Reading 1.In the last decade, computers have come an integral part of every life at home, work, school, and nearly everywhere else. Of course, almost every computer user encounters a problem occasionally, whether it is the annoyance of a forgotten password or the disaster of a crashing hard drive. The explosive use of computers has created demand for specialists who provide advice to users, as well as for the day-to-day administration, maintenance, and support of computer systems and networks. The word 'integral' in the passage is referred to____. basic essential fundamental *All the choices are correct 2.In the last decade, computers have come an integral part of every life at home, work, school, and nearly everywhere else. Of course, almost every computer user encounters a problem occasionally, whether it is the annoyance of a forgotten password or the disaster of a crashing hard drive. The explosive use of computers has created demand for specialists who provide advice to users, as well as for the day-to-day administration, maintenance, and support of computer systems and networks. The word ' explosive' in the passage is referred to___. burning *increasing bombing deceasing 3.However, machine code as a means of communication is very difficult to write. For this reason, we use symbolic languages that are easier to understand. Then, by using a special program, these languages can be translated into machine code. For example, the so-called assembly languages use abbreviations such as ADD, SUB, MPY to represent instructions. These mnemonic codes are like labels easily associated with the items to which they refer. According to the passage, machine code is___. impossible to write not easy to write easy to write *very difficult to write 4.However, machine code as a means of communication is very difficult to write. For this reason, we use symbolic languages that are easier to understand. Then, by using a special program, these languages can be translated into machine code. For example, the so-called assembly languages use abbreviations such as ADD, SUB, MPY to represent instructions. These mnemonic codes are like labels easily associated with the items to which they refer. Which of the following does these languages in the passage refer to? assembly languages special programs *symbolic languages machine code 5.However, machine code as a means of communication is very difficult to write. For this reason, we use symbolic languages that are easier to understand. Then, by using a special program, these languages can be translated into machine code. For example, the so-called assembly languages use abbreviations such as ADD, SUB, MPY to represent instructions. These mnemonic codes are like labels easily associated with the items to which they refer. Which of the following is the word 'instructions' in the passage closest to? comments *commands translations explanations 6.Basic languages, where the program is similar to the machine code version, are know as low-level languages. In these languages, each instruction is equivalent to a single machine code instruction, and the program is converted into machine code by a special program called an assembler. These languages are still quite complex and restricted to particular machines. Which of the following does ' these languages' in the passage refer to? machine code version assemblers high-level languages *low-level languages 7.Basic languages, where the program is similar to the machine code version, are know as low-level languages. In these languages, each instruction is equivalent to a single machine code instruction, and the program is converted into machine code by a special program called an assembler. These languages are still quite complex and restricted to particular machines. Which of the following is not TRUE about the passage? *Low-level languages are still quite complex and restricted to any machines. The program is converted into machine code by an assembler. In these languages, each instruction is equal to a single machine code instruction. Basic languages are know as low-level languages. 8.To make the program easier to write and to overcome the problem of intercommunication between different types of machines, higher level languages were designed such as BASIC, COBOL, FORTRAN or Pascal. These are all problem-oriented rather than machine-oriented. Programs written in one of these languages (know as source programs) are converted into a lower-level language by means of a compiler (generating the object program). On compilation, each statement in a high-level language is generally translated into many machine code instructions. Which of the following can be inferred from the passage? The function of a compiler in a program The intercommunication between a high-level language and a low-level language. The difference between problem-oriented and machine-oriented. *Higher level languages were designed to solve the problem of intercommunication between different types of machines 9.To make the program easier to write and to overcome the problem of intercommunication between different types of machines, higher level languages were designed such as BASIC, COBOL, FORTRAN or Pascal. These are all problem-oriented rather than machine-oriented. Programs written in one of these languages (know as source programs) are converted into a lower-level language by means of a compiler (generating the object program). On compilation, each statement in a high-level language is generally translated into many machine code instructions. Which of the following does 'these languages' in the passage refer to? machine code instruction *higher level languages low-level languages Compilers 10.To make the programs easier to write and to overcome the problem of intercommunication between different types of machines, higher level languages were designed such as BASIC, COBOL, FORTRAN or PASCAL. There are all problem-oriented rather than machineoriented. Programs written in one of these languages ( known as source programs) are converted into a lower-level language by mean of compiler (generating the object program). On compilation, each statement in a high-level language is generally translated into many machine code instructions. The word 'translated' in the passage is the closet to___. Turned Changed *Converted Transferred 11.People communicate instructions to the computer in symbolic languages and the easier this communication can be made the wider the application of computers will be. Scientists are already working on Artificial Intelligence and the next generation of computers may be able to understand human languages. The word 'communicate' in the passage is the closet to__ *Send Talk Transfer Order 12.People communicate instructions to the computer in symbolic languages and the easier this communication can be made the wider the application of computers will be. Scientists are already working on Artificial Intelligence and the next generation of computers may be able to understand human languages. Which of the following is true about the passage? Symbolic languages can make a wider application of computers. *The next generation of computers may be able to understand human languages. Scientists have been working on Artificial Intelligence People communicate with the computer in symbolic languages 13.The question of security is crucial when sending confidential information such as credit card number. For example, consider the process of buying a book on the Web. You have to type your credit card number into an order from which passes from computer on its way to the online bookstore. If one of the intermediary computers is infiltrated by hackers, your data can be copied. it is difficult to say how often this happens, but it's technically possible. Which of the following is the passage about? sending confidential data such as credit card number *the importance of security when sending confidential data the process of buying a book on the Web data can be copied by intermediary computers 14.The question of security is crucial when sending confidential information such as credit card number. For example, consider the process of buying a book on the Web. You have to type your credit card number into an order from which passes from computer on its way to the online bookstore. If one of the intermediary computers is infiltrated by hackers, your data can be copied. it is difficult to say how often this happens, but it's technically possible. The word 'which' in the passage referred to___ *An order form Your credit card number credit card number the process of buying a book 15.The question of security is crucial when sending confidential information such as credit card number. For example, consider the process of buying a book on the Web. You have to type your credit card number into an order from which passes from computer on its way to the online bookstore. If one of the intermediary computers is infiltrated by hackers, your data can be copied. it is difficult to say how often this happens, but it's technically possible. The word 'its' in the passage referred to___ credit card number Data Computer *An order form 16. A computer displays images on the phosphor-coated surface of a graphics display screen by means of an electron beam that sweeps the screen many times each second. Those portions of the screen energized by the beam emit light, And changes in the intensity of the beam determine their brightness and hue. The brightness of the resulting image fades quickly, however, and must be continuously 'refreshed' by the beam, typically 30 times per second. Which of the following is the passage about? Performance of an electron beam The role of the brightness of the resulting image on screen *How a computer displays images on a graphics display The interaction between brightness and hue on the screen. 17.A computer displays images on the phosphor-coated surface of a graphics display screen by means of an electron beam that sweeps the screen many times each second. Those portions of the screen energized by the beam emit light, And changes in the intensity of the beam determine their brightness and hue. The brightness of the resulting image fades quickly, however, and must be continuously 'refreshed' by the beam, typically 30 times per second. The word 'portion' in the passage is closest to_____ Rates *Sections Divisions Groups 18. Private networks connected to the internet can be attacked by intruders who attempt to take valuable information such as Social security numbers, bank accounts or research and business reports. To protect crucial data, companies hire security consultants who analyze the risks and provide security solution. The most common methods of protection are passwords for access control, encryption and decryption systems, and firewalls. The word 'intruders' in the passage is referred to_____ *Hackers. Consultants Pirates While hackers 19.Private networks connected to the internet can be attacked by intruders who attempt to take valuable information such as Social security numbers, bank accounts or research and business reports. To protect crucial data, companies hire security consultants who analyze the risks and provide security solution. The most common methods of protection are passwords for access control, encryption and decryption systems, and firewalls. According to the passage, which of the following do security consultants do? *Analyze the risks and provide security solutions Take valuable information Provide common methods of protection Protect crucial data 20. If your friend suddenly had an accident and was unconscious or incoherent, could you provide any information to an ambulance crew? Would you know her type, her allergies, the prescription drugs she takes? Probably not. Even family members may not have this information, or be too distraught themselves to provide needed medical information. Enter the MediCard, a plastic card that has an embedded chip containing all that patient information. Small computers that can read the cards are installed in ambulances and in hospital emergency rooms. This system is working successfully in some communities. The biggest problem is making sure that people carry their cards at all times. Which of the following is the passage about? Performance of an ambulance crew Providing needed medical information *Introduction of the MediCard Installing small computers in ambulances and in hospital emergency rooms 21. If your friend suddenly had an accident and was unconscious or incoherent, could you provide any information to an ambulance crew? Would you know her type, her allergies, the prescription drugs she takes? Probably not. Even family members may not have this information, or be too distraught themselves to provide needed medical information. Enter the Medicard, a plastic card that has an embedded chip containing all that patient information. Small computers that can read the cards are installed in ambulances and in hospital emergency rooms. This system is working successfully in some communities. The biggest problem is making sure that people carry their cards at all times. According to the passage which of the following is NOT TRUE about the Medicard A plastic card with an embedded chip providing a person's needed medical information A plastic card with an embedded chip providing a person's blood type, her allergies, the prescription drugs A plastic card with an embedded chip containing all that patient information *the Medicard is installed in ambulances and in hospital emergency rooms 22. If your friend suddenly had an accident and was unconscious or incoherent, could you provide any information to an ambulance crew? Would you know her type, her allergies, the prescription drugs she takes? Probably not. Even family members may not have this information, or be too distraught themselves to provide needed medical information. Enter the Medicard, a plastic card that has an embedded chip containing all that patient information. Small computers that can read the cards are installed in ambulances and in hospital emergency rooms. This system is working successfully in some communities. The biggest problem is making sure that people carry their cards at all times. the passage is closest to_____ Nervous *Distracted Worried Unconscious The word 'distraught' in 23. This may sound very much like shopping by the internet, but in fifty years' time it will be very different. Shoppers will be able to scan down virtual supermarket aisles on their PC and click on to whatever they want, the goods will then be delivered shortly afterwards. Customers may well be able ta call up a virtual assistant who will talk them through their shopping or to ask the computer for suggestions. Moreover, people will be able to get background information on shops and goods, and will be able to boycott any that offend their ethical considerations. Which of the following is the passage is mainly about? Goods delivery Getting background information on shops and goods *Computer shopping Shopping by the internet. 24. Computer support specialists provide technical assistance, support, and advice to customers and other users. This occupational group includes technical support specialists and help-desk technicians. These troubleshooters interpret problems and provide technical support for hardware, software, and systems. They answer telephone calls, analyze problems by using automated diagnostic program, and resolve recurring difficulties. What do TROUBLESHOOTERS refer to? *technical support specialists and help-desk technicians help-desk technicians technical support specialists customers and other users 25. Computer support specialists provide technical assistance, support, and advice to customers and other users. This occupational group includes technical support specialists and help-desk technicians. These troubleshooters interpret problems and provide technical support for hardware, software, and systems. They answer telephone calls, analyze problems by using automated diagnostic program, and resolve recurring difficulties. What is not the job task of computer support specialists? Providing technical support for hardware and software *Providing technical support and diagnosis program to customers Providing advice to customers via telephone Using automated diagnostic programs to analyze problems 26. Experts advise us to register country-specific do main names such as '.fr' for France, '.mx' for Mexico or '.vn' for Vietnam. That way, we can protect our brand name in other countries and be ready to expand our business internationally. There are now more than 191 countrycode domain names available, each with its own set of regulations. A Belgian company's country-code domain names will most probably be� AAA.com.fr AAA.com.vn AAA.com.mx *None of the choices is accepted EXCEPT THIS ONE 27. Experts advise us to register country-specific do main names such as '.fr' for France, '.mx' for Mexico or '.vn' for Vietnam. That way, we can protect our brand name in other countries and be ready to expand our business internationally. There are now more than 191 countrycode domain names available, each with its own set of regulations. What is not true about country-specific domain names ? They are, for example , .fr, .mx, or .vn There are nearly 100 country- specific domain names now *Country- specific domain names may the same for some countries Country-code domain names has different regulations 28. Experts advise us to register country-specific do main names such as '.fr' for France, '.mx' for Mexico or '.vn' for Vietnam. That way, we can protect our brand name in other countries and be ready to expand our business internationally. There are now more than 191 countrycode domain names available, each with its own set of regulations. Why should we register country- specific domain names? *To protect our brand in other countries To expand locally To have a set of regulations To protect your business domestically 29. the U.S. Anti-cyber squatting Consumer Protection Act, which makes it easier for business to sue pirates holding domain names for ransom, has just been approved. However, the effectiveness of the new remains an open question. Moreover, small companies and individuals cannot afford a lengthy court battle. What can RANSOM most probably be? facilities *money human jobs 30. the U.S. Anti-cyber squatting Consumer Protection Act, which makes it easier for businesses to sue pirates holding domain names for ransom, has just been approved. However, the effectiveness of the new law remains an open question. Moreover, small companies and individuals cannot afford a lengthy court battle. Which statement is not true? In the US, there has been an anti-cyber squatting Consumer Act *There is a question about the anti-cyber squatting Consumer Act If you cyber squat in the US, you may be sued People are still not sure about the effectiveness of the anti-cyber squatting Consumer Act 31. a new batch of domain extensions would open the field for businesses and consumers who have been shut out of the '.com' Web land. Based on negotiations among ICANN members, there ultimately could be many more extensions. No final decisions have been made -ICANN is expected to debate this issue at its next international conference -but new extensions under consideration include .biz, .firm, .shop, .airline. What is not true about the text? ICANN members decide what new extensions should be included ICANN hasn't decided what new extensions should be *biz, .firm, .airline and .shop are four new extensions that ICANN has decided to have one of the topics to be discussed at ICANN's next international conference is a new batch of domain extensions 32. A new batch of domain extensions would open the field for businesses and consumers who have been shut out of the 'com' web land. Based on negotiations among ICANN members , there ultimately could be many more extension. No final decisions have been made-ICANN is expected to debate this is sue at its next international conference- but new extensions under consideration include .biz, .firm, .shop, .airline. What is the main idea of the text? ICANN ICANN members ICANN's next international conference *new domain extensions 33. A new batch of domain extensions would open the field for businesses and consumers who have been shut out of the 'com' web land. Based on negotiations among ICANN members , there ultimately could be many more extension. No final decisions have been made-ICANN is expected to debate this is sue at its next international conference- but new extensions under consideration include .biz, .firm, .shop, .airline. What dose BATCH mean in this text? collection *roup or set use registration 34. Cyber squatters only have to pay $35 for a domain name and the return on a $35 investment can range hundreds to thousands- and sometime even millions- of dollars, depending on the buyer. A trio of cyber squatters made headlines last year when they tried to sell barrydiller.Com for $10 million. But rather than pay, USA Networks CEO Barry Diller took them to court and won. How much did Barry Diller pay for 'barrydiller.com'? *$0 $10m $35 thousands 35. Cyber squatters only have to pay $35 for a domain name and the return on a $35 investment can range hundreds to thousands- and sometime even millions- of dollars, depending on the buyer. A trio of cyber squatters made headlines last year when they tried to sell barrydiller.Com for $10 million. But rather than pay, USA Networks CEO Barry Diller took them to court and won. How much does a domain name cost? $1000 $100 $10 *$35 36. Viruses can enter a PC through files from disks, the internet or bulletin board systems. If you want to protect your system, don't open e-mail attachments from strangers and take care when downloading files from the web. What dose the writer advise us to do to avoid viruses? *never open email attachments from a person you do not know never download files from the internet never use removable disks without scanning you do not know never join a bulletin board system 37. To protect crucial data, companies hire security consultants who analyze the risks and provide security solutions. The most common methods of protection are access control, encryption and decryption systems, and firewalls. Which of the following are the ways to protect data that people often use? hiring security consultants, using passwords, firewalls and decryption and decryption systems analyzing risks and using password , firewalls and decryption and decryption systems *using password , firewalls and decryption and decryption systems all of the choices are true 38. To protect crucial data, companies hire security consultants who analyze the risks and provide security solutions. The most common methods of protection are access control, encryption and decryption systems, and firewalls. This is an extract from an article about____ crucial *internet security the job of security consultant coding systems 39. pictures are stored and processed in a computer's memory by either of two methods: raster graphics and vector graphics. Raster-type graphics maintain an image as a matrix of independently controlled dots, while vector graphics maintain it as a collection of points, lines, and arcs. Raster graphics are now the domain computer graphics technology Which type of graphics is more popularly used nowadays? *raster graphics vector graphics the one that uses points and lines the one that uses dots and arcs 40. pictures are stored and processed in a computer's memory by either of two methods: raster graphics and vector graphics. Raster-type graphics maintain an image as a matrix of independently controlled dots, while vector graphics maintain it as a collection of points, lines, and arcs. Raster graphics are now the domain computer graphics technology What is the text mainly about? *how pictures are stored and processed a prospect for raster graphics dominant computer graphics technology the similarity between raster and vector graphics. 