Variant 3
1 When your computer is not connected to the internet, it is ________.
A) out of line B) offline C) off the line
2. All the lights are _____ . I can see nothing.
A) in B) on C) at D) off
3. _ _ _ _ _ hold objects and cut or bend tough materials.
A Pliers B Reversible C Clippers D tweezers
4. Insertion/Extraction _ _ _ _ _ insert and remove fibre connections in tight spaces.
A screwdriver B reversible C clippers D work
5. I______ lose my work because I haven’t backed up my files.
A might B allowed to C may D should
6. We aren’t______ use social networking sites at work.
A may B allowed to C must D can
7. You_______ put your cup of coffee on the computer.
A should B can C mustn’t D can
8. They aren’t______ to share their passwords with anyone.
A would B permitted C must D allowed to
9. You _______ use your date of birth as a password.
A shouldn’t B may C are D can
10. We are______ have a virus in the system.
A permitted B shouldn’t C must D need
11. Choose the synonym of Unplug.
A) disconnect B)insert C)turn off D)press
12. It is an output device to produce sound which is stored in digital form to a multimedia presentation or for movies.
A) Speaker B) microphone C) digital camera D) scanner
13. Things that you plug into computers.
A) Peripherals B) internal components C) storage devices D) software
14. The "brains" of the computer.
A)software B)CPU C) hardware D)RAM
15. Changing the fonts, colours etc. of a spreadsheet is called __________.
A) formatting B)forming C)reforming
16. A number in a spreadsheet cell is often called a __________.
A) digit B) numeral C) value
17. An effort to get unauthorised access to a computer is called a(n) ___________.
A spyware B malware attack C Trojan D hijacker
18. A(n) __________is software that replaces the user’s search engine with its own.
A spyware B browser hijacker C Encryption D adware
19. ____________ blocks authorised access.
A hacker B malware attack C install D Encryption
20. A spreadsheet grid is called a worksheet. A file containing one or more worksheets is called a __________.
A) workout B) work C) workbook
21. ________ is one way to make sure that only authorised people access the network.
A Trojan B Adware C Biometric scanning D Attack
22.____________ is software that automatically plays commercials on a computer.
A hacker B firewall C Adware D Trojan
23 .Did you ______ the latest software?
A unplug B spyware C install D unplug
24.You must ______ secure protocols.
A use B network C report D hardware
25.They didn’t _______ the supervisor about the problem.
A use B install C notify D software
Do'stlaringiz bilan baham: |