De On Luyen Tacn HTTT 01 07 24
De On Luyen Tacn HTTT 01 07 24
Tiếng Anh cơ bản (Trường Đại học Công nghệ Giao thông Vận tải)
Họ và tên:
Lớp:
Date:
TEST 1
I. Match the terms (A) with the appropriate definitions (B). (There are more definitions than necessary)
A B
1. Ports a. The data is stored centrally and users from different locations can access this data.
2. Centralized Database b. the underlying colors and patterns of a web page.
3. Java applets c. a mechanism for adding styles to web documents.
4. Video conferencing d. databases with the same base hardware and running on the same operating systems and applications.
5. Background e. small programs that enable the creation of interactive files.
f. sockets into which an external device may be connected.
g. refers to a form of communication where videos are broadcast over the internet.
h. refers to a set of technologies that allow a person to make a video call to one or more people at the same time.
………………………………………………………………………………………………….………………………………………………………….
II. Choose suitable word(s) to fill in the blank.
machine digital analysis computers relational
distributed exchange personal robotics wireless
1. The ……………………………….. of large-size, unstructured information can be done very efficiently on several cloud virtual servers.
2. A ……………………………….. database in which various parts of a database are located in different physical locations along with databases replicated and
distributed between different points in a network can be imagined.
3. Like human, a ……………………………….. retains information and becomes smarter over time.
4. In the modern world, telecommunications mainly means transferring information across the Internet, via modem, phone lines or
………………………………..networks.
5. In recent years, TV and radio broadcasting has been revolutionized by developments in satellite and ……………………………….. transmission.
III. Read the following passage and answer the questions.
When a brand new computer comes off the factory assembly line, it can do nothing. The hardware needs software to make it work. Are we talking about
applications software such as word-processing or spreadsheet software? Partly. But an applications software package does not communicate directly with the
hardware. Between the applications software and the hardware is a software interface - an operating system. An operating system is a set of programs that lies
between applications software and the computer hardware.
The most important program in the operating system, the program that manages the operating system, is the supervisor program, most of which remains in
memory and is thus referred to as resident. The supervisor controls the entire operating system and loads into memory other operating system programs (called
nonresident) from disk storage only as needed.
An operating system has three main functions: manage the computer's resources, such as the central processing unit, memory, disk drives, and printers, establish
a user interface, and execute and provide services for applications software. Keep in mind, however, that much of the work of an operating system is hidden from
the user. In particular, the first listed function, managing the computer's resources, is taken care of without the user being aware of the details. Furthermore, all
input and output operations, although invoked by an applications program, are actually carried out by the operating system.
1. Why does the hardware need software?.......................................................................................................................................................................................
2. Why is the supervisor program considered as the most important operating system program?..................................................................................................
3. What is the difference between resident and non-resident programs?.........................................................................................................................................
4. What are the main functions of an operating system?..................................................................................................................................................................
5. Are computer’s input and output operations carried out by the applications software?..............................................................................................................
IV. Decide whether the statements are True (T) or False (F).
1. _____ A database query function allows you to extract information according to certain conditions or criteria.
2. _____ Centralized Database are the paid versions of the enormous databases, designed for users who wish to access the information for assistance.
3. _____ The analysis of large-size, unstructured information can be done very efficiently on every cloud virtual servers.
4. _____ Vlogging and Blogging are similar in delivering informal styles, however, with Vlogging, Vloggers can post videos.
5. _____ Hackers are always looking to exploit a private network or system's vulnerabilities so they can steal confidential information and data.
Họ và tên:
Lớp:
Date:
TEST 2
I. Match the terms (A) with the appropriate definitions (B). (There are more definitions than necessary)
A B
1. Input devices a. a collaborative database that is designed specifically for the end-user as do the managers at various levels.
2. Hard drive b. refers to a set of technologies that allow a person to make a video call to one or more people at the same time.
3. Monitor c. is a service to make telephone calls over the internet rather than through the traditional telephone or cell phone networks.
4. End User Database d. enable us to extract the finish product from the system.
5. VOIP e. displays the output from a computer on a screen.
f. enable data to go into the computer’s memory.
g. are needed for functional lines such as marketing, employee relationships, customer service.
………………………………………………………………………………………………….………………………………………………………….
II. Choose suitable word(s) to fill in the blank.
WAN link attachment blogging LAN
mobile electronic mail video conferencing Ransomware Phishing
1. A ……………………………….. connects computers over a relatively short distance, allowing them to share data, files, and resources.
2. By using ……………………………….., one can send a message to another person through a mail immediately.
3. With the potential congestion of fixed broadband service, there is a chance that devices will fall back on ………………………………..networks, and this will
cause a significant surge of mobile data traffic.
4. Hackers try to trick email recipients into believing that a message is genuine and relevant – a request from their bank or a note from a co-worker, for example –
so that they click on a link or open a/an ………………………………...
5. ……………………………….. is a type of malware that prevents you from using your computer or accessing specific files on your computer unless a ransom is
paid.
Họ và tên:
Lớp:
Date:
TEST 3
I. Match the terms (A) with the appropriate definitions (B). (There are more definitions than necessary)
A B
1. Processor a. the software used in databases to store, organized and retrieve the data.
2. Operating system b. rectangular areas that allow the display of different pages in the same browser window.
3. DBMS c. controls all the operations in a computer.
4. Tags d. small programs that enable the creation of interactive files.
5. Frames e. a mechanism for adding styles to web documents.
f. is a broad area of computer science that makes machines seem like they have human intelligence.
g. are placed around pieces of text to tell the web browser how to display text or pictures.
h. is the set of programs between the applications programs and the hardware.
………………………………………………………………………………………………….………………………………………………………….
II. Choose suitable word(s) to fill in the blank.
robots communications telecommunication robotics recognition
productive profitable artificial transmission passwords
1. Don’t use common words or numbers as ……………………………….., such as birthdays or names of your children.
2. The best database packages also include network facilities, which can make business more ………………………………...
3. Thanks to books and movies, each generation has formed its own fantasy of a world ruled or at least served by ………………………………...
4. Neural networks, also called ……………………………….. neural networks, are ways of achieving deep learning.
5. While people are mostly using home WiFi, they would still use their mobile phones for voice ……………………………….., and this is the area that MNOs
need to keep a close eye on.
Họ và tên:
Lớp:
Date:
TEST 4
I. Match the terms (A) with the appropriate definitions (B). (There are more definitions than necessary)
A B
1. Peripherals a. hold instructions which are needed to start up the computer.
2. Hardware b. is the layout of the interconnections of the nodes of a computer network which depends on the distance involved, the
type of hardware used and the stability needed.
3. ROM c. databases with the same base hardware and running on the same operating systems and applications.
4. A cloud database d. is an electronic or mechanic part you can see or touch.
5. A network topology e. a collaborative database that is designed specifically for the end-user as do the managers at various levels.
f. controls the cursor.
g. is an automated or built-in database for such a virtualized environment.
h. are the physical units attached to the computer.
………………………………………………………………………………………………….………………………………………………………….
II. Choose suitable word(s) to fill in the blank.
electronic ring computers automatic RAM
networks CPU software Security social media
1. Thanks to advances in processing speeds, ……………………………….. can actually make sense of all this information more quickly.
2. ……………………………….. may be difficult to set up and may be insecure as computer hackers can send viruses or computer worms to the net computer.
3. In the near future we may have ……………………………….. pets, with video camera eyes and microphone ears, linked by radio to the family computer.
4. Electronic communication can be classified into different types like messaging, voice call, e-mail, ……………………………….., etc.
5. There is no central hub that holds all the data, and communication is sent in one direction around the ……………………………….. through the use of a token.
Họ và tên:
Lớp:
Date:
TEST 5
I. Match the terms (A) with the appropriate definitions (B). (There are more definitions than necessary)
A B
1. A computer a. is an electronic or mechanic part you can see or touch.
2. Software b. is a broad area of computer science that makes machines seem like they have human intelligence.
3. Password c. are made up of a series of independent pictures put together in sequence to look like moving pictures.
4. Artificial d. is an electronic machine which can accept data in a certain form, process the data, and give the results of the processing in a
Intelligence specified format as information.
5. Animations e. is a service to make telephone calls over the internet rather than through the traditional telephone or cell phone networks.
f. A secret word that you type into a computer before you use it.
g. refers to the transmission of signals over a distance for the purpose of communication.
h. is a set of instructions, called a program, which tells the computer what to do.
………………………………………………………………………………………………….………………………………………………………….
II. Choose suitable word(s) to fill in the blank.
virtual exchange cheap Internet minimal
communication database transmission record overload
1. A ……………………………….. can manage any type of data, including text, numbers, images, sound and video and hyperlinks (links to websites).
2. Neural networks help solve the problem of providing higher revenue at ……………………………….. costs.
3. Nowadays, data are actually stored in a public cloud, a hybrid cloud or a private cloud, also known as a ………………………………..environment.
4. The ………………………………..of information in a network is controlled by communications protocols, which define the formats and rules that computers
must follow when talking to one another.
5. Netflix and Google have already announced that they would be reducing video streaming quality in Europe for a month from high definition (HD) to standard
definition (SD) to prevent network ………………………………..and collapse.