Task 12. Do the tasks in the following test.



1. A (n) ___ is a copy of one or more files that has been made in case the original files become damaged.

2. The Windows ___ is an important group of files that the Windows operating system uses to store configuration information about all the devices and software installed on a computer system.

3. The main directory of a disk is referred to as the ___ directory.

4. The main hard disk drive on a PC is often referred to as “drive C”. (True/False)

5. A filename extension is usually related to a file ___, which is the arrangement of data in a file and the coding scheme used to represent the data.

6. Antivirus software is 100% reliable when it comes to protecting your computer from viruses. (True/False)

7. A file specification or path typically includes all of the following information EXCEPT ___.

a) the file author    b) the file name     c) the file extension d) the drive letter

8. ___ software is a set of utility programs that looks for and eradicates viruses, worms, and Trojan horses.

9. File-naming ___ are a set of rules for naming files.

10. The easiest way to convert a file from one format to another is to find an application program that works with both file formats. (True/False)

11. Deleting a file’s icon from a directory does not necessarily remove the data from the disk. (True/False)

12. A computer ___ is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.

13. A root directory typically contains smaller ___, often depicted as folders in graphical user interfaces.

14. A (n) ___ is a computer program that seems to perform one function while actually doing something else.

15. A virus can be spread if people distribute infected files by ___.

a) exchanging disks or CDs                                 b) sending e-mail attachments

c) downloading software from the Web              d) all of the above

16. You should update your antivirus software regularly. (True/False)

17. Bot-infected computers linked together into a network is called a(n) ___.

18. A virus ___ is a section of the virus program that can be used to identify a known virus.

19. Computer virus trigger events are often tied to a specific date. (True/False)

20. The file ___ helps you keep track of the most current version of your file when you have saved several versions.

LANGUAGE SKILLS DEVELOPMENT

Exercise 1. Translate the following sentences paying attention to Absolute Participle Clause

  My colleague being away, I had to take the decision myself. Оскільки мій товариш по роботі був відсутній, мені довелося самому прийняти рішення. We continued our work, with our laboratory assistants helping us. Ми продовжували свою роботу, а наші лаборанти допомагали нам.  

 

1. My boss being away, I didn’t go to work. 2. The disk removed, the computer can be switched off. 3. The new browser having been studied in detail, the committee decided to introduce it at the exhibition. 4. My colleague being away, I had to take the decision myself. 5. There being many people in the conference hall, we couldn’t enter. 6. We continued our work, with our laboratory assistants helping us. 7. The new wireless network is very expensive, we hardly buy it. 8. The technology designed, we made a great progress in the field of IT. 9. The research being carried out, the virus can’t destroy our equipment. 10. Other protecting systems being cumbersome, we use the old one. 11. The new software having been installed, I felt a sort of satisfaction. 12. With the new virus being created, we need the patches for Windows. 13. With a sound generated every time you destroy one of the enemies, the game becomes more interesting. 14. The computer crashed, I lost all my afternoon’s work. 15. The information stored, you can access it any time you need it.

Exercise 2. Choose the right form of Participle and translate the sentences.

1. The net was supposed to be about community, about people with common interests finding/found each other in the limitless tracts of cyberspace and connecting/connected like never before.

2. The nodes will link to the net via broadband links and share that access via antenna siting/ sited on the roofs of several buildings.

3. The company administering/ administered the .info domain could face legal challenges from those denying/ denied a chance to apply for some generic .info domains.

4. A group of researchers at Bell labs have made tiny functioning/functioned transistors a million times smaller than a grain of sand.

5. Each molecular transistor is 10 times smaller than any components creating/ created with today’s most advancing/ advanced chip making/ made techniques.

6. In the media you can often find articles telling/ told of hackers breaking/ broken into computer systems and websites stealing/ stolen and destroying/ destroyed information.

7. Hacker is a computer user breaking/ broken a system’s security and stealing/ stolen valuable information.

8. Hackers will often write open-source code allowing/ allowed others to see what they have done.

9. The hacking contest was not run fairly and proved nothing about the integrity of the proposing/ proposed technologies.

10. Chemically producing/ produced components are microscopical, faster and more efficient then today’s silicon products made using/ used lithography.

11. Technologies such as the Internet, PCs and wireless telephony have turned the globe into an increasingly interconnecting/ interconnected network of individuals, organizations and governments communicating/ communicated and interacting/ interacted with each other with through a variety of channels.

12. Using/ used effectively, information and communication technologies can help to create training/ trained, educating/ educated and healthy workforce.

13. Netscape Gecko control how WebPages appears on the screen and supports accepting/ accepted web standards such as HTML, XML, Cascading Style Sheets and JavaScript.

14. The method using/ used depends on the length to be measured.

15. An intelligent network consists of distributing/ distributed signaling network of switches, databases and dedicating/ dedicated computer servers.


Дата добавления: 2018-10-26; просмотров: 519; Мы поможем в написании вашей работы!

Поделиться с друзьями:






Мы поможем в написании ваших работ!