Архитектура Аудит Военная наука Иностранные языки Медицина Металлургия Метрология
Образование Политология Производство Психология Стандартизация Технологии


Which of these nouns DOES NOT exist:



a) linkor b) link  c) linkage d) linker

4. To put data or a program into a memory of a computer again means to _____ load it.

a) un b) re c) up d) down

5. What is the logical relationship between "junk mail" and "spam":

a) general and specific b) cause and effect c) equivalence d) contrast

6. What is the logical relationship between "input" and "processing":

a) cause and effect b) equivalence c) general and specific d) contrast

7. E-mail is antonymous to _____ mail.

a) snail b) office c) voice d) direct

8. The word "message" goes best with _____ .

a) copy b) password c) delivery d) guide 

9. An image can NOT be________ .                                                 a) distorted b) guided c) monitored d) loaded

10. Laptops, notebooks and palmtops differ mostly in ____. a) capacity b) scale c) size d) length

11. You place your mouse on a mouse _______.

a) click b) pad c) port d) driver

12. What is the logical relationship between “computer” and “mouse”:

a) general and specific b) part and whole c) contrast d) equivalence

13. A mouse is connected to a computer through a mouse _______.

a) pad b) port c) driver d) cursor

14. We _____ data through keys.

a) input b) output c) throughput d) put

15. Logging in is closest in meaning to logging ___.           a) off b) on c) up d) out

16. An original sample from which copies are made is called a _______ copy.

a) soft b) hard c) master d) back-up

17. What is the logical relationship between "monitor" and "computer":

a) cause and effect b) equivalence c) part and whole d) general and specific

18. All of these can be input EXCEPT FOR:                                  a) user b) data c) error d) channel

19. The word "host" is synonymous to all of these EXCEPT FOR:

a) main b) TV program conductor c) chief d) minor

20. To take smth (disk or tape) off a computer means to ___ load it.

a) un b) re c) up d) down

21. To copy or move data into a computer memory, esp from a larger computer means to ___ load it.                                                a) un b) re c) up d) down

22. To copy a program or information into a main system means to ___ load it.

a) un b) re c) up d) down

23. All of these can be uploaded EXCEPT FOR:

a) data b) processor c) files d) games

 

 

 

 

TM Training Test 101-120

 

1. Rules of behavior on the Internet are referred to as _______.

a) netizen b) netspeak c) netiquette d) network

2. A person actively involved in online communities is referred to as (a) _______.

a) netizen b) netspeak c) netiquette d) network

3. A type of slang that Internet users have popularized, and in many cases, have coined may be referred to as _______.

a) netizen b) netspeak c) netiquette  d) network

4. A _______ is a device attached to a host computer to expand its capabilities.

a) periphery b) peripheral c) reflector d) reference

5. A list of the programs expecting their execution is called a _______.

a) query b) key c) queu d) queue

6. A _______ is a request to provide information.

a) query b) key c) queu d) queue

7. All of these go with the word “password” EXCEPT FOR:

a) identify b) protect c) change d) connect

8. A plug ___ is a set of software components that adds specific capabilities to a larger software application.               a) in b) on c) out d) at

9. A/n _______ printer acts like a typewriter.

a) jet b) impact c) non-impact d) laser

10. A/n _______ error is the one which cannot be corrected.

a) recoverable b) irrecoverable c) unrecoverable d) non-recoverable

11. A _______ is a device which is not located on the motherboard.

a) peripheral b) peripherial c) reflector d) reference

12. “To insert" is synonymous to _______.

a) cut b) paste c) place d) pace

13. “A waiting line” is also called a _______.

a) query b) key c) queu d) queue

14. An aged password is _______.                                                     a) valid b) invalid c) non-valid d) unvalid

15. What is the logical relationship between “power supply” and “power consumption”:

a) general and specific b) part and whole c) contrast d) equivalence

16. What is the logical relationship between “printer” and “impact printer”:

a) general and specific b) part and whole c) contrast d) equivalence

17. Network ______ occurs when a link or node is carrying so much data that its quality of service goes down.

a) connection b) traffic c) congestion d) access

18. What is the logical relationship between “impact printer” and “dot matrix printer”:

a) general and specific b) part and whole c) contrast d) equivalence

19. A mouse is a/n _______ storage device.

a) online b) offline c) line d) line-up

20. A printout is a _______ copy.

a) hard b) soft c) master d) original

21. A group of computers and devices interconnected by communication channels that allows users to share resources is referred to as _______.

a) netizen b) netspeak c) netiquette  d) network

 

 

 

 

TM Training Test 121-140

 

1. What is the logical relationship between “periphery” and “scanner”:

a) part and whole b) cause and effect c) contrast d) general and specific

2. What is the logical relationship between “restricted information” and “security”:

a) part and whole b) cause and effect c) contrast d) general and specific

3. What is the logical relationship between “press a button” and “release a button”:

a) part and whole b) cause and effect c) contrast d) general and specific

4. What is the logical relationship between “remove” and “replace”:

a) part and whole b) cause and effect c) contrast d) equivalence

5. You cannot replace this file ____ another one.

a) with b) for c) at d) on

6. All of these prepositions can follow the verb “scale” EXCEPT FOR:

a) up b) down c) back d) on

7. A _______ is used for sending information to another place.

a) route b) root c) rout d) rote

8. “Remote” is antonymous to:

a) far away b) close c) distant d) preceding

Mark the odd word:

a) security b) safety c) defense d) protect

10. The beta version of the program was due for _______ at the end of 1990.

a) regain b) retake c) release d) remove

11. All of these can be remote EXCEPT FOR:

a) release b) DVD c) boot d) control

12. Antonym to “replaceable” is _______.

a) unreplaceable b) inreplaceable c) irreplaceable d) desreplaceable

13. These options should be used _______.

a) selected b) selective c) selectively d) selection

14. All of these can be released EXCEPT FOR:

a) button b) menu c) software d) bulletin

15. Root directory _______.

a) has a catalogue of roots      b) shows directions to some place  c) contains all other directories in a system of organizing information  d) is a place where smth in stored

16. They reside along this _______.

a) route b) root c) rout   d) rote


Поделиться:



Последнее изменение этой страницы: 2019-04-19; Просмотров: 182; Нарушение авторского права страницы


lektsia.com 2007 - 2024 год. Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав! (0.023 с.)
Главная | Случайная страница | Обратная связь