0% found this document useful (0 votes)
32 views6 pages

De On Luyen Tacn HTTT 01 07 24

Uploaded by

bplinh2k3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views6 pages

De On Luyen Tacn HTTT 01 07 24

Uploaded by

bplinh2k3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

lOMoARcPSD|10785756

ĐỀ ÔN LUYỆN TACN. HTTT 01-07-24

Tiếng Anh cơ bản (Trường Đại học Công nghệ Giao thông Vận tải)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Duyên Nguy?n (dn032298@gmail.com)
lOMoARcPSD|10785756

Họ và tên:
Lớp:
Date:
TEST 1
I. Match the terms (A) with the appropriate definitions (B). (There are more definitions than necessary)
A B
1. Ports a. The data is stored centrally and users from different locations can access this data.
2. Centralized Database b. the underlying colors and patterns of a web page.
3. Java applets c. a mechanism for adding styles to web documents.
4. Video conferencing d. databases with the same base hardware and running on the same operating systems and applications.
5. Background e. small programs that enable the creation of interactive files.
f. sockets into which an external device may be connected.
g. refers to a form of communication where videos are broadcast over the internet.
h. refers to a set of technologies that allow a person to make a video call to one or more people at the same time.

………………………………………………………………………………………………….………………………………………………………….
II. Choose suitable word(s) to fill in the blank.
machine digital analysis computers relational
distributed exchange personal robotics wireless

1. The ……………………………….. of large-size, unstructured information can be done very efficiently on several cloud virtual servers.
2. A ……………………………….. database in which various parts of a database are located in different physical locations along with databases replicated and
distributed between different points in a network can be imagined.
3. Like human, a ……………………………….. retains information and becomes smarter over time.
4. In the modern world, telecommunications mainly means transferring information across the Internet, via modem, phone lines or
………………………………..networks.
5. In recent years, TV and radio broadcasting has been revolutionized by developments in satellite and ……………………………….. transmission.
III. Read the following passage and answer the questions.
When a brand new computer comes off the factory assembly line, it can do nothing. The hardware needs software to make it work. Are we talking about
applications software such as word-processing or spreadsheet software? Partly. But an applications software package does not communicate directly with the
hardware. Between the applications software and the hardware is a software interface - an operating system. An operating system is a set of programs that lies
between applications software and the computer hardware.
The most important program in the operating system, the program that manages the operating system, is the supervisor program, most of which remains in
memory and is thus referred to as resident. The supervisor controls the entire operating system and loads into memory other operating system programs (called
nonresident) from disk storage only as needed.
An operating system has three main functions: manage the computer's resources, such as the central processing unit, memory, disk drives, and printers, establish
a user interface, and execute and provide services for applications software. Keep in mind, however, that much of the work of an operating system is hidden from
the user. In particular, the first listed function, managing the computer's resources, is taken care of without the user being aware of the details. Furthermore, all
input and output operations, although invoked by an applications program, are actually carried out by the operating system.
1. Why does the hardware need software?.......................................................................................................................................................................................
2. Why is the supervisor program considered as the most important operating system program?..................................................................................................
3. What is the difference between resident and non-resident programs?.........................................................................................................................................
4. What are the main functions of an operating system?..................................................................................................................................................................
5. Are computer’s input and output operations carried out by the applications software?..............................................................................................................
IV. Decide whether the statements are True (T) or False (F).
1. _____ A database query function allows you to extract information according to certain conditions or criteria.
2. _____ Centralized Database are the paid versions of the enormous databases, designed for users who wish to access the information for assistance.
3. _____ The analysis of large-size, unstructured information can be done very efficiently on every cloud virtual servers.
4. _____ Vlogging and Blogging are similar in delivering informal styles, however, with Vlogging, Vloggers can post videos.
5. _____ Hackers are always looking to exploit a private network or system's vulnerabilities so they can steal confidential information and data.

V. Translate into Vietnamese.


1. The processor can not operate on any information if the information is not in main storage.
................................................................................................................................................................................................................................................
2. The function of the control unit within the central processor is to transmit coordinating control signals and commands.
................................................................................................................................................................................................................................................
3. There are a lot of benefits from an open system like the Internet, but we are also exposed to hackers who break into computer systems just for fun, as well as
to steal information or propagate viruses.
................................................................................................................................................................................................................................................
4. A network is a group of devices (PCs, printers, etc.) connected by communications circuits so that users can share data, programs and hardware resources.
................................................................................................................................................................................................................................................
5. LANs can be interconnected by gateways. These devices help manage communications and control traffic on large networks.
---THE END---

Downloaded by Duyên Nguy?n (dn032298@gmail.com)


lOMoARcPSD|10785756

Họ và tên:
Lớp:
Date:

TEST 2
I. Match the terms (A) with the appropriate definitions (B). (There are more definitions than necessary)
A B
1. Input devices a. a collaborative database that is designed specifically for the end-user as do the managers at various levels.
2. Hard drive b. refers to a set of technologies that allow a person to make a video call to one or more people at the same time.
3. Monitor c. is a service to make telephone calls over the internet rather than through the traditional telephone or cell phone networks.
4. End User Database d. enable us to extract the finish product from the system.
5. VOIP e. displays the output from a computer on a screen.
f. enable data to go into the computer’s memory.
g. are needed for functional lines such as marketing, employee relationships, customer service.

………………………………………………………………………………………………….………………………………………………………….
II. Choose suitable word(s) to fill in the blank.
WAN link attachment blogging LAN
mobile electronic mail video conferencing Ransomware Phishing

1. A ……………………………….. connects computers over a relatively short distance, allowing them to share data, files, and resources.
2. By using ……………………………….., one can send a message to another person through a mail immediately.
3. With the potential congestion of fixed broadband service, there is a chance that devices will fall back on ………………………………..networks, and this will
cause a significant surge of mobile data traffic.
4. Hackers try to trick email recipients into believing that a message is genuine and relevant – a request from their bank or a note from a co-worker, for example –
so that they click on a link or open a/an ………………………………...
5. ……………………………….. is a type of malware that prevents you from using your computer or accessing specific files on your computer unless a ransom is
paid.

III. Read the following passage and answer the questions.


Information stored in the RAM is lost when the computer is turned off. Because of this, data and applications are stored in either hard or floppy disks which
provide a more permanent backing store.
Floppy disks are so called because they consist of flexible plastic material which has a magnetizable surface. They are available in two sizes: 5.25-inch disks are
used in old computers, 3.5-inch disks are the most popular today. The surface of a floppy disk is divided into concentric circles or 'tracks', which are then divided
into 'sectors'. When you insert a blank disk into a disk drive, it must be 'initialized', or formatted, before information can be recorded onto it. This means that
magnetic areas are created for each track and sector, along with a catalogue or 'directory' which will record the specific location of files.
When you save a file, the operating system moves the read/write heads of the disk drive towards empty sectors, records the data and writes an entry for the
directory. Later on, when you open that file, the operating system looks for its entry in the directory on the disk, moves the read/write heads to the correct sectors,
and reads the file into the RAM area.
1. Why are data and applications not stored in RAM?.....................................................................................................................................................................
2. Which type of floppy disk was used in computers in the past?...................................................................................................................................................
3. What are “tracks”?........................................................................................................................................................................................................................
4. What happens to a blank disk when you insert it into a disk drive?............................................................................................................................................
5. What does the operating system do when you save a file?..........................................................................................................................................................
IV. Decide whether the following statements are True (T) or False (F).
1. _____ A Personal Digital Assistant is small enough to fit into the palm of your hand.
2. _____ A Personal Database is an automated or built-in database for such a virtualized environment.
3. _____ A VPN establishes an encrypted channel that keeps a user’s identity and access credentials, as well as any data transferred, inaccessible to hackers.
4. _____ VOIP allows voice and multimedia data to be transferred across a data network.
5. _____ Thanks to electronic communication, mobile phones now let you check your email, browse the Web and connect with home or company intranets, all
without wire.
V. Translate into Vietnamese
1. CD-ROM systems offer everything, from shareware programs to dictionaries and encyclopedias, from multimedia databases to 3-D games.
................................................................................................................................................................................................................................................
2. Internet TV sets allow you to surf the Web and have e-mail while you are watching or vice versa.
................................................................................................................................................................................................................................................
3. What are “telecommunications’? This term refers to the transmission of information over long distances using the telephone system, radio, TV satellite or
computer links.
................................................................................................................................................................................................................................................
4. Mechanical engineers use sophisticated programs for applications in computer-aid design and computer-aid manufacturing.
................................................................................................................................................................................................................................................
5. E-mail is your personal connection to the Internet which allows you to exchange messages with people all over the world. It can include text, pictures and
even audio and animation.
................................................................................................................................................................................................................................................
---THE END---

Downloaded by Duyên Nguy?n (dn032298@gmail.com)


lOMoARcPSD|10785756

Họ và tên:
Lớp:
Date:

TEST 3
I. Match the terms (A) with the appropriate definitions (B). (There are more definitions than necessary)
A B
1. Processor a. the software used in databases to store, organized and retrieve the data.
2. Operating system b. rectangular areas that allow the display of different pages in the same browser window.
3. DBMS c. controls all the operations in a computer.
4. Tags d. small programs that enable the creation of interactive files.
5. Frames e. a mechanism for adding styles to web documents.
f. is a broad area of computer science that makes machines seem like they have human intelligence.
g. are placed around pieces of text to tell the web browser how to display text or pictures.
h. is the set of programs between the applications programs and the hardware.

………………………………………………………………………………………………….………………………………………………………….
II. Choose suitable word(s) to fill in the blank.
robots communications telecommunication robotics recognition
productive profitable artificial transmission passwords

1. Don’t use common words or numbers as ……………………………….., such as birthdays or names of your children.
2. The best database packages also include network facilities, which can make business more ………………………………...
3. Thanks to books and movies, each generation has formed its own fantasy of a world ruled or at least served by ………………………………...
4. Neural networks, also called ……………………………….. neural networks, are ways of achieving deep learning.
5. While people are mostly using home WiFi, they would still use their mobile phones for voice ……………………………….., and this is the area that MNOs
need to keep a close eye on.

III. Read the following passage and answer the questions.


The ability of tiny computing devices to control complex operations has transformed the way many tasks are performed, ranging from scientific research to
producing consumer products. Tiny “computers on a chip” are used in medical equipment, home appliances, cars and toys. Workers use handheld computing
devices to collect data at a customer site, to generate forms, to control inventory, and to serve as desktop organizers.
Not only is computing equipment getting smaller, it is getting more sophisticated. Computers are part of many machines and devices that once required
continual human supervision and control. Today, computers in security systems result in safer environments, computers in cars improve energy efficiency, and
computers in phones provide features such as call forwarding, call monitoring, and call answering.
These smart machines are designated to take over some of the basic tasks previously performed by people; by so doing, they make life a little easier and a little
more pleasant. Smart cards store vital information such as health records, drivers’ licenses, bank balances, and so on. Smart phones, cars, and appliances with built
in computers can be programmed to better meet individual needs. A smart house has a built-in monitoring system that can turn lights on and off, open and close
windows, operate the oven, and more.
With small computing devices available for performing smart tasks like cooking dinner, programming the VCR, and controlling the flow of information in
an organization, people are able to spend more time doing what they often do best – being creative. Computers can help people work more creatively.
1. Name some types of device that use “computers on a chip”?......................................................................................................................................................
2. What are handheld computing devices used for?.........................................................................................................................................................................
3. What are the benefits of using computers in phones?..................................................................................................................................................................
4. What are smart cards used for?....................................................................................................................................................................................................
5. Why are people able to spend more time being creative?........................................................................................................................................................
IV. Decide whether the following statements are True (T) or False (F).
1. _____ The network starts with an input layer that receives output in the form of data.
2. _____ Instant messages are sent for free over the internet and can contain multimedia items like emoji, pictures, videos and voice recordings.
3. _____ A database query function allows you to extract information according to certain conditions or criteria.
4. _____ If you want to send instant messages on Facebook Messenger, Whatsapp or Snapchat, you will be charged a large amount of fee.
5. _____ If you want to protect your PC, don’t open email attachments from strangers and take care when downloading files from the Web.

V. Translate into Vietnamese


1. The CPU can also retrieve information from memory and can store the results of manipulations back into the memory unit for later reference.
................................................................................................................................................................................................................................................
2. The most important function of a computer is to hold information in its memory in order to process it.
................................................................................................................................................................................................................................................
3. Computer hardware refers to the parts of the computer system that you can see and hold, such as the keyboard, monitor, disk drive and printer.
................................................................................................................................................................................................................................................
4. A computer virus is a very small program routine that infects a computer system and uses its resources to reproduce itself.
................................................................................................................................................................................................................................................
5. Computers are also used to present data in a more understandable form: electrical engineers use computer graphics to design circuits and people in business
can present information visually to clients in graphs and diagrams.
................................................................................................................................................................................................................................................
---THE END---
Downloaded by Duyên Nguy?n (dn032298@gmail.com)
lOMoARcPSD|10785756

