Essential IT Terms and Security Practices

1. Fill in the Gaps with the Following Terms

  1. You have to enter a command line to make the system do anything.
  2. Capturing information stored in cards is card scanning.
  3. A warm light that you cannot see is infrared.
  4. To move at an angle is to tilt.
  5. Errors in the OS can sometimes cause a computer to crash.
  6. A power supply is a prerequisite for a computer to work.
  7. Voicemail is a feature that calls a number by speaking instead of by dialing.
  8. Is the system compliant with the latest standards?
  9. Is it worth improving our website?
  10. Every Friday, the staff get their shifts for the following week.

2. Complete the Words Corresponding to These Definitions

  1. A method used to gain access to computers with their owners logged in: shoulder surfing (12 letters).
  2. A power source in cell phones: battery pack (7 letters – 3 letters – 7 letters).
  3. Unwanted emails: spam (3 letters).
  4. Website space where people can discuss topics: forum (5 letters).
  5. It can infect one’s computer and steal information: worm (4 letters).
  6. A certificate you get after successfully completing university studies: degree (6 letters).
  7. Being able to speak a foreign language at an average speed (adj.): fluent (6 letters).

3. Write a Definition for the Following IT Terms

  1. To recruit: To select and hire individuals for a job or a specific role in a company or organization.
  2. Career: A person’s professional journey and progress in a specific field of work.
  3. False positive: A security alert that incorrectly identifies a safe action or file as a threat.
  4. Rootkit: A type of malware that hides its presence on a system and allows unauthorized access to a computer.
  5. Charging cradle: A docking station designed to charge electronic devices such as smartphones or tablets.

4. What Do These Acronyms Stand For?

  1. MMORPG: Massively Multiplayer Online Role-Playing Game.
  2. FPS: First-Person Shooter.
  3. ASAP: As Soon As Possible.
  4. FAQS: Frequently Asked Questions.
  5. PDA: Personal Digital Assistant.
  6. CV: Curriculum Vitae.
  7. VPK: Virtual Private Key.

5. Complete the Sentences with the Correct Form

  1. There are several advertisements online for a variety of work placements.
  2. She’s always known that she wants to work as a scientist after university.
  3. Learning music is interesting, but it’s irrelevant to what I want to do later.
  4. My previous employers would be willing to provide references to support my application.
  5. At the animal sanctuary, I had sole responsibility for looking after the birds.

6. Passive / Active / Impersonal Passive / Causative

  1. Active: Someone broke into my office.

    Passive: My office was broken into.

  2. Active: The students are using the computers right now.

    Passive: The computers are being used by the students right now.

  3. People believe that solving puzzles keeps the brain active.

    Impersonal Passive: It is believed that solving puzzles keeps the brain active.

    Passive: Solving puzzles is believed to keep the brain active.

  4. Active: A student is fixing my laptop at school.

    Passive: My laptop is being fixed by a student at school.

  5. The groups had their class PCs programmed by their tutors last September.

  6. Active: Experts have proved that exercise is good for concentration.

    Impersonal Passive: It has been proved that exercise is good for concentration.

    Passive: Exercise has been proved to be good for concentration.

  7. The YouTuber had a video game designed by an engineer during the winter.

  8. Passive: The computers were being stolen from the classrooms in I.E.S. Gabriela Mistral last weekend.

    Active: Thieves were stealing the computers from the classrooms in I.E.S. Gabriela Mistral last weekend.

7. Complete a Suitable Compound Collocation

  1. Human resources.
  2. Board meeting.
  3. Share holder.
  4. Chair person.
  5. High demand.

8. Fill in the Following Sentences with an Appropriate

  1. Andrew will be able to purchase tickets online tomorrow from 9 am. (Meaning: ability in the future)
  2. To get the job, you must be fluent in German. (Meaning: obligation/requirement)
  3. I couldn’t record the film for you last night. It wasn’t available. (Meaning: past impossibility)
  4. You can phone Henry at work. He should be available in the office by now. (Meaning: probability)
  5. Lucy’s just bought a new car. She must be earning plenty of money. (Meaning: strong deduction)

9. Difference Between Phishing, Pharming, and Pretexting

  • Phishing: A cyberattack where criminals send fraudulent emails or messages pretending to be legitimate institutions to steal personal information.
  • Pharming: A method where attackers redirect a website’s traffic to a fake site to steal login credentials or financial information.
  • Pretexting: A social engineering technique where a scammer invents a fake scenario to obtain sensitive information from a victim.

10. Essay: Security Measures for My Technology Devices

In today’s digital age, securing our technology devices is crucial. I frequently update my security settings, including passwords and two-factor authentication, to prevent unauthorized access. Additionally, I install antivirus software and regularly scan my system for malware.

However, I have not yet started using a VPN, which I believe is essential for protecting my online privacy. I plan to implement this measure soon. In the future, I foresee cybersecurity becoming more advanced, with artificial intelligence playing a key role in threat detection.

Overall, staying informed and proactive in security measures is the best way to protect our digital lives.