Check Your Knowledge-Activity

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

Check your knowledge

A. Match the descriptions on the left with these famous applications.

1. word processor a. Adobe Photoshop


2. spreadsheet b. Internet Explorer
3. virus protection c. Microsoft Word
4. browser d. Microsoft Excel
5. image editor e. Microsoft PowerPoint
6. media player f. Norton AntiVirus
7. email software g. Outlook Express
8. presentation software h. Adobe PageMaker
9. graphic design software i. RealPlayer

Choose the best words to go into each of the spaces.

1. Person who illegally accesses somebody else's computer over the internet is called a hacker
a. pirate b. hack c. hacker

2. A website which (in theory) cannot be accessed by a hacker is strong


a. strong b. secure c. clean

3. A website which can only be viewed by authorised people has restricted access.
a. reduced b. small c. restricted

4. Unwanted advertising emails are popularly known as spam


a. meatloaf b. spam c. sausages

5. Software which blocks attempts by others to access your computer over the internet is called a:
a. firewall b. fire blanket c. fire engine

6. It's essential to update your anti-virus protection regularly.


a. up-to-date b. date c. update

7. Anti-virus software can scan your computer for viruses.


a. detect b. review c. scan

8. Anti-virus software can also detect viruses on removable media, such as floppy disks.
a. detect b. control c. see

9. When your anti-virus software subscription expires


a. ends b. stops c. expires

10. ... it's a good idea to renovate it immediately.


a. renew b. renovate c. replace
pointer on optical roll
scroll left
scroll up down touchpad button
right button joystick single double
hold repetitive strain
scroll wheel down injury

1. Scroll up to see pages above.

2. Scroll down to see pages below.

3. To select text, left button the left button, and move the mouse pointer.

4. If you use a mouse for many hours every day, you can get repetitive strain injury in your fingers.

5. With a laptop computer, plug in a mouse, or use the touchpad in front of the
keyboard.
6. To play some games, you need to use a joystick instead of a mouse.

7. To move up and down a page, you can scroll wheel the mouse wheel.

8. This mouse doesn't have a ball. It's an optical mouse.

9. One click of a mouse button is called a single click.

10. Two clicks of a mouse button are called a double click.

11. Click on the folder to open it.

LAN

intranet Local log onto network card

satellite server terminals WAN (Wide Area Network)

LAN is

pronounced "lan", and stands for 1 local Area Network. In a typical LAN, there is a central network
2
__server______ which supports a number of 3Terminals . Users have to
4
__log onto the network server. Pages of information that can be viewed within a LAN are called an
5
____intranet. A number of LANs connected to each other via 6__satelite or other form of __communication
are called a 7______WAN . To be used as network terminals, each computer needs to have a 8__Network
card installed.
B. Crossword

1. programs which tell the computer what to do (8)


2. a piece of software which makes a computer do a task (for example, edit an image) (11)
3. any set of instructions for a computer (7)
4. software which operates a peripheral, such as a scanner or printer (6)
5. application which stores and displays digital photos (5,5)
6. you enter a security code to prove that you have a _______ to use the software (7)
7. software which prevents unauthorised access to your computer over the internet (8)
8. a series of letters and numbers which you have to enter before installing some programs (8,4)
9. download new features for an application (6)
10. an unauthorised copy of a program (7)

2
1  S O F T W A R E        
           P            
        3  P  R O G R A M
  4        L       5    
   D        I        P   6
   R        C        O    L
7  F  I R E  W  A  L       T    I
   V   9    T       H   C
8  S  E  C  U R I T Y C O D E
   R    P    O        A    N
       D    N       L    S
       A            B    E
10  B  O O  T  E  E  O       U    

       E            M    

A. Choose the best words.

1. Software which is easy to use is…

a. user-easy b. user-friendly c. usable


Software which is obvious to
2 use is…
c.
comprehensibl
a. intuitive b. guessable e
3 Software which is not obvious to use is…
a. counter-intuitive b. unintuitive c. non-intuitive

4 Software for use by children and schools is…


a. learning b. teaching c. educational
Software for use by
5 businesses is…
a. commercial b. businesslike c. busy

6 Software made specially for one company is…


a. one-off b. unique c. tailor-made

7 Software for use at home is…


c. for
a. for home use b. for house use… household use

8 Software which has been illegally copied is…


a. unreal b. pirated c. fake

9 Software which has been bought from the company that produced it is…
a. real b. justified c. licensed

Choose the best words.