Họ và tên:
Lớp:
Date:

TEST 4
I. Match the terms (A) with the appropriate definitions (B). (There are more definitions than necessary)
A B
1. Peripherals a. hold instructions which are needed to start up the computer.
2. Hardware b. is the layout of the interconnections of the nodes of a computer network which depends on the distance involved, the
type of hardware used and the stability needed.
3. ROM c. databases with the same base hardware and running on the same operating systems and applications.
4. A cloud database d. is an electronic or mechanic part you can see or touch.
5. A network topology e. a collaborative database that is designed specifically for the end-user as do the managers at various levels.
f. controls the cursor.
g. is an automated or built-in database for such a virtualized environment.
h. are the physical units attached to the computer.

………………………………………………………………………………………………….………………………………………………………….
II. Choose suitable word(s) to fill in the blank.
electronic ring computers automatic RAM
networks CPU software Security social media

1. Thanks to advances in processing speeds, ……………………………….. can actually make sense of all this information more quickly.
2. ……………………………….. may be difficult to set up and may be insecure as computer hackers can send viruses or computer worms to the net computer.
3. In the near future we may have ……………………………….. pets, with video camera eyes and microphone ears, linked by radio to the family computer.
4. Electronic communication can be classified into different types like messaging, voice call, e-mail, ……………………………….., etc.
5. There is no central hub that holds all the data, and communication is sent in one direction around the ……………………………….. through the use of a token.

III. Read the following passage and answer the questions.


Unfortunately, computers cannot understand ordinary spoken English or any other natural language. The only language they can understand directly is called
machine code. This consists of the 1s and 0s (binary code) that are processed by the CPU. However, machine code as a means of communication is very difficult
to write. For this reason, we use symbolic languages that are easier to understand. Then, by using a special program, these languages can be translated into
machine code. For example, the so-called assembly languages use abbreviations such as ADD, SUB, MPY to represent instructions. These mnemonic codes are
likes labels easily associated with the items to which they refer.
Basic languages, where the program is similar to the machine code version, are known as low-level languages. In these languages, each instruction is equivalent
to a single machine code instruction, and the program is converted into machine code by a special program called an assembler. These languages are still quite
complex and restricted to particular machines.
To make the programs easier to write and overcome the problem of intercommunication between different types of machines, higher-level languages were
designed such as BASIC, COBOL, FORTRAN, or Pascal. These are all problem-oriented rather than machine-oriented. Programs written in one of these
languages (known as source programs) are converted into a lower-level language by means of a compiler (generating the object program). On compilation, each
statement in a high-level language is generally translated into many machine code instructions.
1. Do computers understand human language?................................................................................................................................................................................
2. Why do we use symbolic languages?...........................................................................................................................................................................................
3. How can symbolic languages be translated into machine code?..................................................................................................................................................
4. What are some examples of higher-level languages mentioned in the text?................................................................................................................................
5. What is the function of a compiler?..........................................................................................................................................................................................
IV. Decide whether the following statements are True (T) or False (F).
1. _____ A mainframe computer is more powerful than a PC.
2. _____ Systems Administrators, Network Administrators, or anyone who has anything to do with cybersecurity will also be under a great deal of stress.
3. _____ Private networks can’t be attacked by intruders who attempt to obtain information such as Social Security numbers, bank accounts or research and
business reports.
4. _____ Peripherals are the physical units attached to the computer. They include storage devices and input/output devices.
5. _____ A Web Application Firewall (WAF) which updates a threat database in real-time is one of the effective ways to filter application input to protect
against code injection.
V. Translate into Vietnamese
1. Today, computers in security system result in safer environments, computers in cars improve energy efficiency, and computers in phones provide features such as
call forwarding, call monitoring and call answering.
................................................................................................................................................................................................................................................
2. A smart house has a built-in monitoring system that can turn lights on and off, open and close windows, operate the oven and more.
................................................................................................................................................................................................................................................
3. Computers can work endlessly without having to stop to rest unless there is a breakdown.
................................................................................................................................................................................................................................................
4. Computer software can be divided into very broad categories systems software and application software.
................................................................................................................................................................................................................................................
5. Because of the complex electronic circuitry of a computer, data can be either stored or moved about at high speeds.
Downloaded by Duyên Nguy?n (dn032298@gmail.com)
lOMoARcPSD|10785756

Họ và tên:
Lớp:
Date:

TEST 5
I. Match the terms (A) with the appropriate definitions (B). (There are more definitions than necessary)
A B
1. A computer a. is an electronic or mechanic part you can see or touch.
2. Software b. is a broad area of computer science that makes machines seem like they have human intelligence.
3. Password c. are made up of a series of independent pictures put together in sequence to look like moving pictures.
4. Artificial d. is an electronic machine which can accept data in a certain form, process the data, and give the results of the processing in a
Intelligence specified format as information.
5. Animations e. is a service to make telephone calls over the internet rather than through the traditional telephone or cell phone networks.
f. A secret word that you type into a computer before you use it.
g. refers to the transmission of signals over a distance for the purpose of communication.
h. is a set of instructions, called a program, which tells the computer what to do.

………………………………………………………………………………………………….………………………………………………………….
II. Choose suitable word(s) to fill in the blank.
virtual exchange cheap Internet minimal
communication database transmission record overload

1. A ……………………………….. can manage any type of data, including text, numbers, images, sound and video and hyperlinks (links to websites).
2. Neural networks help solve the problem of providing higher revenue at ……………………………….. costs.
3. Nowadays, data are actually stored in a public cloud, a hybrid cloud or a private cloud, also known as a ………………………………..environment.
4. The ………………………………..of information in a network is controlled by communications protocols, which define the formats and rules that computers
must follow when talking to one another.
5. Netflix and Google have already announced that they would be reducing video streaming quality in Europe for a month from high definition (HD) to standard
definition (SD) to prevent network ………………………………..and collapse.

III. Read the following passage and answer the questions.


A biological virus is a very small, simple organism that infects living cells, known as the host, by attaching itself to them and using them to reproduce
itself. This often causes harm to the host cells.
Similarly, a computer virus is a very small program routine that infects a computer system and uses its resources to reproduce itself. It often does this by
patching the operating system to enable it to detect program files, such as COM or EXE files. It then copies itself into those files. This sometimes causes harm to
the host computer system. When the user runs an infected program, it is loaded into memory carrying the virus. The virus uses a common programming technique
to stay resident in memory. It can then use a reproduction routine to infect other programs. This process continues until the computer is switched off.
The virus may also contain a payload that remains dormant until a trigger event activates it, such as the user pressing a particular key. The payload can have
a variety of forms. It might do something relatively harmless such as displaying a message on the monitor screen or it might do something more destructive such as
deleting files on the hard disk.
When it infects a file, the virus replaces the first instruction in the host program with a command that changes the normal execution sequence. This type of
command is known as JUMP command and causes the virus instructions to be executed before the host program. The virus then returns control to the host program
which then continues with its normal sequence of instructions and is executed in the normal way.
1. How does a biological virus cause harm to the host cells?..........................................................................................................................................................
2. What is the similarity between a biological virus and a computer virus?....................................................................................................................................
3. What is the effect of a virus patching the operating system?.......................................................................................................................................................
4. What happens when the user runs an infected program?.............................................................................................................................................................
5. What does a virus do when it infects a file?
IV. Decide whether the following statements are True (T) or False (F).
1. _____ A mainframe is used by large organizations that need to process small amount of data.
2. _____ Tech professionals are not required to constantly keep themselves up-to-date on the latest trends and developments.
3. _____ A cloud database is an automated or built-in database for such a virtualized environment.
4. _____ Neural networks are used to convert handwritten characters into digital characters that a machine can recognize.
5. _____ Digital TV is a way of transmitting pictures by means of digital signals, in contrast to the analogue signals used by traditional TV.
V. Translate into Vietnamese
1. The language used for data transfer on the Internet is known as TCP/IP (transmission control protocol/ Internet protocol). This is like the Internet operating
system.
................................................................................................................................................................................................................................................
2. A computer can solve a series of problems and make hundreds, even thousands, of logical decisions without becoming tired or bored.
................................................................................................................................................................................................................................................
3. Hard disks have important advantages over floppy disks: they spin at a higher speed, so you can store and retrieve information much faster than with floppies.
................................................................................................................................................................................................................................................
4. The success or failure of any computer system depends on the skill with which the hardware and software components are selected and blended.
................................................................................................................................................................................................................................................
5. Mainframes are huge powerful machines whose peripheral equipment takes up a lot of space.
................................................................................................................................................................................................................................................
---THE END---

Downloaded by Duyên Nguy?n (dn032298@gmail.com)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy