Check Your Knowledge-Activity
Check Your Knowledge-Activity
Check Your Knowledge-Activity
1. Person who illegally accesses somebody else's computer over the internet is called a hacker
a. pirate b. hack c. hacker
3. A website which can only be viewed by authorised people has restricted access.
a. reduced b. small c. restricted
5. Software which blocks attempts by others to access your computer over the internet is called a:
a. firewall b. fire blanket c. fire engine
8. Anti-virus software can also detect viruses on removable media, such as floppy disks.
a. detect b. control c. see
3. To select text, left button the left button, and move the mouse pointer.
4. If you use a mouse for many hours every day, you can get repetitive strain injury in your fingers.
5. With a laptop computer, plug in a mouse, or use the touchpad in front of the
keyboard.
6. To play some games, you need to use a joystick instead of a mouse.
7. To move up and down a page, you can scroll wheel the mouse wheel.
LAN
LAN is
pronounced "lan", and stands for 1 local Area Network. In a typical LAN, there is a central network
2
__server______ which supports a number of 3Terminals . Users have to
4
__log onto the network server. Pages of information that can be viewed within a LAN are called an
5
____intranet. A number of LANs connected to each other via 6__satelite or other form of __communication
are called a 7______WAN . To be used as network terminals, each computer needs to have a 8__Network
card installed.
B. Crossword
2
1 S O F T W A R E
P
3 P R O G R A M
4 L 5
D I P 6
R C O L
7 F I R E W A L T I
V 9 T H C
8 S E C U R I T Y C O D E
R P O A N
D N L S
A B E
10 B O O T E E O U
E M
9 Software which has been bought from the company that produced it is…
a. real b. justified c. licensed
1
. Making changes to a text is called _________.
a. altering b. renewing c. editing
2
. To change normal text to italic, first you must _________ the text you want to format.
a. choose b. take c. select
3
. A very pale image behind the text is called ________.
a. an ink mark b. a watermark c. a grey mark
4
. To divide the text into two pages, insert a ________.
a. page break b. page stop c. page change
5
. The numbers at the bottom of the page are ________.
a. page numbers b. sheet numbers c. paper numbers
6 An extra note at the bottom of the page (usually in a smaller font size) is called a
. ________.
a. bottom note b. foot c. footnote
7 In word processing, to put things into alphabetical order is to
. ________.
a. sort b. organise c. order
8
. A list of contacts, addresses etc. is called _________.
a. an archive b. a list c. a database
B. Match the malware with the damage. (It's not easy, and the terms are sometimes confused with
each other.)
1. virus
2. spyware
3. trojan horse
5. worm
a. collects and sends private information from the infected computer to a third party
d. a program which adds itself to an executable file, and can cause considerable damage to the data on the infected
computer.
4. zoom in
d. remove part of an image
5. zoom out
e. copy part of an
7. rotate
f. view part of the image in more detail
8. touch up
g. view more of the image in less detail
9. clone
h. convert a vector image to a bitmap image (see
B5 below)
10. rasterize
Fill the gaps, then put these stages in order (number them 1 to 8).
1 Before you can start shopping, you usually have to sign in to the site.
(If you don't already have an account, you have to create one.)
10
_Browse the website, and decide what you want to buy.
From: anna@goodmail.com
To: bernard@ciaociao.it
Cc: carol@freemail.co.uk
Bcc: dave@norsemail.no
Hi Bernard
I'll be arriving in Rome just after midday tomorrow (Friday). You don't need to pick me up
at the airport – I can get a taxi to the city centre.
Anna
3. Bernard knows that Carol knows when Anna will be arriving in Rome. True
4. Bernard knows that Dave knows when Anna will be arriving in Rome. True
5. You can say that Anna Cc-ed her email to Carol. True
6. You can say that Anna Bcc-ed her email to Dave. True
9. Cc stands for carbon copy and Bcc stands for blind carbon copy, but the full terms are almost
never used. True
10. Carbon copies were a method of making copies of documents typed on typewriters. True
Sending an attachment
Put the words in the spaces.
inbox
attach browse field es
You can send almost any file as an attachment. Browse through the folders on your computer until you find
2 3
the file you want to attach. Click on " _Open ". The file will appear in the attachments _Field_. Then click
4
" _Attach ", and wait while the file uploads. Add more files if you wish. When you have finished adding files,
5
click " _Send ".
6 7
Some email _Inboxes will only receive attachments up to a certain _Size with one email, for example
10MB. If you need to send a lot of very big attachments, it's sometimes necessary to spread them over a
number of separate emails.
Email comprehension 1
Hi Tony
Thanks for sending through that a/w so quickly. Just one problem – I couldn't open the attachment. I'm
not sure why. My inbox is virtually empty, so there's plenty of room, and the attachment limit is 20MB,
so there's no problem there. Perhaps there was a glitch somewhere. Anyway, rather than trying to
figure out what went wrong, could you just send it again?
Did we discuss file format? I don't know much about TIFFs, JPEGs etc, but I meant to tell you that if
you have any queries on this, you could get in touch with Steve, our designer. His email address is
steve@stevegreendesign.co.uk.
One other thing. When you resend me the a/w, could you cc it to Angela? I've asked her to have a
quick look at it before we put it in the brochure.
I'm looking forward very much to seeing those pics – fingers crossed that they'll come through OK this time.
However, if I still can't download them, I'll ask you to put them on a disk and mail them.
1. Jenny didn't receive the a/w because her inbox is too small. False
3. Jenny has resolved a technical problem, and the attachment will come through without any
problems next time. False
4. Tony will have to resend the a/w. False
6. Tony is also going to put the files onto a disk and mail them. False
8. The style is too informal – business emails should always be more formal than this. False
B. Find words or expressions in the email which mean the same as the phrases
below.
1. artwork A/W
6. email a copy to cc
Email comprehension 2
Dear Jenny
The technical problems you've been experiencing may be due to your email provider. I have to say,
I've never heard of Whoopydudu.com. You might be better off switching to one of the big names, such
as Gmail or Yahoo.
Regarding file formats, TIFFs should be OK. If necessary, your designer will be able to reformat them
very easily, but in my experience most designers have no problem working with TIFFs.
As the file sizes are quite large, and I understand that Angela only has a dial-up connection, I've sent her
low-res versions to look at. I hope that will be OK. They should be clear enough.
I'm just about to go on holiday, so if you need me to send these files on disk, please let me know by
Friday afternoon. I probably won't get the opportunity to check my email while I'm away, but if anything
arises that won't keep, my assistant Trevor may be able to deal with it.
Best regards
Tony
5. These versions will look the same as the original versions. FALSE
7. Trevor may be able to help with any problems that come up while Tony is away. TRUE
Find words or expressions in the email which mean the same as the phrases
below.
7. comes up ____________arises_________
________________________________________________________________________________________
__
Yes mi computer have a procesator intel celeron , 4 gb ram ,500 gb hard disk.
________________________________________________________________________________________
__
________________________________________________________________________________________
__
3. Would you like to upgrade your computer? If so, what kind of computer would you like to get?
Yes I would like to a computer desktop because is faster and more efficient
________________________________________________________________________________________
__
________________________________________________________________________________________
__
The peripherals that I use most are the keyboard and mouse
________________________________________________________________________________________
__
5. Do you use computer networks? If so, how do you connect to the networks you use?