1
. Making changes to a text is called _________.
a. altering b. renewing c. editing
2
. To change normal text to italic, first you must _________ the text you want to format.
a. choose b. take c. select
3
. A very pale image behind the text is called ________.
a. an ink mark b. a watermark c. a grey mark
4
. To divide the text into two pages, insert a ________.
a. page break b. page stop c. page change
5
. The numbers at the bottom of the page are ________.
a. page numbers b. sheet numbers c. paper numbers
6 An extra note at the bottom of the page (usually in a smaller font size) is called a
. ________.
a. bottom note b. foot c. footnote
7 In word processing, to put things into alphabetical order is to
. ________.
a. sort b. organise c. order
8
. A list of contacts, addresses etc. is called _________.
a. an archive b. a list c. a database

9 Producing a document on your computer and sending it direct to a printing press is


. __________.
a. computer publishing b. desktop publishing c. electronic publishing

10. Cut or copied text is temporarily stored in the __________.


a. clipboard b. clip c. clipart

B. Match the malware with the damage. (It's not easy, and the terms are sometimes confused with
each other.)

1. virus

2. spyware

3. trojan horse

4. keystroke logger or keylogger

5. worm

a. collects and sends private information from the infected computer to a third party

b. an undesirable program which can replicate itself across a network

c. allows a hacker to access private information when he/she wishes

d. a program which adds itself to an executable file, and can cause considerable damage to the data on the infected
computer.

e. records characters that are typed into a computer


Match the word with the definition.

1. crop a. turn an image

2. sharpen b. reverse an image

3. soften c. improve the


appearance of an image

4. zoom in
d. remove part of an image

5. zoom out
e. copy part of an

6. flip image to another point


in that image

7. rotate
f. view part of the image in more detail

8. touch up
g. view more of the image in less detail

9. clone
h. convert a vector image to a bitmap image (see
B5 below)
10. rasterize

i. make the image less blurred

j. make the image more blurred


Match the activities with the internet features.

1 Keep a public diary of your journey through South


. America a. webmail
Lose lots of money
2
. b. online music store
Find out about the First World War
3
. c. instant messaging
Download songs
4
. d. online radio
5
Listen to music in real time
. e. portal
6
. Check your email from any computer f. blog
7
. Find links to other websites g. online encyclopedia

8 Exchange messages in real time with friends or


. colleagues h. currency converter
9
Check the latest exchange rates
. i. e-zine
10. Read new articles about a subject that interests
you j. online casino

Fill the gaps, then put these stages in order (number them 1 to 8).

account add browse checkout


confirm details invoice
sign
shopping basket in
You usually have to allow at least two working days for 1 delivery

Choose an item, and 2add it to your shopping basket .

Click 4 "_Confirm__". Now it's too late to change your mind!

When you have finished shopping, click "proceed to checkout .

Usually, you will receive an invoice by email.

Enter your name, address and card details .

1 Before you can start shopping, you usually have to sign in to the site.
(If you don't already have an account, you have to create one.)

10
_Browse the website, and decide what you want to buy.

EMAIL

From: anna@goodmail.com

To: bernard@ciaociao.it

Cc: carol@freemail.co.uk

Bcc: dave@norsemail.no

Subject: arriving in Rome

Hi Bernard

I'll be arriving in Rome just after midday tomorrow (Friday). You don't need to pick me up
at the airport – I can get a taxi to the city centre.

See you soon!

Anna

Look at the email and answer the questions true or false.

1. The recipient is Anna. False

2. The sender is Anna. True

3. Bernard knows that Carol knows when Anna will be arriving in Rome. True
4. Bernard knows that Dave knows when Anna will be arriving in Rome. True

5. You can say that Anna Cc-ed her email to Carol. True

6. You can say that Anna Bcc-ed her email to Dave. True

7. The subject line is empty. False

8. The style of the email is formal. True

9. Cc stands for carbon copy and Bcc stands for blind carbon copy, but the full terms are almost
never used. True
10. Carbon copies were a method of making copies of documents typed on typewriters. True

Sending an attachment
Put the words in the spaces.

inbox
attach browse field es

open send size

You can send almost any file as an attachment. Browse through the folders on your computer until you find
2 3
the file you want to attach. Click on " _Open ". The file will appear in the attachments _Field_. Then click
4
" _Attach ", and wait while the file uploads. Add more files if you wish. When you have finished adding files,
5
click " _Send ".

