0% found this document useful (0 votes)
338 views6 pages

ĐỀ CƯƠNG ÔN TẬP HP. TACN. CNTT - 10-23

Uploaded by

bplinh2k3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
338 views6 pages

ĐỀ CƯƠNG ÔN TẬP HP. TACN. CNTT - 10-23

Uploaded by

bplinh2k3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

ENGLISH FOR INFORMATION TECHNOLOGY

Revision for Final Test

I. Match the terms in Column A with their definitions in Column B

are placed around pieces of text to tell the web browser how to display
1 A computer v a
text or pictures.
2 A clock rr b information about where the visitors to your site are from.
A cloud refers to the transmission of signals over a distance for the purpose of
3 kk c
database communication.
are made up of a series of independent pictures put together in sequence to
4 a gateway uu d
look like moving pictures.
is the layout of the interconnections of the nodes of a computer network
5 A hub ff e which depends on the distance involved, the type of hardware used and
the stability needed.
are highlighted texts or pictures (buttons, image maps, etc.) that act as
6 A modem l f
links to other pages.
is malware that employs encryption to hold a victim’s information at
A network
7 e g ransom. A user or organization’s critical data is encrypted so that they
topology
cannot access files, databases, or application.
ss a collaborative database that is designed specifically for the end-user as do
8 Algorithm h
the managers at various levels.
9 Animations d i sockets into which an external device may be connected
10 Artificial tt k magnetic device used to store information.
Artificial
11 modulates and demodulates the data into a digital or an analog signal.
intelligence gg l
12 Background q m controls all the operations in a computer.
is a service to make telephone calls over the internet rather than through
13 Blogging r n the traditional telephone or cell phone networks.
14 Bot mm o a mechanism for adding styles to web documents.
Browser oo
15 enable data to go into the computer’s memory.
hijacker p
16 Cache yy q the underlying colors and patterns of a web page.
Cascading is a type of online journal in which the user can update daily, share, follow
17
Style Sheets o r and post comments.
Central
is a type of malicious code or software that can take control of your
18 processing
computer.
unit (CPU) pp s
Centralized The data is stored centrally and users from different locations can access
19 t
Database t this data.
20 DBMS vv u holds data read or written to it by the processor.
is an electronic machine which can accept data in a certain form, process
End User h
21 the data, and give the results of the processing in a specified format as
Database
v information.
22 Frames cc x is an electronic or mechanic part you can see or touch.
refers to a set of technologies that allow a person to make a video call to
23 Hard drive
y one or more people at the same time.
24 Hardware x aa the science of making devices from single atoms and molecules.
25 Hyperlinks f bb small programs that enable the creation of interactive files.
rectangular areas that allow the display of different pages in the same
26 Input devicesp
cc browser window.
Instant
27 hold instructions which are needed to start up the computer
message ll dd
28 Java applets bb ee A secret word that you type into a computer before you use it.
29 Monitor hh ff channels incoming data maintains the bandwidth speed.
Nanotechnolo is a broad area of computer science that makes machines seem like they
30 aa
gy gg have human intelligence.
Operating
31 nn displays the output from a computer on a screen.
system hh
32 Password ee ii are the physical units attached to the computer.
33 Peripheralsii kk is an automated or built-in database for such a virtualized environment.
34 Podcasting xx ll is a kind of service that allows people to send short message for free.
m a computer program that works automatically, especially one that searches
35 Ports i
m for and finds information on the Internet.
36 Processor m nn is the set of programs between the applications programs and the hardware
is malicious software that changes a browser’s behavior, settings, or
37 RAM u
oo appearance without user consent.
38 Ransomware g pp is considered the brain of the computer.
This is a type of communication in which videos are created and uploaded
39 ROM dd
qq to a website like Youtube.
40 Software c rr controls the timing of signals in the computer.
a predetermined set of instructions for solving a specific problem in a
41 Spyware aaa
ss limited number of steps.
42 Tags a tt made by humans, not natural.
43 Teleworkingbbb uu is an entrance to another network.
44 Trojan s vv the software used in databases to store, organized and retrieve the data.
is a free service in which audio only broadcast released on the internet and
45 Video casting qq
xx users can download to listen,
Video
46 y provides fast access for sections of a program and its data.
conferencing yy
software that enables a user to obtain convert information about another’s
47 visitor map b
aaa computer activities by transmitting data covertly from their hard drive.
bb the practice of working at home and communicating with the office by
48 VOIP n
b phone and computer

II. Fill in the blank with suitable word(s)


1 ………………………………..
wearable devices are designed to be worn on the body or integrated into the user’s
clothing.
2 ………………………………..
adware is software that displays unwanted advertisements on your
computer.
3 ……………………………is
ransomware a type of malware that prevents you from using your computer or
accessing specific files on your computer unless a ransom is paid.
4 An operating system has three main functions: manage the computer's resources, such as the
memory
central processing unit, …………………………, disk drives, and printers, establish a user
interface, and execute and provide services for applications software.
5 Electronic communication is fast, ………………………………...
cost - effective and convenient, but these
attributes contain inherent disadvantages.
6 ………………………………..
Output device enable us to extract the finish product from the system.
7 ……………………………….. is a type of malware that prevents you from using your computer
Ransomware
or accessing specific files on your computer unless a ransom is paid.
8 ………………………………..
backup means copying data to another place so that you don’t lose it.
9 ………………………………..,.is a set of instructions, called a program, which tells the computer
Software
what to do.
10 A ………………………………..
database management system can manage any type of data, including text, numbers, images,
sound and video and hyperlinks (links to websites).
11 A ………………………………..
LAN connects computers over a relatively short distance, allowing
them to share data, files, and resources.
12 A ………………………………..
distributed database in which various parts of a database are located in
different physical locations along with databases replicated and distributed between different
points in a network can be imagined.
13 A network topology is the layout of the interconnections of the ……………………………….. nodes of
a computer network.
14 A record about an employee might consist of several ……………………………….. fields which give
their name, address, phone number, date of birth, salary and length of employment.
15 Artificial Intelligence is slowly making progress, but it could soon
………………………………...into
Spyrocket a new trend in technology
16 But in the modern world, telecommunications mainly means transferring information across the
Internet, via modem, phone lines or ………………………………..networks.
wireless
17 instant masseging
By using ……………………………….., one can send a message to another person through a
mail immediately.
18 Don’t use common words or numbers as ……………………………….., password such as birthdays or
names of your children.
19 Due to the advancement of electronic media, business managers can effortlessly manage
…………………………
operations transversely the world.
20 Electronic communication can be classified into different types like messaging, voice call, e-mail,
………………………………..,
video conferencing etc.
21 Hackers try to trick email recipients into believing that a message is genuine and relevant – a
request from their bank or a note from a co-worker, for example – so that they click on a link or
open an ………………………………...
attachment
22 Heterogeneous and homogenous are the two kinds of distribution ……………………………….. models

23 HTML is a language that is all about the ………………………… presentation of your information, not what
the actual data is.
24 If you want to inject something special into your web pages, you can use Adobe Flash to include
animations
interactive ……………………………….. and streaming audio.
25 If you want to share …………………………
information with people, you can use RSS feeds and provide
readers with a link to the feed.
bus network
26 In ……………………………….., all nodes are connected to a common medium, call backbone,
as it happens with Christmas lights.
27 In a …………………………
bus network all nodes are connected to a common medium, call
backbone, as it happens with Christmas lights.
28 In basic terms, AI is a ………………………………..area
broad of computer science that makes
machines seem like they have human intelligence.
29 In recent years, TV and radio broadcasting has been revolutionized by developments in satellite
and ………………………………..
digital transmission.
30 In the ideal smart home, appliances and electronic devices work
in………………………………....
sync to keep the house secure.
electronic
31 In the near future we may have ……………………………….. pets, with video camera eyes and
microphone ears, linked by radio to the family computer.
32 Instant messaging is a service, like SMS, that ………………………………..people
allows to send short
messages using their mobiles phones (or computers).
33 Like human, a ………………………………..
machine retains information and becomes smarter over time.
34 Netflix and Google have already announced that they would be reducing video streaming quality
in Europe for a month from high definition (HD) to standard definition (SD) to prevent network
………………………………..and
overload collapse.
35 Neural networks help solve the problem of providing higher revenue at
lower
……………………………….. costs.
36 Neural networks, also called ………………………………..
artificial neural networks, are ways of
achieving deep learning.
37 No ………………………………...user
unauthorized can access the information.
38 Nowadays, data are actually stored in a public cloud, a hybrid cloud or a private cloud, also
vitual
known as a ………………………………..environment.
39 On the other hand, ………………………………..
networks may be difficult to set up and may be insecure
as computer hackers can send viruses or computer worms to the net computer.
40 Thanks to advances in processing speeds, ……………………………….. computers can actually make
sense of all this information more quickly.
41 Thanks to books and movies, each generation has formed its own fantasy of a world ruled or at
least served by ………………………………...
robots
42 The ………………………………..
analysis of large-size, unstructured information can be done very
efficiently on several cloud virtual servers.
exchange
43 The ………………………………..of information in a network is controlled by communications
protocols, which define the formats and rules that computers must follow when talking to one
another.
44 The best database packages also include network facilities, which can make business more
…………………………………
productive
45 The role of the operating system is to ………………………………..directly
comunicate with the hardware.
46 There are three basic hardware sections: the central processing unit (CPU), main memory
and………………………………..
peripherals
47 There is no central hub that holds all the data, and communication is sent in one direction around
the ………………………………..
ring through the use of a token.
48 When you ask Siri or Cortana where the closest gas station is, it’s really translating your voice
into text, feeding it to a ………………………………..,
search engine and read the answer back in human
syntax.
49 While people are mostly using home WiFi, they would still use their mobile phones for voice
………………………………..,
comunications and this is the area that MNOs need to keep a close eye on.
50 With the potential congestion of fixed broadband service, there is a chance that devices will fall
back on ………………………………..networks,
mobile and this will cause a significant surge of mobile
data traffic.
III. Decide if these statements are True (T) or False (F)
1 _____
T A cloud database is an automated or built-in database for such a virtualized environment.
2 _____ A cloud database is used for large data sets.
F
_____
T A cloud service offers various advantages, including the ability to pay per user storage
3 capacity and bandwidth and provides scalability on request, as well as low availability.
_____
T A database query function allows you to extract information according to certain
4 conditions or criteria.
_____
T A database query function allows you to extract information according to certain
5 conditions or criteria.
6 _____
F A field is a group of records holding large amount of information.
7 _____
F A LAN connects computers in an office building, school, over a relatively long distance.
8 _____ A mainframe computer is less powerful than a PC.
F
9 _____
T A mainframe computer is more powerful than a PC.
10 _____ A mainframe is used by large organizations that need to process great amount of data.
T
11 F
_____ A mainframe is used by large organizations that need to process small amount of data.
_____
F A MAN is a specialized network that provides access to block-level storage—shared
network or cloud storage that, to the user, looks and works like a storage drive that’s physically
12 attached to a computer.
_____
F A Personal Database is an automated or built-in database for such a virtualized
13 environment.
14 _____
T A Personal Digital Assistant is small enough to fit into the palm of your hand.
_____
T A VPN establishes an encrypted channel that keeps a user’s identity and access
15 credentials, as well as any data transferred, inaccessible to hackers.
_____
T A Web Application Firewall (WAF) which updates a threat database in real-time is one of
16 the effective ways to filter application input to protect against code injection.
17 T
_____ A wireless access point allows wireless devices to connect to the network.
_____
F Animations are placed around pieces of text to tell the web browser how to display text or
18 pictures.
19 _____
T Background means the underlying colors and patterns of a web page.
_____
F Centralized Database are the paid versions of the enormous databases, designed for users
20 who wish to access the information for assistance.
_____
T Digital TV is a way of transmitting pictures by means of digital signals, in contrast to the
21 analogue signals used by traditional TV.
_____
T E-mail, telephone, video calling, FAX machine are typically used to transmit information
22 in electronic communication.
_____
T Hackers are always looking to exploit a private network or system's vulnerabilities so
23 they can steal confidential information and data.
T
_____ Hackers are always trying to attack a private network or system's vulnerabilities so they
24 can steal secret information and data.
_____
T Hackers are always trying to attack a private network or system’s vulnerabilities so they
25 can steal secret information and data.
_____
T Hardware is any physical part of the computer which includes the internal components
26 and the external parts like the monitor and printer.
_____
T If you want to protect your PC, don’t open email attachments from strangers and take
27 care when downloading files from the Web.
_____
F If you want to send instant messages on Facebook Messenger, Whatsapp or Snapchat,
28 you will be charged a large amount of fee.
_____
F If your computer is attacked by ransomware, you don’t have to pay any ransom to unlock
29 your screen and your files.
30 _____
F In a star bus network, each node is connected to its left in a circle.
_____
F In distribution database, the data is stored centrally and user from various locations can
31 access this data.
32 _____
T Instant message is a kind of service that allows people to send short message for free.
_____
T Instant messages are sent for free over the internet and can contain multimedia items like
33 emoji, pictures, videos and voice recordings.
_____
T Instant messages are sent for free over the internet and can contain multimedia items like
34 emoji, pictures, videos and voice recordings.
_____
F Malware attack is malicious software that changes a browser's behavior, settings, or
35 appearance without user consent.
36 T
_____ MANs are typically bigger than LANs but smaller and WANs.
37 _____
T Meta tag is invisible information (e.g. a hidden keyword) on a website.
_____
T Neural networks are used to convert handwritten characters into digital characters that a
38 machine can recognize.
_____
T Peripherals are the physical units attached to the computer. They include storage devices
39 and input/output devices.
_____T Phishing is a cyber-attack in which phishing emails are sent to gather users’ login
40 information.
_____
F Private networks can’t be attacked by intruders who attempt to obtain information such as
41 Social Security numbers, bank accounts or research and business reports.
42 _____
T Relational database is the database which is made up of related files.
_____
T Systems Administrators, Network Administrators, or anyone who has anything to do with
43 cybersecurity will also be under a great deal of stress.
F
_____ Tech professionals are not required to constantly keep themselves up-to-date on the latest
44 trends and developments.
_____
T Thanks to electronic communication, mobile phones now let you check your email,
45 browse the Web and connect with home or company intranets, all without wire.
_____
F The analysis of large-size, unstructured information can’t be done very efficiently on
46 several cloud virtual servers.
47 _____
F The connection between devices of WLAN and LAN are the same.
48 _____T The network starts with an input layer that receives output in the form of data.
_____
T Vlogging and Blogging are similar in delivering informal styles, however, with Vlogging,
49 Vloggers can post videos.
50 _____
T VOIP allows voice and multimedia data to be transferred across a data network.

You might also like