Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

I. Read The Following Sentences and Decide Whether They Are TRUE or FALSE (1pt)

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

I. Read the following sentences and decide whether they are TRUE or FALSE (1pt).

1. ____ New computers are faster and sometimes cheaper than older machines.
2. ____ Laptops are smaller than desktop computers, but heavier than notebooks.
3. ____ Notebook is about the size of a piece of writing paper and the most common type of portable.
4. ____ Subnotebook is as small as notebook, and it can fit into a jacket pocket.
5. ____ Minicomputers are the most common type of computer.
II. Read the following sentences and choose the best answer (2 pts).
6. Computers are _________ machines which can accept data in a certain form, process the data and
give the results of the processing in a specified format as information.
A. electronic B. electrical C. electrician D. electricity
7. Data is fed into the computer’s __________.
A. CPU B. CD C. memory D. central access
8. Information in the form of data and programs is known as ________.
A. hardware B. software C. peripherals D. process
9. Electronic and mechanical parts that make up a computer system are call _______
A. hardware B. software C. peripherals D. process
10. The physical units attached to the computer are __________
A. hardware B. software C. peripherals D. process
11. Modems, fax machine, optical drives and scanners are _________
A. hardware B. software C. peripherals D. process
12. Networks also require ________ systems to control access.
A. hardware B. software C. peripherals D. security
13. When a piece of virus code is found, the virus can be ________
A. input B. output C. verified D. identified
14. Care should be taken check for viruses when using removable disks or when _____ files
A. deleting B. replying C. contributing D. transferring
15. Computers can listen to your voice and change what you say into a written message or into ___.
A. orders B. software C. peripherals D. process
16. The computer compares the code with other codes in its memory to _______ each word.
A. look B. rectify C. identify D. provide
17. Scanners ____ text or pictures into electronic codes that can be manipulated by the computer.
A. delete B. input C. convert D. introvert
18. The manufacturer usually includes _____ which offers different ways of treating the scanned image.
A. hardware B. software C. peripherals D. process
19. A color scanner _______ by using three rotating lamps, each of which has different colored filter.
A. operates B. inputs C. converts D. introvert
20. When the computer _________ the correct word it displays it on the monitor screen.
A. deletes B. inputs C. converts D. finds
21. The keys on a ______ keyboard can be arranged in many different ways.
A. machine B. mainboard C. computer D. introducer
22. Above the main keyboard is a row of keys known as the _______ keys.
A. delete B. input C. function D. converted
23. To the right of the main keyboard is a section known as the ______ keys
A. deleting B. inputting C. outputting D. editing
24. The most _____ way on a desktop PC is called the extended keyboard.
A. vital B. common C. empowered D. different
25. CPU is the most _________ part of a computer.
A. vital B. common C. empowered D. different
III. TEXT COMPLETION (1pt)
1|TEST 1TIẾNG ANH CHUYÊN NGÀNH
Choose the best choice to complete the following text.
The question of security is ………. (26) when sending confidential ……… (27) such as credit card
numbers. For example, consider the process of ……….. (28) a book on the web. You have ………………..
(29) your credit card number ……. (30) an order from which passes ……… (31) computer on its way to the
online bookstore. If one ………(32) the intermediary computers is infiltrated …….. (33) hackers, your data
can be ………. (34). It is difficult to say how often this happens, but it’s ………… (35) possible
26. A. crucial B. violent C. insecure D. confident.
27. A. information B. file C. contract D. logo
28. A. to buy B. bought C. buying D. having bought
29. A. typing B. typed C. type D. to type
30. A. to B. in C. into D. at
31. A. out B. from C. through D. on
32. A. out B. from C. of D. on
33. A. through B. by C. drawn D. at
34. A. copied B. copying C. to copied D. having copied
35. A. technical B. technically C. technique D. technician
IV. REWRITE THE SENTENCES (1pt)
Complete the following sentences, using words or phrases provided to keep the same meaning.
36.We use a word processing program or word processor for creating and editing text document.
A word processing program ……………………………………………………………………..
37.You can access the program facilities by using a menu bar.
The program facilities ……………………………………………………………………………
38. You can use spell checkers to correct the errors in the document.
Spell ………………………………………………………………………………………………
39. The spell checkers sometimes suggests possible correct spelling.
Possible …………………………………………………………………………………………..
40. Many word processors include grammar checkers.
Grammar ………………………………………………………………………………………….
V. TERMS & USES (1pt)
41. What is CPU? …………………………………………………………………………………
42. What do Storage Devices do?
……………………………………………………………………………………………………..
43. What are Disk drives used to?
……………………………………………………………………………………………………..
44. What do Input devices do?
……………………………………………………………………………………………………..
45. What do Output devices do?
…………………………………………………………………………………………………….
VI. READING COMPREHENTION (2pts)
Read the following short article then answer the questions:

2|TEST 1TIẾNG ANH CHUYÊN NGÀNH


From the use of fingers and toes, to stones and bones, man proceeded to invent several apparatus that led to
the modern machine for computing. The computer of today (or tomorrow) is light-years ahead of any that
would have been conceived by Leonardo da Vinci. The evolution of ICT has spanned several centuries; the
advancement within the last half-century is truly enormous. Information signals (sound/voice and data –text
or pictures) converged into digital form –the binary language of computers and, could thus be transmitted for
shared usage through communication devices and other electronic products. Hence we had convergence of
and, development of multifunctional technological products that offered users mobility and share ability of
services. The military, the corporate bodies and the innovative entrepreneur have seen to the ascent of
technology over the ages. The technological environment changes so drastically that a human generation
witnesses multiple technological generations. Technology has not only brought increased standard of living,
it has also brought along competition among nations seeking dominance in the new world order. It is even
argued that ICT growth also enabled the dark sides of computing such as privacy intrusions, data
destructions and easier means to spread moral perversions and ideologies.

46. What is likely the headline of this paragraph?


…………………………………………………………………………………………………………….
47. What does technology impact on human life?
…………………………………………………………………………………………………………….
48. Which word in the text means “imagined”? Conceived
…………………………………………………………………………………………………………….
49. Which word in the text means “control”?
…………………………………………………………………………………………………………….
50. How are the signals of information converged?
……………………………………………………………………………………………………………..
……………………………………………………………………………………………………………..
……………………………………………………………………………………………………………..

VII. TRANSLATION (2pts).


Translate into Vietnamese the following text.
Viruses can be found and removed by anti-virus programs, which scan disks and files looking for
programming code that is known to belong to particular virus programs. When a piece of virus code is
found, the virus can be identified and an appropriate program run to delete the virus code from the disk or
file. Plain text email messages cannot contain a virus but viruses can be carried in email attachments, i.e.
files attached to email messages some viruses are much more common than others and are often
unknowingly downloaded from a network system such as internet. We have to check carefully when
attaching removable disks into our computer or laptop.

………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
3|TEST 1TIẾNG ANH CHUYÊN NGÀNH
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………

THE END

4|TEST 1TIẾNG ANH CHUYÊN NGÀNH

You might also like