Essential IT Terms and Security Practices
1. Fill in the Gaps with the Following Terms
- You have to enter a command line to make the system do anything.
- Capturing information stored in cards is card scanning.
- A warm light that you cannot see is infrared.
- To move at an angle is to tilt.
- Errors in the OS can sometimes cause a computer to crash.
- A power supply is a prerequisite for a computer to work.
- Voicemail is a feature that calls a number by speaking instead of by dialing.
- Is the system compliant with the latest standards?
- Is it worth improving our website?
- Every Friday, the staff get their shifts for the following week.
2. Complete the Words Corresponding to These Definitions
- A method used to gain access to computers with their owners logged in: shoulder surfing (12 letters).
- A power source in cell phones: battery pack (7 letters – 3 letters – 7 letters).
- Unwanted emails: spam (3 letters).
- Website space where people can discuss topics: forum (5 letters).
- It can infect one’s computer and steal information: worm (4 letters).
- A certificate you get after successfully completing university studies: degree (6 letters).
- Being able to speak a foreign language at an average speed (adj.): fluent (6 letters).
3. Write a Definition for the Following IT Terms
- To recruit: To select and hire individuals for a job or a specific role in a company or organization.
- Career: A person’s professional journey and progress in a specific field of work.
- False positive: A security alert that incorrectly identifies a safe action or file as a threat.
- Rootkit: A type of malware that hides its presence on a system and allows unauthorized access to a computer.
- Charging cradle: A docking station designed to charge electronic devices such as smartphones or tablets.
4. What Do These Acronyms Stand For?
- MMORPG: Massively Multiplayer Online Role-Playing Game.
- FPS: First-Person Shooter.
- ASAP: As Soon As Possible.
- FAQS: Frequently Asked Questions.
- PDA: Personal Digital Assistant.
- CV: Curriculum Vitae.
- VPK: Virtual Private Key.
5. Complete the Sentences with the Correct Form
- There are several advertisements online for a variety of work placements.
- She’s always known that she wants to work as a scientist after university.
- Learning music is interesting, but it’s irrelevant to what I want to do later.
- My previous employers would be willing to provide references to support my application.
- At the animal sanctuary, I had sole responsibility for looking after the birds.
6. Passive / Active / Impersonal Passive / Causative
Active: Someone broke into my office.
Passive: My office was broken into.
Active: The students are using the computers right now.
Passive: The computers are being used by the students right now.
People believe that solving puzzles keeps the brain active.
Impersonal Passive: It is believed that solving puzzles keeps the brain active.
Passive: Solving puzzles is believed to keep the brain active.
Active: A student is fixing my laptop at school.
Passive: My laptop is being fixed by a student at school.
The groups had their class PCs programmed by their tutors last September.
Active: Experts have proved that exercise is good for concentration.
Impersonal Passive: It has been proved that exercise is good for concentration.
Passive: Exercise has been proved to be good for concentration.
The YouTuber had a video game designed by an engineer during the winter.
Passive: The computers were being stolen from the classrooms in I.E.S. Gabriela Mistral last weekend.
Active: Thieves were stealing the computers from the classrooms in I.E.S. Gabriela Mistral last weekend.
7. Complete a Suitable Compound Collocation
- Human resources.
- Board meeting.
- Share holder.
- Chair person.
- High demand.
8. Fill in the Following Sentences with an Appropriate
- Andrew will be able to purchase tickets online tomorrow from 9 am. (Meaning: ability in the future)
- To get the job, you must be fluent in German. (Meaning: obligation/requirement)
- I couldn’t record the film for you last night. It wasn’t available. (Meaning: past impossibility)
- You can phone Henry at work. He should be available in the office by now. (Meaning: probability)
- Lucy’s just bought a new car. She must be earning plenty of money. (Meaning: strong deduction)
9. Difference Between Phishing, Pharming, and Pretexting
- Phishing: A cyberattack where criminals send fraudulent emails or messages pretending to be legitimate institutions to steal personal information.
- Pharming: A method where attackers redirect a website’s traffic to a fake site to steal login credentials or financial information.
- Pretexting: A social engineering technique where a scammer invents a fake scenario to obtain sensitive information from a victim.
10. Essay: Security Measures for My Technology Devices
In today’s digital age, securing our technology devices is crucial. I frequently update my security settings, including passwords and two-factor authentication, to prevent unauthorized access. Additionally, I install antivirus software and regularly scan my system for malware.
However, I have not yet started using a VPN, which I believe is essential for protecting my online privacy. I plan to implement this measure soon. In the future, I foresee cybersecurity becoming more advanced, with artificial intelligence playing a key role in threat detection.
Overall, staying informed and proactive in security measures is the best way to protect our digital lives.