41. a computer-graphics system basically consists of a computer to store and manipulate images, a display screen, various input and output devices, and a graphics software package, i.e. a program that enables a computer to process graphics images by means of mathematical language. these program enable the computer to draw, colour, shade, and manipulate the images held in its memory. What can users do with a graphics package? store images process mathematical language. *draw pictures or images hold images in memory 42. a computer-graphics system basically consists of a computer to store and manipulate images, a display screen, various input and output devices, and a graphics software package, i.e. a program that enables a computer to process graphics images by means of mathematical language. these program enable the computer to draw, colour, shade, and manipulate the images held in its memory. What is a graphics package? devices storing and manipulating images input and output devices a mathematical languages *a program enabling computers to process graphics images 43. a computer-graphics system basically consists of a computer to store and manipulate images, a display screen, various input and output devices, and a graphics software package, i.e. a program that enables a computer to process graphics images by means of mathematical language. these program enable the computer to draw, colour, shade, and manipulate the images held in its memory. How many main parts or components needed in a computergraphics system are mentioned in the text? 2 3 *4 6 44.justin Hall, who began eleven years of personal blogging in 1994 while a student at Swarthmore College is generally recognized as one of the earliest bloggers, as is Jerry Pournelle. What can we say about Justin Hall? he's amongst the first people who had a blog he studied at Swarthmore he first blogged in 1994 *all of the choices are right 45.support specialists may write training manuals and train computer users in how to use new computer hardware and software. What are training manuals? *instructions to use computers books on training documents for advertising computers leaflets about computers 46.to create the illusion of movement, an image is displayed o the computer screen then quickly replaced by a new image that is similar to the previous image, but shifted slightly. What does the phrase SHIFTED SLIGHTLY mean? moved a bit *changed a bit changed a lot remained unchanged 47.there are a lot of benefirts from an open system like the internet, but we are also exposed to hackers who break into computer system just for fun, as well as to steal information or propagate viruses.so how do you go about making online transactions secure? What does the word PROPAGATE mean in this text? scan stop clean *spread 48.there are a lot of benefirts from an open system like the internet, but we are also exposed to hackers who break into computer system just for fun, as well as to steal information or propagate viruses.so how do you go about making online transactions secure? What is NOT true about the text? The internet has good side as well as bad side there are three reasons why hackers breaking into computer system our system can be attacked if we are connected to an open system *all hackers want to steal data from the system they break into 49.after a slow star ,blogging rapidly gained in popularity. blog usage the near-simultaneous arrival of the first hosted blog tools such as open diary which was launched in October 1998,soon growing to thousands of online diaries. open diary innovated the reader comment, becoming the first blog community where readers could add comments to other writes' blog entries. According to the passage, which of the following statements is right? people liked blogging from the first time Blog appeared first in1999 *blogging didn't develop well at first blogging was named Open Diary 50. After a slow star, blogging rapidly gained in popularity. Blog usage spread during 1999 and the years following, being further popularized by the near - simultaneous arrival of the first hosed blog tools such as Open diary which was launched in October 1998, soon growing to thousands of online diaries. Open Diary innovated the reader comment becoming the fist blog community where reads could and comments to other writer's blog entries. The phrase � gain in popularity� in the passage means ____. became more and more popular became less and less developed *attracted the attention of few people became attracted by the population 51. After a slow star, blogging rapidly gained in popularity. Blog usage spread during 1999 and the years following, being further popularized by the near - simultaneous arrival of the first hosed blog tools such as Open diary which was launched in October 1998, soon growing to thousands of online diaries. Open Diary innovated the reader comment becoming the fist blog community where reads could and comments to other writer's blog entries. What can be inferred from the passage? *After a slow start, a lot of users liked and supported blogging After a slow start, blogging became popular until 1999 The launching of Open diary made lots of people know about blogging People liked blogging because they could write comments to it 52. However, the evolution of tools to facilitate the production and maintenance of web articles posted in reverse chronological order made the publishing process feasible to a much larger, less technical, population. How are web articles arranged? The oldest entry is followed by others *The latest entry is followed by the less recent Entries are randomly selected to appear Entries are shown according to their page view counts 53. Cyber - squatters only have to pay $35 for a domain name and the return on a $35 investment can range from hundreds to thousands and sometime even millions depending on the buyer. A trio of cyber - squatters made headlines last year when they tried to sell barrydiller.com for $10 million . But rather than pay, USA Networks CEO Barry Diller took them to court and won. Which statement is TRUE? *The fee for registering a domain name $ barrydiller.com 35 Cyber - squatter only have to invest $35 USA Network had to pay $10 million for domain name It is the Cyber - squatters who decide the price of a domain name 54. Cyber - squatters only have to pay $35 for a domain name and the return on a $35 investment can range from hundreds to thousands and sometime even millions depending on the buyer. A trio of cyber - squatters made headlines last year when they tried to sell barrydiller.com for $10 million. But rather than pay, USA Networks CEO Barry Diller took them to court and won. Make headlines' means_____. To make headline for barydiller.com *To be an important item of news in newspapers or on the radio or television To make barrydiller.com famous To be an important item in the Internet 55. Now let's turn our attention to speed. Access times vary from 8ms to 20ms. Access time' or seek time - is the time it takes your read/write heads to find any particular record. You have to distinguish8 clearly between seek time (e.g.20ms) �and data transfer rate� ( the average speed required to transmit data from a disk system to the RAM, e.g. at 20 megabits per second). Remember that the transfer rate also depend on the power o your computer. Which statement is TRUE according to the text? Access time and data transfer rate mean the same Seek time and data transfer rate mean the same *Access time and seek time mean the same Access time is the average time required for the recording 56. Now let's turn our attention to speed. Access times vary from 8ms to 20ms. Access time' or seek time - is the time it takes your read/write heads to find any particular record. You have to distinguish8 clearly between seek time (e.g.20ms) �and data transfer rate� ( the average speed required to transmit data from a disk system to the RAM, e.g. at 20 megabits per second). Remember that the transfer rate also depend on the power o your computer. The access time is always____. Over 20ms Under 8ms 8ms or 20ms *Between 8ms and 20ms 57. The Maltese Amoeba may sound like a cartoon character, but if attacked your computer, you wouldn't be laughing. The Maltese Amoeba is a computer virus. It is a form of software which can �infect� your system and destroy your data. Making computer viruses is only one type of computer crime. Others include hacking ( changing data in a computer without permission) and pirating ( illegally copying software programs). How many types of computer crimes are mentioned is the passage? One Tow *Three Four 58.the Maltese amoeba may sound like a cartoon character but if it attacked your computer you wouldn't be laughing the Maltese amoeba is a computer virus.it is a from of software which can infect your system and destroy your data making computer viruses is only one type of computer crime. others include hacking and pirating( illegally copying software programs). Which one is NOT MENTIONED name of a computer virus *How can a virus work types of computer crimes the definition of computer virus 59, the Maltese amoeba may sound like a cartoon character but if it attacked your computer you wouldn't be laughing the Maltese amoeba is a computer virus.it is a from of software which can infect your system and destroy your data making computer viruses is only one type of computer crime. others include hacking and pirating( illegally copying software programs). Which is NOT TRUER about the text *pirating means legally copying software programs hacking is one type of computer crime computer virus is a form of software which can infect your system and destroy your data when Maltese amoeba attacked your computer your wouldn't be laughing 60. a postscript file consists of two main parts: the prolong which contains a set of subroutines used to from different graphic elements and the script which contains the elements introduced by the user the script calls up the subroutines stored in the subroutines stored in the prolog and adds the parameters for example, if you have drawn a square of 10x5 cm the script calls up the subroutines square and specifies the values 10x5. Which statement is NOT TRUE prolog and script are two main parts of a postscript file *prolong contains different graphic element such as rectangle and curves subroutines used to form different graphic element are stored in the prolog the script calls up the subroutines and adds the parameters 61. a postscript file consists of two main parts: the prolong which contains a set of subroutines used to from different graphic elements and the script which contains the elements introduced by the user the script calls up the subroutines stored in the subroutines stored in the prolog and adds the parameters for example, if you have drawn a square of 10x5 cm the script calls up the subroutines square and specifies the values 10x5. If you want to draw an equilateral triangle of 5cm the script calls up the subroutines____. square and specifies the values 5 square stored in the prolog and adds the parameter 5 *triangle stored in the prolog and add the parameter 5 triangle in the script and specifies the values 5 62. Graphics software programs enable the user to draw colour and shade and manipulate an image on a display screen with command input by a keyboard. What can be inferred from the passage? *the keyboard can be used to input commands we can use the keyboard to draw graphics software can store an image graphics software lets users to manipulate different kinds of texts 63.help-desk technicians deal directly with customer issues and companies value them ass a source of feedback on their products. they are consulted for information about what gives customers the most trouble as well as other customer concerns most computer support specialists start out at the help desk. Help desk technicians���_______. make deals with customers value customers as source of feedback *collect information about customers issues help customers through telephone line 64. help-desk technicians deal directly with customer issues and companies value them ass a source of feedback on their products. they are consulted for information about what gives customers the most trouble as well as other customer concerns most computer support specialists start out at the help desk. According to the passage which one is NOT TRUE about help technicians? they deals directly with the customers they may start their job at the help desk they know customers problems *they value customers 65. They are talking to each other. The very first job of the Internet was to move files from one computer to another even when these computers were very far apart, and Files Transfer protocol was used for this job. If you use the Net just to browse your favorite website, you may not use FTP a lot, but the people who built those websites almost certainly used a FTP program to put the pages on the web in the first place. Which of the following is the best definition of a protocol? The way that a computer talk Something made from FTP A method between two computers *An agreed means of communication 66. one of the earliest bits of the Net is FTP, which stands for Files Transfer Protocol. 'File' and 'transfer' are easy enough to understand, but what is a 'protocol'? Put simply, a protocol is a method that two computer have agreed to use when they are talking to each other. The very first job of the Internet was to move files from one computer to another even when these computers were very far apart, and File Transfer Protocol was used for this job. If you use the Net just to browses your favorite websites, you may not use FTB a lot, but the people who built those website almost certainly used a FTB program to put the pages on the web in the first place. Which of the following sentence is not true according to the passage? You may not use ATP very often if you the internet just to browses your favorite website *The very first job of the Internet was to move files from one computer to another if these computer were not very far apart File Transfer Protocol was used for moving files between computer People use a ATP program to put the pages on the website 67. we all know what e-mail is, but did you know that you usually use two different protocols with it? We usually send mail by SMTP( Simple Mail Transfer protocol) and pick it up, as you might expect by POP ( Post Office Protocol). And yes, the World Wide Web also uses a protocol. The links on a web page that you click to take you to another part � the Net are call ' hypertext links'. Now look at the top of your web page, and you should see 'http://www.english-online.org.uk/'. Http stands for(you guessed it!) Hypertext Transfer Protocol and that 'www' after that show that this page is part of the world wide web. How many protocol dose the text mention? *Three Four Five Six 68. we all know what e-mail is, but did you know that you usually use two different protocols with it? We usually send mail by SMTP( Simple Mail Transfer protocol) and pick it up, as you might expect by POP ( Post Office Protocol). And yes, the World Wide Web also uses a protocol. The links on a web page that you click to take you to another part � the Net are call ' hypertext links'. Now look at the top of your web page, and you should see 'http://www.english-online.org.uk/'. Http stands for(you guessed it!) Hypertext Transfer Protocol and that 'www' after that show that this page is part of the world wide web. How many protocol dose the text mention? At the top of the web page shows that it is part of the world 'www' wide web Http stands for hypertext Transfer Protocol Hypertext links is the links from a web page to another part of the net *http means you guessed it 69. we all know what e-mail is, but did you know that you usually use two different protocols with it? We usually send mail by SMTP( Simple Mail Transfer protocol) and pick it up, as you might expect by POP ( Post Office Protocol). And yes, the World Wide Web also uses a protocol. The links on a web page that you click to take you to another part � the Net are call ' hypertext links'. Now look at the top of your web page, and you should see 'http://www.english-online.org.uk/'. Http stands for(you guessed it!) Hypertext Transfer Protocol and that 'www' after that show that this page is part of the world wide web. How many protocol are used to send an email? *One Two Three Four 70. we all know what e-mail is, but did you know that you usually use two different protocols with it? We usually send mail by SMTP( Simple Mail Transfer protocol) and pick it up, as you might expect by POP ( Post Office Protocol). And yes, the World Wide Web also uses a protocol. The links on a web page that you click to take you to another part � the Net are call ' hypertext links'. Now look at the top of your web page, and you should see 'http://www.english-online.org.uk/'. Http stands for(you guessed it!) Hypertext Transfer Protocol and that 'www' after that show that this page is part of the world wide web. Which of the following statement is true? You use Http to send an email You use SMTP and POP to send an email *You use SMTP to send an email You use two different protocols to send an email 71. A blog is website in which items are posted on a regular basis and displayed in reverse chronological order. The term blog is a shortened from of web log, maintaining a blog or adding an article to an existing blog is called 'blogging'. Individual articles on a blog are called 'blog post', 'posts' or 'entries'. A person who posts these entries is called a 'blogger'. 'blog' can also be used as a verb, meaning to maintain or add content to a blog. Blogs use a conversational style of document. Often blogs focus on particular area of interest s, such as Washington D.C.'s political going-on. Some blogs discuss personal experiences. Blog definition and related term *What is a blog? Blog definition and uses Blog definition and topics 72. A blogs is a website in which items are posted on a regular basis and displayed in reverse chronological order. The term blog is a shortened form of weblog or web log .Authoring a blog, maintaining a blog or adding an article to an existing blog is called 'blogging'. Individual articles on a blog are called 'blog posts', 'posts', or 'entries'. A person who posts these entries is called a 'blogger'. 'Blog' can also be used as a verb, meaning to maintain or add content to a blog. Blogs conversational style documentation. often blogs focus on particular ' area of interest', such as Washington D.C.'s political goings-on. Some blogs discuss personal experiences. Which of the following is NOT mentioned in the paragraph? Blog's related terms *types od blog blog's is topics blog definiton 73. A blogs is a website in which items are posted on a regular basis and displayed in reverse chronological order. The term blog is a shortened form of weblog or web log .Authoring a blog, maintaining a blog or adding an article to an existing blog is called 'blogging'. Individual articles on a blog are called 'blog posts', 'posts', or 'entries'. A person who posts these entries is called a 'blogger'. 