1. The mouse moves on a. A mouse mat b mouse carpet c mouse table d mouse rat



Download 43,15 Kb.
bet3/5
Sana20.07.2022
Hajmi43,15 Kb.
#828884
1   2   3   4   5
Bog'liq
answers for five variants (2)

Variant 3

1 When your computer is not connected to the internet, it is ________.


A) out of line B) offline C) off the line

2. All the lights are _____ . I can see nothing.


A) in B) on C) at D) off
3. _ _ _ _ _ hold objects and cut or bend tough materials.
A Pliers B Reversible C Clippers D tweezers

4. Insertion/Extraction _ _ _ _ _ insert and remove fibre connections in tight spaces.


A screwdriver B reversible C clippers D work

5. I______ lose my work because I haven’t backed up my files.


A might B allowed to C may D should

6. We aren’t______ use social networking sites at work.


A may B allowed to C must D can

7. You_______ put your cup of coffee on the computer.


A should B can C mustn’t D can

8. They aren’t______ to share their passwords with anyone.
A would B permitted C must D allowed to

9. You _______ use your date of birth as a password.


A shouldn’t B may C are D can

10. We are______ have a virus in the system.


A permitted B shouldn’t C must D need

11. Choose the synonym of Unplug.


A) disconnect B)insert C)turn off D)press

12. It is an output device to produce sound which is stored in digital form to a multimedia presentation or for movies.


A) Speaker B) microphone C) digital camera D) scanner


13. Things that you plug into computers.
A) Peripherals B) internal components C) storage devices D) software


14. The "brains" of the computer.
A)software B)CPU C) hardware D)RAM

15. Changing the fonts, colours etc. of a spreadsheet is called __________.


A) formatting B)forming C)reforming

16. A number in a spreadsheet cell is often called a __________.


A) digit B) numeral C) value

17. An effort to get unauthorised access to a computer is called a(n) ___________.


A spyware B malware attack C Trojan D hijacker

18. A(n) __________is software that replaces the user’s search engine with its own.


A spyware B browser hijacker C Encryption D adware

19. ____________ blocks authorised access.
A hacker B malware attack C install D Encryption

20. A spreadsheet grid is called a worksheet. A file containing one or more worksheets is called a __________.


A) workout B) work C) workbook

21. ________ is one way to make sure that only authorised people access the network.


A Trojan B Adware C Biometric scanning D Attack

22.____________ is software that automatically plays commercials on a computer.


A hacker B firewall C Adware D Trojan

23 .Did you ______ the latest software?


A unplug B spyware C install D unplug

24.You must ______ secure protocols.


A use B network C report D hardware

25.They didn’t _______ the supervisor about the problem.


A use B install C notify D software

Download 43,15 Kb.

Do'stlaringiz bilan baham:
1   2   3   4   5




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish