a device, usually electronic, that processes data according to a set of instructions.
the physical equipment used in a computer system, such as the central processing unit, peripheral devices, and memory
the unauthorized use or reproduction of another's work
the application of practical sciences to industry or commerce
the programs that can be used with a particular computer system
the programs that can be used with a particular computer system
the application of practical sciences to industry or commerce
the part of a computer in which operations are controlled and executed
the physical equipment used in a computer system, such as the central processing unit, peripheral devices, and memory
a device, usually electronic, that processes data according to a set of instructions.
the part of a computer in which operations are controlled and executed
a counting device that consists of a frame holding rods on which a specific number of beads are free to move
a pictorial representation
the unauthorized use or reproduction of another's work
the capacity of a machine or appliance to be connected to other machines, appliances, or facilities
the capacity of a machine or appliance to be connected to other machines, appliances, or facilities
a computer fanatic, esp one who through a personal computer breaks into the computer system of a company, government, etc
a solid material
a semiconductor device
a thing used to help perform a job
a solid material
a thing used to help perform a job
the physical equipment used in a computer system, such as the central processing unit, peripheral devices, and memory
a device for connecting two computers by a telephone line, consisting of a modulator that converts computer signals into audio signals and a corresponding demodulator
a semiconductor device with three connections, capable of amplification in addition to rectification
a semiconductor device with three connections, capable of amplification in addition to rectification
a personal computer that is small and light enough to be operated on the user's lap
a link from a hypertext document to another location, activated by clicking on a highlighted word or image
a device for connecting two computers
a part of a computer in which information is stored for immediate use by the central processing unit
a device for connecting two computers by a telephone line, consisting of a modulator that converts computer signals into audio signals and a corresponding demodulator
a part of a computer in which information is stored for immediate use by the central processing unit
a software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method
a programming language
a link from a hypertext document to another location, activated by clicking on a highlighted word or image
a link from a hypertext document to another location, activated by clicking on a highlighted word or image
an international computer network providing e-mail and information from computers in educational institutions, government agencies, and industry, accessible to the general public via modem links
a service provided on the internet enabling users to search for items of interest
a part of Internet
the physical equipment used in a computer system, such as the central processing unit, peripheral devices, and memory
a device for recording visual images in the form of photographs, movie film, or video signals
a software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method
with various parts or aspects linked or coordinated
a link from a hypertext document to another location, activated by clicking on a highlighted word or image
a service provided on the internet enabling users to search for items of interest
a service provided on the internet enabling users to search for items of interest
with various parts or aspects linked or coordinated
a panel of keys that operate a computer or typewriter
the action of mathematical calculation
a computer program, that provides an easy method of accessing and viewing information stored as HTML web documents on different web servers
the action of mathematical calculation
a computer program, that provides an easy method of accessing and viewing information stored as HTML web documents on different web servers
the physical equipment used in a computer system, such as the central processing unit, peripheral devices, and memory
a panel of keys that operate a computer or typewriter
with various parts or aspects linked or coordinated
a panel of keys that operate a computer or typewriter
irrelevant or inappropriate messages sent on the Internet to a large number of newsgroups or users
the action of mathematical calculation
web architect
the action of mathematical calculation
web architect
a person who or thing that receives
the name of a person or a mark or sign representing his name, marked by himself or by an authorized deputy
a group of Internet users who exchange emails on a topic of mutual interest
a panel of keys that operate a computer or typewriter
the name of a person or a mark or sign representing his name, marked by himself or by an authorized deputy
the action of inventing something, typically a process or device
a person who or thing that receives
the action of mathematical calculation
a group of Internet users who exchange emails on a topic of mutual interest
a group of Internet users who exchange emails on a topic of mutual interest
the ordinary postal system as opposed to electronic mail
gain unauthorized access to (data in a computer)
to calculate
the part of a network address which identifies it as belonging to a particular domain
a computer file in which email messages received by a particular user are stored
to calculate
gain unauthorized access to (data in a computer)
the action of mathematical calculation
the part of a network address which identifies it as belonging to a particular domain
the part of a network address which identifies it as belonging to a particular domain
the process of writing computer programs
a computer virus
semiconductor memory
location connected to the Internet that maintains one or more web pages
a computer virus
location connected to the Internet that maintains one or more web pages
semiconductor memory
not existing naturally
to insert
a record of the address of a file, Internet page, or other data used to enable quick access by a user
not existing naturally
a computer virus
semiconductor memory
to insert
a transmission technique using a wide range of frequencies that enables messages to be sent simultaneously, used in fast internet connections
to insert
semiconductor memory
not existing naturally
convert (waste) into reusable material
any device, such as a disk, printer, modem, or screen, concerned with input/output, storage, etc
convert (waste) into reusable material
the part of a computer in which operations are controlled and executed
a peripheral device that accepts data and feeds it into a computer
semiconductor memory in which all storage locations can be rapidly accessed in the same amount of time
the part of a computer in which operations are controlled and executed
semiconductor memory in which all storage locations can be rapidly accessed in the same amount of time
a computer virus
a computer or computer program which manages access to a centralized resource or service in a network
convert (waste) into reusable material
a storage device that holds data permanently and cannot in normal circumstances be altered by the programmer
a peripheral device that accepts data and feeds it into a computer
not existing naturally
a computer or computer program which manages access to a centralized resource or service in a network
the information produced by a computer
the information produced by a computer
a machine or tool used for a specific task
a computer program enabling the user to alter or move online text
designed to detect and destroy computer viruses
a system of electrical conductors and components forming an electrical circuit
a computer or computer program which manages access to a centralized resource or service in a network
a system of interconnected computer systems, terminals, and other equipment allowing information to be exchanged
a peripheral device that accepts data and feeds it into a computer
designed to detect and destroy computer viruses
a system of electrical conductors and components forming an electrical circuit
a system of electrical conductors and components forming an electrical circuit
the study of people's efficiency in their working environment
designed to detect and destroy computer viruses
a large high-speed computer, especially one supporting numerous workstations or peripherals
poisonous
a large high-speed computer, especially one supporting numerous workstations or peripherals
poisonous
a journal written on-line and accessible to users of the internet
designed to detect and destroy computer viruses
a tall structure that houses machinery
a computer program enabling the user to alter or move online text
a communication, usually brief, from one person or group to another
a tall structure that houses machinery
poisonous
able to be transferred from one machine or system to another
a tall structure that houses machinery
able to be transferred from one machine or system to another
a large high-speed computer, especially one supporting numerous workstations or peripherals
designed to detect and destroy computer viruses
a line or block of text appearing at the top of each page of a book or document
a computer program used chiefly for accounting, in which figures arranged in the rows and columns of a grid can be manipulated and used in calculations
a code or instruction which connects one part of a program or an element in a list to another
designed to detect and destroy computer viruses
able to be transferred from one machine or system to another
a line or block of text appearing at the top of each page of a book or document
a line or block of text appearing at the top of each page of a book or document
a sequence of coded instructions fed into a computer, enabling it to perform specified logical and arithmetical operations on data
designed to detect and destroy computer viruses
a large high-speed computer, especially one supporting numerous workstations or peripherals
a familiar or humorous name given to a person or thing instead of or as well as the real name
a familiar or humorous name given to a person or thing instead of or as well as the real name
an internet-based teaching system
a large high-speed computer, especially one supporting numerous workstations or peripherals
designed to detect and destroy computer viruses
informal conversation or talk conducted in an easy familiar manner
a high-level computer programming language designed for general commercial use
a computer program that runs within a page on the World Wide Web
gain unauthorized access to (data in a computer)
a computer program enabling the user to alter or move online text
informal conversation or talk conducted in an easy familiar manner
a high-level computer programming language for mathematical and scientific purposes, designed to facilitate and speed up the solving of complex problems
informal conversation or talk conducted in an easy familiar manner
designed to detect and destroy computer viruses
able to be transferred from one machine or system to another
a journal written on-line and accessible to users of the internet
of, relating to, or characteristic of the culture of computers, information technology, and virtual reality
a computer programming language that uses common English terms
gain unauthorized access to (data in a computer)
designed to detect and destroy computer viruses
a journal written on-line and accessible to users of the internet
a journal written on-line and accessible to users of the internet
communicating without connecting wires or other material contacts
designed to detect and destroy computer viruses
a large high-speed computer, especially one supporting numerous workstations or peripherals
a computer programming language
a person who breaks into a computer system, typically for an illegal purpose
gain unauthorized access to (data in a computer)
a computer program enabling the user to alter or move online text
able to be transferred from one machine or system to another
a computer programming language
a computer programming language combining the advantages of a high-level language with the ability to address the computer at a level comparable with that of an assembly language
a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
a journal written on-line and accessible to users of the internet
the procedure for making copies of data in case the original is lost or damaged
a computer program designed specifically to damage or disrupt a system, such as a virus
a computer program designed specifically to damage or disrupt a system, such as a virus
a self-replicating program able to propagate itself across a network, typically having a detrimental effect
designed to detect and destroy computer viruses
a computer program enabling the user to alter or move online text
messages distributed by electronic means from one computer user to one or more recipients via a network
messages distributed by electronic means from one computer user to one or more recipients via a network
designed to detect and destroy computer viruses
a computer program designed specifically to damage or disrupt a system, such as a virus
able to be transferred from one machine or system to another
a wire or bundle of wires that conducts electricity
computer software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
a wire or bundle of wires that conducts electricity
the action of mathematical calculation
designed to detect and destroy computer viruses
messages distributed by electronic means from one computer user to one or more recipients via a network
the unauthorized use or reproduction of another's work
a widely used information system on the Internet, which provides facilities for documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another
a wire or bundle of wires that conducts electricity
the action of mathematical calculation
messages distributed by electronic means from one computer user to one or more recipients via a network
a part of a computer system or network which is designed to block unauthorized access while permitting outward communication
the procedure for making copies of data in case the original is lost or damaged
able to be transferred from one machine or system to another
the unauthorized use or reproduction of another's work
a wire or bundle of wires that conducts electricity
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
EXPERTS RECOMMEND THESE STEPS AS COPING MECHANISMS:
‑ TURN THE _______ AWAY FROM THE WINDOW TO REDUCE GLARE, AND COVER YOUR SCREEN WITH A GLARE DEFLECTOR. TURN OFF OVERHEAD LIGHTS; ILLUMINATE YOUR WORK AREA WITH A LAMP.
‑ PUT YOUR MONITOR ON A TILT-AND-SWIVEL _______.
‑ GET A PNEUMATICALLY _______ CHAIR. POSITION THE SEAT BACK SO YOUR LOWER BACK IS SUPPORTED.
‑ PLACE THE KEYBOARD LOW ENOUGH TO AVOID ARM AND WRIST _______. DO NOT BEND YOUR WRISTS WHEN YOU TYPE. USE AN INEXPENSIVE, RAISED WRIST REST. DO NOT REST YOUR WRISTS ON A SHARP EDGE.
‑ SIT WITH YOUR _______ FIRMLY ON THE FLOOR.
1. base
2. fatigue
3. screen
4. hands
5. feet
6. calm
7. adjustable
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
IT TAKES ONLY A FEW MINUTES TO CREATE A VISUAL BASIC _______. USING THE _______, YOU SIMPLY DRAG AND DROP CONTROLS (E.G. OPTION BUTTONS, ICONS, MENU BARS, ETC.) INTO THE REQUIRED POSITION, AND THEN _______ THEIR COLOUR, SIZE AND BEHAVIOR. THANKS TO ITS OBJECT-ORIENTED PHILOSOPHY AND INTERACTIVE NATURE, VISUAL BASIC ENABLES THE _______ TO QUICKLY CREATE ALL SORTS OF APPLICATION FROM SMALL SYSTEM UTILITIES TO DATABASE PROGRAMS AND INTERNET SERVER _______.
1. slotted
2. program
3. mouse
4. programmed
5. define
6. programmer
7. applications
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
BEN IS A MODERN _______. HE USED TO _______ ON THE PHONE AT PEOPLE’S _______. BEN _______ UP TO A NUMBER AND ENJOYED THE _______. BUT AS HAVING BEEN DETECTED HE DOESN’T LIKE TO DO IT.
1. mere
2. cracker
3. talk
4. expense
5. hooked
6. insight
7. conversation
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
JACK IS A REAL _______ IN COMPUTERS. HE WRITES THE COMPUTER PROGRAMS. JACK CAN _______ THE COMPUTERS EASILY. HE CAN CRACK ANY _______. BUT JACK ALWAYS FOLLOWS STEVEN LEVY’S _______ BECAUSE JACK IS A _______ HACKER.
1. connoisseur
2. hack
3. password
4. bogus
5. rules
6. exhilaration
7. bonafide
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
THE _______ OF RAM VARIES FROM ONE COMPUTER MODEL TO ANOTHER. BUT NO MATTER HOW MUCH RAM YOUR COMPUTER HAS, IT IS NOT _______. AT SOME POINT, THE MEMORY WILL BE _______. WHEN THAT HAPPENS (OR EVEN BEFORE IT HAPPENS) YOU WILL NEED TO _______ DATA FROM THE FILLED INTERNAL STORAGE TO SOME FORM OF _______ STORAGE.
1. amount
2. transfer
3. unlimited
4. internal
5. filled
6. external
7. limit
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
EVERYWHERE WE GO, WE HEAR ABOUT _______. IT’S ON TELEVISION, IN MAGAZINES, NEWSPAPERS, AND IN SCHOOLS. ONE MIGHT THINK THAT THIS _______ OF MILLIONS OF COMPUTERS AROUND THE GLOBE IS AS _______ AND CAPTIVATING AS TELEVISION, BUT WITH MORE AND MORE _______ LOGGING ON EVERYDAY AND STAYING ON LONGER AND LONGER, THIS “INFORMATION SUPERHIGHWAY” COULD BE PERHAPS MORE CORRECTLY REFERRED TO AS AN EXPRESSWAY OF BIG CITY CENTER AT _______ HOUR.
1. users
2. network
3. use
4. Internet
5. rush
6. fast
7. rushed
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
RAM IS _______ MEMORY. WHEN YOU TURN OFF THE _______, EVERYTHING THAT HAS BEEN _______ IN RAM _______. IF YOU WANT TO _______ DATA THAT IS STORED IN RAM, YOU HAVE TO STORE IT EXTERNALLY – THAT IS, OUTSIDE THE COMPUTER.
1. disappear
2. stored
3. computer
4. save
5. temporary
6. disappears
7. storing
RAM IS THE _______ THAT HOLDS THE SOFTWARE AND OTHER INPUT _______ WHILE YOU ARE WORKING ON THEM. THIS KIND OF MEMORY IS CALLED RANDOM _______ BECAUSE YOU CAN INSTANTLY GO RIGHT TO ANY PART OF THE _______ DATA OR PROGRAM. YOU DO NOT HAVE TO _______ THROUGH ALL THE DATA STORED UP TO THE PART THAT YOU WANT TO SEE.
1. access
2. store
3. memory
4. storing
5. run
6. data
7. stored
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
YOU CAN EASILY _______ INPUT DATA THAT IS _______ IN RAM. FOR INSTANCE, YOU CAN ADD A MISSING NAME OR _______ A MISSPELLING. HOWEVER, MANY COMMERCIAL _______ PRODUCERS WRITE THEIR PROGRAMS IN SUCH A WAY AS TO MAKE IT VERY _______ FOR YOU TO CHANGE THEM.
1. difficult
2. stored
3. software
4. correct
5. store
6. change
7. hardware
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
THE OPERATING SYSTEM IS THE _______ THAT MAKES IT POSSIBLE FOR YOU TO _______ ALL OTHER PROGRAMS THAT ARE AVAILABLE OR CAN BE WRITTEN FOR YOUR _______. THE OPERATING SYSTEM PROGRAM MAY EXIST JUST IN _______. OR IT MAY EXIST PARTLY IN ROM AND PARTLY ON A _______ OR TAPE.
1. run
2. RAM
3. computer
4. program
5. ROM
6. running
7. disk
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
AN OPERATING SYSTEM PROVIDES THE BASIC _______ THAT TELL THE COMPUTER HOW TO HANDLE CERTAIN TASKS NECESSARY FOR IT TO _______. THE OPERATING SYSTEM OF A LARGE COMPUTER CAN BE VERY _______, BECAUSE IT HAS TO CONTROL SO MANY _______. A MICROCOMPUTER’S OPERATING SYSTEM IS _______ BY COMPARISON.
1. work
2. complication
3. instructions
4. functions
5. simple
6. complicated
7. instruct
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
A DISK OPERATING SYSTEM, OR DOS IS A _______ THAT CONTROLS THE STORAGE OF INFORMATION ON _______. DOS ALSO MAKES IT POSSIBLE FOR THE COMPUTER TO USE _______ PROGRAMS THAT ARE ALREADY _______ ON DISKS. MOST _______ PROGRAMS FOR COMPUTERS ARE AVAILABLE ON DISKS, AND THE DOS IS WHAT GETS THESE PROGRAMS STARTED. OBVIOUSLY, THE SYSTEM REQUIRES A DISK DRIVE.
