Minitest 1
Fill in the blanks with the correct words from Unit 1.
1.A superior c________ m___________ is special for Mac.
2.If you want to change a computer for your needs you should c________ it.
3.PCs have more powerful v____________ s_______________.
4.The most common PC operating system is created by a company named M_____________.
5.PCs work with a faster p___________ s___________.
6.Macs use operating system called ___ _____ _____.
7.W__________ is an operating system for PCs.
8.There are so many fonts used by the t__________ on this computer.
9.As they prefer the Windows OS they decided to buy a P__.
10.To improve the p_______ process install publishing software.
Minitest 2
Unscramble the words (1-10) and match them with their definitions (A-J)
1. einl ancdmom; 2. erfe weratfos necilse; 3. sutnodirtisbi xinul; 4. leramtin; 5. utbuntu; 6. loprotco pi/ptc; 7. sorvend; 8. acefierten;
9. pnoe fceifo; 10. epno cursoe.
A. a software that can be distributed with the same basic source code
B. a license that allows users to change and distribute programs
C. a collection of software for Linux
D. distribute products and software.
E. used to input command lines
F. has word processing and spreadsheet programs
G. Linux-based operating system
H. provides a way for a user to interact with a computer
I. a set of rules that determine how a computer connects to a network or the internet.
J. a word or a phrase that makes a computer perform an operation
Minitest 3.
Write a word that is similar in meaning to the underlined part .
1.The owner of the Dartmouth Enterprises didn`t want any small applications embedded in a webpage.
ap_l_ _ s
2.To streamline communication for the employees the head of the company included a shared file that can be used to spread information.
__ _c_ _o_i _ _u_l_t_n b_ _r
3.The product can work properly for a long time if it has high quality.
r _ _ _ a_ _ _ _ t _
4.A section containing any type of media used on a webpage, including images, animation and videos is really helpful for the clients.
m_ _ _ _ m_ _ _ _
5.We will convert all the images to a video format that is used to compress videos into smaller files.
_ _ _ G
6.A device that is used to play media such as videos and animations can be embedded in a webpage.
m_ _i _ _l _ _ _ r
7.The company keeps the employees up-to-date with new training requirements using a computer to train them .
_B_
8.They specialize in the use of a computer to design manufacturing facilities such as machines or buildings.
_ _ D
9.The head of the company required a helpful section with a list of common questions with the answers.
_ A _
10.All guidance will be done through the menus without a word, phrase or image that includes a hyperlink and can be used for navigation.
_n _ _ _ r
Minitest 4.
Fill in the blanks with the correct words and phrases from the word bank.
CPM, ad products , frequency capping, geo targeting, CPC, click-through rate,click tracking,above the fold, animated GIFs, hang
1.The banner doesn`t have a high ______________ .
2.Pricing named _____________ is a model wherein rates are charged according to how many people view the advertisement.
3.The use of _______ ________ prevents overexposure of the advertisements.
4.Any banner would look more attractive if its advertisements are created with the help of ___________ ____________.
5.If the price of an advertisement depends on how many clicks it receives the ______ tends to be expensive.
6.When the advertisement is located _______ ______ _______ it is visible without scrolling down after the page has loaded .
7.According to __________ ____________ studies animated GIF banner receives a larger number of clicks.
8.To avoid losing profits it is recommended to use __________ ___________ when showing ads in geographical areas where they are relevant.
9.A variety of advertising opportunities named ___ ____________ can be located on a website.
10.The majority of ads ___________ preventing a website from loading all the way
Minitest 5.
Match the beginnings and the endings of the sentences.
1. An integrated circuit could be bigger anyway | A. if the latency time on the machine were too long . |
2.The company employs new embedded system | B.If it worked at higher speeds linking computers together.
|
3. The oscilloscope is | C. for complete computer integrated manufacturing.
|
4.Encoder is a device | D.there are several devices attached to it. |
5. Automation system will increase production | E.machines are used to perform tasks without human assistance. |
6.The head of the company says that Ethernet network would be more effective
| F.that allows the hardware to work together. |
7.CAM is used as a program | G.a software problem that can lower production. |
8.The factory has low redundancy | H.a device that allows the user to view the electric voltage of a machine. |
9.A new processor might be needed | I.so it doesn`t replace machines quickly. |
10.Priority inversion is | J.that relays mechanical data to a network.
|
Minitest 6
Match the words with the definitions:
1. tour 6. dashboard
2. Basecamp 7. gallery
3. telecommute 8. toggle
4. web-based 9. message board
5. centralize 10. color coding
A. a display on a computer that shows commonly or recently used tiles and programs
B. a series of web pages that offer information about a product or site
C. to bring things from multiple places and make them available in one location
D. a program offered by the company 37 signals that organizes projects
and can be accessed by multiple users simultaneously
E. to work at a location away from a main office by using technology
F. it is available on the Internet instead of on a disk
G. an online application that displays and organizes messages from
users
H. the practice of labeling things with different colors in order to tell them
apart
I. a collection of icons or pictures that have been organized in a file or page
J. to move from one file or setting to another
Minitest 7.
Fill in the blanks with the correct words from Unit 7.
1.Viruses can i_______ so that they are impossible to delete.
2.As all viruses r________ themselves quickly, they infected multiple computers.
3.You l_____ _______ when you enter identification that allows you to use a computer first .
4.A program file that installs itself without permission is named v___________.
5.Nowadays a lot of h__________ illegally exploit computer hardware and software.
6.The manager of the company complains that the h______ has a very harmful virus attached to it..
7.Using a method named p__________ the hacker gained access to computers when the owners logged in.
8.The computer has got r_______ e________ in the operating system.
9.The o______ v_________ copies its code over and destroys the files of the original data.
10.Email i________ computers with viruses.
Minitest 8.
Match the words with the definitions:
1. legitimate 6.phishing
2. malware 7. pretexting
3. card scanning 8.pharming
4. Trojan horse 9.fraud
5. identity theft 10.spyware
A. any type of malicious, harmful software
B. a computer program that appears to be beneficial but is actually malicious
C. a process wherein thieves trick people into giving away their personal
information through email
D. the process of stealing another person's personal information and using
it for personal gain
and can be accessed by multiple users simultaneously
E. a type of computer program that gathers someone's personal information
without their knowledge
F. the practice of capturing the personal information stored on credit
cards, debit cards, or passports
G. a process wherein thieves reroute people to a fake website that appears to
be legitimate in order to trick them into giving away their personal information
H. a process wherein thieves trick people into giving away their personal
information over the phone.
I. an action that results in the loss of another person's property
J. anything that is considered to be legal
Minitest 9.
Write a word that is similar in meaning to the underlined part .
1.We will review a record of who has accessed a computer system and what actions they took.
a__ i _ _o_
2. Your browser should block an advertisement that suddenly appears in a new window in an Internet browser.
p_ _ u_
3. Employees who violate a set of rules that must be followed for the sake of security, will receive disciplinary action.
_r_ _ _ c _ _
4. The software supplier is releasing a piece of code that is used to fix a flaw in a computer program fixing all the errors.
p_ _ _ h
5. A flaw in a computer program has been traced by the IT department.
_ u _
6.The bug made an unwanted hidden way to get by security in computers and programs, sometimes intentionally created.
_ _ _ k _ _ _ r
7. The state of being safe from attack in the company has recent breach.
s_ _ _r_ _ _
8. You must keep a program that restricts access on a network to prevent attacks from hackers.
_ _ r_w_ _ _
9. A person or program that attempts to access a network or computer without permission is of a big danger for the computer`s operating system.
I _ _ _ _d_ _
10. They installed a type of trojan virus that tracks what keystrokes are entered into a computer and the iT department had to remove it.
_e _ _ _ g_ _ r
Minitest 10.
Unscramble the words (1-10) and match them with their definitions (A-J)
1.ewb eagp silansay ; 2.atenqaurin; 3.ryceb malicirn; 4. tian-siruv aftersow; 5. cubakp; 6. elfas itospesvi; 7. asfle vtisegena; 8. attced;
9. itktoro; 10. sivur vmalreo artsowef.
A. when anti-virus software incorrectly indicates that a clean file has
been infected with a computer virus.
B. a process wherein the security of a website is determined
in order to help computer users know whether or not the website is safe.
C. a person who uses computers and the Internet to commit crimes
such as identity theft and fraud.
D. something is to place it in complete isolation where it cannot access or infect
anything else.
E. when anti-virus software incorrectly indicates that an infected file
is clean.
F. to create a duplicate copy of data that is stored on a separate hard drive or computer
system to prevent the loss of the data.
G. searches a computer system for computer viruses.
H. to discover something .
I. . destroys computer viruses, removing them from
the files they have infected.
J. a type of computer virus that is created to gain total control over a computer
system by overwriting parts of its operating system.
Minitest 11.
Fill in the blanks with the correct words from Unit 11.
1. A system's ability to change size as needed in a given situation is named s_________.
2.If you need a service offered to specific users who have purchased it and is not
available publicly use p__________ c____________.
3. A service offered for any users on the Internet is p__________ c___________.
4.. A way of selling computer use as a metered service like water and electricity is called u______
c___________.
5.D_____________ will help to introduce new software into a group of hardware.
6.C_ _ is a system of computers on a network containi ng copies of data that nearby users can access.
7. A model for payment where customers pay according to how much they use a resource is p_______ a_ y_ _ g_ .
8.When users receive a computing operating system and related components over the Internet they use P_ _ _.
9.If it is necessary to receive applications over the Internet instead of buying and installing them you can use S_ _ _.
10.E_________ is a computer system's ability to gain or lose computer resources as a user sees fit. .
Minitest 12.
Fill in the blanks with the correct words and phrases from the word bank.
Implanted microchip,PACs,EHR,lab-on-a-chip,interoperability,bar coding,micro robotic tweezers,optic scanner,EMM,CDSS
1.______________ is a device that reads and records identification labels on medications. .
2.. A tiny device in a person's body that releases specific amounts of medicine is an _______ _____________.
3. A system in which doctors scan medicines and match them to patients is named __________ _____________.
4.Doctors use ___________ which is a system that captures and stores medical images from different sources. .
5._____________ is the ability to easily send or combine electronic health data from
one system into another. .
6.______________ is a computerized version of a patient's health record. .
7.This tiny device called ______________ holds cells and fluid that a doctor can analyze easily. .
8.These _____ ___________ _______________ allow a doctor to operate in extremely small or delicate areas .
9.. A system that helps doctors diagnose problems is called ______________ .
It also suggests treatment options.
10.____________ helps hospitals keep track of medications and medical supplies.
Minitest 13.
Fill in the blanks with the correct words from Unit 13.
1.You can create a personal website named b________ for friends and family to enjoy.
2.. We build and maintain the main directory of a file system named r_________ d_________.
3. We allow customers to use n_________ l________ to navigate and search your site.
4. We create customer whimsical a_______ G______ that add an interactive element to
Interface.
5.W___ p_______ is a webpage that displays information from several sources.
6. Communication between computers or networks is called I______________ .
7.P__ __ c_____________ is needed for upholding certain security standards when
accepting credit cards.
8.. A t_________ l___________ shows that information is safe on a page.
9.. A(n) i_______ f____________ prevents people from sending malicious
software to you.
10.. Our site shows up when people search the k_____ w _____
"hardware ".
Minitest 14.
Choose the correct answers.
1.The candidate for the administrator of the computer system must have a degree in a ………
field.
A) technical B) science C) chemical
2.He will have to delete files or data from a computer which is called to ……….
A) to lose B) install C) purge
3.Candidates must also have experience working with a computer operating system named …….
A) Linux B) Unix C) Windows
4. To modify or arrange something you should ……….. it.
A) delete B) configure C) set up
5. Identifying and fixing technical problems is ………..
A) configuring B) purging C) troubleshooting
6.Interested applicants must send a ……………. that explains why a person wants
and is qualified for, a job.
A) message B) email C) cover letter
7. …………….. is organizing computer files in an orderly way.
A) identifying B) file archiving C)maintaining
8. A person who manages a computer system is …………..
A) system administrator B) system manager C) system director
9. To …………. is named to get the new software and add it to the system.
A) configure B) install C) delete
10. With some ………………………………… our network would be faster.
A)performance tuning B) troubleshooting C) file archiving
Minitest 15.
Mark the following statements as true (T) or false (F). Correct the wrong statements.
1. A GUI (graphical user interface) is how a user interacts with a computer using images and text.
2. If something is back end, it occurs in the middle of a project or job.
3. A component is a part of something bigger.
4. A script is a small part of commands to be carried out automatically.
5. An editor is a program that is used to create and change files.
6. If something is user-friendly, it is easy to access and use.
7. If something is interactive , it will respond to a user's commands.
8. A web developer is an operating system that builds a website.
9. XML (extensive markup language) is a programming language that is used to encode web pages.
10. HTML (hypertext markup language) is a way to delete a text on web
Keys .
Тест 1 :1.color matching;2.customize;3.video subsystems;4.Microsoft;5.processing speed;6. OS X ;7.Windows;8.typography;9.PC ; 10.prepress.
Тест 2: 1. command line - J; 2. free software license - B; 3. Linux distributions - C; 4. terminal- E; 5. Ubuntu- G; 6. IP/TCP protocol- I; 7. vendors - D; 8. interface- H; 9. Open office - F; 10. open source- A.
Тест 3:1.applets;2.electronic bulletin board;3.reliability;4.multimedia;5.MPEG;6.media player;7.CBT;8.CAD;9.FAQ;10.anchor.
Тест 4:1.click-through rate;2.CPM;3.frequency capping;4.animated GIFs;5.CPC;6. above the fold;7.click tracking;8.geo targeting;9.ad products ; 10.hang.
Тест 5: 1-D, 2-F, 3-H, 4-J, 5-E, 6-B, 7-C, 8-I, 9-A, 10-G.
Тест 6: 1-B, 2-D, 3-E, 4-F, 5-C, 6-A, 7-I, 8-J, 9-G, 10-H.
Тест 7:1.imbed;2.replicate;3.log in;4.virus;5.hacker;6.host ;7.piggyback;8.resident extension;9.overwriting virus ; 10.infect
Тест 8: 1.-J, 2.-A, 3.-F, 4.-B, 5.-D, 6.-C ,7.-H, 8.-G, 9.-I, 10-E
Тест 9: 1. audit log, 2.pop up. 3.protocol, 4.patch,5.bug,6.backdoor,7.security, 8.firewall,9.intruder, 10.keylogger.
Тест 10: 1. web page analysis - B; 2. quarantine - D; 3. cyber criminal - C; 4. anti-virus software- G; 5. backup- F; 6. false positives- A; 7. false negatives- E; 8. detect- H; 9. rootkit - J; 10. virus removal software- I.
Тест 11: 1.scalability;2.private clouds;3.public clouds;4.utility computing;5.deployment;6.CDN;7.pay as you go;8.PaaS; 9.SaaS; 10. elasticity.
Тест 12 :1.optic scanner;2.implanted microchip;3.bar coding; 4.PACs;5.interoperability;6.EHR; 7.lab-on-a-chip;8.micro robotic tweezers;9.CDSS;10.EMM.
Тест 13: 1.blog;2.root directory;3.natural language; 4.animated GIF; 5.web portal;6.interface; 7.PCI compliance ; 8.trust logo;9.ingress filter;10.key word.
Тест 14: 1.A 2.C 3.B 4.B 5.C 6.C 7. B 8. A 9 B 10. A
Тест 15: 1.T 2.F 3.T 4.F 5.T 6.T 7.T 8.F 9.T 10.F