|
2. A person actively involved in online communities is referred to as (a) _______.
A) netizen
3. A type of slang that Internet users have popularized, and in many cases, have coined may be referred to as _______.
b) netspeak
4. A _______ is a device attached to a host computer to expand its capabilities.
B) peripheral
5. A list of the programs expecting their execution is called a _______.
D) queue
6. A _______ is a request to provide information.
A) query
7. All of these go with the word “password” EXCEPT FOR:
D) connect
8. A plug ___ is a set of software components that adds specific capabilities to a larger software application.
a) in
9. A/n _______ printer acts like a typewriter.
B) impact
10. A/n _______ error is the one which cannot be corrected.
B) irrecoverable
11. A _______ is a device which is not located on the motherboard.
A) peripheral
12. “To insert" is synonymous to _______.
b) paste
13. “A waiting line” is also called a _______.
D) queue
14. An aged password is _______.
b) invalid
15. What is the logical relationship between “power supply” and “power consumption”:
C) contrast
16. What is the logical relationship between “printer” and “impact printer”:
A) general and specific
17. Network ______ occurs when a link or node is carrying so much data that its quality of service goes down.
C) congestion
18. What is the logical relationship between “impact printer” and “dot matrix printer”:
A) general and specific
19. A mouse is a/n _______ storage device.
B) offline
20. A printout is a _______ copy.
A) hard
21. A group of computers and devices interconnected by communication channels that allows users to share resources is referred to as _______.
d) network
TM Training Test 121-140
1. What is the logical relationship between “periphery” and “scanner”:
D) general and specific
2. What is the logical relationship between “restricted information” and “security”:
B) cause and effect
3. What is the logical relationship between “press a button” and “release a button”:
C) contrast
4. What is the logical relationship between “remove” and “replace”:
D) equivalence
5. You cannot replace this file ____ another one.
A) with
6. All of these prepositions can follow the verb “scale” EXCEPT FOR:
B) on
7. A _______ is used for sending information to another place.
A) route
8. “Remote” is antonymous to:
B) close
9. Mark the odd word:
D) protect
10. The beta version of the program was due for _______ at the end of 1990.
C) release
11. All of these can be remote EXCEPT FOR:
B) relief
12. Antonym to “replaceable” is _______.
C) irreplaceable
13. These options should be used _______.
C) selectively
14. All of these can be released EXCEPT FOR:
B) menu
15. Root directory _______.
C) contains all other directories in a system of organizing information
16. They reside along this _______.
A) route
17. _______ is done not to distort an image by changing its size.
b) Scaling
TM Training Test 141-160
1. A digitised copy is referred to as a ________ copy.
B) soft
2. Target language is the same as _______ language.
A) object
3. Mark the odd word:
C) setup
4. A program distributed in violation of the copyright law is called _______ software.
Дата добавления: 2015-11-16; просмотров: 59 | Нарушение авторских прав
<== предыдущая страница | | | следующая страница ==> |
C) cause and effect | | | B) bootlegged |