1. disks
2. stored
3. store
4. various
5. packaged
6. program
7. package
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
ONE OF THE _______ SAYS THAT HACKERS HAVE CHANGED UNDER THE INFLUENCE OF “CRACKERS” – THE PEOPLE WHO LOVED TO TALK ON THE PHONE AT SOMEBODY ELSE’S _______. THOSE PEOPLE HOOKED UP TO ANY NUMBER AND _______ THE PLEASURE OF TELEPHONE CONVERSATION, LEAVING THE MOST FUN – BILLS – FOR THE VICTIM. ANOTHER LEGEND TELLS US THAT MODERN HACKERS WERE BORN WHEN A NEW COMPUTER GAME _______ WAS INVENTED. RULES WERE VERY SIMPLE: TWO COMPUTER PROGRAMS WERE FIGHTING FOR THE REIGN ON THE COMPUTER. MEMORY, DISKSPACE AND _______ TIME WERE THE BATTLEFIELD.
1. enjoyed
2. legends
3. CPU
4. memory
5. concept
6. expense
7. did
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
STEVEN LEVY, IN HIS BOOK HACKERS, PRESENTED THE RULES:
- RULE 1: ACCESS TO _______ – AND ANYTHING, WHICH MIGHT TEACH YOU, SOMETHING ABOUT THE WAY THE WORLD WORKS – SHOULD BE UNLIMITED AND TOTAL.
- RULE 2: ALL INFORMATION SHOULD BE _______.
- RULE 3: MISTRUST AUTHORITY – PROMOTE DECENTRALIZATION.
- RULE 4: HACKERS SHOULD BE JUDGED BY THEIR _______, NOT BOGUS CRITERIA SUCH AS DEGREES, RACE, OR POSITION.
- RULE 5: YOU CAN _______ ART AND BEAUTY ON A COMPUTER.
- RULE 6: COMPUTERS CAN _______ YOUR LIFE FOR THE BETTER.
1. phones
2. free
3. create
4. computers
5. hacking
6. ambitious
7. change
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
THE FIRST “HACKERS” WERE _______ AT THE MASSACHUSETTS INSTITUTE OF TECHNOLOGY (MIT) WHO BELONGED TO THE TMRC (TECH MODEL RAILROAD CLUB). SOME OF THE MEMBERS REALLY BUILT MODEL _______. BUT MANY WERE MORE INTERESTED IN THE WIRES AND _______ UNDERNEATH THE TRACK PLATFORM. SPENDING HOURS AT TMRC CREATING BETTER CIRCUITRY WAS _______ “A MERE HACK”. THOSE MEMBERS WHO WERE INTERESTED IN CREATING INNOVATIVE, STYLISTIC, AND TECHNICALLY CLEVER CIRCUITS CALLED THEMSELVES (WITH PRIDE) _______.
1. trains
2. called
3. call
4. circuits
5. transistors
6. students
7. hackers
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
DATA COMMUNICATION WITHIN AND BETWEEN COMPUTER SYSTEMS IS _______ BY SYSTEM SOFTWARE. COMMUNICATION SOFTWARE _______ DATA FROM ONE COMPUTER SYSTEM TO ANOTHER. THESE PROGRAMS USUALLY PROVIDE _______ WITH DATA SECURITY AND ERROR CHECKING ALONG WITH PHYSICALLY TRANSFERRING DATA BETWEEN THE TWO COMPUTER’S MEMORIES. DURING THE PAST FIVE YEARS THE DEVELOPING ELECTRONIC NETWORK COMMUNICATION HAS STIMULATED MORE AND MORE COMPANIES _______ VARIOUS COMMUNICATION SOFTWARE, SUCH AS WEB-BROWSERS FOR _______.
1. transfers
2. handled
3. Internet
4. retrieve
5. to produce
6. users
7. hand
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
THE ABACUS, WHICH EMERGED ABOUT 5,000 YEARS AGO IN ASIA MINOR AND IS STILL IN _______ TODAY, MAY BE CONSIDERED THE FIRST COMPUTER. THIS DEVICE ALLOWS _______ TO MAKE COMPUTATIONS USING A SYSTEM OF SLIDING BEADS ARRANGED ON A RACK. EARLY MERCHANTS USED THE ABACUS TO KEEP TRADING _______. BUT AS THE USE OF PAPER AND PENCIL SPREAD, PARTICULARLY IN EUROPE, THE _______ LOST ITS IMPORTANCE. IT TOOK NEARLY 12 CENTURIES, HOWEVER, FOR THE NEXT SIGNIFICANT _______ IN COMPUTING DEVICES TO EMERGE.
1. use
2. users
3. using
4. transactions
5. calculator
6. abacus
7. advance
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
A COMPUTER TO COMPLETE A JOB REQUIRES MORE THAN JUST THE ACTUAL EQUIPMENT OR HARDWARE WE SEE AND TOUCH. IT REQUIRES _______ – PROGRAMS FOR DIRECTING THE OPERATION OF A COMPUTER OR ELECTRONIC DATA.
SOFTWARE IS THE FINAL COMPUTER SYSTEM COMPONENT. THESE COMPUTER PROGRAMS _______ THE HARDWARE HOW TO CONDUCT PROCESSING. THE COMPUTER IS MERELY A GENERAL-PURPOSE _______ WHICH REQUIRES SPECIFIC SOFTWARE TO PERFORM A GIVEN _______. COMPUTER CAN INPUT, CALCULATE, COMPARE, AND OUTPUT DATA AS INFORMATION. SOFTWARE DETERMINES THE ORDER IN WHICH THESE OPERATIONS ARE _______.
1. machine
2. task
3. performance
4. instruct
5. software
6. performed
7. firmware
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
THE _______ OF STORAGE HARDWARE IS TO _______ COMPUTER INSTRUCTIONS AND DATA IN A FORM THAT IS RELATIVELY PERMANENT AND _______ WHEN NEEDED FOR PROCESSING. STORAGE HARDWARE SERVES THE SAME BASIC FUNCTIONS AS DO OFFICE FILING SYSTEMS EXCEPT THAT IT STORES DATA AS ELECTROMAGNETIC _______. THE MOST COMMON WAYS OF STORING _______ ARE HARD DISK, FLOPPY DISK AND CD-ROM.
1. retrieve
2. signals
3. purpose
4. data
5. store
6. transfer
7. transmit
THE _______ OF THE INPUT HARDWARE IS _______ DATA AND CONVERT IT INTO A FORM SUITABLE FOR COMPUTER PROCESSING. THE MOST COMMON INPUT DEVICE IS A _______. IT LOOKS VERY MUCH LIKE A TYPEWRITER. THE MOUSE IS A HAND HELD DEVICE CONNECTED TO THE COMPUTER BY SMALL _______. AS THE MOUSE IS ROLLED ACROSS THE MOUSE PAD, THE _______ MOVES ACROSS THE SCREEN. WHEN THE CURSOR REACHES THE DESIRED LOCATION, THE USER USUALLY PUSHES A BUTTON ON THE MOUSE ONCE OR TWICE TO SIGNAL A MENU SELECTION OR A COMMAND TO THE COMPUTER.
1. take
2. cursor
3. to collect
4. keyboard
5. note
6. cable
7. purpose
AT PRESENT THERE IS A TENDENCY TOWARDS AN EVEN HIGHER LEVEL OF PROGRAMMING LANGUAGES, WHICH MIGHT BE CALLED _______ LANGUAGES, AND AN INCREASING USE OF SOFTWARE DEVELOPMENT TOOLS.PEOPLE COMMUNICATE INSTRUCTIONS TO THE COMPUTER IN _______ LANGUAGES AND THE EASIER THIS COMMUNICATION CAN BE MADE, THE WIDER THE _______ OF COMPUTERS WILL BE. SCIENTISTS ARE REPORTED TO BE ALREADY WORKING ON _______ INTELLIGENCE AND THE NEXT GENERATION OF COMPUTERS MAY BE ABLE _______ HUMAN LANGUAGES.
1. symbolic
2. specification
3. artificial
4. to understand
5. symbol
6. application
7. specified
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
BASIC LANGUAGES, IN WHICH THE PROGRAM IS _______ TO THE MACHINE _______ VERSION, ARE KNOWN AS _______ LANGUAGES. IN THESE LANGUAGES, EACH INSTRUCTION IS EQUIVALENT TO A SINGLE MACHINE CODE INSTRUCTION, AND THE PROGRAM IS _______ INTO MACHINE CODE BY A SPECIAL PROGRAM CALLED AN ASSEMBLER. THESE LANGUAGES ARE CONSIDERED TO BE STILL QUITE _______ AND RESTRICTED TO PARTICULAR COMPUTERS.
1. code
2. converted
3. complex
4. different
5. low
6. low-level
7. similar
ALGOL ACRONYM FOR ALGORITHMIC LANGUAGE. ORIGINALLY CALLED IAL, WHICH MEANS INTERNATIONAL ALGEBRAIC LANGUAGE. IT IS USED FOR MATHEMATICAL AND SCIENTIFIC _______. ALGOL WAS FIRST INTRODUCED IN EUROPE IN 1960.PL/1 PROGRAMMING LANGUAGE 1. _______ IN 1964 TO _______ FEATURES OF COBOL AND ALGOL. CONSEQUENTLY, IT IS USED FOR DATA PROCESSING AS WELL AS SCIENTIFIC _______. BASIC ACRONYM FOR BEGINNERS ALL-PURPOSE SYMBOLIC INSTRUCTION CODE. DEVELOPED IN 1965 AT DARTMOUTH COLLEGE IN THE UNITED STATES FOR USE BY STUDENTS WHO REQUIRE SIMPLE LANGUAGE TO BEGIN _______.
1. combine
2. applications
3. systems
4. developed
5. contain
6. programming
7. purposes
FORTRAN ACRONYM FOR FORMULA TRANSLATION. THIS LANGUAGE IS USED FOR _______ SCIENTIFIC AND MATHEMATICAL PROBLEMS. IT CONSISTS OF ALGEBRAIC FORMULAE AND ENGLISH PHRASES. IT WAS FIRST _______ IN THE UNITED STATES IN 1954.COBOL ACRONYM FOR COMMON BUSINESS-ORIENTED LANGUAGE. THIS LANGUAGE IS USED FOR COMMERCIAL _______. COBOL, WHICH IS WRITTEN USING ENGLISH _______, DEALS WITH PROBLEMS THAT DO NOT _______ A LOT OF MATHEMATICAL CALCULATIONS. IT WAS FIRST INTRODUCED IN 1959.
1. introduced
2. statements
3. purposes
4. contain
5. decide
6. solving
7. involve
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
THE WORLD WIDE WEB (WWW) IS A PART OF THE INTERNET. BUT IT'S NOT A COLLECTION OF _______. RATHER, IT IS INFORMATION THAT IS CONNECTED OR _______ TOGETHER LIKE A WEB. YOU ACCESS THIS INFORMATION THROUGH ONE INTERFACE OR TOOL CALLED A _______. THE NUMBER OF RESOURCES AND SERVICES THAT ARE PART OF THE WORLD WIDE WEB IS GROWING EXTREMELY FAST. IN 1996 THERE WERE MORE THAN 20 MILLION USERS OF THE WWW, AND MORE THAN HALF THE INFORMATION THAT IS _______ ACROSS THE INTERNET IS ACCESSED THROUGH THE WWW. BY USING A COMPUTER TERMINAL (HARDWARE) CONNECTED TO A NETWORK THAT IS A PART OF THE INTERNET, AND BY USING A PROGRAM (SOFTWARE) TO BROWSE, OR RETRIEVE INFORMATION THAT IS A PART OF THE WORLD WIDE WEB, THE PEOPLE CONNECTED TO THE INTERNET AND WORLD WIDE WEB THROUGH THE LOCAL _______ HAVE ACCESS TO A VARIETY OF INFORMATION.
1. linked
2. Web
3. providers
4. Web Browser
5. transferring
6. networks
7. transferred
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
MILLIONS OF PEOPLE AROUND THE WORLD USE THE INTERNET TO _______ FOR AND _______ INFORMATION ON ALL SORTS OF TOPICS IN A WIDE VARIETY OF AREAS INCLUDING THE ARTS, BUSINESS, GOVERNMENT, HUMANITIES, NEWS, POLITICS, AND RECREATION. PEOPLE _______ THROUGH ELECTRONIC MAIL (E-MAIL), DISCUSSION GROUPS, CHAT CHANNELS AND OTHER MEANS OF INFORMATIONAL EXCHANGE. THEY _______ INFORMATION AND MAKE COMMERCIAL AND BUSINESS TRANSACTIONS. ALL THIS ACTIVITY IS POSSIBLE BECAUSE TENS OF THOUSANDS OF NETWORKS ARE CONNECTED TO THE INTERNET AND _______ INFORMATION IN THE SAME BASIC WAYS.