6 7
Some email _Inboxes will only receive attachments up to a certain _Size with one email, for example
10MB. If you need to send a lot of very big attachments, it's sometimes necessary to spread them over a
number of separate emails.

Email comprehension 1

Hi Tony

Thanks for sending through that a/w so quickly. Just one problem – I couldn't open the attachment. I'm
not sure why. My inbox is virtually empty, so there's plenty of room, and the attachment limit is 20MB,
so there's no problem there. Perhaps there was a glitch somewhere. Anyway, rather than trying to
figure out what went wrong, could you just send it again?

Did we discuss file format? I don't know much about TIFFs, JPEGs etc, but I meant to tell you that if
you have any queries on this, you could get in touch with Steve, our designer. His email address is
steve@stevegreendesign.co.uk.

One other thing. When you resend me the a/w, could you cc it to Angela? I've asked her to have a
quick look at it before we put it in the brochure.

I'm looking forward very much to seeing those pics – fingers crossed that they'll come through OK this time.
However, if I still can't download them, I'll ask you to put them on a disk and mail them.

All the best


Jenny

Are these statements true or false?

1. Jenny didn't receive the a/w because her inbox is too small. False

2. The attached files came to less than 20MB in total. True

3. Jenny has resolved a technical problem, and the attachment will come through without any
problems next time. False
4. Tony will have to resend the a/w. False

5. Jenny is a graphic design expert True

6. Tony is also going to put the files onto a disk and mail them. False

7. Angela has already seen the a/w. False

8. The style is too informal – business emails should always be more formal than this. False

B. Find words or expressions in the email which mean the same as the phrases
below.

1. artwork A/W

2. a small technical problem ltchg

3. type of file File Format

4. questions about this Quieries on this

5. send again _______Resent______________

6. email a copy to cc

7. communicate with Get in touch with

8. with luck… ___________________Fingers____

Email comprehension 2

Dear Jenny

As requested, I'm attaching the a/w files again.

The technical problems you've been experiencing may be due to your email provider. I have to say,
I've never heard of Whoopydudu.com. You might be better off switching to one of the big names, such
as Gmail or Yahoo.
Regarding file formats, TIFFs should be OK. If necessary, your designer will be able to reformat them
very easily, but in my experience most designers have no problem working with TIFFs.

As the file sizes are quite large, and I understand that Angela only has a dial-up connection, I've sent her
low-res versions to look at. I hope that will be OK. They should be clear enough.

I'm just about to go on holiday, so if you need me to send these files on disk, please let me know by
Friday afternoon. I probably won't get the opportunity to check my email while I'm away, but if anything
arises that won't keep, my assistant Trevor may be able to deal with it.

Best regards
Tony

Are these statements true or false?

1. Tony thinks Jenny should change her email provider. TRUE

2. The designer will need to reformat the files. FALSE

3. Angela doesn't have broadband. TRUE

4. Tony is sending resized versions of the a/w files to Angela. TRUE

5. These versions will look the same as the original versions. FALSE

6. Tony is going on holiday on Friday morning. FALSE

7. Trevor may be able to help with any problems that come up while Tony is away. TRUE

8. The style is neutral – neither formal nor informal. TRUE

Find words or expressions in the email which mean the same as the phrases

below.

1. as you asked AS REQUESTED

2. famous companies BIG NAMES

3. change the type of file I understand that


4 ____i understand
. I think, but I may be wrong… ______________________
5
. Low image resolution (see 1.6) By Friday
6. on Friday afternoon or before afternoon

7. comes up ____________arises_________

8. that's urgent That won t keep

ANSWER THE QUESTIONS


1. What kind of computer do you have?

My computer is a laptop samsung


________________________________________________________________________________________
__

________________________________________________________________________________________
__

2. Do you know the technical specifications of you computer?

Yes mi computer have a procesator intel celeron , 4 gb ram ,500 gb hard disk.
________________________________________________________________________________________
__

________________________________________________________________________________________
__

3. Would you like to upgrade your computer? If so, what kind of computer would you like to get?

Yes I would like to a computer desktop because is faster and more efficient
________________________________________________________________________________________
__

________________________________________________________________________________________
__

4. Which peripherals do you use most often? Why?

The peripherals that I use most are the keyboard and mouse

________________________________________________________________________________________
__

5. Do you use computer networks? If so, how do you connect to the networks you use?

Yes my conecting is for wifi medium

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy