Revisions To English For IT
Revisions To English For IT
REVISION
SUBJECT: ENGLISH FOR INFORMATION TECHNOLOGY
Exercise 2: Match the definition with the correct word or phase by circling A, B, C or D.
1. Data about quantity of product in storage……..
A. stock management B. human resources
C. marketing department D. sales
2. Data about product specifications, details and design….
A. data validation B. data collection
C. human resources D. production
3. A(n) ____________ is someone who tries to break into a computer system.
A. Trojan B. spyware
C. hacker D. browser hijacker
4. A program which is usually free but contains a virus is called a(n) ___________
7
A. Trojan B. spyware
C. encryption D. firewall
5. An effort to get unauthorised access to a computer is called a(n) ____________
A. hacker B. browser hijacker
C. malware attack D. spyware
6. A(n) ____________ is software that replaces the user’s search engine with its own.
A. hacker B. browser hijacker
C. malware attack D. spyware
37. ____________ blocks authorised access
A. Trojan B. Spyware
C. Hacker D.Encryption
8. Software that sends information about the use of a computer system is called ________
A. Spyware B. Trojan
C. encryption D. firewall
9. ____________ is software that automatically plays commercials on a computer.
A. Spyware B. Adware
C. Encryption D. Biometric scanning
10._________ is one way to make sure that only authorised people access the network.
A. Spyware B. Browser hijacker
C. Malware attack D. Biometric scanning
11.I'm __________. I create usernames and passwords and I set firewalls.
A. a network administrator B. an IT support officer.
C.database analysts D. a network architect
12.I’m _________. Her job is to plan and design the network.
A. a network administrator B. an IT support officer.
C.database analysts D. a network architect
13.His job is to make sure all of the computers work properly. She is _____________.
A. a network administrator B. an IT support officer.
C.database analysts D. a network architect
14. It measures electrical properties such as AC or DC voltage, current and resistance. It
troubleshoots electrical problems in batteries, power supplies,and wiring systems.
A. Cable tester B. Multimeter
B. C. Diagnostic software D.System diagnostic card
15.It is an electronic device that checks the electrical connections in wired devices.
A. Cable tester B. Multimeter
B. C. Diagnostic software D.System diagnostic card
16.Malicious software that can copy itself and infect the system.
A. Malware B. Spyware
C. Worm D . Virus
17..Affects privacy. It does not take control of a computer system, but sends information about
the use of a computer system.
A. Malware B. Spyware
C. Worm D. Virus
18.A _________protects the system from public access.
8
A. Firewall B. Antivirus software
B. C. Authentication D. Encryption
19.___________used for inserting and removing fibre.
A .Insertion/ extraction clipper B. Hex key
C. Anti-static wrist strap D. Screwdriver
20. .People sell or exchange second-hand, used items and collectibles.
A. B2C business-to-consumer B. B2B business-to-business
C. C2C consumer-to-consumer D. M-commerce
PART II. READING: Read the following passages and circle the letter A, B, C or D on your
answer sheet to indicate the correct answer to each of the following s
Reading Passage 1
DATA STORAGE
Online storage is an emerging method of data storage and back-up. A remote server with a
network connection and special software backs up files, folders, or the entire contents of a hard
drive. There are many companies that provide a web-based backup. One emerging technology in
this area is cloud computing. This allows colleagues in an organisation to share resources,
software and information over the Internet. Continuous backup and storage on a remote hard
drive eliminates the risk ofdata loss as a result of fire, floodor theft. Remote data storage and
back-up providers encrypt the data and set up password protection to ensure maximum security.
Small businesses and individuals choose to save data in a more traditional way. External drives,
disks and magnetic tapes are very popular data storage solutions. USB or flush memories, DVDs
and hard disks are cheap and widely accessible solutions. These methods are very practical with
9
small volumes of data storage and backup. However, they are not very reliable and do not protect
the user in case of a disaster.
1. What is online storage method?
A. A remote server with a network connection and special software backs up files, folders,
or the entire contents of a hard drive.
B. interner users send files and folders of documents to a company that has storage drive.
C. cloud computing
D. A, B and C
2. Cloud computing ………..
A. allows people in an organization to send emails.
B. allows colleagues in an organisation to share resources, software and information over the
Internet
C. allows IT students to send information to each others
D. is used by the IT students only.
3. Continuous backup and storage on a remote hard drive……
A. helps users store more data in their computers.
B. increses the risk of data loss as a result of fire, floodor theft.
C. eliminates the risk of data storage.
D. reduces the risk of data loss as a result of fire, floodor theft
4. Why continuous backup and storage on a remote hard drive can eliminate the risk of data loss?
A. Spyware
B. Browser hijacker
C. bucause it encrypts the data and set up password protection to ensure maximum
security
D. Biometric scanning
5. What are the popular traditional devices to store the data?
A. computers B. laptops
C. mobile phones D. external drives, disks and magnetic tapes.
Reading Passage 2
RANGE AND SPEED
Range
Wireless networks have limited range. Network range depends on the type of 802.11 protocol,
strength of the device transmitter and the architecture of the surrounding area. Some structures,
such as walls and metal frames, reduce the range of a WLAN by 25%. However, users can extend
the range of a WLAN.
Repeaters forward the wireless signal to access points or routers and increase the range of a
network.
Speed
Bandwidth and latency are the measures of computer network speed, or data transfer rate.
Bandwidth is the maximum throughput of data in bits per second. Some modems support 100
Gbit/s but speed depends on the hardware and software used. Latency is the delay that network
creates during the transfer data. Users have no, or very little, control over bandwidth and latency.
6. How many things does network range depend on?
A. two B. three
10
C. four D. five
7. What can reduce network range?
A. structures like walls and mental frammes B. surrounding area
C. letancy D. type of 802.11
8. What can improve network range?
A. letancy B. metal frames
C. repeaters D. device transmitter
9. What two things affect speed?
A. surrounding and latency B. bandwith and latancy
C. walls and metal frames D. softwware and hardware
10. What is latency?
A. the delay that network creates when users browsing the network.
B. the delay that network creates when an IT supporter using the network.
C. the delay that network creates when collecting the data.
D. the delay that network creates during the transfer data.
Reading Passage 3
The technology needed to set up a home network is here today. It is just a matter of connecting a
number of PCs equipped with Ethernet adapters to a hub using twisted pair cabling which uses
sockets rather like phone sockets. Special isolation adapters can be fitted to allow existing mains
lines to be used instead of twisted-pair cabling, most future home networks, however, are likely
to be wireless network systems, using tuned transmitter and receiver devices. The simplest
networks allow basic file-sharing and multi-player gaming as well as sharing of peripherals such
as printers, most advanced home networks are likely to have a client/server structure, with low-
cost terminals, or ‘thin’ clients, connected to a central server which maintains the system’s
storage capacity and, depending on whether the terminals are dumb or processor-equipped
network computers, its processing power. To make the most of such a network, it must become
part of an integrated home entertainment and control system. To the user, the desktop becomes
just one of many features accessible throughout the house. Tired of working in the study? Top
down to the living room and reload it into the terminal there. Before you start work, call up the
hi-fi control program and have the music of tour choice pumped through the living room
speakers. Computer and entertainment networks can be separated but linked by the server to
allow control of the latter from the terminals. Future home networks are more likely to have the
entire system based on a single loop.
11 . How can people currently set up their home network?
A. Connect their PCs integrated Ethernet adapters to the hub by using twisted pair cabling
B. Link their computers to the local network
C. Install a software on their computers and use sockets to connect
D. Use twisted pair cabling and phone sockets.
12. Which equipment can be used in order to make use of existing main lines instead of twisted
pair cabling?
A. A hub B. transmitter C. special isolation adapter D.cable
13.What type of network is more likely to be used in the future?
A. LAN B. MAN C. WAN D. Wireless
14. Which home networks are equipped with a client/server structure?
11
A. The simplest home network
B. The most advanced home network
C. Low-cost network
D. Local Area Network
15.Why have the computer and the entertainment network to be linked together?
A. To load the information and data
B. To process the programs
C. To ensure the control of the network with terminals
D. To reload the Internet to the terminals.
Reading Passage 4
Bramley College now has full electronic information resources in the College Library to help you
in your studies. On CD-ROM in the library we have about fifty databases, including many
statistical sources. Want to know the average rainfall in Tokyo or the biggest export earner of
Vanuatu? It's easy to find out. Whether you are in the School of Business or the School of Art &
Design, it's all here for you.
You can conduct your own CD-ROM search for no charge, and you can print out your results on
the library printers using your library photocopying card. Alternatively, you can download your
results to disk, again for no charge, but bring your own formatted floppy disk or CD-ROM. If
you are not sure how to conduct a search for yourself, library staff can do it for you, but we
charge $20 for this service, no matter how long or how short a time it takes.
All library workstations have broadband access to the Internet, so you can find the web-based
information you need quickly and easily If you are unfamiliar with using the Internet, help is
available in several ways. You can start with the online tutorial Netstart; just click on the Netstart
Icon on the Main Menu. The tutorial will take you through the basic steps to using the Internet, at
any time convenient to you. If you prefer, ask one of the librarians for internet advice (best at
quiet times between 9.00am and 11.30am weekdays) or attend one of the introductory group
sessions that are held in the first two weeks of each term. Sign your name on the list on the
Library Bulletin Board to guarantee a place, as they are very popular.
A word of warning: demand for access to library workstations is very high, so you are strongly
advised to book a workstation, and we have to limit your use to a maximum of one hour at any
one time. Make your booking (for which you will receive a receipt) at the information Desk or at
the enquiry desks in the Media Services Area (Level 1). Also, use of the computers is limited to
Bramley students only, so you may be asked to produce your Student Identification Card to make
a booking, or while using the workstations.
16 . To use the library printers, students must have...........
A. a floppy disk. B. correct change in coins.
C. a photocopying card. D. coins
17. To copy search results to a floppy disk, students pay.......
A. $20. B. no fee. C. a fee dependent on the time taken. D. $50.
18. If library staff helps students search for information on CD-ROM, students have to
pay..............
A. $20. B. no fee. C. a fee dependent on the time taken. D. $40.
19. Students can learn to use the Internet...........
12
A. at all times. B. in the first two weeks of term only.
C. between 9.00am and 11.30am only. D. 11.30am only
20.To ensure efficient access to the library workstations, students should.........
A. queue to use a workstation in the Media Services Area.
B. reserve a time to use a workstation.
C. work in groups on one workstation.
D. use a workstation in the Media Services Area
Reading Passage 3
A computer is a (21) ______ with an intricate network of electronic circuits that operate
switches or magnetize tiny metal cores. The I switches, like the cores, are capable of being in one
of two possible I states, that is, on or (22) ______; magnetized or demagnetized. The machine is
capable of storing and manipulating numbers, letters, and characters. The basic idea of a
computer is that we (23) ______ the machine do what we want by inputting signals that turn
certain switches on and turn others off, or that magnetize or do not magnetize the cores.
The basic job of computers is the (24) ______ of information. For this reason, computer can be
defined as devices which accept information in the form of instructions called a program and
characters called data, perform mathematical and/or logical (25) ______ on the information, and
then supply results of these operations. The program, or part of it, which tells the computers what
to do and the data, which provide the information needed to solve the problem, are kept inside the
computer in a place called memory.
21. A. machine B. material C. operator D. metal
22. A. from B. of C. off D. out
23. A. should make B. must make C. can make D. have to make
24. A. entering B. processing C. coding D. encrypting
25. A. data B. circuits C. operations D. programs
Reading Passage 6
Word-processing facilities
Writing letters, memos or reports are the ways most people use computers. They (26)______
words and text on a screen primarily to print at some later time and store for safe keeping. (27)
______ alleviate much of the tedium associated with typing, proofing and manipulating words.
Because computers can (28) ______ and recall information so readily, documents need not be
retyped from scratch just to make corrections or changes. The real strength of word (29) ______
lies in this ability to store, retrieve and change information.
Typing is still necessary (at least, for now) to put the information into the computer initially but
once in, the need to retype only applies to new information.
Word processing is more than just typing, however. Features such as Search and (30)______
allow users to find a particular phrase or word no matter where it is in a body of text.
This becomes more useful as the amount of text grows.
26. A. manipulate B. work C. process D. analyze
27. A. Users B. Computers C. Programs D. Programmers
28. A. enter B. process C. type D. store
29. A. computer B. processor C. processing D. program
30. A. copy B. paste C. cut D. replace
13