1. exchange
2. search
3. share
4. retrieve
5. tell
6. communicate
7. delete
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
THE BASIC _______ OF THE COMPUTER IS THE PROCESSING OF INFORMATION. COMPUTERS _______ INFORMATION IN THE FORM OF INSTRUCTION CALLED A _______ AND CHARACTERS CALLED DATA TO _______ MATHEMATICAL AND LOGICAL OPERATIONS, AND GIVE THEM THE RESULTS. THE DATA IS _______ MATERIAL WHILE INFORMATION IS ORGANIZED, PROCESSED, REFINED AND USEFUL FOR DECISION MAKING. COMPUTER IS USED TO CONVERT DATA INTO INFORMATION. COMPUTER IS ALSO USED TO STORE INFORMATION IN THE DIGITAL FORM.
1. program
2. perform
3. raw
4. information
5. job
6. task
7. accept
IN THE EARLY 1980S, GATES LED MICROSOFT’S _______ FROM THE DEVELOPER OF COMPUTER PROGRAMMING LANGUAGES TO A LARGE COMPUTER SOFTWARE COMPANY. THIS TRANSITION BEGAN WITH THE INTRODUCTION OF MS-DOS, THE _______ FOR THE NEW IBM PERSONAL COMPUTER IN 1981. GATES ALSO LED MICROSOFT TOWARDS THE INTRODUCTION OF APPLICATION SOFTWARE SUCH AS THE _______.MUCH OF GATES’ SUCCESS IS BASED ON HIS ABILITY TO _______ TECHNICAL VISIONS INTO MARKET STRATEGY. ALTHOUGH GATES HAS ACCUMULATED GREAT WEALTH FROM HIS HOLDINGS OF MICROSOFT STOCK, HE HAS BEEN KNOWN AS A TOUGH _______ WHO SEEMS TO VALUE WINNING IN A COMPETITIVE ENVIRONMENT OVER MONEY. GATES STILL CONTINUES TO WORK PERSONALLY IN PRODUCT DEVELOPMENT AT MICROSOFT.
1. competitor
2. evolution
3. operating system
4. chief
5. translate
6. founder
7. Microsoft Word processor
Заповніть пропуски цифрами, які відповідають правильному слову в тексті:
IN 1980, IBM DECIDED THAT THERE WAS A _______ FOR 250 000 PCS, SO THEY _______ A SPECIAL TEAM TO DEVELOP THE FIRST IBM PC. IT _______ SALE IN 1981 AND SET A WORLD-WIDE STANDARD FOR IBM COMPATIBILITY WHICH OVER THE NEXT TEN YEARS, WAS ONLY SERIOUSLY CHALLENGED BY ONE OTHER COMPANY, APPLE COMPUTERS. SINCE THEN, OVER SEVENTY MILLION PCS _______ BY IBM AND OTHER MANUFACTURERS HAVE BEEN SOLD. OVER THIS PERIOD, PCS HAVE BECOME COMMODITY ITEMS. SINCE IBM MADE THE DESIGN _______, ANYONE CAN MAKE THEM.
1. made
2. market
3. make
4. went on
5. sit
6. set up
7. nonproprietary
WILLIAM HENRY GATES WAS BORN IN SEATTLE, WASHINGTON, IN 1955. HE IS AN AMERICAN BUSINESS EXECUTIVE, CHAIRMAN AND _______ EXECUTIVE OFFICER OF THE MICROSOFT CORPORATION. GATES WAS THE _______ OF MICROSOFT IN 1975 TOGETHER WITH PAUL ALLEN, HIS _______ IN COMPUTER LANGUAGE DEVELOPMENT. WHILE _______ HARVARD IN 1975, GATES TOGETHER WITH ALLEN DEVELOPED A VERSION OF THE BASIC COMPUTER _______ FOR THE FIRST PERSONAL COMPUTER.
1. partner
2. programming language
3. attending
4. chief
5. translate
6. founder
7. Microsoft Word processor