be released EXCEPT FOR: a) button b) menu c) software d) bulletin 15. Root directory _______. a) has a catalogue of roots b) shows directions to some place c) contains all other directories in a system of organizing information d) is a place where smth in stored 16. They reside along this _______. a) route b) root c) rout d) rote TM Training Test 141-160
1. A digitised copy is referred to as a ________ copy. a) hard b) soft c) master d) original 2. Target language is the same as _______ language. a) object b) programming c) native d) input 3. Mark the odd word: a) set b) kit c) setup d) group 4. A program distributed in violation of the copyright law is called _______ software. a) licensed b) bootlegged c) copyrighted d) packaged 5. One cannot hijack a _______. a) session b) plane c) time d) taxi 6. A template is a(n) _______ copy. a) hard b) soft c) back-up d) master 7. Mark the odd phrase: a) pirated software b) bootlegged software c) copyrighted software d) buggy software 8. A combination of keys for quick work is called a _______. a) shortcut b) shut down c) parameters d) keyboard 9. Completion of the computer work is referred to as a(n) _______. a) shortcut b) shut down c) parameters d) keyboard Is gratis software. a) Freeware b) Shareware c) Adware d) Malware 11. Which software is limited in time span: a) freeware b) shareware c) adware d) malware 12. Exact measurements or detailed technical requirements are called _______. a) specifics b) specifications c) specimens d) species 13. Mark the odd word: a) shut down b) finish c) terminate d) start 14. An electronic form of a document is called a _____ copy. a) soft b) back-up c) master d) hard 15. Kazakhtelecom is the largest service _______ in Kazakhstan. a) provided b) provider c) provision d) provide 16. A vendor _______ software. a) sells b) programs c) maintains d) operates Are the parameters set. a) Settings b) Setting c) Set-up d) Setdown TM Training Test 161-180
1. To______ means to work at home using computer connection with the office. a) commute b) commit c) commutation d) telecommute 2. Which of these is done to work at home: a) troubleshooting b) telecommuting c) upgrading d) tuning 3. Which of these is done to customize developers’ environment according to their requirements: a) troubleshooting b) telecommuting c) upgrading d) tuning 4. What is the logical relationship between “to work” and “to telecommute”: a) general and specific b) equivalence c) part and whole d) contrast 5. What is the logical relationship between “to terminate” and “to start” a) general and specific b) equivalence c) part and whole d) contrast 6. What is the logical relationship between “transceiver” and “transmitter” a) general and specific b) equivalence c) part and whole d) contrast 7. “Template” is synonymous to a ________. a) tool b) device c) gadget d) sample 8. The amount of traffic a system can service per unit of time is referred to as its _______ capacity. a) output b) input c) throughput d) put 9. Find the odd word: a) transfer b) transmit c) transcript d) move 10. All of these are nouns EXCEPT FOR: a) terminal b) terminator c) terminate d) termination 11. Which of these goes best with the noun “trial”: a) face b) bar c) period d) transaction 12. To tune means to _______. a) fit b) put c) place d) insert 13. Which of these is done to prevent runtime errors: a) troubleshooting b) telecommuting c) upgrading d) tuning 14. What is the logical relationship between “Tracking” and “monitoring”: a) general and specific b) equivalence c) part and whole d) contrast 15. An electronic device used for inputting and outputting data is called a _______. a) terminate b) terminator c) terminal d) termination 16. All of these go with the word “trial” EXCEPT FOR: a) period b) software c) licence d) trail 17. “Trail” is synonymous to all of these EXCEPT FOR: a) track b) trace c) transmit d) leftover 18. A set of things is referred to as a/n _______. a) block b) kit c) kite d) kitt 19. All of these can be used with the word “kit” EXCEPT FOR: a) upgrade b) tool c) repair d) block
TM Training Test 181-200
1. Which of these is done to increase capacity: a) troubleshooting b) telecommuting c) upgrading d) tuning 2. An experienced, skilled user is called a/n _______ user. a) powerful b) power c) end d) network 3. When you want somebody to do something very urgently, you write _______. a) CUL8R b) ASAP c) PTO d) PS 4. At the end of an sms message you are likely to write _______. a) CUL8R b) ASAP c) PTO d) PS 5. Volatile memory depends on _______. a) storage capacity b) volume c) power supply d) speed 6. A user for whom smth is meant is called a/n _______ user. a) powerful b) power c) end d) network 7. “Volatile” is synonymous to _______. a) changeable b) visible c) stable d) valid 8. A virtual mall is used to _______. a) prevent harm from viruses b) order goods via Internet c) answer voice mailbox without addressee d) sort out how to use a program 9. A virus detection system is used to _______. a) prevent harm from viruses b) order goods via Internet c) answer voice mailbox without addressee d) sort out how to use a program 10. A voice mail is used to _______. a) prevent harm from viruses b) order goods via Internet c) answer voice mailbox without addressee d) sort out how to use a program 11. A user manual is used to _______. a) prevent harm from viruses b) order goods via Internet c) answer voice mailbox without addressee d) sort out how to use a device 12. Antonym to “valid” is _______. a) non-valid b) unvalid c) invalid d) validated 13. To _______ is to show that smth is reasonable or logistic. a) validate b) verify c) certify d) prove Is a transport facility. a) WWW b) URL c) The Internet d) http 16. A user-friendly device is ______ to use. a) hard b) easy c) sophisticated d) difficult 17. To _______ means to state officially that smth is true, accurate or of satisfactory standard. a) validate b) verify c) certify d) prove 18. The condition in which a computer at idle time consumes less electric power, but is available for immediate use is called a/n _______ mode. a) default b) wait c) operating d) command 19. A _______ is a one person computer that is more powerful and faster than most personal computers, and is typically used foe graphics, scientific computing. a) PC b) workstation c) laptop d) mainframe 20. “Wireless” is opposite to ________. a) wiry b) wired c) wireline d) wiring 21. HTML is decoded as _______. a) Hypertext Mark-up Language b)Hypertext Modern Language c) Hyperlink Mark-up Language d) Hypotext Mark-up Language
IT TM 1-20 |
IT TM 21-40 | |||||||||||||
1 b | 2b | 3d | 4a | 5c | 1b | 2c | 3b | 4b | 5a | |||||
6c | 7a | 8d | 9c | 10b | 6a | 7c | 8c | 9d | 10b | |||||
11a | 12a | 13c | 14a | 15d | 11d | 12a | 13c | 14a | 15c | |||||
16c | 17a | 18d | 19b | 20c | 16a | 17b | 18d | 19d | 20d | |||||
21d | 22d | 23a | 24d | 25d |
| |||||||||
26a | 27b | 28a |
| |||||||||||
| ||||||||||||||
IT TM 41-60 |
IT TM 61-80 | |||||||||||||
1b | 2c | 3c | 4a | 5a | 1d | 2d | 3c | 4a | 5a | |||||
6c | 7a | 8a | 9b | 10d | 6c | 7b | 8a | 9a | 10c | |||||
11c | 12c | 13a | 14c | 15a | 11a | 12a | 13b | 14d | 15a | |||||
16c | 17a | 18d | 19c | 20a | 16d | 17b | 18d | 19a | 20b | |||||
21d | 22a | |||||||||||||
| ||||||||||||||
IT TM 81-100 |
IT TM 101-120 | |||||||||||||
1c | 2d | 3a | 4b | 5c | 1c | 2a | 3b | 4b | 5d | |||||
6a | 7a | 8c | 9b | 10c | 6c | 7d | 8a | 9b | 10b | |||||
11b | 12b | 13b | 14a | 15b | 11a | 12b | 13d | 14b | 15c | |||||
16c | 17c | 18a | 19d | 20a | 16a | 17c | 18a | 19b | 20a | |||||
21d | 22c | 23b | 24 | 25 | 21d | 22 | 23 | 24 | 25 | |||||
| ||||||||||||||
IT TM 121-140 |
IT TM 141-160 | |||||||||||||
1d | 2b | 3c | 4d | 5a | 1b | 2a | 3c | 4b | 5c | |||||
6d | 7a | 8b | 9d | 10c | 6 d | 7d | 8a | 9b | 10a | |||||
11b | 12c | 13c | 14b | 15c | 11b | 12b | 13d | 14a | 15b | |||||
16a | 17b | 16a | 17a | 18c | 19b | 20a | ||||||||
21b | 22d | 23 | 24 | 25 | ||||||||||
| ||||||||||||||
IT TM 161-180 |
IT TM 181-200 | |||||||||||||
1d | 2b | 3d | 4a | 5d | 1c | 2b | 3b | 4a | 5c | |||||
6c | 7d | 8c | 9c | 10c | 6c | 7a | 8b | 9a | 10c | |||||
11c | 12a | 13a | 14b | 15c | 11d | 12c | 13a | 14a | 15c | |||||
16d | 17c | 18b | 19d | 16b | 17c | 18b | 19b | 20c | ||||||
21a | ||||||||||||||
TM Training Test 1-20
1. What is the logical relationship between “device” and “auxiliary device”:
a) cause and effect b) general and specific c) contrast d) part and whole
2. To place or arrange things in a straight line means to________ it.
a) amplify b) align c) attach d) adapt
3. To make sth suitable for a new use or situation means to________ it.
a) amplify b) align c) attach d) adapt
4. What is the logical relationship between “backup copy” and “available data”:
a) cause and effect b) general and specific c) contrast d) part and whole
5. To fasten or join sth to sth means to ______ it. a) amplify b) align c) attach d) adapt
6. Antonym for “deny” is ______.
a) authenticate b) reject c) permit d) restrict
7. Which of these is used to identify the user:
a) account name b) alignment c) auxiliary memory d) backup copy
8. A program which adds additional features to the main program is a/n ________.
a) bar code b) alignment c) alias d) accessory
9. An alternative name, nick is a/n ________.
a) bar code b) alignment c) alias d) accessory
10. To ________access means to reject sb’s right to enter sth or approach sth.
a) restrict b) deny c) permit d) certify
11. To increase in strength or intensity means to_______.
a) amplify b) align c) attach d) adapt
12. To confirm sb’s right to enter sth or approach sth means to_____ access.
a) certify b) deny c) restrict d) allow
13. The appropriate adjective for the noun “access” is _______.
a) accessive b) accessable c) accessible d) accessory
14. A function to level/straighten the text is a/an ________.
a) alignment b) alias c) bar code d) accessory
15. Which verb goes with such nouns as memory, disk capacity, channels, recourses, processor, space, storage, time. a) assemble b) authenticate c) allocate d) amplify
Which of these is NOT an adjective from the verb “adapt”:
a) adaptive b) adaptable c) adaptible d) adapted
17. All of these go with the verb “align” EXCEPT FOR: a) font b) center c) left d) height
18. Array means: a) an impressive display or series b) clothes c) a type of data structure that has multiple values d) all of the above
19. Which verb goes with such nouns as data, password, response, message, signature
a) assemble b) authenticate c) allocate d) amplify
20. An alternative name, nick is a/n________ a) bar code b) alignment c) alias d) accessory
21. Modify is closest to ________ a) attach b) authenticate c) certify d) adapt
22. A line coding given to products to encrypt information about them is a/n________.
a) accessory b) alignment c) alias d) bar code
23. What is the logical relationship between “identification” and “bar code”:
a) method and purpose b) cause and effect c) general and specific d) part and whole
24. Which of these is used not to lose the file/data:
a) account name b) alignment c) auxiliary memory d) backup copy
25. “Alternate” means: a) happening or following one after another; b) one of every two c) that can be used instead of another d) all of the above
Последнее изменение этой страницы: 2019-04-19; Просмотров: 221; Нарушение авторского права страницы