Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

C) netiquette

2. A person actively involved in online communities is referred to as (a) _______.

A) netizen

3. A type of slang that Internet users have popularized, and in many cases, have coined may be referred to as _______.

b) netspeak

4. A _______ is a device attached to a host computer to expand its capabilities.

B) peripheral

5. A list of the programs expecting their execution is called a _______.

D) queue

6. A _______ is a request to provide information.

A) query

7. All of these go with the word “password” EXCEPT FOR:

D) connect

8. A plug ___ is a set of software components that adds specific capabilities to a larger software application.

a) in

9. A/n _______ printer acts like a typewriter.

B) impact

10. A/n _______ error is the one which cannot be corrected.

B) irrecoverable

11. A _______ is a device which is not located on the motherboard.

A) peripheral

12. “To insert" is synonymous to _______.

b) paste

13. “A waiting line” is also called a _______.

D) queue

14. An aged password is _______.

b) invalid

15. What is the logical relationship between “power supply” and “power consumption”:

C) contrast

16. What is the logical relationship between “printer” and “impact printer”:

A) general and specific

17. Network ______ occurs when a link or node is carrying so much data that its quality of service goes down.

C) congestion

18. What is the logical relationship between “impact printer” and “dot matrix printer”:

A) general and specific

19. A mouse is a/n _______ storage device.

B) offline

20. A printout is a _______ copy.

A) hard

21. A group of computers and devices interconnected by communication channels that allows users to share resources is referred to as _______.

d) network

 

 


 

TM Training Test 121-140

1. What is the logical relationship between “periphery” and “scanner”:

D) general and specific

2. What is the logical relationship between “restricted information” and “security”:

B) cause and effect

3. What is the logical relationship between “press a button” and “release a button”:

C) contrast

4. What is the logical relationship between “remove” and “replace”:

D) equivalence

5. You cannot replace this file ____ another one.

A) with

6. All of these prepositions can follow the verb “scale” EXCEPT FOR:

B) on

7. A _______ is used for sending information to another place.

A) route

8. “Remote” is antonymous to:

B) close

9. Mark the odd word:

D) protect

10. The beta version of the program was due for _______ at the end of 1990.

C) release

11. All of these can be remote EXCEPT FOR:

B) relief

12. Antonym to “replaceable” is _______.

C) irreplaceable

13. These options should be used _______.

C) selectively

14. All of these can be released EXCEPT FOR:

B) menu

15. Root directory _______.

C) contains all other directories in a system of organizing information

16. They reside along this _______.

A) route

17. _______ is done not to distort an image by changing its size.

b) Scaling

TM Training Test 141-160

 

1. A digitised copy is referred to as a ________ copy.

B) soft

2. Target language is the same as _______ language.

A) object

3. Mark the odd word:

C) setup

4. A program distributed in violation of the copyright law is called _______ software.


Дата добавления: 2015-11-16; просмотров: 59 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
C) cause and effect| B) bootlegged

mybiblioteka.su - 2015-2024 год. (0.009 сек.)