Word family fill in the missing words of the same root where possible

I.
Give synonyms and/or antonyms:

1.
to deny access

to
restrict access, to refuse access, ant. to certify access, to
permit access

2.
to assemble

to
put together, ant. to take apart, to disassemble

3.
available data

accessible
data, ant. unavailable data

4.
alias

nick,
pseudonym, ant. real name

5.
background

ant.
foreground

II.
Word family. Fill in the missing words of the same root where
possible:

noun

verb

adjective

adverb

access

accessible

adaptation/
adapter

to
adapt

adaptable/
adaptive

alternation

to
alternate

alternate

alternatively

authentication

to
authenticate

authenticated

availability

to
avail

available

III.
Make up phrases by matching the words in the left column with those
in the right:

1.
to certify B

A.
code

2.
alternate C

B.
access

3.
auxiliary E

C.
route

4.
bar A

D.
name

5.
account D

E.
memory

IV.
Fill the web diagram with the words that can be used with the given
word:

ACCESS

to
certify, to restrict, to deny, to permit, to obtain, authorized,
channel, data, direct, fast, information, network, one-touch, random
access.

VI.
Do a mini-research and classify the types of memory:

AROM,
auxiliary memory, available memory, buffer memory, RAM, ROM, etc.

VII.
Match the given terms with their definitions:

1.
bar code C

A.
a function to level/straighten the text

2.
available data E

B.
an alternative name, nick

3.
alignment A

C.
a line coding given to products to encrypt information about them

4.
alias B

D.
a program which adds additional features to the main program

5.
accessory D

E.
information which a user can access

VIII.
State the type of logical relations between the following words:

Example

Type
of logical relations

1.
to deny access — to permit access C

A.
general and specific

2.
device — auxiliary device
A

B.
cause and effect

3.
backup copy — available data B

C.
contrast

4.
account – account name E

D.
method and purpose

5.
identification – bar code D

E.
part and whole

IX.
Say what can be:

1.
adapted

program,
any equipment, bus, channels, colors, communication line, disk

2.
amplified

memory,
signal, sound, buffer, electric current (power), driver

3.
allocated

memory,
disk capacity, channels, recourses, processor, space, storage,
time

4.
assembled

computer,
any equipment, packets

5.
authenticated

data,
password, response, message, signature

X.
Say what the following is used for:

1.
account name

to
identify the user

2.
alignment

to
level, straighten the text/picture

3.
auxiliary memory

to
store auxiliary programs/data

4.
backup copy

not
to lose the file/data

5.
alias

to
enter programs, to use data

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]

  • #
  • #
  • #
  • #
  • #
  • #
  • #
  • #
  • #
  • #
  • #

Language activities

1. Give antonyms/synonyms

1) Career –

2) CV –

3) Employ –

4) Position –

5) colleague –

2. Word family. Fill in the missing words of the same root where possible:

Noun Verb Adjective Adverb
  manage    
(dis)qualification      
    retired  
      Vacantly
  employ    
Redundancy
reduction
     

3. Give prepositions:

1) Before getting this job I was ___ probation for 3 months. a) in b) at c) on d) during

2) I don’t know why he was dismissed ___ the job.  a) of b) at c) from d) for

3) Soon after graduation he took ___the position of a system administrator. a) up b) on c) to d) in

4) He is not qualified ___ this post. a) for b) to c) of d) in

5) This is one of the things he does regularly ___ the job. a) onb) in c) for d) at

4. Match the words in the two columns to form collocations

Submit, fill-in, withdraw A an internship
Career B a job, position, program
Apply for C a job, position, office
Resign from D an application
Do, serve, complete E guidance, plan, opportunities

5. State the type of logical relations between the following words:

Example Type of logical relations
1) Hiring – firing A. general and specific
2) Recruitment – headhunting B. cause and effect
3) downsizing – cutting costs C. contrast
4) Dismissal – unemployment D. method and purpose
5) IT – telecommuting E. part and whole
6) Qualifications – CV F. equivalence
7) Work – job  

Speech activities

Reading: ML Pre-Int p. 8

 Read the text “10 Ways to improve your career” and

a) say which of the tips deal with:

Goal-setting (1, 6)

Work-and-life balance (9)

Interaction with colleagues (3, 5, 8)

Meeting challenges/taking risks (7, 10)

b) sum up what you need to be/do:

a) not to be fired or made redundant,

b) get promoted, c) get employed after your probation/internship, d) get a salary increase.

Listening

Listen to records 1. 6-1. 8 p. 12 and identify the candidates

A people-oriented leader Eva Rheinberger
Ambitious and competitive Barbara Szmarmach
Cautious and reliable Tadeusz Vajda

Speaking

Speak about your strengths as a potential employee.

Writing

Write about your weaknesses and the ways you may get rid of them.

IX. Say what can be:

1. dropped

2. enhanced

3. expanded

4. folded

5. edited

X. Why do you think the
following is done:

1. error detection

2. feedback

3. file handling

4. text editing

5. file erasing

TM
FIT 81-100

I. Give synonyms and/or
antonyms:

1. hard

2. input

3. invalid

4. download

5. log in

II. Word family. Fill in the
missing words of the same root where possible:

Noun

Verb

Adjective

Adverb

to link

loadable

maintenance

to monitor

III.
Make up phrases by matching the words in the left column with those
in the right:

1. hard

A. distortion

2. image

B. delivery

3. invalid

C. guide

4. message

D. copy

5. maintenance

E. password

IV.
Fill the web diagram with the words that can be used with the given
word
:

V.
Pick out the appropriate words and add them to your thematic
glossary.

VI. Do a mini-research and
explain the difference between:

1. hard copy — backup copy
— soft copy — master copy

2. input — output

3. laptop – notebook —
palmtop

4. to reload – unload –
download — upload

5. log in — log off

VII.
Crosses and naughts.
Play
the game in 2 teams.

  1. Copy
    the given table on the board.

  2. Team
    1: Select a word and give its English equivalent.

  3. Team
    2: Verify whether or not your opponent’s answer is correct and put
    an X or O in that square for a correct answer.

  4. Get
    3 crosses or naughts in one row and win the game.

главный компьютер

скачать с Интернета

ПЗУ

информационный
мусор

вход в систему

оригинал

дорожный
компьютер

обычная почта

редактор дискуссии

VIII.
State the type of logical relations between the following words:

Example

Type of logical
relations

1. input — processing

A. part and whole

2. monitor — computer

B. general and specific

3. computer- notebook

C. cause and effect

4. junk mail — spam

D. contrast

4. input — output

E. equivalence

IX.
Say what the following is used for:

1. hard copy

2. keyboard

3.
log in

4. master copy

5. ROM

X.
Say what can be:

1. input

2. uploaded

3. downloaded

4. maintained

5. monitored

TM
FIT 101-120

I. Give synonyms and/or
antonyms:

1. offline mode

2. to paste

3. real memory

4. recoverable error

5. print out

II. Word family. Fill in the
missing words of the same root where possible:

Noun

Verb

Adjective

Adverb

to print

program

to recover

reflected

reference

III. Make up phrases by
matching the words in the left column with those in the right:

1. mouse

A. mode

2. network

B. database

3. offline

C. pad

4. programmable

D. memory

5. real

E. access

IV.
Fill the web diagram with the words that can be used with the given
word:

V.
Pick out the appropriate words and add them to your thematic
glossary.

VI. Do a mini-research and
explain the difference between:

1. online mode – offline
mode

2. impact printer –
nonimpact printer

3. print out – hard copy

4. real memory — ROM

VII.
Give the definitions suiting the terms below:

1. netiquette

A.

2. peripheral device

B.

3. programmable database

C.

4. queue

D.

5. recoverable error

E.

VIII. State the type of
logical relations between the following words:

Example

Type of logical
relations

1. computer – mouse

A. part and whole

2. error correction —
recovery

B. general and specific

3. online mode – offline
mode

C. cause and effect

4. reference guide — manual

D. contrast

5. language — netspeak

E. equivalence


IX. Say what can be:

1. pasted

2. printed

3. programmed

4. recovered

5. referred to

X.
Name the kinds of printers.

TM
FIT 121-140

I. Give synonyms and/or
antonyms:

1. to release

2. to remove

3. to scale back

4. to scan

5. security

II. Word family. Fill in the
missing words of the same root where possible:

Noun

Verb

Adjective

Adverb

to remove

replacement

selectively

serviceability

reserved

III. Make up phrases by
matching the words in the left column with those in the right:

1. restricted

A. border

2. root

B. browsing

3. screen

C. environment

4. service

D. directory

5. server

E. information

IV.
Fill the web diagram with the words that can be used with the given
word
:

V.
Pick out the appropriate words and add them to your thematic
glossary.

VI. Do a mini-research and
explain the meaning of the following words beginning with re-:

1. remove

2. replace

3. release

4. restore

5. restrict

VII. Give the definitions
suiting the terms below:

1. register

A.

2. remote access

B.

3. to scale back

C.

4. screen saver

D.

5. search engine

E.

VIII. State the type of
logical relations between the following words:

Example

Type of logical
relations

1. remove – replace

A. part and whole

2. periphery – scanner

B. general and specific

3. Internet – search
engine

C. cause and effect

4. restricted information —
security

D. contrast

5. press a button –
release a button

E. equivalence

IX. Say what can be:

1. released

2. removed

3. replaced

4. restored

5. scanned

X. Say what the following is
used for:

1. release

2. route

3.
scale

4. security

5. restriction of
information

TM
FIT 141-160

I. Give synonyms and/or
antonyms:

1. shut down

2. soft copy

3. bootleg software

4. set

5. to surf

II. Word family. Fill in the
missing words of the same root where possible:

Noun

Verb

Adjective

Adverb

shared

signature

specifically

storage

to suspend

III.
Make up phrases by matching the words in the left column with those
in the right:

1. session

A. area

2. software

B. highjacking

3. shadow

C. mode

4. storage

D. maintenance

5. suspend

E. memory

IV.
Fill the web diagram with the words that can be used with the given
word:

V.
Pick out the appropriate words and add them to your thematic
glossary.

VI. Do a mini-research and
explain the difference between:

1. hard copy – soft copy
– master copy

2. shareware – freeware –
pirate software

3. target language –
programming language

4. settings — setup

VII. Match the given terms
with their definitions:

1. settings

A. a combination of keys
for quick work

2. shareware

B. parameters

3. shortcut

C. a program which is
distributed without the compliance with the copyright law

4. shut down

D. an image on the screen

5. soft copy

E. interval

6. bootleg software

F. programs that are
distributed free for users to try them

7. space

G. completion of the
computer work

VIII.
Crosses and naughts.
Play
the game in 2 teams.

  1. Copy
    the given table on the board.

  2. Team
    1: Select a word and use it in a sentence.

  3. Team
    2: Verify whether or not your opponent’s answer is correct and put
    an X or O in that square for a correct answer.

  4. Get
    3 crosses or naughts in one row and win the game.

session

shift

signature

set

task bar

silicon chip

shadow memory

target language

soft

IX. Say what can be:

1. switched

2. specified

3. shifted

4. shared


X. Say what the following is
used for:

1. session log

2. silicon chip

3. task bar

4. settings

5. signature

TM
FIT 161-180

I. Give synonyms and/or
antonyms:

1. template

2. to terminate

3. tool bar

4. to tune

5. tracking

II. Word family. Fill in the
missing words of the same root:

Noun

Verb

Adjective

Adverb

terminal

to trail

update

to transmit

transaction

III.
Make up phrases by matching the words in the left column with those
in the right:

1. throughout

A. period

2. tool

B. capacity

3. trial

C. face

4. turnkey

D. bar

5. type

E. system

IV.
Fill the web diagram with the words that can be used with the given
word
:

V.
Pick out the appropriate words and add them to your thematic
glossary.

VI. Give the terms suiting the
definitions below:

1.

A. to work at home with the
help of computer connection with the office

2.

B. to end, stop

3.

C. to convey from one place
to another

4.

D. to adapt to the
prevailing conditions

5.

E. to fit into current
systems

VII.
Crosses and naughts
.
Play the game in 2 teams.

  1. Copy
    the given table on the board.

  2. Team
    1: Select a word and give its English equivalent.

  3. Team
    2: Verify whether or not your opponent’s answer is correct and put
    an X or O in that square for a correct answer.

  4. Get 3 crosses or naughts in
    one row and win the game.

пропускная
способность канала связи

магистральный
кабель

дистанционная
передача данных

след перемещения
объекта на экране

система «под
ключ»

обработка
транзакций

приемопередатчик

гарнитура

выключать
питание

VIII. State the type of
logical relations between the following words:

Example

Type of logical
relations

1. to work – to
telecommute

A. general and specific

2. to terminate – to
start

B. equivalence

3. tracking – monitoring

C. part and whole

4. transceiver —
transmitter

D. contrast

IX. Say what can be:

1. terminated

2. tracked

3. transferred

4. updated

5. turned off

X. Say when and why people do
the following:

1. telecommute

2. transaction processing

3. troubleshooting

4. upgrade

5. tune

TM
FIT 181-200

I. Give synonyms and/or
antonyms:

1. usable

2. to verify

3. virtual

4. to zoom

5. valid

II. Decode the acronyms:

1. WWW

2. ASAP

3. ASCII

4. CUL8R

5. VR

III.
Word family. Fill in the missing words of the same root where
possible:

Noun

Verb

Adjective

Adverb

user

valid

to verify

vision

volatile

IV.
Fill the web diagram with the words that can be used with the given
word
:

V.
Pick out the appropriate words and add them to your thematic
glossary.

VI. Do a mini-research and
explain the difference between:

1. end-user – power user

2. to verify – to
validate

3. WWW – the Internet

4. workstation –
supercomputer

VII. Give the definitions
suiting the given terms:

1. power user

A.

2. volatility

B.

3. wait mode

C.

4. workstation

D.

5. validation

E.

VIII.
Crosses and naughts
.
Play the game in 2 teams.

  1. Copy
    the given table on the board.

  2. Team
    1: Select a word and give its Russian equivalent.

  3. Team
    2: Verify whether or not your opponent’s answer is correct and put
    an X or O in that square for a correct answer.

  4. Get
    3 crosses or naughts in one row and win the game.

virus detection system

end user

validation

volatile memory

Virtual world

user guide

window layout

wait mode

workstation


IX. Say what can be:

1. valid

2. verified

3. zoomed

4. volatile

5. wrapped

X. Say what the following is
used for:

1. virtual mall

2. virus detection system

3. voice mail – answering
machine

4. user-friendly interface

5. user manual

KEYS
TO TRAINING EXERCISES

TM
FIT 1-20

I. Give synonyms and/or
antonyms:

1. to deny access

to restrict access, to
refuse access, ant. to certify access, to permit access

2. to assemble

to put together, ant. to
take apart, to disassemble

3. available data

accessible data, ant.
unavailable data

4. alias

nick, pseudonym, ant. real
name

5. background

ant.
foreground

II. Word family. Fill in the
missing words of the same root where possible:

noun

verb

adjective

adverb

access

accessible

adaptation/
adapter

to adapt

adaptable/
adaptive

alternation

to alternate

alternate

alternatively

authentication

to authenticate

authenticated

availability

to avail

available

III.
Make up phrases by matching the words in the left column with those
in the right:

1.
to certify
B

A. code

2.
alternate
C

B. access

3.
auxiliary
E

C. route

4.
bar
A

D. name

5.
account
D

E. memory

IV.
Fill the web diagram with the words that can be used with the given
word:

ACCESS

t
o
certify, to restrict, to deny, to permit, to obtain, authorized,
channel, data, direct, fast, information, network, one-touch, random
access.

VI.
Do a mini-research and classify the types of memory:

AROM,
auxiliary memory, available memory, buffer memory, RAM, ROM, etc.

VII.
Match the given terms with their definitions:

1.
bar code
C

A. a function to
level/straighten the text

2.
available data
E

B. an alternative name,
nick

3.
alignment
A

C. a line coding given to
products to encrypt information about them

4.
alias
B

D. a program which adds
additional features to the main program

5.
accessory
D

E. information which a user
can access

VIII.
State the type of logical relations between the following words:

Example

Type of logical
relations

1.
to deny access — to permit access
C

A. general and specific

2.
device — auxiliary device
A

B. cause and effect

3.
backup copy — available data
B

C. contrast

4.
account – account name
E

D. method and purpose

5.
identification – bar code
D

E. part and whole

IX. Say what can be:

1. adapted

program, any equipment,
bus, channels, colors, communication line, disk

2. amplified

memory, signal, sound,
buffer, electric current (power), driver

3. allocated

memory, disk capacity,
channels, recourses, processor, space, storage, time

4. assembled

computer, any equipment,
packets

5. authenticated

data, password, response,
message, signature

X. Say what the following is
used for:

1. account name

to identify the user

2. alignment

to level, straighten the
text/picture

3. auxiliary memory

to store auxiliary
programs/data

4. backup copy

not to lose the file/data

5. alias

to enter programs, to use
data

TM
FIT 21-40

I. Give synonyms and/or
antonyms:

1. binary

2 digit, ant. decimal

2. blank

empty, erased, unformatted,
space, ant. full, recorded

3. bottom-up programming

ant. top-down programming

4. bug

error, defect, breakage,
ant. fixed, debugged, bug-ridden

5. case-insensitive

ant. case-sensitive

II. Decode the acronyms:

1. CD-ROM

compact disk read only
memory

2. CD-E

compact disk erasable

3. CD-R

compact disk recordable

4. CD-RW

compact disk rewritable

5. AROM

alterable read only memory


III. Word family. Fill in the
missing words of the same root where possible:

Noun

Verb

Adjective

Adverb

blank

blank

blankly

browser

to browse

bug

buggy

buffer

to buffer

buffer

sensitivity

to sense

sensitive

sensitively

IV.
Make up phrases by matching the words in the left column with those
in the right:

1.
batch
C

A. card

2.
bit
E

B. click

3.
button
B

C. file

4.
cache
A

D. address

5.
call
D

E. density

VI. Do a mini-research and
explain the difference between:

1. bottom-up programming –
top down programming

A method of working out a
program from modules to result. A method when you first make a
frame and then fill it with parts of the program.

2. break out – break in –
break down

When you interrupt the
program work and stop working with it; when smb crashes your
security system; when a computer can’t work and needs repair.

3. buggy hardware – buggy
software

Hardware (equipment) that
doesn’t work (properly); programs with errors that don’t
function properly.

4. byte – gigabyte –
kilobyte — megabyte

Byte – a unit of
information and memory, 8 bits; kilobyte – 1024 bytes; megabyte
– 1048576 bytes; gigabyte – 1024 megabytes.

5. case sensitive – case
insensitive

Differentiates capital and
small letters – does not.

VII.
Match the given terms with their definitions:

1.
binary code

D

A. a place where the copied
or cut information is temporarily stored

2.
byte
G

B. unformatted disk or a
disk without recorded data

3.
buffer
A

C. a disk for uploading

4.
buggy hardware
F

D. a system of encoding
information with the help of Os and Is

5.
blank disk
B

E. to get the access to
computer system illegally

6.
boot disk
C

F. a device that doesn’t
work because of defects or spoilage

7.
break in
E

G. the unit of information
measurement

VIII. Say what the following
is used for:

1. binary code

programming, entering data

2. blank disk

recording data

3.
build-in modem

connection to the Internet

4. cable connection

to connect computer
peripherals, etc.

5. call address

to find data, programs

IX. Say when and why people do
the following:

1. break in

to get smb’s data,
information, programs, money illegally

2. break out

to finish work with one
program and start with another

3. browse

to get information

4. broadcast

to send smb. information,
images, etc.

5. bottom-up programming

to make a program

X.
Name the kinds of compact disks:

CD-E,
CD-R, CD-RW, CD-ROM, CD-I, CD-PROM, CD-ROM XA, CD-V, CD-WO, CD-WORM.

TM
FIT 41-60

I. Give synonyms and/or
antonyms:

1. certified

allowed, permitted, ant.
uncertified, denied, illegal

2. compatible

ant. incompatible

3. connection

link, switching, ant.
disconnection

4. data verification

control, check,
authentication, validation

5. data retrieval

selection/search from
database

II. Word family. Fill in the
missing words of the same root where possible:

noun

verb

adjective

adverb

character

to characterise

characteristic

compatibility

compatible

computer/
computation

to
compute/ computerize

computable/
computerized

customer

to customize

customized

deletion

to delete

deleted

III.
Make up phrases by matching the words in the left column with those
in the right:

1.
copyright
C

A. key

2.
cursor
A

B. drive

3.
default
D

C. law

4.
disk
B

D. option

5.
display
E

E. mode


Fill in the missing word. There are three words you do not need to use. ● present ● sound ● bring out ● overtime ● freelancer ● moved ● came ● bring ● deadline ● sloppy ● research ● change

1) The missing explorers returned home safe and …………….. after a search team found their whereabouts in the desert
2) After many years of scientific………………………., Albert Einstein won the Nobel Prize for Physic in 1921.
3) The Smiths…………………………… from the city to the countryside, so that their children could grow up in a healthier environment.
4) John had to …………………………schools when his family went to live at the other side of town.
5) Jane has worked……………………….. every day this week, as it is the busiest time of year in the advertising company.
6) George hated working in a bank and ………………………………….to the conclusion that a desk job wasn’t for him.
7) It is amazing how Linda has been able to ………………………………… four children and work at the same time. I really admire her.
8) One of the things Tony loves about working as a……………………………… is that he doesn’t have to spend eight hours in an office every day.
9) Alex has a tough……………………………. to meet, so he’s been working during the weekend.


Предмет: Английский язык,


автор: arasuroa083

Ответы

Автор ответа: truedex





19

booked,

boat,

snaps

beneath,

cuisine

Native

catch

landmarks

drive

missed

Предыдущий вопрос

Следующий вопрос

Интересные вопросы

Предмет: История,
автор: pisynbobra

Что изучает антропология?

4 года назад

Предмет: Английский язык,
автор: mojetbat

Ответить просто буквами​

4 года назад

Предмет: Алгебра,
автор: chfhhffhhffh444664

Срочноооооооооо ребятааааа помогитеее с полным решением

4 года назад

Предмет: Геометрия,
автор: anastasiadro15

На рисунке AM и СН высоты треугольника АВС . Докажите,что треугольники ВНС и АМВ подобны.

6 лет назад

Предмет: Математика,
автор: Акмарал252887

(2ц98кг+5ц35кг)÷7=?ц??кг (6км82м+35км92м)÷7=?км??м (5м72см+4м8см)×6=?м??см

6 лет назад

Понравилась статья? Поделить с друзьями:
  • Word fields if statement
  • Word family dictionary pdf
  • Word field merge field
  • Word family dictionary online
  • Word field if page