'Blog' can also be used as a verb, meaning to maintain or add content to a blog. Blogs conversational style documentation. often blogs focus on particular ' area of interest', such as Washington D.C.'s political goings-on. Some blogs discuss personal experiences. Which of the following statement is NOT TRUE? Blog can be used as a verb blog is short form of weblog Blog can be used as a noun *Blog can be used as an adverb 74. A blogs is a website in which items are posted on a regular basis and displayed in reverse chronological order. The term blog is a shortened form of weblog or web log .Authoring a blog, maintaining a blog or adding an article to an existing blog is called 'blogging'. Individual articles on a blog are called 'blog posts', 'posts', or 'entries'. A person who posts these entries is called a 'blogger'. 'Blog' can also be used as a verb, meaning to maintain or add content to a blog. Blogs conversational style documentation. often blogs focus on particular ' area of interest', such as Washington D.C.'s political goings-on. Some blogs discuss personal experiences. Items displayed in reverse chronological order means_______. *events arranged in reverse order in which they happened Items arranged in chronological order in which they happened Items displayed upside down events arranged in the order in which they happened 75. A blogs is a website in which items are posted on a regular basis and displayed in reverse chronological order. The term blog is a shortened form of weblog or web log .Authoring a blog, maintaining a blog or adding an article to an existing blog is called 'blogging'. Individual articles on a blog are called 'blog posts', 'posts', or 'entries'. A person who posts these entries is called a 'blogger'. 'Blog' can also be used as a verb, meaning to maintain or add content to a blog. Blogs conversational style documentation. often blogs focus on particular ' area of interest', such as Washington D.C.'s political goings-on. Some blogs discuss personal experiences. which of the following statement is true? Articles on a blog are called ' blogging' Blog always focus on a particular 'are of interest' *author of a blog is called a 'blogger' Posting articles into a blog is called 'posts' 76.viruses are programs which are written deliberately to damage data. viruses can hide themselves in a computer system. Some viruses are fairly harmless. They may flash a message on screen, such as ' gotcha! bet you don't know how i crept in'. The Yankee Doodle virus plays this American tune on the computer's small internal speaker every eight days at 5 p.m. Others have serious effects. They attach themselves to the operating system and can wipe out all your data or turn it into gobbledygook. When the Cascade virus attacks, all the letters in a file fall into a heap at the bottom of the screen. This looks spectacular but it's hard to see the funny side when it's your document. Others' refers to_____. Other message *other viruses other programs other tunes 77. viruses are programs which are written deliberately to damage data. viruses can hide themselves in a computer system. Some viruses are fairly harmless. They may flash a message on screen, such as ' gotcha! bet you don't know how i crept in'. The Yankee Doodle virus plays this American tune on the computer's small internal speaker every eight days at 5 p.m. Others have serious effects. They attach themselves to the operating system and can wipe out all your data or turn it into gobbledygook. When the Cascade virus attacks, all the letters in a file fall into a heap at the bottom of the screen. This looks spectacular but it's hard to see the funny side when it's your document. which of the following statement is true? *The Cascade can turn your into gobbledygook All viruses have serious effects on your computers The Yankee Doodle flashes a message on screen Some viruses are totally harmless 78. viruses are programs which are written deliberately to damage data. viruses can hide themselves in a computer system. Some viruses are fairly harmless. They may flash a message on screen, such as ' gotcha! bet you don't know how i crept in'. The Yankee Doodle virus plays this American tune on the computer's small internal speaker every eight days at 5 p.m. Others have serious effects. They attach themselves to the operating system and can wipe out all your data or turn it into gobbledygook. When the Cascade virus attacks, all the letters in a file fall into a heap at the bottom of the screen. This looks spectacular but it's hard to see the funny side when it's your document. Which of the following statement is true? *The Yankee Doodle virus activates at 5 p.m every eight days The Yankee doodle virus plays this American tune on the computer's small internal speaker every days at 5p.m the Cascade can wipe out all your data When the Cascade virus attacks you are funny because the screen looks spectacular 79. A PostScript file consists of two main parts: the 'prolog' which contains a set of subroutines used to form different graphic elements (rectangles, curves, etc�), and the script, which contains the elements introduced by the user. The script calls up the subroutines stored in the prolog and adds the parameters: for example, if you have drawn a square of 10x5 cm, the script calls up the subroutine Square and specifies the values 10x5. Which of the following statement is Not True? Prolog and script are two main parts of a Postscript file Subroutines used to form different graphic elements are stored in the prolog *Prolog contains different graphic elements such as rectangles and curves The script calls up the subroutines ands the parameters. 80. . A PostScript file consists of two main parts: the 'prolog' which contains a set of subroutines used to form different graphic elements (rectangles, curves, etc�), and the script, which contains the elements introduced by the user. The script calls up the subroutines stored in the prolog and adds the parameters: for example, if you have drawn a square of 10x5 cm, the script calls up the subroutine Square and specifies the values 10x5. If you want to draw an equilateral triangle of 5cm the script calls up the subroutines _____. Triangle in the script and specifies the values 5 Square stored in the prolog and adds the parameter 5 Square and specifies the values 5 *Triangle stored in the prolog and adds the parameter 5 81. Graphics software program enable the user to draw, colour and shade; and manipulate an image on a display screen with commands input by a keyboard. What can be inferred from the passage? *The keyboard can be used to input commands Graphics software lets user to manipulate different kinds of texts Graphics software can store an image We can use the keyboard to draw 82. Project managers develop requirements, budgets, and schedules for their firms' information technology projects. They coordinate such projects from development through implementation, working with internal and external clients, vendors, consultants, and computer specialists. These managers are increasingly involved in projects that upgrade the information security of an organization. Project managers in IT often responsible for_____. Being involved in projects Upgrade the information security of an organization Coordinating the different projects *Developing requirements, budgets, and schedules for their firms' information technology projects. 83. when buying a hard disk you should considers the kinds of drive mechanisms and products available. There are 'internal' and 'external' drives which are bots fixed hard drive, i.e. rigid disks sealed into the drive unit, either within or attached to the computer. A third type of hard drive, known as 'removable', allows in formation to be recorded on 'cartridges', which can be removed and stored off-line for security purposes. Popular removable hard disks include Jaz and Zip drives. A Jaz cartridge can store up to 2 GB of data, whereas a Zip drive can store up to 250 MB of data. How many factors should you consider when buying a hard disk? One *Two Three Four 84. when buying a hard disk you should considers the kinds of drive mechanisms and products available. There are 'internal' and 'external' drives which are bots fixed hard drive, i.e. rigid disks sealed into the drive unit, either within or attached to the computer. A third type of hard drive, known as 'removable', allows in formation to be recorded on 'cartridges', which can be removed and stored off-line for security purposes. Popular removable hard disks include Jaz and Zip drives. A Jaz cartridge can store up to 2 GB of data, whereas a Zip drive can store up to 250 MB of data. How many types of hard drives are ment ioned in the passage? One Two *Three Four 85. when buying a hard disk you should considers the kinds of drive mechanisms and products available. There are 'internal' and 'external' drives which are bots fixed hard drive, i.e. rigid disks sealed into the drive unit, either within or attached to the computer. A third type of hard drive, known as 'removable', allows in formation to be recorded on 'cartridges', which can be removed and stored off-line for security purposes. Popular removable hard disks include Jaz and Zip drives. A Jaz cartridge can store up to 2 GB of data, whereas a Zip drive can store up to 250 MB of data. Which type of hard disk can be stored off-line for security puposes? *Removable Cartridges external internal 86.As your e-mail message travels across the net, it is copied temporarily on many computers in between. This means it can be read by unscrupulous people who illegally enter computer systems. The only way to protect a message is to put it in a sort of' envelope' , that is, to encode it with some form of encryption. A system designed to send e-mail privately is Pretty Good Privacy, a freeware program written by Phil Zimmerman According to the passage, which statement is NOT TRUE? Using encryption to make your message safer online. A kind of 'envelope' is used for your message. *You can send messages securely through the net Your e-mail messages travels through the net 87 As your e-mail message travels across the net, it is copied temporarily on many computers in between. This means it can be read by unscrupulous people who illegally enter computer systems. The only way to protect a message is to put it in a sort of' envelope' , that is, to encode it with some form of encryption. A system designed to send e-mail privately is Pretty Good Privacy, a freeware program written by Phil Zimmerman. The word 'it' in the passage is referred to�����_____. The envelope Encryption The form *E-mail-message 88. As your e-mail message travels across the net, it is copied temporarily on many computers in between. This means it can be read by unscrupulous people who illegally enter computer systems. The only way to protect a message is to put it in a sort of' envelope' , that is, to encode it with some form of encryption. A system designed to send e-mail privately is Pretty Good Privacy, a freeware program written by Phil Zimmerman. What can be referred from the passage ? Using 'envelope' is the safest way to protect your message *Your messages through the net are sometimes exposed to others Most of Internet users are illegally It is very sending e-mail through the Internet 89. private networks connected to the Internet can be attacked by intruders who attempt to take valuable information such as Social Security numbers, bank account or research and business reports. To protect crucial data, companies hire security consultants who analyze the risks and provide security solutions. The most common methods of protection are password for access control, encryption and decryption system, and firewalls. How many ways to protect private networks are mentioned in the passage? One Two *Three four 90. Security is crucial when you send confidential information online. Consider, for example, the process of buying a book on the web. You have to type your credit card number into an order form which passes form computer to computer on its way to the online book store. If one of the intermediary computer is infiltrated by hacker, you data can by copied. Which of the following does the passage imply? You have to use credit card buying online. Someone might copy your data when you send it on the Internet. You can visit a book store online. *You should pay attention when sending important data online. 91. There are many benefits form an open system like the Internet, but one of the ricks is that we are often exposed to hackers, who break into computer system just for fun, to steal information, or to spread viruses. Which of the following is NOT TRUE about the passage? People can get both the good side as well as the bad side of the Internet. The Internet is an open system. *Hackers do no harm on the Internet. People who break into computer system are called hackers. 92. Publishing has existed in its current form for centuries. Ever since paper was first invented, human being have found ways of using it to pass on message to each other. Book, magazines, and newspapers are now part of our everyday lives, but with invention of the Internet and the speed of new technological advances, the word of publishing is changing. Online newspapers and magazines, blogs, and even e-book are changing the way we get information. Which of the following is TRUE about the passage? Paper publication is the only way of getting information for users. *Online publishing have great effect towards the way people get information. Books, newspapers and magazines are sold online. The Internet hasn't made any change in the world of publishing. 93. The only language a PC can directly execute is machine code, which is consists of 1s or 0s. This language is difficult to write, so we use symbolic languages that are easier to understand. For example, assembly languages use abbreviations such as ADD, SUB, and MPY to represent instructions. The program is then translated into machine code by software called an assembler. Which of the following is NOT TRUE according to the passage? *People easily understand machine code. Programmers use abbreviation to write instruction. An assembler translates symbolic languages into machine code. Machine code is a kind of computer languages consists of 1s and 0s. 94. The only language a PC can directly execute is machine code, which is consists of 1s or 0s. This language is difficult to write, so we use symbolic languages that are easier to understand. For example, assembly languages use abbreviations such as ADD, SUB, and MPY to represent instructions. The program is then translated into machine code by software called an assembler. Which of the following is TRUE according to the passage? An assembler is used to translate machine code into normal language. Machine code is the language that people can understand. *It's not easy for programmers to write machine code. People can't understand symbolic languages. 95.You don't need a sophisticated cell phone to surf the Internet when you are on the road just your own voice. That's the idea behind a new breed of voice service that is popping up all over the place. Subscribers dial a toll-free phone number and use spoken commands to listen to anything from weather conditions to stock quotes, or flight information to news stories. Which of following is TRUE about the passage? People can use any phone surf web. People can't get news when they are driving. People don't have to subscribe to voice services but they still use them. *People can use their voice to start a program. 96. You don't need a sophisticated cell phone to surf the Internet when you are on the road just your own voice. That's the idea behind a new breed of voice service that is popping up all over the place. Subscribers dial a toll-free phone number and use spoken commands to listen to anything from weather conditions to stock quotes, or flight information to news stories. The word 'toll-free' in passage is closest to ___. *no charge a lot of money no service smart 97. The basic equipment has changed drastically in the last few years. You no longer need a computer to use the Internet. Web TV provides email and access to the Web via normal TV set plus a high-speed modem. More recently, 3-Generation mobile phones and PDAs, personal digital assistants, also allow you to go online with wireless connection, with cables. Which of the following is NOT TRUE about the passage? The basic equipment is changing quickly these days. People can use Web TV to surf the Internet. *You must have a computer to access the Internet nowadays. You can connect webs through a 3-G mobile. 98. The basic equipment has changed drastically in the last few years. You no longer need a computer to use the Internet. Web TV provides email and access to the Web via normal TV set plus a high-speed modem. More recently, 3-Generation mobile phones and PDAs, personal digital assistants, also allow you to go online with wireless connection, with cables. According to the passage, to the Internet, you don't need to have ___. *a computer a PDA a modem a mobile phone 99. The basic equipment has changed DRASTICALLY in the last few years. You no longer need a computer to use the Internet. Web TV provides email and access to the Web via normal TV set plus a high-speed modem. More recently, 3-Generation mobile phones and PDAs, personal digital assistants, also allow you to go online with wireless connection, with cables. The word 'drastically' in the passage is closest to ___. lightly slowly *extremely freely 100. If you want to protect your PC, don't open email attachments from strangers and take care when downloading files from th Web. Remember to update you're anti-virus software as open as possible, since new viruses are being created all the time. Which of the following is NOT TRUE about the passage? user should protect their computer carefully *open whatever e-mail attachments you get update the latest anti-virus regularly New viruses are born every time 101. Kevin Mitnick, a legend among hackers, began hacking into banking networks and altering the credit reports of his enemies. He didn't expect that his most famous exploit hacking into North American Defense Command in Colorado Springs - would inspire the film War Games in 1983. Which of the following is TRUE about Kevin Mitnick? He is a computing legend He stole all the credits reports in bank networks *Film directors got inspiration from his work The film War Games was on display in 1983 102. In modern commercial printing, DTP files output directly to the printing plates without using film as an intermediate step. This new technology is known as Computer-to-Plate (CTP) or direct to plate, and the machine that generates plates for a printing press is called plate-setter. CTP machines are expensive, so most people take their files to a service bureau, a company that specializes in printing other people's files. Service bureaus offer a full range of scanning and printing solutions. According to the passage, people _____use film when printing DTP files. have to *don't have to must can 103. In modern commercial printing, DTP files output directly to the printing plates without using film as an intermediate step. This new technology is known as Computer-to-Plate (CTP) or direct to plate, and the machine that generates plates for a printing press is called plate-setter. CTP machines are expensive, so most people take their files to a service bureau, a company that specializes in printing other people's files. Service bureaus offer a full range of scanning and printing solutions. Which of the following is TRUE about the passage? CTP isn't a new technique in modern printing Everyone can print DTP files using CTP machines Plate-setter can print DTP files *A service bureau is one kind of printing companies 104. Audio is becoming a key element of the Web. Many radio stations broadcast live over the Internet using streaming audio technology, which lets you listen to audio in a continuous stream while it is being transmitted. The broadcast of an event over the Web, for example a concert, is called a webcast. Be aware that you won't be able to play audio and video on the Web unless you have a plug-in like RealPlayer or QuickTime. What can be inferred from the passage? People have to make a clip before they want to broadcast on the Internet *Some small program are needed to play audio or video on the Web Audio cannot transmitted over the Internet You won't be able to play audio or video on the Web 105. Audio is becoming a key element of the Web. Many radio stations broadcast live over the Internet using streaming audio technology, which lets you listen to audio in a continuous stream while it is being transmitted. The broadcast of an event over the Web, for example a concert, is called a webcast. Be aware that you won't be able to play audio and video on the Web unless you have a plug-in like RealPlayer or QuickTime. Which of the following is TRUE about the passage? You won't be able to play audio or video on the Web It's not easy to transmit audio over the Internet A plug-in effects badly to the Web *A webcast is an event which you can listen to or watch on the Internet 106. If you want to inject something special into your web pages, you can use Adobe Flash to include interactive animations and streaming audio. Additionally, you can insert Java applets - small programs that enable the creation of interactive files. Animations are made up of a series of independence picture put together in sequence to look like moving pictures. To see or hear all these files, you must have the right plug-in, an auxiliary program that expands the capabilities of your web browser. What is the function of Java program? Streaming audio over the Internet *Providing interactive features to web applications Integrating with plug-in programs Expanding the abilities of web browsers 107. If you want to inject something special into your web pages, you can use Adobe Flash to include interactive animations and streaming audio. Additionally, you can insert Java applets - small programs that enable the creation of interactive files. Animations are made up of a series of independence picture put together in sequence to look like moving pictures. To see or hear all these files, you must have the right plug-in, an auxiliary program that expands the capabilities of your web browser. The word 'auxiliary' in the passage is closest to____. *additional exceptional further special 108. It is important not to confuse programming languages with markup languages, used to create web documents. Markup languages use instructions, known as markup tags, to format and link text files. Which of the following is TRUE about the passage? Programming languages are very confusing *Programming languages and markup languages are not the same There aren't any differences between programming languages and markup languages Markup languages are used to create web documents 109. Visual Basic was developed by Microsoft in 1990. The name BASIC stands for Beginner's All-purpose Symbolic Instruction Code. The adjective Visual refers to the technique used to create a graphical user interface. Instead of writing a lot of instructions to describe interface elements, you just add pre-defined objects such as buttons, icons and dialog boxes. It enables programmers to create a variety of Windows applications. Which of the following is NOT TRUE about the passage? Visual Basic was generated in 1990 Visual Basic helps programmers create Windows applications *In Visual Basic, programmers have to write a lot of instructions to describe interface elements In Visual Basic, programmers use a lot of pre-defined objects to describe interface elements. 