0% found this document useful (0 votes)
26 views8 pages

Enit220137 07 01 2016

This document is an end-of-term test for the Faculty of Foreign Languages at the University of Technology and Education, focusing on English for IT. It includes multiple-choice questions, true/false statements, and reading comprehension passages related to computer technology and telecommuting. The test is designed to assess students' understanding of IT concepts and their application in real-world scenarios.

Uploaded by

23110340
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views8 pages

Enit220137 07 01 2016

This document is an end-of-term test for the Faculty of Foreign Languages at the University of Technology and Education, focusing on English for IT. It includes multiple-choice questions, true/false statements, and reading comprehension passages related to computer technology and telecommuting. The test is designed to assess students' understanding of IT concepts and their application in real-world scenarios.

Uploaded by

23110340
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

UNIVERSITY OF TECHNOLOGY AND EDUCATION END-OF-TERM TEST

FACULTY OF FOREIGN LANGUAGES Semester 1 – School year 2015-2016


SECTION: GE & ESP Subject: ENGLISH FOR IT

Invigilator 1 Invigilator 2 Code: ENIT 220137


Date: 07/01/2016
Duration: 75 minutes
Score and Signature
Examiner 1 Examiner 2 Student’s name: ……………………………
Student’s ID: ………………………….........
Ordinal number: …………. Room:………...

ANSWER KEY
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

A X X X X X X

B X X X X

C X X X X X X

D X X X X

21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40

A X X X X X X

B X X X X X

C X X X X

D X X X X X

Matching TRUE/FALSE

41 D 46 FALSE

42 E 47 TRUE

43 A 48 TRUE

44 B 49 FALSE
Page1

45 C 50 FALSE
I. CHOOSE THE BEST ANSWER FOR EACH QUESTION (6 marks)
1. What part of a computer stores data permanently?
A. network interface card B. secondary storage C. CPU D. primary storage
2. The fundamental conceptual unit in a computer is ______.
A. CPU B. Hard Drive C. Operating System D. Transistor
3. Approximately how many bytes make one Megabyte?
A. One Million B. One Thousand C. Ten Thousand D. One Hundred
4. Which device allows your computer to talk to other computers over a telephone line as well as
access the internet?
A. CD-ROM drive B. RAM C. Modem D. Hard Drive

5. With these systems, input and output devices are located outside the system unit.
A. Desktop systems B. Personal digital assistants
C. Smartphones D. Laptop computers
6. Which of the following offers a combination of the features of RAM and ROM?
A. DRAM B. DDR C. Flash Memory D. Cache
7. Most microcomputers allow users to expand their systems by providing these on the system
board.
A. expansion slots B. ports C. sound cards D. modem cards
8. This type of monitor is common on desktop computers. It looks much like a standard television.
A. cathode-ray tube B. flat-panel C. monochrome D. projector
9. Monitors use various intensities of ______ colors to generate the rainbow.
A. 16 B. 16 million C. three D. four
10. Newer projectors utilize ______ to achieve clearer and brighter images.
A. mirrors B. thin-film transistors
C. digital light processing D. cathode ray tubes
11. A ______ is an example of a solid-state memory device.
A. flash memory drive B. CD-RW C. floppy disk D. hard disk

12. Floppy drives, hard drives and tape drives all use a ______ to read data.
A. laser B. magnet C. sensor D. pen

13. Disk defragmentation software allows you to _____.


A. destroy files stored on your hard drive.
B. physically destroy computer hard drives, CD and DVDs.
C. collect broken files and fix them.
D. maximise space on your hard drive by organising files.

14. As a victim of identity theft, how would you attempt to resolve your dilemma?
A. Ask someone else to collect your mail. B. Change your bank account details.
C. Prove yourself innocent to avoid financial costs. D. Have someone impersonate you.
Page2

15. The main interface in Windows and OS X is a (an) ______ interface.


A. embedded B. graphical C. command-line D. neural
16. The program that allows the OS to work with a printer or a video card is a(n) ______.
A. driver B. utility C. applet D. system call
17. A program currently loaded in the system but not active is said to be running in the ______.
A. user session B. kernel C. background D. foreground

18. Data that is copied from an application is stored in the ______.


A. driver B. clipboard C. terminal D. prompt
19. The last member of the Windows 9X family is ______.
A. Windows XP B. Windows 95 C. Windows 98 D. Windows ME
20. Office LANs that are spread geographically apart on a large scale can be connected using a
corporate ______.
A. CAN B. LAN C. DAN D. WAN
21. What is the process of copying software programs from secondary storage media to the hard
disk called?
A. storage B. download C. configuration D. upload
22. The WWW standard allows programmers on many different computer platform to how the
information on a server. Such programmers are called ______.
A. ISP B. Web Browsers C. Web Servers D. Web Modular
23. Which process checks to ensure the components of the computer are operating and connected
properly?
A. Editing B. Processing C. Saving D. Booting
24. A software/hardware mechanism that private networks use to block unauthorized traffic from
the internet.
A. a padlock B. a firewall C. a virus scanner D. a privacy protector

25. Which input device cannot be used to work in MS Office?


A. Scanner B. Light Pen C. Mouse D. Joy Stick
26. A commonly used graphic format for the web is ______.
A. GIF B. bmp C. Imp D. TIF
27. What does HTTP stand for?
A. Hyper Translation Protocol B. Hyper Typical Text Protocol
C. Hyper Text Transfer Protocol D. Hyper Text Transforming Protocol
28. What does ADSL stand for?
A. Asymmetric Digital Subscriber Line B. Asymmetric Digital Signal Line
C. A Digital Super Line D. Analog Dimension Super Long
29. A good solution to overcome network bandwidth limitations is to ______.
A. increase network connections.
B. reduce the size of files and increase the number of files being transmitted.
C. decrease the capacity of the communications media within the network.
D. increase the capacity of the communications media within the network.
Page3

30. Viruses, worms or Trojans can be named as ______.


A. harmware B. shockwave C. malware D. software
II. READING COMPREHENSION (4 marks) Read the 3 passages and answer the questions.
Passage 1: Questions 31-35 refer to the following passage.
Telecommuting – substituting the computer for the trip to the job – has been hailed as a
solution to all kinds of problems related to office work. For workers it promises freedom from the
office, less time wasted in traffic, and help with child - care conflicts. For management,
telecommuting helps keep high performers on board, minimizes tardiness and absenteeism by
eliminating commutes, allows periods of solitude for high - concentration task, and provides
scheduling flexibility. In some areas, such as Southern California and Seattle, Washington, local
governments are encouraging companies to start telecommuting programs in order to reduce rush -
hour congestion and improve air quality. But these benefits do not come easily. Making a
telecommuting program work requires careful planning and an understanding of the differences
between telecommuting realities and popular images.
Many workers are seduced by rosy illusions of life as a telecommuter. A computer
programmer from New York City moves to the tranquil Adirondack Mountains and stays in
contact with her office via computer. A manager comes in to his Office three days 8 week and
works at home the other two. An accountant stays home to care for child; she hooks up her
telephone modem connections and does office work between calls to the doctor.
These are powerful images, but they are a limited reflection of reality. Telecommuting
workers soon learn that it is almost impossible to concentrate on work and care for a young child
at the same time. Before a certain age, young children cannot recognize. Much less respect, the
necessary boundaries between work and family. Additional child support is necessary if the parent
is to get any work done.
Management, too, must separate the myth from the reality. Although the media has paid a
great deal of attention to telecommuting. In most cases it is the employee's situation, not the
availability of technology that precipitates a telecommuting arrangement.
That is partly why, despite the widespread press coverage, the number of companies with
work-at-home programs or policy guidelines remains small.
31. What is the main subject of the passage?
A. Business management policies
B. Driving to work
C. Extending the workplace by means of commuters
D. Commuters for child - care purposes
32. Which of the following is NOT mentioned as a problem for office employees?
A. Being restricted to the office B. Incurring expenses for lunches and clothing
C. Taking care of sick children D. Driving in heavy traffic
33. Which of the following is NOT mentioned as a problem for employers that is potentially solved
by telecommuting?
A. Employees' lateness for work
B. Employees' absence from work
C. Employees' need for time alone to work intensively
D. Employee's' conflicts with second jobs
34. Which of the following does the author mention as a possible disadvantage of telecommuting?
A. Small children cannot understand the boundaries of work and play.
Page4

B. Computer technology is not advanced enough to accommodate the needs of every


situation.
C. Electrical malfunctions can destroy a project.
D. The worker often does not have all the needed resources at home.
35. Which of the following is an example of telecommuting as described in the passage?
A. A scientist in a laboratory developing plans for a space station
B. A technical writer sending via computer documents created at home
C. A computer technician repairing an office computer network
D. A teacher directing computer-assisted learning in a private school

==============================

Passage 2:
The average computer user has between 5 and 15 username/password combinations to log in
to email accounts, social networking sites, discussion boards, news and entertainment sites, online
stores, online banking accounts, or other websites. For people who use email or other internet
applications at work, the number of required username/password combinations may surpass 30.
Some of these accounts demand that you use a specific number of symbols and digits, while others
require you to change your password every 60 days. When you add to this list the codes needed to
access things like ATMs, home alarm systems, padlocks, or voicemail, the number of passwords
becomes staggering. The feeling of frustration that results from maintaining a memorized list of
login credentials has grown so prevalent that it actually has a name: password fatigue.
Having to remember so many different passwords is irritating, but it can also be dangerous.
Because it is virtually impossible to remember a unique password for each of these accounts, many
people leave handwritten lists of usernames and passwords on or next to their computers. Others
solve this problem by using the same password for every account or using extremely simple
passwords. While these practices make it easier to remember login information, they also make it
exponentially easier for thieves to hack into accounts.
Single sign-on SSO. authentication and password management software can help mitigate
this problem, but there are drawbacks to both approaches. SSO authentication can be used for
related, but independent software systems. With SSO, users log in once to access a variety of
different applications. Users only need to remember one password to log in to the main system; the
SSO software then automatically logs the user in to other accounts within the system. SSO software
is typically used by large companies, schools, or libraries. Password management software, such as
KeePass and Password Safe, is most often used on personal computers. These software programs—
which have been built into many major web browsers—store passwords in a remote database and
automatically “remember” users’ passwords for a variety of sites.
The problem with both SSO authentication and password management software is that the
feature that makes them useful is also what makes them vulnerable. If a user loses or forgets the
password required to log in to SSO software, the user will then lose access to all of the applications
linked to the SSO account. Furthermore, if a hacker can crack the SSO password, he or she will
then have access to all of the linked accounts. Users who rely on password management software
are susceptible to the same problems, but they also incur the added threat of passwords being
compromised because of computer theft.
Although most websites or network systems allow users to recover or change lost passwords
by providing email addresses or answering a prompt, this process can waste time and cause further
frustration. What is more, recovering a forgotten password is only a temporary solution; it does not
address the larger problem of password fatigue.
Some computer scientists have suggested that instead of passwords, computers rely on
biometrics. This is a method of recognizing human users based on unique traits, such as
fingerprints, voice, or DNA. Biometric identification is currently used by some government
agencies and private companies, including the Department of Defense and Disney World. While
biometrics would certainly eliminate the need for people to remember passwords, the use of
Page5

biometrics raises ethical questions concerning privacy and can also be expensive to implement.
The problems associated with SSO, password management software, and biometrics
continue to stimulate software engineers and computer security experts to search for the cure to
password fatigue. Until they find the perfect solution, however, everyone will simply have to rely
on the flawed password system currently in place.

==============================
36. Which of the following best describes the organization of the passage?
A. The passage organizes ideas in order of increasing importance.
B. The author presents an argument and then uses evidence to dismiss opposing views.
C. The author explains a problem, explores solutions, and then dismisses these solutions as
inadequate.
D. The author explains a problem and then persuades readers to agree with his or her
solution to the problem.

37. The passage discusses all of the following solutions to password fatigue except _____.
A. intelligent encryption B. voice-recognition software
C. KeePass D. using very simple passwords

38. According to the passage, SSO authentication software may be safer than password
management software because _____.
I. stolen personal computers contain passwords memorized by a user’s web browser
II. if a user of password management software forgets his or her login credentials, the user
can no longer access any of the applications protected by the password
III. hackers who access password management software can gain access to all of the
applications protected by that password
A. I only B. II only C. I and II only D. II and III only

39. Which of the following statements from the passage represents an opinion, as opposed to a fact?
A. “For people who use email or other internet applications at work, the number of required
username/password combinations may surpass 30.”
B. “The feeling of frustration that results from maintaining a memorized list of login
credentials has grown so prevalent that it actually has a name: password fatigue.”
C. “Having to remember so many different passwords is irritating, but it can also be
dangerous.”
D. “Additionally, recovering a forgotten password is only a temporary solution; it does not
address the larger problem of password fatigue.”

40. In paragraph 6, the author notes that “the use of biometrics raises ethical questions concerning
privacy.” Which of the following situations could be used as an example to illustrate this point?
A. A thief steals a personal computer with password management software and gains access
to private email accounts, credit card numbers, and bank statements.
B. An employee at a company uses a voice recognition system to log in to his computer,
only to be called away by his boss. While he is away from the computer but still logged in,
another employee snoops on his computer and reads personal email correspondence.
C. A computer hacker gains access to a system that uses SSO software by cracking the
password, thus gaining private access to all linked accounts.
D. A company that employs fingerprint identification security software turns over its
database of fingerprints to the local police department when a violent crime occurs on its
grounds.
Page6

Passage 3: Questions 41-50 refer to the following passage.


Computers Make the World Smaller and Smarter
The ability of tiny computing devices to control complex operations has transformed the way many
tasks are performed, ranging from scientific research to producing consumer products. Tiny
'computers on a chip' are used in medical equipment, home appliances, cars and toys. Workers use
handheld computing devices to collect data at a customer site, to generate forms, to control
inventory, and to serve as desktop organisers.
Not only is computing equipment getting smaller, it is getting more sophisticated. Computers are
part of many machines and devices that once required continual human supervision and control.
Today, computers insecurity systems result in safer environments, computers in cars improve
energy efficiency, and computers in phones provide features such as call forwarding, call
monitoring, and call answering.
These smart machines are designed to take over some of the basic tasks previously performed by
people; by so doing, they make life a little easier and a little more pleasant. Smart cards store vital
information such as health records, drivers' licenses, bank balances, and so on. Smart phones, cars,
and appliances with built in computers can be programmed to better meet individual needs. A smart
house has a built-in monitoring system that can turn lights on and off, open and close windows,
operate the oven, and more.
With small computing devices available for performing smart tasks like cooking dinner,
programming the VCR, and controlling the flow of information in an organization, people are able
to spend more time doing what they often do best - being creative. Computers can help people work
more creatively. Multimedia systems are known for their educational and entertainment value,
which we call 'edutainment'. Multimedia combines text with sound, video, animation, andgraphics,
which greatly enhances theinteraction between user and machine andcan make information more
interesting andappealing to people. Expert systems softwareenables computers to 'think' like
experts.Medical diagnosis expert systems, forexample, can help doctors pinpoint apatient's illness,
suggest further tests, andprescribe appropriate drugs.
Connectivity enables computers and software that might otherwise be incompatible to communicate
and to share resources. Now that computers are proliferating in many areas and networks are
available for people to access data and communicate with others, personal computers are becoming
interpersonal PCs. They have the potential to significantly improve the way we relate to each other.
Many people today telecommute - that is, use their computers to stay in touch with the office while
they are working at home. With the proper tools, hospital staff can get a diagnosis from a medical
expert hundreds or thousands of miles away. Similarly, the disabled can communicate more
effectively with others using computers.
Distance learning and videoconferencing are concepts made possible with the use of an electronic
classroom or boardroom accessible to people in remote locations. Vast databases of information are
currently available to users of the Internet, all of whom can send mail messages to each other. The
information superhighway is designed to significantly expand this interactive connectivity so that
people all over the world will have free access to all these resources.
People power is critical to ensuring that hardware, software, and connectivity are effectively
integrated in a socially responsible way. People - computer users and computer professionals - are
the ones who will decide which hardware, software, and networks endure and how great an impact
they will have on our lives. Ultimately people power must be exercised to ensure that computers are
used not only efficiently but in a socially responsible way.

41-D
42-E
43-A
Page7

44-B
45-C
46-FALSE
47-TRUE
48-TRUE
49-FALSE
50-FALSE

THIS IS THE END OF THE TEST.

Chuẩ n đầ u ra ho ̣c phầ n Câu hỏi


Hiểu được các thuật ngữ tiếng Anh thông dụng liên quan lĩnh vực CNTT và 1-60
G1.1
khoa học máy tính.
Nhận biết đặc tính, ứng dụng và phân loại thiết bị, linh kiện máy tính (CPU, 1-60
G1.2
input/output devices, storage devices, …)
Nhận biết nguyên tắc, quy trình vận hành tổng quát của một số phần mềm 1-60
G1.3 thông dụng như hệ điều hành, nhóm các ứng dụng văn phòng, nhóm các ứng
dụng cho người dùng mạng Internet, nhóm các ứng dụng đồ họa, ...

Compiled by Approved by
Huỳnh Hạnh Dung
Hứa Trần Phương Thảo ̣
Lê Thi Thanh Hà
Phạm Văn Khanh Sử Thị Ái Mỹ

Page8

You might also like