1.Java is an object-oriented language, similar to C + +, but more dynamic and simplified to eliminate possible programming errors. A Java program is both compiles and interpreted. First, the source code is compiled and converted into a format called bytecode, which can then be executed by a Java interpreter.[cr]The word in bold in the passage is closest to: A.attractive *B. active C. interesting D. compatible 2.Java is an object-oriented language, similar to C + +, but more dynamic and simplified to eliminate possible programming errors. A Java program is both compiles and interpreted. First, the source code is compiled and converted into a format called bytecode, which can then be executed by a Java interpreter.[cr]The word in bold in the passage is closest in meaning to: A.remove B. take away C. cancel *D. All are correct 3.Most programmers like Java because it allows them to write applets which make web pages moreinteractive and attractive. They can create graphic objects (for example, bar charts and diagrams) and new controls (for example, check boxes and push buttons with special properties). A web page that uses Java can have sounds that play in real time, music that plays in the background, cartoon-style animations, real-time video and interactive games.[cr]Which of the following can be used as the heading of the paragraph? A. The Java language B.Characteristics of the Java language *C.Why is Java popular? D.Alternatives to Java 4.Most programmers like Java because it allows them to write applets which make web pages more interactive and attractive. They can create graphic objects (for example, bar charts and diagrams) and new controls (for example, check boxes and push buttons with special properties). A web page that uses Java can have sounds that play in real time, music that plays in the background, cartoon-style animations, real�time video and interactive games.[cr]The word in bold in the passage is closest in meaning to: A. advents *B. check/ supervision C. attention D. manipulations 5.Most programmers like Java because it allows them to write applets which make web pages more interactive and attractive. They can create graphic objects (for example, bar charts and diagrams) and new controls (for example, check boxes and push buttons with special properties). A web page that uses Java can have sounds that play in real time, music that plays in the background, cartoon-style animations, real�time video and interactive games.[cr]The word in bold in the passage is closest to: A. real estates B. realties *C. attributes D. animations 6.Most programmers like Java because it allows them to write applets which make web pages more interactive and attractive. They can create graphic objects (for example, bar charts and diagrams) and new controls (for example, check boxes and push buttons with special properties). A web page that uses Java can have sounds that play in real time, music that plays in the background, cartoon-style animations, real�time video and interactive games.[cr]Which of the following is NOT TRUE about the passage? A.Bar charts and diagrams are graphic objects in a web page using Java. B.Interactive games can run in web pages that use Java. C.Thanks to Java, programmers can play music in the background of a web page. *D.Phones are configured to use Java games with animations and music in the background. 7.Most programmers like Java because it allows them to write applets which make web pages more interactive and attractive. They can create graphic objects (for example, bar charts and diagrams) and new controls (for example, check boxes and push buttons with special properties). A web page that uses Java can have sounds that play in real time, music that plays in the background, cartoon-style animations, real�time video and interactive games.[cr]How many new controls are mentioned in the passage? A. one *B. two C.three D. four 8.Senior Programmer required by DigitumUK, a leading supplier of business systems to the insurance industry. You will be able to work on the full range of software development activities - analysis, design, coding, testing, debugging and implementation.[cr]The word in bold in the passage is closest in meaning to: A.ordinary B. normal *C.best D. minor 9.Senior Programmer required by DigitumUK, a leading supplier of business systems to the insurance industry. You will be able to work on the full range of software development activities - analysis, design, coding, testing, debugging and implementation.[cr]The word in bold in the passage is closest to: A.field B. area C.sphere *D. All are correct 10.Senior Programmer required by DigitumUK, a leading supplier of business systems to the insurance industry. You will be able to work on the full range of software development activities - analysis, design, coding, testing, debugging and implementation.[cr]Which of the following is the passage about? *A.A job advert for a senior programmer. B.DigitumUK is a leading supplier of business system to the insurance industry. C.You can work as a software engineer. D.You need to develop the software. 11.it We are looking for a bright, competent QuarkXPress operator with at least three years� experience in design and layout. Skills in Photoshop, Freehand or Illustrator an advance. Ability to work in a team and to tight deadline is vital.[cr]The word in bold in the passage is closest to: A. proficient *B.competitive c. handsome D. nice 12.We are looking for a bright, competent QuarkXPress operator with at least three years� experience in design and layout. Skills in Photoshop, Freehand or Illustrator an advance. Ability to work in a team and to tight deadline is vital.[cr]Which of the following years of experience in design and layout is best suitable for the requirement? A. 0 B.1 c.2 *D.4 13.We are looking for a bright, competent QuarkXPress operator with at least three years� experience in design and layout. Skills in Photoshop, Freehand or Illustrator an advance. Ability to work in a team and to tight deadline is vital.[cr]Which of the following is NOT MENTIONED in the passage? *A.The QuarkXPress operator with three years experience has a high salary. B.The candidate needs to be excellent in Photoshop, Freehand or Illustrator, c. The candidate is capable of working in group D.The candidate can be able to finish work under pressure of time. 14.In recent years, TV and radio broadcasting has been revolutionized by developments in satellite and digital transmission. Digital TV is a way of transmitting pictures by means of digital signals, in contrast to the analogue signal used by traditional TV.[cr]The word in bold in the passage is closest in meaning to: A. assist B.emit *c. reform / change D.receive 15.In recent years, TV and radio broadcasting has been revolutionized by developments in satellite and digital transmission. Digital TV is a way of transmitting pictures by means of digital signals, in contrast to the analogue signal used by traditional TV.[cr]The word in bold in the passage is closest to: *A. by B.for c. because of D.according to 16.In recent years, TV and radio broadcasting has been revolutionized by developments in satellite and digital transmission. Digital TV is a way of transmitting pictures by means of digital signals, in contrast to the analogue signal used by traditional TV.[cr]The word in bold in the passage is closest to: *A.in opposition to B. compare with c. similar to D.similar with 17.In recent years, TV and radio broadcasting has been revolutionized by developments in satellite and digital transmission. Digital TV is a way of ?ansmitting pictures by means of digital signals, in contrast to the analogue signals used by traditional TV.[cr]Which of the following is NOT MENTIONED in the passage? A. Digital transmission changes radio broadcasting recently. *B.Digital TV provides a better quality of picture and sound, c. Digital signals are used to transmit pictures on digital TV. D.Traditional TV uses analogue signals to transmit pictures. 18.The use of GPS in cars and PDAs is widespread, so you can easily navigate in a foreign city or find the nearest petrol station. In the next few years, GPS chips will be incorporated into most of mobile phones.[cr]The word in bold in the passage is closest in meaning to: A.limited B.local c.narrow *D. popular 19.The use of GPS in cars and PDAs is widespread, so you can easily navigate in a foreign city or find the nearest petrol station.[cr]Which of the following does the passage IMPLY? A.You can find a foreign city easily. B.It takes a little time for you to find a gas station, c. There is always a petrol station around you. *D.Wherever you are, with GPS, you can�t be lost. 20.The use of GPS in cars and PDAs is widespread, so you can easily navigate in a foreign city or find the nearest petrol station. In the next few years, GPS chips will be incorporated into most of mobile phones.[cr]Which of the following is NOT TRUE about the passage? A.Cars and PDAs are popularly equipped with GPS. B.With GPS, you can easily navigate in a strange city. C.GPS chips will be embedded in most of cell phones in the near future. *D.Mobile phones are equipped with GPS nowadays. 21.It is important that you remember to log off after using the Internet. An open line increases the risk of viruses, and hackers might break into your computer to steal confidential data.[cr]The word in bold in the passage is closest to: A. safety B. security *C. danger D. truth 22.It is important that you remember to log off after using the Internet. An open line increases the risk of viruses, and hackers might break into your computer to steal confidential data.[cr]The word in bold in the passage is closest to: A. secret B. private C. intimate *D. All are correct 23.It is important that you remember to log off after using the Internet. An open line increases the risk of viruses, and hackers might break into your computer to steal confidential data.[cr]Which of the following is the main idea of the passage? *A.You need to exit the line on the Internet to avoid the dangers of viruses and hackers. B.Viruses exist on the Internet C.Hackers can steal your private data. D.All are correct 24.Wireless networks let you move, roam, from one access point to another, but they are less secure and subject to interference.[cr]The word in bold in the passage refers to: *A. Wireless networks B. you C. one access point D. another access point 25.Wireless networks let you move, roam, from one access point to another, but they are less secure and subject to interference.[cr]The word in bold in the passage is closest to: A. backup B. accommodation C. circulation *D. intervention 26.In a client-server network, a computer acts as a server and stores and distributes information to the nodes, or clients.[cr]The word in bold in the passage is closest to: A. build *B.dispense C. raise D. communicate 27.In a peer-to-peer network, all the computers have the same capabilities - that is, share files and peripherals without requiring a separate server computer.[cr]The word in bold in the passage is closest to: A. mobility B.relay *C. ability to perform D. extract 28.A lot of modem games certainly draw inspiration from films and even TV. You can see it in the look of the characters, the sound of the dialogue, and in even more artistic elements such as lighting and camera work.[cr]The word in bold in the passage is closest to? A. picture B.sense *C. genius D. view 29.A lot of modem games certainly draw inspiration from films and even TV. You can see it in the look of the characters, the sound of the dialogue, and in even more artistic elements such as lighting and camera work.[cr]The word in bold in the passage is closest to? A. to see or to watch *B. the appearance C.glance D. glimpse 30.A lot of modem games certainly draw inspiration from films and even TV.You can see it in the look of the characters, the sound of the dialogue, and in even more artistic elements such as lighting and camera work.[cr]Which of the following is the passage about? *A.Many modem games are influenced by films and TV. B.The characters are beautiful. C.Characters make dialogues. D.The lighting and camera work are artistic. 31.The use of A-list Hollywood actors to provide voice work in games is no coincidence either and is a good example of the two media coming together.[cr]The words in bold in the passage refers to: A.the alphabet *B.famous C.a list of A D.a series 32The use of A-list Hollywood actors to provide voice work in games is no coincidence either and is a good example of the two media coming together.[cr]Which of the following is TRUE about the passage? *A.Well-known Hollywood actors dub in video games. B.Well-known Hollywood actors appear in video games. c. Hollywood actors� appearance in video games is no coincidence. D.Hollywood actors appear in video games by accident. 33.TV and video games are amusing and can be educational. But too much of this kind of entertainment can be addictive and make children become accustomed to violence.[cr]What does �this kind of entertainment� mean? A. TV B.video games *c. TV and video games D. amusing and can be educational 34.TV and video games are amusing and can be educational. But too much of this kind of entertainment can be addictive and make children become accustomed to violence.[cr]Which of the following is the main idea of the passage? A.Video games are not good for children. B.TV and video games can help in education. c. Video games distract children from school and homework. *D.On the one hand, TV and video games are helpful. On the other hand, they make children become familiar with violence. 35.The term Artificial Intelligence originated in the 1940s, when Alan Turing said: �A machine has artificial intelligence when there is no discernible difference between the conversation generated by the machine and that of an intelligent person.�[cr]The word �that� in the passage refers to: A. the machine B. artificial intelligence *c.the conversation D. intelligent person 36.The term Artificial Intelligence originated in the 1940s, when Alan Turing said: �A machine has artificial intelligence when there is no discernible difference between the conversation generated by the machine and that of an intelligent person.�[cr]What does �1940s� in the passage mean? *A. From 1940 to 1949 B. From 1940 to 1950 c. From 1941 to 1950 D. From 1939 to 1950 37.The term Artificial Intelligence originated in the 1940s, when Alan Turing said: �A machine has artificial intelligence when there is no discernible difference between the conversation generated by the machine and that of an intelligent person.�[cr]The word �discernible� in the passage is closest in meaning to: *A. perceptible B. capable c.sensible D. intelligent 38.When you enter the airport, a hidden camera compares the digitized image of your face to that of suspected criminals. At the immigration checkpoint, you swipe a card and place your hand on a small metal surface. The geometry of your hand matches the code on the card, and the gate opens.[cr]The word �hidden� in the passage is closest in meaning to: A. reliable *B. concealed c.expensive D. modem 39.When you enter the airport, a hidden camera compares the digitized image of your face to that of suspected criminals. At the immigration checkpoint, you swipe a card and place your hand on a small metal surface. The geometry of your hand matches the code on the card, and the gate opens.[cr]The word �that� in the passage refers to: A. the airport B. the hidden camera *c.the digitized image D. your face 40.When you enter the airport, a hidden camera compares the digitized image of your face to that of suspected criminals. At the immigration checkpoint, you swipe a card and place your hand on a small metal surface. The geometry of your hand matches the code on the card, and the gate opens.[cr]The phrase �immigration checkpoint� in the passage refers to: A. immigration B. immigration control c.reception *D. A & B are correct 41.When you enter the airport, a hidden camera compares the digitized image of your face to that of suspected criminals. At the immigration checkpoint, you swipe a card and place your hand on a small metal surface. The geometry of your hand matches the code on the card, and the gate opens.[cr]The word �matches� in the passage means: A.short pieces of wood used for lighting a fire B. contestes *c. to combine well with D. to give in marriage Gammar 1.Dot matrix printers are noisy, ___ laser printer are quiet. so because there for *but 2.Graphics software programs enable the user ___ an image on a display screen with commands input by s keyboard. manipulate manipulating *to manipulate to manipulating 3.Images on paper ___ into the computer through the use of scanners, digitizers, patternrecognition devices, or digital cameras. *can be scanned can scan can be scan can scanned 4.Various output devices such as image-setters or film recorders___recently. has been developed *have been developed have developed has developed 5.Pictures___in a computer's momory by either of two methods: raster graphics and vector graphics. *are stored and processed store and process is stored and processed are storing and processing 6.This technique is identical ___ how the illusion of movement is achieved with television and motion pictures. for with of *to 7.___ security for online banking services, most banks use digital certificates. assure *to assure Assuring to assuring 8.When an e-mail message travels across the net, it ___ temporarily on many computers in between copies was copied *is copied is copying 9.An extortionist is someone who ___ registers trademarked names. *intentionally intentional intention intend 10.Network and computer systems administrators are responsible ___ local-area networks ( LAN ), wide-area networks (WAN), network segment, and internet and intranet systems. *for to with about 11.They are ___ involved with the upkeep, maintenance, and security of networks. increase increased *increasingly increasing 12.If you close a text file that you are editing, the computer will request ___ the file. to save you to save you save *save 13.There is a message displayed on the screen to tell you ___ to log on. not try not trying to not try *not to try 14.The data bus is bidirectional,___ the address bus is unidirectional. *whereas and although because 15.Early weblogs were simply manually ___ components of common websites. updating were update *update to update 16.In Delphi, the code ___ to the objects is written in a form of Pascal attaches which attaches *which is attached is attached 17.Server is a specia list computer ___ a server to a network. provides provided *providing is provided 18.A network is simply two or more computers ___ together to allow users to share files, software, and hardware. *linked linking are linked are linking 19.Help-desk technicians ___ telephone calls and e-mail messages from customers looking for help with computer problems. have responded to responding responds to *respond to 20.Systems administrators ___ maintaining network efficiency. are responsible for are in charge for are accountable for *all choices are right 21.Network and computer systems administrators ___ local-area networks (LAN), wide-area networks (WAN), network segment, and internet and intranet systems. are in charge with *are in charge of are responsible to are accountable to 22.CIOs are responsible ___ the overall technological direction of their organizations. about with *for to 23.The chief technology officer often ___ the organization's chief information officer. reports for *reports to account to be responsible to 24.Floppy disks store small amounts of data ___ hard disks store large amounts of data *whereas though so and 25.Handheld computers fit into your pocket ___ supercomputers occupy a whole room although because therefore *in contrast 26.High-level languages are easy to understand, ___ machine code is very difficult to understand. so *whereas because even though 27.Basic is a simple language, ___ C++ is complex *but so and nevertheless 28.Modern computers are powerful and relatively cheap ___ older computers were less powerful and quiet expensive in addition according to *in contrast therefore 29.An analyst analyses problems and finds solutions, ___ a programmer turns these solutions into computer programs and *whereas because so 30.A graphics package produces images and designs ___ a word processer produces texts in contrast although so *but 31.___ a printer runs out of paper, an interrupts carries a signal to the CPU if *when after until 32.___ the CPU receives the signal, it interrupts its takes. *when unless after before 33.The CPU sends a message to the user ___ it saves its current status in a special area of memory before until *after as soon as 34.___ the user reloads the paper tray, the processor returns to its previous state if *when unless before 35.___ computers are general purpose instruments, they can be used in many different ways. as well as although so *because 36.Robots inhuman from ___ often featured in Science fiction. *have has are is 37.Robotic arms ___ commonly used for car manufacture, nuclear plants, and for bomb disposal is *are get gets 38.In the future, insect-sized robot micro-machines ( tiny mechanisms built on electronic chips) ___ used as or for doing work in very small spaces which are difficult to access is are is being *may be 39.Insect-sized robot micro-machines may even be used __ the human body for drug delivery, curing common ailments *inside outside in across 40.Virtual reality (VR)___ already___ for games and entertainment are/used *is/used have/used has/used 41.Medical cards, ___ store information about the user's medical history, may become common; and banks are already when where *which that 42.Smart cards are already being used for storing information about the user, for controlling access to facilities, and as a means of providing money __ _ an electronic form. *in by on with 43.Computing is changing and developing ___ a very fast pace by with in *at 44.Videophones, electronic pets, and robots already exist and may become ___ in the future more commonly *more common commoner more commoner 45.postscript is mainly used to ___ the appearance of text, graphics and images on the printed page *describe describing described be described 46.The development of smaller computers and computing networks s making it ____ for computers to be used in more stuations. More easy More easily *Easier Easily 47. It is already necessary ____ some computing skills for most jobs. *To have Have Having Had 48. We will produce students who are not good ____ communicating with others and working as a team In *At On By 49. PostScript war ____ by Adobe Systems, Inc. In 1982 as a page description language for printers. Written Opened Installed *Developed 50. Picture created in PostScript and saved as separate files ( khown as Encapsulated PostScript (EPS) files) can be _____ into a document. Exported *Inported Sored Drawn 51. The CPU sent a message to the user _____ it saves current status in the memory. While Before *After Whereas 52. When buying a hard disk, you _____ consider the kinds of drive mechanisms. *Should Must Have to Can 53. In programming, it is necessary to ____ the coding among a team of program. Divede on Divede to Divede into *Divede up 54. Went the user and the computer are active on communication on a graphics system, we refer to this as ___ active graphics. Dec*InterMicroMulti55. Micro-machines ____ used for drug delivery Is going to Are going to *Are going to be Is going to be 56. Simple programs can be written in a few hours but some programs may _____ more than a year to create. Taken Be talking *Take Taking 57. If a website _____ too long to download, people will _____ and go to other sites. *Takes/ give up Take/ giving up Took/ gave Taking/ giving 58. Modeling refers to the process ____ buiding objects on the computer monitor. At *Of On In 59. It's importan ______ what computer uses you need before ____ one. Define/ buy To define/ buy Define/ buying *To define/ buying 60. The modern blog evoived from the online diary, ____ people would keep a running account of their personal lives. Who What *Where Why 61. The brightness of the resulting image must be ____ 'refreshed' by the beam *Continuously Continuous Continued Continuing 62. He tries to ____ every interesting articles from IT magazines Pick off *Pick up Pick on Pick at 63. Text and graphics are adjusted ____ they all fit well. *Until Before After When 64. After a slow start, blogging rapidly gained ____ popularity. At By *In On 65. Pupils will have access _____ a world of leaning. On *To By With 66. You can avoid ____ the surface of a CD-ROM by _____ it by the edges Marks/ hold To mark/ to hold Marking/ held *Marking/ holding 67. 3D graphics ARE SUITABLE WITH broadband connection. Which one is similar to the CAPITALS? Can go with Accompanied by *Are compatible with Used with 68. _____ we finish a project, we often put a copy of the software as a record. *Whenever In addition On purpose However 69. Thanks to advanced technology, our lives will become _____ Easily and comfortably *Easier and more comfortable Harder and cheaper More difficult and complicated 70. The best way to ____ development in computer science is to subscribe to PC magazines Keep up Keep on Keep up to *Keep uo with 71. Picture _____ in a computer's memory by either of two methods: raster graphics and vector graphics *Are processed Is processing Processing Processed 72. To keep your message safe, you should _____ it with some form of encyption. Encoding *Encode Encoded Be encoded 73. Java is originally designed ____ programming small electronic devices such as mobile phones. Of At To *For 74. He teacher me how ____ some programming languages. Use Used *To use Using 75. He has to ____ some projects on high technology. *Carry out To carry out Be carried out Carrying out 76. Modern computer are lighter and more powerful _____ old computer were quite big and less powerful Therefore Because Nevertheless *Whereas 77. Simple programs can be written in a few hours but some programs may ____ more than a year to create. Talking *Take Taken Be taking 78. People may ____ your website by chance when they are browsing the net. To come across Become across *Come across Coming across 79. Modeling refers to the process ____ building objects on the computer monito. *Of In On At 80. Yoy can protect your computer from viruses by ______ anti-virus program frequently. Run To run *Running Ran 81. The data bus is bidirectional, ______ the address bus is unidirectional. But *Whereas And However 82. CGI is another way people call computer animation which ______ in films. Uses Used Using *Is used 83. It's importan _____ what computer uses you need before _____ one. *To define/ buying To define/ buy Define/ buying Define/ buy 84. We are now familiar ____ the term of ' body chips ' To For *With Within 85. A computer system has two or more cental processors which are under common control, it is called a _____ processor system. What is the right prefix? Mini Micro Mono *Multi 86. Computing technology is likely _____ in popularity today. *To gain Gaining On gaining To gaining 87. 3D graphics _____ suitable with broadband connection. Is *Are Been Being 88. A Jaz cartridge can store up to 2 GB of data, _____ a Zip drive can store up to 250 MB of data. *But Althought However In contrast 89. The brightness of the resulting image must be _____ refreshed by the beam. Continued Continuous *Continuously Continuting 90. To avoid risks, you should set all the security alerts to high ____ your web browser. *On Of In Into 91. He tries to _____ every interesting articles from IT magazines. To pick up *Pick up Picking up Picked up 92. In Delphi, the code attached to the objects _____ in a form of Pascal. Write Wrote Writing *Is written 93. There _____ lots of benefits from an open system like the internet. Is *Are Was Were 94. A blog ______ by a mobile device like a mobile phone or PDA is called a mob log. Written Which is written *Both ' which is written' & ' written are' correct None of the choices is correct 95. Computing is relatively new and is developing _____ an incresingly fast rate. In With *At By 96. JavaScipt can ______ to perform simple tasks or tie other programs together. Use *Be used Be using Uses 97. I usually ____ about JavaScrip but this week I ____ to learn how to use Active Server pages. Learn/ try Learning/ am trying Learning/ trying *Learn/ am trying 98. A rare type of blog hosted on the Gopher Photocol is know____ a Phlog. *As Like Such as For 99. You can get rid ______ logic errors by hand- testing the program. Off *Of On About 100. It is ____ to transfer the rendered animation into another format. Impossible Impossibly *Possible Possibly 101. Doctors will experiment computing technology ______ simulated patients. *On Of In For 102. While your email message travels along the net, it can be read by unscrupulous people who _____ enter the system. illegal *illegally legal legally 103.Mind Mega XT is compatible ______.IBM PCs or Macintosh computer. *with for by of 104.Raster graphics maintains an image as an array of controlled dots."an array of" mean ______ a variety of *a collection of a lot of a type of 105.when you test a progam, different kinds of problem ______ comes up came up *come up is coming up 106.Graphics program enables users ______ the images help in its memory. *to manipulate manipulate manipulated manipulating 107. 3-D virtual reality systems ______ ,the internet to make shopping easier, and smart cards ______ to provide an electronic money system. *can be used on/ may be used can use in/ may use are used in/ can used can being used on/ may be using 108. if your password is simple, someone ______ guess what it is and access your files. should have to must *may 109.it is unusual ______ a program to work properly the first time it's tested. with to *for of 110. there are always some technical assistants ______ on duty at the help desk. *working is working work will work 111. reading about new developments ______ a lot of Colin's free time to take up *takes up take up taking up 112. various output devices ______ recently in computing industry. develop *have been developed developed have developed 113. the technique used in computer animations is identical ______ how the illusion of movement is achieved with television. *to with for of 114.children will ______ communicate directly with experts through the net in the feature. able able to be able *be able to 115.when you are online, you are sometimes exposed to hackers ______ break into your computer system. which *who whom whose 116.the transfer rate depends ______ the power of the computer. *on for of at 117.live connections to classes and lectures will be ______ in the near future. impossible impossibly *impossible possibly 118.we ______ start our websites with abrief piece of information to attract readers must *should have to mustn't 119 I have worked for several IT businesses and ______ for IBM currently. work will work was working *am working 120. you can return to your starting page on the web by ______ the home button. *selecting selected to select select 121 the total number of pixels in which the display ______ both horlizontally and vertically is known as the resolution. divides is dividing required *is divided 122. dot-matrix printers use pins to print the dots ______ to shape a character. to require requiring *required to be required 123.all the features of postscript can ______ with macintosh, windows or os/2 environments. used *be used to use use 124.however, an IC ANN spokesperson suggests______ a domain name from an official registrar so you have a contract and the protections that go with it. bought to buy *buying have bought 125. they are ______ involved with the upkeep, maintenance, and security of networks. *increasingly increasing increased increasable 126.computer and information systems managers do everything from______.to construct a business plan to ______.network security to directing internet operations. help/overseeing *helping/overseeing help/oversee helping/oversee 127.A blog______ by a mobile device like a mobile phone or PDA is called a mob log. written which is written *A&B only B 128.A vertical or horizontal bar at the side or bottom of a window that can be used______ a mouse for moving around in a document. *with in no word on 129. the grandfather, father, son method is one way of______ your document. transmitting sending entering *backing up 130. the computer mouse is a hand-operated device that______ you______ control more easily the location of the pointer on your screen. let/to *lets/x lets/to let/x 131. you can share idea with other internet users______ a subject you're interested in by joining a newgroup. with between *on in 132.you can get rid of logic errors by______ the program. *hand-testing handing-testing test-handing handing 133.the brightness of the resulting image fades quickly, ______,and must be continuously �refreshed� by the beam. then otherwise therefore *however 134.the bill______ by multiplying the number of weeks by the rate. is divided is executed *is calculated is taken 135.the language______ will depend on a number of factors incluing what system the program will run on, what the function of the program is, and the knowledge of the programmer. chose being chosen choosing *chosen 136. the Active Server system______ by the analyst/programmer is a system that allows web pages______.for running small programs on the main server computer on a network. mentioning / using *mentioned / to be used mentioned/to be using mentioning/ to be using 137. in this program the value of total will always be more than 0, and ______.the program will go on forever. This is called and infinite loop. *therefore however otherwise but 138. handheld computers fits into your pocket______ ,supercomputers occupy a whole room. *in contrast therefore so that however 139. An analyst analyses problems and finds solution, whereas a programmer______.these solution______ computer programs. make/into *turns/into turns/onto puts/into 140. It is likely that VR______.in many ways in the future, including providing a home shopping environment, and allowing premises to be guarded remotely . is used *will be used will use uses 141. although it is ______ to predict the future with any certainty, one thing we can be sure of is that the hardware and software we will be using in twenty or thirty years' time will be very different from what is in use today. *impossible possible possibly impossibly 142.email will allow pupils ______.will pupils in another part of the UK and in different parts of the world. communicate *to communicate communicating communicated 143.pupils will become______ IT from an early age. Computer skills will help them when they leave school. famililar *familliar with familliar for familliar of 144.perhaps humans______.one day travel to other planets and even discover other worlds. could must *may going on 145. when a piece of virus code______,the virus can be identified. *is found finds is finding found 146.the modern blog evolved from the online diary, ______.people would keep a running account of their personal lives. what *who why where 147.An anlyst analyses problems and finds solutions, then a programmer______ these solutions______ computer programs. turns/out *turn/into turn/onto turned/into 148.Small computers that can read the cards______.ambulances and in hospital emergence rooms. installed in installing in *are installed in is installed in 149. Experience in the US has shown that greater use of computers______.school standards. have not raised *has not raised didn't raise don't raise 150. A smart card can be used in many ways, it can be used______.a key to the building. for like such as *as 151. Experts foresee, within twenty years, implanted chips that can correct our ability to interact______.the word. *with for in by 152.Customers may well be able to______ a virtual assistant who will talk them through their shopping or to ask the computer for suggestions. being called up calling up to call up *call up 153.bank customers can now download money from their account to an electronic wallet, a smart card, using a specially ______ phone equipped with a smart card reader. design *designed to design designing 154. banks in the future are likely to develop a ______ currency payment engine which allows online retailer to sell their goods in sixteen countries. mono*multimixmini155 . The Maltese Amoeda is a very dangerous virus and it looks funny but if it ___your computer , you ___laughing. *attacked /wouldn't be attacked/would be attack/would be attack/wouldn't be 156. Most viruses remain dormant___activated by something. after before when *until 157.If you do catch a virus , there are antivirus programs to hunt___and eradicate the virus for up *down with 158.It is likely that VR___in many ways in the future , including providing a home shopping environment, and allowing premises to be guarded remotely. is using *will be used will use is being used 159.It is also likely _for air traffic control and for training doctors , allowing them to practise diffrcult operations safely. be used *to be used will be used being used 160.Computers may be connected directly to the humen brain using a direct neural interface (DN1) to change the brain of the user ,___them to do things they couldn't do before to allow allow *allowing allowed 161.Smart cards are already ___for storing information about the user , for controlling access to facilities , and as a means of providing money in an electronic form. used using to be used *being used 162.Smart cards will have a wide variety of uses and___to become very common in the near future is likely *are likely will be likely are like 163.The development of smaller computers and computing networks is making it easier for computers__in more situations be used are used *to be used being used 164.It would be better to spend the money__teaching reading , numeracy,and taking pupils on field trips for under *on in 165.Email will allow pupils__with pupils in another part of the UK and in different parts of the world communicate communicating will communicate *to communicate 166.Computers will free teachers___paperwork *from right away away at once 167.They will make a big change___computing and will inevitanly encourage a lot more people to use computers___everyday situations *in/in in/on on/in by/in 168.We will produce students who are not good___communicating with others and working as a team on about *at in 169.Computers are likely to continue to become___,and more efficient faster,more cheap *faster , cheaper fast , cheaper more fast ,cheaper 170.It is difficult ___a good time to buy a computer because they are always being improved *to find finding find to be found 171.This is___important in a network where many users are storing vast amounts of data special specially specialized *especially 172.Networks also require security systems___access controlling *to control controlled control 173.Electrolic computers ___around for a relatively short time will be *have only been are were 174.Mainframes are still in use however and have continued___developed be being *to be have only been 175.When a piece of virus code is found , the virus___,and an appropriate program run to delete the virus code from the disk or file is identified will be identified *can be identified identifies 176.Experts advise us__country-specific domain names such as 'fr' for France, '.mx' for Mexico or '.vn' for Vietnam *to register register registering registered 177.The mobile phone is a device___people use for communicating with each other what *which who why 178.The amount of light produced by an LCD screen is called___, or luminance , measured in cd/m2 bright *brightness brightly bright less 179.New digital cameras offer innovative features such us Bluetooth___ connect connecting connection *connectivity 180.The human brain is far___powerful than be ___advanced computer working at its full capacity more/more most/more *more/most most/most 181.I recomment getting the ___resolution monitor you can afford *highest higher highly high 182.Plasma screen are___than LCD screens heavy heavily heavyer *heavier 183.You___write on discs with permanent pens must have to should *shouldn't 184.Don't___hit or move the computer while the hard disk is spinning *O should must can 185.A virus entered my computer . ___,many files have been destroyed on the other hand in contrast moreover *as a result 186.We need more money to ___the school library computer *computerize computerization computing 187.Today,most of the information we produce is stored___ *digitally digital digit digitized 188.To make a movie on the PC,user needs a special video___program edit edited editor *editing 189.___is the technique used to make a graphic object look realistic,by adding reflection , shadows and highlights to render render *rendering being rendered 190.We are looking for a web master who___design , improve and mmanitain our website have to must *can could 191.I___use a computer when I was only five years old can *could might may 192.It you want to create your own MP3 files from your CDs , you___have a CD ripper can could need *must 193.If I ___you,I would buy the fastest computer to play encyclopedia version was *were had been would have been 194.People___buy cracked software or download music illegally from the internet *shouldn't should must have to 195.The Help facility enables the user___advice on most problems get gets *to get getting 196.Adding more RAM lets your computer___faster *work works to work working 197.Users should avoid___off main power while they are working on the computer turn to turn *turning being turned 198.They use special applets to create___fractals amaze *amazing amazed to amaze 199.It is advisable___test the programs under different conditions testing being tested test *to test 200.He refused___the project with me *to do doing being done have done 201.Programs written in a high-level language require____-that is , translation into machine cade , the language understood by the processor compile compiling *compilation compiler 202.A___is a program used to test and____other programs *debugger/debug debugger/debugging debug/debugger debugging/debugger 203.A___keyboard alllows the user to configure the layout and the meaning of the keys program programmers programming *programmable 204.These days,you___learn how to use complicated HTML codes . Modern web design software is user-friendly and converts a visual layout into HTML code mustn't shouldn't *needn't can't 205.To view a PDF file , you___have Adobe Acrobat Reader *must need should can 206.If I had the money,I___invest in some new multimedia software can will should *would 207.A 23-year-old man known as Captain Zap on the networks hacked___the While House and the Pentagon in 1981 to *into onto by 208.In 1991, Kevin Paulsen was___stealing military files in America *accused of accused accusing of accuse of 209.IBM international ___by hackers when they wanted to arrest a dangerous black-hacker paralyzed *is paralyzed were paralyzed was paralyzed 1.A banner applet displays graphic images on websites_______advertise products or services. A. in order to B. to c. so as to *D.All are correct 2.The Jman for Java applet permits medical researchers to view_____MRI (Magnetic Resonance Images) of the brain. *A. sequential B. sequentially c. sequence D.sequencing 3.One of the competitors of Java is Microsofts c #,______as C sharp. A. pronounce B. pronunciation *c. pronounced D. pronoun 4.The idea for Java started in 1990, when a team of software engineers at Sun Microsystems decided_____ a language for a handheld device. *A. to create B. create c. created D. creating 5.With the advent of the Web in 1993, the company made a web browser based______ A. in *B. on c. under D. with 6.Don’t let your children_____too much time on playing computer games. *A. spend B. to spend c. spent D. spending the Oak langu 7.My boss doesnt allow me_______the company�s telephone for private calls. A. use *B. to use c. used D. using 8.The Java language_______ A. invents *B. was invented c. invented D. inventing 9.When_________ *A. did - play B. was I played c. are I playing D. do - to play by a team of software engineers at Sun Microsystems. you first_______a computer game? 10.How old were you when you______your first Java language lesson at school? A. take B. have taken *c. took D. are taking 11. Computer specialists________ about the computer system security when they found a malicious virus attacking the system. A. worry *B. were worried c. have worried D. to worry 12.Plug-in is an auxiliary program that enables web browser_______ example animation. A. support B. supported c. supporting *D. to support new content, for 13. He interacts very well______other students in his programming language class at college. A. to *B. with c. on D. in 14.The new technology should enable doctors_______the disease. A. detect B. detected c. detecting *D. to detect 15.With the compiler, a program is first converted_________Java bytecodes. A. to B. with *c. into D. on 16.The new analyst programmer makes her boss pleased with her high labor______ . A.efficiently B. efficient c. efficienced *D. efficiency 17.The seft-discipline is one of the most important qualities for a senior programmer because he has to control himself and to make______work hard in a particular way without needing anyone else to tell him what to do. 'A. he *B. himself C. his D.him 18.A computer security specialist needs to have a high_____in debugging. A. accurate B. accurately *C. accuracy D.accurating 19.A DTP operator needs to have_____ *A. imagination B. imagine C. imaginary D.imanaging 20.Why don�t you apply_____ to form great pictures or layouts. the post of Web master at Digitum-UK? - Because I�m lack______experience. *A. for/of B. in/of C. for/in D.in/in 21.Charles cannot play this game on his computer because it is not compatible_______Window XP. A. in *B. with C. on D.for 22.He___ A. do/in *B. did/in a course_____ graphic design at Highland ArtSchool in 2003. C. do/on D.did/on 23.An anti-virus software is a necessity to protect your computer______viruses. A. in B. on *C. from D. under 24. Mike stayed at high school_______ coding and debugging at Aston University. A. for B. since C. ago *D. until he was 18 and went on to do a course in 25.I started______ in the DTP field six years ago and now I work as a DTP operator for a leading financial magazine. A. work B. working *C. to work D. worked 26.Lisa worked as an analyst programmer for Computer Sciences______a year as part of her degree. *A. for B. since C. ago D. until 27 ._____, I spent six months in America testing our new software for general commercial use. A. Two years so far B. Since two years *C. Two years ago D. Until two years 28.I have designed four programs in COBOL, and_______January I have been writing programs in C. A. for *B. since C. ago D. until 29.She_______an IT consultant at Media Market, a company specializing in e-commerce and IT strategy since 2004. A. was B. is C. will be *D. has been 30.How long ____you______ A. have - use *B. have - been using C. are - used D. are - using computer? - Since 2007. 31.How many spam emails________you______ *A. have - received B. have - been receiving C. had - received D. had - been receiving today? - More than twenty. 32.______you ever in another country? -1 spent 6 months in London learning hardware computer and networking at Cybernetics College. A. Are - living *B. Have - lived C. Did - live D. Have - been living 33.I______my CV of computer security specialist last Monday.______it yet? *A.sent - Have you received C. send - Have you received B.sent - Have you been receiving D. sent - Have you been receiving 34.How can a PC be connected______ A. to B. with C. X *D. A & B are correct another computer in a network? 35.Davis spent 1500 dollars________his course of graphic design and page layout at Highland Art School. A. in *B. on C. X D. over 36.Mobile phones help you keep in touch with your family and friends but prolonged use of them can affect _________your health. A. in B. on *C. X D. over 37.Wearable computers are designed to be worn on the body or integrated_________the user�s clothing. *A. into B. for C. X D. A & B are correct 38.Most existing TV sets can be upgraded to digital TV by________a digital decoder. A. connect B. connected *C. connecting D. to connect 39.The term cyborg _______by M Clynes and N Kline in 1960, with the meaning of a cybernetic organism, a being that a part robot, part human. A. invent B. invented C. is invented *D. was invented 40.In recent years, most mobile phones_______ helps cell phones communicate over short distances. A. equip B. equipped C. are equipped *D. have been equipped with Bluetooth, a technology that 41.I had to use my laptop this morning while my PC______ A. is fixed B. was fixed *C. was being fixed D.is being fixed . 42.Computer chips_______ of silicon with a certain grain size: 0,063 to 2mm. A. made *B. are made C. make D.have made 43.The examination papers are scored by machine. The students______their results next week. *A. will be told B. are told C. were told D.have been told 44.Social scientists warn that mobile phones_________while driving because they can make drivers lose their concentration. A. aren�t used *B. shouldn�t be used C.weren�t used D. won�t be used 45.I applied for the job of help desk technician for IBM last week and now I_______for interview. A. am invited B. was invited *C. have been invited D.will be invited 46.Why do you go to your programming language class on foot? Where�s your car? It_______at the moment. A. is repairing *B. is being repaired C .is repaired D. was repaired 47.It�s a pity the computer game was called off________rain. A. because *B. because of C.for D. A & B are correct 48.Separate networks are_______a public network, the Internet, the largest LAN in existence. *A. linked over B. linked out C.linking in D. link with 49.Do you think it is secure_______financial transactions via mobile phones? A. carry on *B.to carry out C. carries in D. to carry 50.To establish an Internet connection at home, you need to contact with your local ISP,_______their form and wait. A. filling over B.to fill out *C. fill in D. filled up 51.To communicate with your friends, you need______an Internet connection for your computer. A. setting out B.setting C. set in *D. to set up 52.When you see a strange word, try to make your best guess before you_____it______ A. looked/on in a dictionary B.looking/on *C. look/up D. looked/off 53.Remember_____the computer____ A. switch/in B.switching/on C. switch/up *D. to switch/off before leaving your office. 54.It�s dark here. I can�t see anything clearly._____the light______, please. A. Turning - in *B.Turn - on C. To turn - up D. Turned - off 55.If you save your password in your web browser, your password appears when you_______your username . *A. type - in B.are typing-on C. have typed - up D. will type - off 56.The wireless network in Los Angeles_______ a wireless access point or a wireless router, which links multiple computers without using cables. *A. consists of B.consist C. consisted up D. consist off 57. These files_____a lot of disk space. A. are take up B.are taken into *C. take up D. has taken on 58.She______a secret box when cleaning her house. A. founded B.finding C.has found out *D. finds out 59.In a bus network, all the computers_______a main cable, or bus. A. plug in *B. are plugged into C. have plugged into D. have been plugged to 60.Several LANs connected together______a WAN. A. are made by B. have been made up C.made of *D. make up 61.Before purchasing a piece of new software, you should_________ first. *A. try out B. to try on C.trying in D. be tried up their trial version 62.You can play Typing Games on a personal computer. These games will challenge you to type as _______as possible. *A. quickly B. quick C.quicklier D. quicker 63. Java is a programming language__________ A. express - distributed B.express - distributing *C.expressly - distributed D. expressly - distributing designed for use in the_____ 64.Serious video games are games that are designed______to convey information or a learning experience of some sort to the player. *A. primarily B. primary C.primariness D. primality 65.The first______ A. full automatic *B. fully automatic C.full automatically D. fully automatically mobile phone was introduced by Motorola in 1981. 66.In banks, computers store information about the money held by each customer and enable staff to access databases and to carry out__________ transactions at high speed. *A. large financial B. large financially C. largely financial D. largely financially 67.Games are now even more life-like and A. visual attractive B. visual attractively *C. visually attractive D. visually attractively . environment o 68.Wii is_______ the most________ of the three machines. A. current/popular *B. currently/popupar C. current/popularly D. currently/popularly 69.E-commerce has become_______ over the last decade. A. increasing popular *B. increasingly popular C.increasing popularly D. increasingly popularly 70. Stratergy games are mainly restricted______ A. with B. on C. in *D. to PC. 71.The new concept of party games - where people play together in multiplayer mode - has recently injected new life_________ Adventure game and Puzzle game genres. *A. into B. out of C. up D. on 72.It is important_________ programming languages with markup languages. A. not confuse B. to not confuse C. don�t confuse *D. not to confuse 73. By 2020, scientists believe that nanobots will be injected_______ bloodstream to treat diseases at the cellular level. *A. into B. from C. on D. by the body�s 74.Nanotechnology is going to have a huge impact______both business and our daily lives. *A. on B. in C. into D.over 75.As I was about_________when you interrupted me in the Computing class yesterday. A. say *B. to say C. saying D.said 76.Paula and Tom were on their summer vacation when the thieves broke____ smart house. A. on B. in *C. into D.onto 77. In the future, doctors will use nanobots to inject medicine______ A. in B. on C. X *D.into 78. Listening to music on my Ipod makes me_____ A. happily *B. happy C. happiness D.happilier their patients� body. . 79.They hope that people__________naturally with hundreds of smart devices at a time. *A. will interact B. are going to interact C. will be interacting D. will have interacted 80.My lovely computer_______me a lot with your homework. *A. helps B. is going to help C.will be helping D.will have helped 81.By this time next year, I__________for IBM. A. will work B. is going to work *C. will be working D.will have worked 82.By this time next month, I________the Iphone 6 plus that I have wanted to buy for months. A. will buy B. is going to buy C. will be buying *D.will have bought 83.By 2050, scientists believe that everyone___________in smart houses. A. will live B. is going to live *C. will be living D. will have lived Revison 1.HTML stand for____ language. *Hypertext Markup Hightext Markup Hypertext Makeup Hypertask Markup 2.C++ was ___ from the C language. Designed converted *Developed Invented 3.C++ is___, i.e. programs written in C++ can be easily adapted for use on different types of computer systems. Removable *Portable Regrettable Transferable 4.HTML is a page description language used for creating___. System programs *Web pages Applications Text files 5.Java is designed for programming small electronic devices such as___. Servers Desktops Mainframes *Mobile phones 6.JavaScript, a___form of Java language, is powerful and easy to use. Copy Old *Simplified Embedded 7.Scripts are small programs that can be used to___simple task or tie other programs together. *Perfom Adapt Respond Produce 8.Both VisalBasic and Delphi are___for developing programs for the Windows OS. Machine codes *Programming environments Natural languages Programming objects 9.CPU consits of Control Unit, ALU and___. Buses Adapters *Registers Processors 10.ALU stands for___Unit. *Arithmetic Logic Access Logic Arithmetic Local Access Local 11.The set of conductors that carry the memory address signals between different parts of a computer system is called___. Data bus *Address bus Control bus All of choices are right 12.___are connectors that carry signals between the processor and other part of the computers. Devices Units Registers *Buses 13.Data bus is a___bus as it carries data from the memory to the CPU and from the CPU memory. Unidirectional Mono-directional *Bidirectional Multi-directional 14.Clock line carries a signal from the clock chip to___the oprations of processor. Fetch *Synchronize Execute Direct 15.Personal computers can___instrutions in less than one-milionth of a second. *Execute Create Make Configure 16.___refers to the combination of I-time and E-time. Instruction time *Machine cycle Execution time Machine code 17.Many people like using___computers as they fit into their pockets our pocket. Notebook Portable Desktop *Handheld 18.The control Unit DECODES the instructions ang dirests that the necessary data be moved from memory to ALU. Find a word which best replaces the word DECODES. Stores *Translates Executes Fetches 19.VR headset, which can aso called___, showed graphics on a screen in fonts of our eyes. *Head-mounted display Head-wear display Head display set 3-D headset 20.___is a very small mechanism containing a tiny computer. It is used in sensors, gyros and drug delivery. *Micro-machine Microchip Robotics Micro-robots 21.A plastic card containing a processor and memory chip is calles a___. Electronic card *Smart card Robotics Chip card 22.An input device worn on the hand in a virtual reality system is called a___. VR mouse Hand glove VR hand *Data glove 23.If all schools and universities are___and develop e-learning, there will be paper-free education. Integrated Disconnected *Netwoked Offline 24.There will possibly be___computers inside human body to monitor and regulate our heart rate or blood pressure. MicroMini*Miniature Small 25.___chips, chips inserted into your body parts, can correct our ability to interact with the world. *Implanted Imported Included Integreted 26.In the first computer generation, vacuum tubes, also called___, were used. Transistors *Valves Circuits Chips 27.In 1965, ___(Ics) were introduced, which reduced the computer size considerably. *Integrated circuits Incorporated circles Incorporated circuits Integrated circles 28.A disk which is protected against writing is called___disk. Wtite against Write-aided Write protect *Write-protected 29.In the near future, ___ screens will replace monitors. Liquid *Flat panel Crystal Flat 30.The second generation of computers were___by transistors. Controlled Invented *Operated Introduced 31.___ refers to the unauthorized access to a computer system and changing its data. *Hacking Pirating Making virus Tampering 32.If you illegally copy software programs, you may be accused of___. Hacking Cracking Attacking *Pirating 33.A plastic card with a magnetic strip containing a user�s identification number is called a___. PIN card *Swipe card Bank card Access card 34.___ is a form of program which infects your computer and destroys your data or damages your system. *Virus Spam Bug Adware 35.Some viruses are___but some are destructive. Harmful Useless *Harmless Serious 36.Viruses can be___ via removed disks, LANs, bulletin boards and email attchments. Infected *Spread Activated Scanned 37.Do not open email attachments send by strangers without___for viruses. Cleaning Opening Downloading *Checking 38.If your computer is infected with a virus, there are antivirus programs to hunt down and___the virus. Eradicate Clean Remove *All of choices all correct 39.Compuserve was___ trafficking pornography and neo-Nazi propadanda. *Accused of Told Warned Charged 40.A___sells computer hardware and arranges support or training for customers. Hardware engineer Software designer *Computer salesperson Computer System Support person 41.___ designs, writes, compiles, and tests the systems and applications of all kinds. Hardware engineer *Software engineer System Analyst Network Support person 42.A___ maintains all aspects of networks including software, wiring and workstations. Software engineer Hardware engineer System Support person *Network Support person 43.Software engineers often___ programs from libraries or sub-programs and combine them to make up a complete system program. *Compile Translate Design Specialize 44.A___ researches designs and develops computer, or parts of computers, and the computerized element of appliances and vehicles. System Analyst Network administrator *Hardware engineer System Support person 45.Website with entrics posted on regular basis and displayed in reverse chronological order is called a___. Weblog Web log Blog *All choices are correct 46.Authoring a blog. Maintaining a blog or adding an articcle to an existing blog is called___. Blogger *Blogging Entry-posting Content-adding 47.It is possible for readers to leave___in an interactive format on blogs. Entries Posts *Comments Articles 48.Micro-blogging is a type of blogging which consists of blogs with___. *Short posts Photographs Sketches Mixed media types 49.Blogs can be___ by dedicated blog hosting services, or they can be run using blog software. Displayed Posted Read *Hosted 50.The morden blog ENVOLVED from the online diary, where people would keep a running account of their personal lives. Which of the following can word ENVOLVED be best replaced with? Came *Developed Imported Recognized 51.A PostScript file consists of two main parts, one of which is the �prolog� containing a set of___ used to form different graphic elements. Script Scripts *Subroutines Subroutine 52.A piece of equipment that is connected the CPU of a computer system is called a___. Backup device CU *Peripheral ALU 53.System Analyst Programmers have to___a feasibility study in the company before writing a program. *Carry out Work out Make up Play back 54. my job is to persuade customers tha it�s ____ investing in new computer system on extending the systems they already have good *worth valule expensive 55. Technical sales managers have to _________ after the sale and make sure things are working well. keep on touch keep in tour keep in distance *keep in touch 56. it�s my job to try _____ new components before they�re used in our computers. *out on in with in 57. software designers have to change the specifications for a system into a ____ that can be programmed. logical put logical constructions *logical order logical sequence 58. software engineers are also ___ for developing new systems. *responsible able charge capable account feasible look 59. unauthorzized access to compyter systems and tampering with other users data is know as_____ pirating *hacking making viruses spreading viruses 60. intentionally attempting to spread viruses is considered as computer______ guilty peripheral criminal illegal *crime 61. because faults can be develop in computer systems , it is important to keep copies of valuable data using a_____ storage device peripheral store system *backup system 62. connector that carry signals between the processor and oter parts of the computer are called___ wires ports *buses ports 63. in the machine cycle, the fetch an decode steps together are called___ *instruction time decoding time fetching time excecution 64. the person who advises potenential customers about available hardware and sells equipment to suit individual requirements is a____. software engineer *commputer salesperson help desk hardware producer 65. �com� or net is so called ___. *extension domain name identify axpansion 66.A _____ is someone to snaps up generic domain name. *prospector extortionist cyber-squatter domain owner 67. in low-level laguages, cash instruction is ____ to a sigle machine code instruction alike equal *equivalent corresponding 68.the _____ of mocement with television and motion pictures is achieved in the same way as the technique used in computer animation. sense *appearance impression illusion 69.one of the most important steps in computing technology in the coming year is ____ to be a return to mechanical methods. similar *likely alike unlikely 70.only a step further is the idea of building insect ____ robots that could do difficult job in very small places. *sized shaped designed imaged 71. average time required for the recording heads to move and access data is ___. data transfer rate move time search time *access time 72. prolog , which is the short form of programming in logic, contains a set of __ used to form different graphic elements. *subroutimes equations compiler assemblers 73. technical sales managers have to ____ after the sale and make sure things are working well. post subrountine *script element 74. the data transfer rate also ____ on the power of your computer. *depends independ rely base 75. a piece of equipment that is connected the CPU of a computer system is called a_______. access CU ALU *peripheral 76. it is common to _______ computers together to form a network. access *connect mix share 77. system analyst programmers have to ___ a feasibility study in the company before writing a program. *carry out work out take up set up 78. the aim is to see whether a new program would be better ____ the methods they use at present more much much more *than 79. the language I choose for coding will deend____ various factors. in *on up upon 80. viruses can be found and removed by _____ program. kill-virus protect-virus anti-virus & kill-virus *anti-virus 81. it�s my job to try ____ new componects before they�re used in our computer. in on *out with in 82. we have 2.600 pubs and 550____ engineers. server *service maintain reinforce 83. intentionally attempting to spread viruses � considered � computer____. criminal guilty offence *crime 84. most viruses remain______ until activated by something. *dormant silent active the same 85. because faults can develop in computer systems, it is important to keep copies of valuable data using a_____. stock *backup system store store system 86. some computer systems use____ that scan and identify characteristics of the user such as their fingerprints, facial features, voice , or eyes. identify system recognition system& backup system backup system *recognition systems 87. always ________ an email attachment before opening it. virus-test *virus-check virus-exam virus-proof 88.bacsic languages , where the program is similar to the machine code version, are ___ as alow-level languages. *known realized understood appreciated 89. the___ is made up of 1s and 0s. digits digital *binary system decimal system 90. processors follow a fixed sequence of steps, called the____ , to process a program instruction *machine cycle cycle machine cycle process process cycle 91. the arithmetic /logic unit excutes the arithmetic or ___. *logical operations logical instructions lgic instructions logic operations 92.in the machine cycle the, the fetch and decode steps together are called___ decoding time storing *instruction time execution time 93. in the machine cycle the execute and store steps together are called_______. *execution time storing time executing time instruction time 94. each postscript-based printer has a microprocessor, at least 2 MB of RAM , and an operating system that ____ the postscript code. encrypts *decpypers transfers interprets 95. in the first steps of the machine Cycle, the control unit ___ the instruction from memory. takes systems analyst software engineer *software designer 96. the person who studies employer�s requirements and working pattern, reports on different options, and writes specifications for programmers is a ______. computer salesperson *systems analyst software enginer software designer 97. the person who often compiles program from libraries or sub�programs, combining these to make up a complete systems program is a________. software engineer *software designer& software engineer software designer computer systems analyst programmer 98. the person who researches, designs, and develops computers, or parts of computers and the computerized element of applicances , machine, and vehicles is a________. *hardware engineer systems analyst software engineer hardware designer 99. maintaining the link between PCs and workstations connected in a network is a part of a ___ job. network designer network engineer *network support person network analyst 100. You have to know the ___ to enter the system, in the same way that you have to know your personal identification number to get money out of a bank cash machine security system *correct password safety transaction identity card 90-b. the ___ is a unidirectional bus. Data flows one way only. It carries addresses from the processor to memory. data bus control bus *address bus all are correct 91-b. the ___ control bus is bidirectional.it carries instructions to and from the CPU and other parts of the computer. address bus *control bus data bus all are correct 92-b. ___ are program that have been written to make a computer behave in an unexpected and undesired way. *viruses sharewares free ware none is correct 93-b. as networking develops _______ is likely to become more common, although people will prefer to meet face �to �face where possible email newsgroup *video conferencing relay chat 94-b. it is likely that computer will play a bigger role in teaching in the future. Teaching , however, requires________ and is unlikely to be done entiren by computers. technology machines *human skills computer 95-b. three _____ of our daily lives that are certainly likely to be affected are health, shopping and money *features fields areas factors 96-b. A ___ is a glove with pressure pads which make yor hand feel as if it�s picking up object or touching surfaces. VR glove data glove data gole, or VR glove *all of the choices are right 97-b. In the near future all schools and libraries will be linked together to from a ___ for Learning - just like the electricity grid which connects all consumers. electricity centre *National Grid national library national data 98-b. All study and most jobs in the future will require ___ computer literacy. computer data computer information *computer literacy computer illiteracy 99-b. Email will allow pupils to ___easily with other puplis in different parts of the country and in different parts of the world. *communicate talk speak say 101. Every individual is unique. Some security system us ____. physical gestures personalities appearances *individual body characteristics 102. A new product called �Facelt� uses ___to protect individual files. *face recognition voice recognition speech recognition fingerprint 103. Easy access to online ___ will not help pupils to develop original ideas. information systems *resources data 104. In some companies, wrokers wear an ___ with an embedded chip, which signals where the wearer is at any time. *active badge-an ID card plastic card business card smart card 105. ___ is mainly used to describe the appearance of text, graphics and images on the printed page. Delphi Cobol Java *PostScript 106. ___ refer to the process of encoding data so that unauthorized users can�t read it. Decryption *Encrytion Certification Authentication 107. Small files used by Web servers to know if you have visited their site before are ___. certificates contemporary files *cookies properties 108. ___ are files that identify users and Web servers on the net, like digital identification cards. *certificates cookies locks cards 109. A(n) ___ is made of two or more computers linked together to allow user to share files, software and hardware. web cyberspace browers *network 110. A person who obtains unauthorized access to computer system is called ___. breaker *hacker blogger poster 111. Computer ___ are pictorial images producted by computer and refer particularly to images displayed on a video display screen, or display monitor. animations *graphics pictures images 112. A program that enables a computer to process graphic images by means of mathematical language is called ___. *graphic sofware package desktop publishing package image-setter package paint and drawing package 113. A computer display images on the phosphor- ___ surface of graphics display screen by means of an electron beam. dressed worn *coated wearable 114. Changes in the intensity of light beam determine their brightness and HUE of the screen. Which of the followinf can be the word HUE be best replaced with? size *colour resolution clearness 115. A picture can be drawn or redrawn onto the screen with the euse of a mouse, a ___ tablet, or a light pen. *formats pressure-sensitive light-sensitive pressure-attracted 116. An output device which print the image on paper or on photographic film is called ___. pattern-recognition devices plotter digitizer *imag-setter 117. The computer can also generate hard copy by means of ___. image-setter digital camera *plotters digitizer 118. ___-type graphics maintain an image as a matrix of independently controlled dots. Vector *Raster Raster and vector alphanumeric 119. Computer animation is the art of � �___ moving images via the use of computers. producing generating creating *all the choices are correct 120. CGI stands for computer-generated ___ or computer-generated imaging. *imagery icon interface interrupt 121. The differences in appearance between key frames are automatically calculated by the computer in a process known as ___. *Tweening modeling rendering rigging 122. the question of security is crucial when sending ___ information such sa credit card numbers. corporate *confidential business academic 123. To void the risks of being hacked, you should set all the ___ to high on your Web browser. mail alerts cookies alerts pop-up blockers *security alerts 124. ___ is the simple combination of a word with an extension like �.com� or �.net�. Web identity Web address *Domain names security alerts 125. ___ is the practice of registering dozens, even hundreds of popular, trademarked names with the purose of selling them for big money. Purchasing Tracking *Cyber-squatting Browsing 126. It�s advisable to buy a domain name from an official ___ so you have a contract and the protections that go with it. *registrar subcriber domain user Inter Service Provider 127.Experts advise us to register ___ domain names such as �.fr�, �.mx� or �.vn�. extension-specific code-specific country-extension *country-specific 128. ___ often request a large amount of money for domain names but sometimes they do not receive any and even are taken to court. Experts *Cyber-squatters Hackers Crackers 129. If you want to set up an e-commerce business, firstly you must ___ a good domain name. *register subcribe mange negotiate 130. A prospector is someone to snaps up ___ domain names. pirated protected *generic trademarked 131. Almost every computer user occasionally ENCOUNTERS a problem such as forgotten password or the disaster of a crashing hard drive. What dose �ENCOUNTERS� mean? *have solve raise create 132. The EXPLOSIVEuse of computers has assistance has created demand for specialists who provide advice to users. Which of the follwing is EXPLOSIVE closest in meaning to? decresing limited well-known *fast-growing 133. Computer ___ provide technical assistance, support, and advice to customers and other users. programmers *support specialists developers analysts 134. Helpdesk specialists answer telephone calls, analyze problems by using automated diagnostic programs, and recurring difficulties. resolve *solve find solutions to all of the choices are right 135. Computer hardware or software vendors are ___. companies producing hardware and software *companies that sell hardware and software hardware and software specialists scientists in software and hardware 136. If computer system break down due to hardware or software problems, technical support specialists are responsible for ___ them. modifying cleaning *repairing installing 137. Helpdesk technicians also OVERSEE the daily perfromance of their company�s computer systems. What does the word OVERSEE mean? supervise manage monitor *all answers are right 138. These workers GATHER data to identify customer needs and the use the information to identify, interpret, and evaluate system and network requirements. What does the word GATHER mean? verify *collect evaluate coordinate 139. Computer and information system managers plan, coordinate, and direct research and facilitate the ___ activities of firms. business administrative *computer-related project 140. Computer and information system mangers ___ the work of system anlysts, computer programmers, support specialists, and other computer-related workers. *direct share support facilitate 141. Computer and information system managers plan and coordinate activities such as implementation of Internet and ___ sites in their organizations. wide area external *intranet worldwide 142. Computer and information systems managers assign and review the work of their ___. bosses *subordinates directors employers 143. Computer and information system ___ are Chief technology officers (CTO), Management information systems (MIS) directors or infoermation technology (IT) directors. analysts *managers technicians help-desk supporter 144. If you have any questions or problems with your computer, you can call an IT company�s ___. sales department administrative *hep-desk development section 145. ___ managers develop requirement, budgets, and schedules for their firm�s information technology projects. *Project Technology Software Information system 146. ___ (CIOs) are who computer and information systems managers report to. *Chief Information Officers Computer Information Officers Computer Input Operators Chief lnformation Operators 147. PDt stands for _____ Postscript Description Laguage *page Description Languagce Postscript Digital languge page Data Language 148. Producing the programs which control the internal Operators of Computer converting the systerm aralysl's specificatior to a logical series of steps are parts of a ___'s job hardware engineer *Software engineer systems analyst hardware desinger 149. the simple combination of a word with an ex tent\sion, serve as both the address and the identity of a Web company, is a ____. *domain name extension expansion website 150. the person who illegally buys and officially records an address on the Internet that is the name of an existing company or a well-known person, with the intention of selling it to the owner in order to make money is called a _____. cyber owner domain owner *cyber-squater website owner 151. the illegal activty of buying and officially recording an address on the Internet that is the name of an existing company or a well-known person, with the intention of selling it to the owner in order to make money is so called _____. *cyber-squatting cyber-owning cyber-conquering A&C 152.A(n) ____ is someone to snaps up generic domain name. domain owner cyber-squater extortionist *prospector 153.A(n)_________is someone who intentionaliy registers trademaker name. prospector *bextortionist cyber-squater domain owner 154.A(n)______ translales the original code into a lower.-level langunge or machine code so that the CPU can understand it *compiler assembler debugger. None of the choices 155.postscipt can speak to different output devides and adjust the quality � the final output to the highest capacities of the output devides do it is independent devide dependent devide *devide dependent devide independent 156.picture created in postscipt and saved as separates file which is called ESP file.in this case ESP stand for ____ especial PostScript English for specific purposes *encapsulated PostScript especial purposes 157.in low-level language, each instruction is ____ to a single machine code instruction. *equivalent alike equal corresponding 158.Individual articles on a blog are ____ "blog posts" , "posts" or "entries" telephone rang *called labeled 159.blog can be _____ by dedicared blog hosting servies or they can be run using blog software. accommodated *hosted held received 160.graphics software programs ___ the user to draw, colour and shade assist support aid *enable 161.A picture csn be drawn or radrawn onto the ____ with the use of the mouse, a pressuresensitive tablet, or a light pen. output display monitor *screen 162. the computers can also ____ hard copy by means of flotters and laser or dot-matrix printers make *generate group collect 163.C++ was used to ____ Microsoft Windows operating system *produce creat make manufacture 164.java is a programming language originally___ for programming small electronic devices such as mobile phone reserved planned *designed contructed 165visual basic is useed to write general purpose____ for the window operating system supplies *applications provision installation 166.program instructions and data must be ____ into memory from an input devide or a secondary storage device located *placed rested left 167 modern computer are ___ and relatively cheap. older computer werer less powerful and quite expensive *powerful violent strong hard 168.there are various types of blogs, and each differs in the way___ is delivered or writen media format device *content 169. A tylical blog combines text ,images, and ____ to orther blogs, webpages, and other media related to its topic connection *links posts comments 170.A graphics ____ produces images and designs. A word processor produces texts series box *package parcel. 171.small computers that can read the cards are ___ in ambulances and in hospital emergency rooms *installed put in set up patched 172.the biggest problem is making sure that people ___ their cards at all times hang take hold *carry 173. One of most important steps in computing technology in the coming years is _____ to be a return to mechanical methods. *likely similar alike unlikely 174. The ____ of using a micro-machine to deliver drugs is getting a bit closer to more sci-fi applications. view *idea opinion concept 175. Swallowing an ant-sized machine to cure you or putting one inside some failed machinery seems_ a really good idea. similar likely *like same 176. Some drawing programs can produce _____ draws in PostScript directly. text files print outs documents *pictures 177. Using ____ reality headsets and gloves, doctors and medical students will be able to experiment with new procedures on simulated patients than real ones. *virtual fake unreal untrue 178. Smart clothes which ____ their thermal properties depending on the weather. modify vary *change convert 179. Since we are already ____ with the notion of an internal pacemaker for the heart, including a chip or two may not seem all that astonishing. acquainted known *familiar informal 180. A mor commom implant would be a chip to ____ visual signals. *correct check modif fix 181. Shoppers will be albe to scan down virtual supermarket asisles on their PC and ___ on to whatever they want. put take rely *click 182. ____ is a set of programs used to detectm, identify, and remove viruses from a system. virus protection *anti-virus program data protection data security 183. A computer - graphics system basically ____ a computer to store and manipulate images. composes of *obtains consists of A & C are correct 184. Preexisting images on paper can ___ into the computer through the use of scanners, digitizers, or digital cameras. *be scanned pushed made put into 185. Programmers ussually ___ alot mor than just write the program code. work make write *do 186. The disigners sometimes use____ to show the sequence of logical steps in a program. maps *diagrams plans tree-flows 187. A (n) ______ in a computer program is often called a bug and the processes of finding and fixing them is known as debugging. *error mistake fault false 188. When your computer has fiddiculties, the processor ____ the priority of the action and stops what it is doing at an appropriate time to deal with the problem. processes gets *determines executes 189. When your computer has difficulties, the processor ____ the priority of the action and stops what it is doing ai an appropriate time to deal with the problem. *is made up of is combined is consist of is kept of 190. The CPU sends a message to the user after it saves its ____ status in a special area of memory. chosen particular permanent *current 191. There are ____ areas of computing and the students are likely to be able to suggest very recentn developments. speeding *fast-moving falling on-going 192. Computing is changing and developing at a very fast ____ around the word in every field. trend face *pace increase 193. It is already necessary for young people to have some computing____ if they want to find a job in the companies nowadays. *skills Bprograms capabilities materials 194. Miniature computers may be used to ____ our health and the use of computer controlled body implants is likely to develop to some extent. determind monitor provide *calculate 195. All study and most jobs in the future will require computer ____ . programs communication literal *literacy 196. Communication through networks will ____ teachers from paperwork. *liberate freedom increase improve 197. Computers _____ continue to become faster, cheaper, and mor efficient. will likely to is likely to *are likely to going to likely to 198. Speech recognition will make a big ____ in computing and will ineviably encourage a lot more people to use computers in everyday situations. *change Damage Loss develop 199. It is difficult to find a good time to buy a computer because they are always___. being repaired being sold being changed *being improved 200.Because___can develop in computer systems, it is important to keep copies of valuable data by using a backup system. mistakes *faults changes developments 201.Viruses are programs that have been written to make a computer behave in a(n)___way. right effective impressive *unexpected 202. Plain text email messages cannot contain a virus, but viruses can be___email attachments. *carried in carried out carriedwith carried of 203. Viruses have a tendency to ___themselves, and often attach themselves to other programs. coppy eather copy or replicate is correct replicate *both copy replicate are correct 204. It is common for a user to have a virus program on their disk without___it. aware of *being aware of wareness of knowledge of 205.___are temporary storage areas for instructions or data .They work under the direction of the control unit. *Registers Floppies Storage devices main memory 206.___is the standard set of rules for communicating over the Internet. *Transmission control protocol/Internet protocol internet address instructions ID 207.Popular network___include Unix,Novell Netware,and Microsoft Windows NT. microprocessors *operating systems word processors programming languages 208.A___is a group of parallel wires which earn electrical signals between different parts of the computer route signal *bus hub 209.The___is a bidirectional bus.It carries data and instructions from the memory to the CPU and form the CPU to memory. *Only data bus is correct both data bus and address bus are correct address bus neither data bus nor address bus is correct 210.Using built-in camera,you can make___to other 3G mobile phones and see yourself and other person you�re talking to on the screen. audio *video calls calls photos 211.If both card and PIN are valid, the ATM will proceed to___money to the customers. take get *dispense withdraw 212. A hacker is a person who___a network�s privacy *invades helps protect secure 213. We are the world leading___of digital camera for professional photographers. *manufacturer manufacturing manufacture manufactured 214. Ascreen___enlarger text and graphics on the screen,increasing legibility. zoom monitor *magnifier camera 215.A___has a screen and a keyboard that transcribes spoken voice as text; it�s ideal for deaf people. microphone recording touch-screen *text-phone 216. When a disk is formatted, its surface is divided into concentric cireles know as___. rings *tracks circular round 217. The set of all weblogs on the internet is called___. blogsphere blogging blogs *blogosphere 218.The Apple I Phone combines three products � a mobile phone, a widescreen iPod,and an internet device � into one small___device. *handheld hand hold handling handheled 219. To capture sounds in digital format and play them back, modern PCs contain a___card. sppeaker recorder *sound mouse 220.Text with links, which takes you to other Webpages, is called___ super link link connection *hyperlink 221. A CD___is a program that extracts music tracks from audio CDs to file on your hard disk. recorder *ripper player editor 222.The technique used to play sound and video files as a continuous stream while they are downloading is called___ *streaming ripping extracting playing 223. Compressed music can be played with an MP3___ stramer ripper *player recorder 224. Concert and other events are broadcast over the web in a process called___. blog cast *webcast weblog webpage 225. Graphics programs have a ___that enables you to draw,paint and edit images on the computer. *toolbox tool menu toolbar paint box 226. Bitmaps, or___are stored as a series of tiny dots are called pixels. vector graphics *raster graphic images animations 227. The basic elements used to construct graphical objects are called___;they include lines, curcles,polygons and text. attributes instructions features *primitives 228. Line objects can have different kinds of___, such as thickness, colour, etc. *attributes instructions features primitives 229.CAD designers often start a project by making a___, a drawing showing the edges and vertices of a 3-D model. wire frame *wireframe wireframing 230.In image-editing programs,___are special effects that can be applied to pictures including drop shadows,textures, distortions,etc. *Filters Rendering Wireframe Translating 231.___is the process of combining multiple images together to form one final image. Translating Rotating Remdering *Compositing 232. Gnofract 4D is a program that allows you to create___. fractals amazing *amazing fractals amazed fractals fractals amazed 233. The only language a PC can directly excute is___,which consistsof 1s and 0s. *machine code programming instruction high-level 234__refers to the technologies and applications that integrate different media: text,graphics,sound,video and animation. Smart device Modem *multimedia virtual reality 235.___represent images as mathematical formulae, so they can be changed or scaled without losing quality. *Vector graphics Raster graphics Animation Drawing 236.___adds textures to each surface, abd generates realistic reflections,shadows and highlights Rotating Compositing black *white 237.Crackers,or___-hat hackers, are computer criminals who use technology to perform a variety of crimes. red green *black white 238.___is one kind of crimes using e-mails or websites that look like those of real organizations. Abusing *Phishing Piracy Spyware 239. Looking at web pages can be called �navigating the web� but is more commonly called___. *surfing the net skiing the net swimming the net going to the net 240. A file which is copied from the internet into your computer is called___. an upload *a download a load a buffer 241. Designs and drawings in websites are usually called web___. pictured images illustrations *graphics 242.Websites with sounds and/or video clips and/or animations have___content. *multimedia many-media mixed-media various 243.A program that adds functions to a browser(eg Shock wave) is called a___. plug plugged-in *plug-in plugging 244.A website which can only be viewed by authorized people has___access. reduced small wrong *restricted 245.Internet users who like cyber-shopping should get a digital___,an electronic identity card. *certificate paper cash signature 246.Private network use a software and/or hardware mechanism called a___to block unauthorized traffic from the Internet. anti-virus *firewall interface lock 247.You can download___from the Net; this type of software is available free of charge but protected by copy right. pirate freeware software *plug-in 248.Afer creating DTP files on the computer, most people often take their files to___,a company that specializes in printing. advertising a gency software producer *distributor service bureau 249.If you click on a___link,you can jump to another screen with more information about a particular subject. super link hypermedia *hypertext supertext 250.MP3 is short for MPEG audio layer 3, a standard format that___audio files *compresses depresses opens views 251.___is a form of wnriched multimedia which allows an interactive and dynamic linking od visual and audio elements. Hypertext Hyperlink *Hypermedia Interactive games 252.___is a technique for playing sound and video files while they are downloading. *Streaming Recording Ripping Compressing 253.___is a special program which converts the source program into machine code � the only language understood by the processor. Flowchart Debugging Machine code *Compiler 254.Geographic information system (GIS) allow___to create detailed maps. *carto graphers map designers programmers photographers 255.In education, it is used in presentations and ___training courses. based computer *computer-based computerized computing 256. In____, users interact with a simulated world. practical the Internet *virtual reality multimedia 257. Some kinds of browsers allow you to disable or delete___, a small file placed on the hard drive by web servers so that they can recognize the PC once visited them. plug-in programs alerts *cookies freeware 258. The activity happening on the internet like harassment or abuse, mainly in the chat rooms or newsgroups is called___. piracy cyber-stalking phishing *spreading 259. ___ involes adding paint, colour and filters to drawing and designs. Wireframing Compositing Rotating *Texturing 260. Video and audio components are decompressed using separate___, a formula used for decomposing components of a data stream. algebra angle *algorithm algae 261. To find the webpage you want, you have to click on a webpage___ or enter a URL into a browser. browser *hyperlink sever domain name 262. ___is used for creating and editing webpages. image editor presentation program graphics *website editor 263. JPEG is the most common type of___ used for storing image data on the web. *compression decompression composition component 264. The company uses___ techniques to decode ( or decipher ) secret data. *decryption decompression compression encryption 1.Compiled Java code can run on most computers because there are Java interpreters, known as________ for most operating systems. A. Java ME B. Java applet C. Java Script *D. Java Virtual Machines 2.The Java Virtual Machine includes an option just-in-time compiler that dynamically compiles bytecodeinto _____as an alternative to interpreting one bytecode instruction at a time. *A. executable code B. digits C. java D. binary code 3.Flash files, traditionally called____, have a .swf file extension. *A. Flash movies B. The Jman applet C. The LandRover applet D.Adobe Flash 4.A competitor of Java is Adobe Flash technology,which supports graphics, a scripting language called____, and the streaming of audio and video. A. Flash files *B. Action Script C. Adobe Flash D. Flash movies 5.The Java language began to attract serious attention from____ *A. the Internet community B. Wi-Fi C. platforms D.the Internet connection . 6.Today, Java is a hot technology that runs on multiple____, including smart cards, embedded devices,mobile phones and computers. A. animations B. screens *C. platforms D. moving texts 7.An_____ clock applet displays the time according to the web user�s computer and lets you set the colors and style of the hands and numbers. *A. analogue B. digital C. computer D. synchronized 8.Java was designed to have the �clock and feel� of the C+ + language, but it is simpler to use than C + and enforces a/an____ programming model. *A. object-oriented B. multi-threaded C. single-threaded D.B & C are correct 9.Duke, an animated character, is the_____of the Java language. A. logo *B. mascot C. statue D.slogan 10.The original name of____ was Oak, which was named after the tree outside the window of James Gosling, one of the engineers at Sun Microsystems. A. Java B. the Java language C. the Java application *D. All are correct 11.Java applets let you watch_____characters on web pages. *A, animated B. object-oriented C. compiled D.interpreted 12.Java does have______: Microsoft�s C# and Adobe Flash. *A. competitors B. applets C. platforms D.A & B are correct 13.A person who knows a lot about Information Technology and is employed to give advice about it to customers and other people is a/an_____. . A.webmaster *B.IT consultant C. DTP operator D. network administrator 14.A person who uses page layout software to prepare electronic files for publication is callled a/an_____ . A.webmaster B. IT consultant *C. DTP operator D. network administrator 15.We call a person who manages the hardware and software that comprise a network a/an____ . A. DTP operator B. IT consultant C. DTP operator *D. network administrator 16.A person who is responsible for creating, managing and maintaining one or more webservers or websites is called a/an_____ . *A. webmaster B. IT consultant C. DTP operator D. network administrator 17.A person who writes applications programs (computer programs designed to be used for a particular purpose, e.g. wordprocessors, spreadsheets or database programs) is called a/an____ . A.IT manager *C. applications programmer B.system programmer D. help-desk troubleshooter 18.A person who specializes in writing systems software (a program or set of programs that are used to control the basic functions of a computer system, e.g. operating system programs) is a/an____ . A,IT manager C. applications programmer *B.system programmer D. help-desk troubleshooter 19.A person who manages projects, technology and people. He is also responsible for developing and implementing computer software that supports the operations of the business is called a/an_____ . *A . I T manager C. applications programmer U system programmer D. help-desk troubleshooter 20.We call a person who works as part of telephone service that helps users solve problems that occur on computer systems a/an____ A.IT manager C. applications programmer B.system programmer D*. help-desk troubleshooter 21.A fault in a machine, especially in a computer system or program is a____ . *A. bug B. debug C. blog D. troubleshoot 22._____is the technique of detecting and correcting errors which may occur in programs. A. Bugging B. Bug C. Debugger *D. Debugging 23._____refers to the transmission of signals over a distance for the purpose of communication. *A. Telecommunications B. teletext C. mobile phone D. Internet 24.VoIP stands for Voice over Internet Protocol, a system which lets you make phone calls using the____ instead of the regular phone line. A. telecommunications B. teletext C. mobile phone *D. Internet 25.With a Wi-Fi phone, you are using the Internet, so the calls are free or at least cheaper than using a(n)_____ . A. telecommunications B. message *C. mobile phone D. Internet 26.Spit, or spam over internet telephony, means that our phones could be blocked with unwanted voice_____ . A.telecommunications *B. messages C. mobile phones D. Internet 27.Thanks to telecommunications, people can now work at home and communicative with their office by computer and telephone. This is called____ . A. teletext *B. teleworking C. telemarketing D. call centre 28_____ .is the process of selling goods and services over the phone. A. Teletext B. Teleworking *C. Telemarketing D. Call centre 29. A___ has the ability to handle a considerable volume of calls at the same time. A. teletext B. teleworking C. telemarketing *D. call centre 30._____ is a system for giving written information on many subjects, such as news, sport results, share prices and weather forecasts, by television. *A. Teletext B. Teleworking C. Telemarketing D. Call centre 31._____ is/are transmitted by devices such as the telephone, radio, television, satellite or computer network. A. Information B. Data C. Signal *D. All are correct 32. A___ is a being that a part robot, part human. *A. cyborg B. robotics C. nanobots D. android 33._____ is a machine that sends and receives documents in an electronic form along telephone wires and then prints them. A. Teletext B. Set-top box *C. Fax D. BlackBerry 34.The Passport, the latest model of__ A. mobile phone B.set-top box C. wearable computer *D. BlackBerry , is officially released on September 24,2014. 35.A device that changes a digital television signal into a form which can be seen on an ordinary television is called a_____ . A. teletext *B. set-top box C. fax D. BlackBerry 36.____ is a machine in or outside a bank from which you can get money from your bank account using a special plastic card. A. Cashpoint B. Cash machine C. Cash dispenser *D. All are correct 37_ ___ cover a large geographic area, like a country or even multiple countries. A. LANs B. Intranets C. PANs *D. WANs 38.______ is a computer network interconnects computers within a limited area such as a home, school, computer laboratory, or office building. *A. LAN B. Intranet C. PAN D. WAN 39.A computer network typically includes a laptop, a mobile phone and a PDA is called___ A. LAN B. Intranet *C.PAN D. WAN 40.A company network that uses public internet software but makes the website only accessible to employees and authorized users is called____ A.LAN *B. Intranet C.PAN D. WAN 41.According to geographical area criteria,_______are divided into PANs, LANs, MANs and WANs. A .topologies B. architectures C. network protocols *D. networks 42. Networks use different_______. For instance, the Internet uses TCP/IP. A .topology B. architecture *C. network protocols D. geographical area 43.According to the criteria of________ peer-to-peer network. A. topology *B.architecture C.network protocol D. geographical area , networks include client-server network and . 44.There are 3 kinds of_____ *A. topology B.architecture C.network protocol D. geographical area , or layout: bus network, star network and ring network. 45.A wireless network for connecting Wi-Fi hotspots is called______ *A. WiMAX B.satellite C.Bluetooth D. GSM . 46 .____ is the wireless technology that allows devices to communicate over long distances. A. WiMAX *B. Satellite C. Bluetooth D. GSM 47 .____ is the wireless network for mobile phones. A. WiMAX B. Satellite C. Bluetooth *D. GSM 48.Much of the Internet uses high-speed______ A. Wi-Fi hotspot *B. fibre optic cable C. Ethernet cable D. telephone line to send data over long distances. 49.The device that serves as a common connection point for devices in a wireless network is called_______ . A. wired router B.broadband modem C.wireless adapter *D. wireless access point 50.On___topology, all data flows through a central hub, a common connection point for the devices in the network. A. bus B. ring *C. star D. client-server 51. A___ is a device that outputs a video signal to display a video game. A. personal computer B. mobile phone *C. video game console D. portable gaming device 52.Some mobile phone games are programmed to run natively on the chip of____ A. personal computer *B. 3G mobile phones C.video game console D. portable gaming device . 53.Console games are played on_________, such as the Sony PS3 or Microsoft Xbox 360. A. personal computer B. 3G mobile phone *C.video game console D. portable gaming devices 54._________ are played on coin-operated machines, typically installed in restaurants, bars and amusement arcades. A. PC games B.Handheld games *C. Arcade games D. Mobile phone games 55.The Snake series of games had been popular on many Nokia phones since the late 1990s. The Snake is a____ A. PC game B. Handheld game C. Arcade game *D. Mobile phone game 56.Her kid plays___ and plays it at any time. A. PC games *B. handheld games C. arcade games D. mobile phone games on that small machine. He brings that machine to everywhere 57.This____can work with Window XP, but it is faster if you have Window Vista. *A. PC game B. handheld game C. arcade game D. mobile phone game 58._____ allow you to play against other users in other parts of the world using the Internet. A. Arcade games B. Console games C. PC games *D. Massively multiplayer online games 59.To play a______ A. handheld game *B. console game you just need the games controller that came with your machine. C.PC game D. massively multiplayer online game 60._____ is the science of making devices from single atoms and molecules. A. Robotics *B. Nanotechnology C. Expert systems D. Artificial intelligence 61._____ is a computer with electronic parts that are so small that they can only be seen using a microscope. A. Appliance B. Pervasive computing *C. Nanocomputer D. Ubiquitous computing 62.The medical application of nanotechnology is called_____. *A. nanomedicine B. appliance C. expert systems D. biometrics 63._____ are chemical substances or materials that are manufactured and used at a very small scale. A .Nanotube B. Nanotransistor C. expert systems *D. Nanomaterials 64.Nano devices are measured in_____ *A. nanometers B. nanotubes C. nanotransistors D. nanobots . 65.The microscopic robots, built with nanotechnology are called____ A. robotics B. android *C. nanobots D. asimo . 66.Nanomaterials will be made from carbon atoms in the form of____ A. devices B. nanotransistors C. nanobots *D. nanotubes . 67.The science of making intelligent machines and programs is called____ A. robotics B.biometrics C.expert systems *D.Artificial Intelligence 68.The branch of .mechanical engineering, electrical engineering and computer science that deals with thedesign, construction, operation, and application of robots is called___ . *A. robotics B. android c. nanobots D. artificial Intelligence 69.A robot that resembles a human is called____ A. robotics *B. android c. nanobots D. Asimo . 70.In the future, doctors will be using______to diagnose illnesses. A. robotics B. nanobots *c. expert systems D. artificial Intelligence 71.______uses computer technology to identify people based on physical characteristics such as fingerprints,facial features, voice, iris and retina patterns. *A. Biometrics B. Pervasive computing c. Ubiquitous computing D. Nanocomputers 72._____ is the new approach in which computer functions are integrated into everyday life, often in an invisible way. A. Nanocomputers B. Pervasive computing c. Ubiquitous computing *D. B & c are correct 73.In the ideal smart home,______and electronic devices work in sync to keep the house secure. A. nanobots B. nanotransistors c. nanotubes *D.appliances