Information Technology
Book 1
Unit 02 Introduction to Computing Systems
Video: Different Computer Types
Mark the following statements as True or False.
1. Relative to their cost, desktops have the most amount of power, speed, storage and upgradeability.
True / False
2. Laptops are the easiest to upgrade and repair. True / False
3. Desktops have a lot of cables and are not as portable as laptops. True / False
4. The most common Mac people purchase is the iMac. True / False
5. Laptops called ‘desktop replacements’ are not as powerful as their desktop counterparts. True / False
6. Tablets are designed to be network based devices. True / False
Key
1T 2F 3T 4T 5F 6T
Unit 03 Inside the Computer
Video: What’s Inside the Box?
Choose the correct answer.
1. Which of the following is the most important component in a computer?
A the mouse B the keyboard C the motherboard D the input device
2. What does CPU stand for?
A computer processing unit B central processing unit C computer processor unit D central part unit
3. How many cycles a second are there in three gigahertz?
A three hundred B three thousand C three million D three billion
4. Which part keeps the CPU cooler?
A the motherboard B the memory C the fan D the main circuit board
5. Which part of the computer is used for permanent storage?
A the monitor B the USB port C the modem D the hard disk drive
6. What is the function of the modem?
A to see what you are doing B to connect to the internet C to save your work D to turn off the
computer
Key
1C 2B 3C 4C 5D 6B
Unit 04 Computing Devices
Video: Computer Accessories-Necessories
Fill in the blanks with the words below.
mouse paper used considered accessories cables
Special Agent Nickolaos Contaxakis gives his advice on what 1) _________ you should buy with your next
computer purchase. The ones that should be 2) _________ a necessity he calls necessories. For example, 3)
_________ is necessary if someone wants to print. Certain 4) _________ like those that attach the printer to
the computer are also necessary. The keyboard and 5) _________ are also considered very vital components.
Mice also come in different sizes for different purposes. The ones 6) _________ for gaming , for example, are
larger and faster.
Key
1 accessories 2 considered 3 paper 4 cables 5 mouse 6 used
Unit 15 E-commerce
Video: E-Commerce
Mark the following statements as True or False.
1. A recent study shows that Australians are not making online purchases. True / False
2. According to the same study 59% of small and medium-sized businesses take orders online. True /
False
3. The company JR Apparel does everything online, from banking to taking orders. True / False
4. Online businesses can reach more indigenous people I remote communities. True / False
5. Broadband hinders the way of bringing content into people’s homes. True / False
6. The internet gives the buyer the ability to compare products. True / False
Key
1F 2T 3T 4T 5F 6T
Revision Test
Choose the correct answer.
1. This new format carries twenty times more … than a CD-ROM.
A hardware B software C data
2. He has written a piece of … which calculates you tax returns for you.
A hardware B software C data
3. Many satellites are … so that they can only be received by people who have paid to see them.
A encoded B processed C supported
4. Two principles are included in … which are ‘Fit for purpose’, which means the product should be suitable
for the intended purpose, and ‘Right first time’, where mistakes should be eliminated.
A quality assurance B data processing C information security
5. I can be reached either by email or … .
A laptop B cell phone C server
6. A … would be really useful for when I’m working on the plane.
A laptop B cell phone C server
7. A … is a computer program running to serve the requests of other programs.
A mainframe B supercomputer C server
8. A … is one of the most powerful machines worldwide.
A handheld PC B PDA C supercomputer
9. Motherboards are generally air cooled with … .
A heat sinks B expansion cards C processors
10. A … is the enclosure that contains most of the components of a computer.
A fan B processor C case
11. Loading up new software requires removing the … from the machine.
A fan B motherboard C heat sink
12. Depending on the form factor of the motherboard and case, around one to seven … can be added to a
computer system.
A hard drives B expansion cards C processors
13. Customers can now try out the new … tablet PC.
A device B scroll wheel C touch screen
14. My laptop has a built-in … that collects crystal clear sound.
A microphone B mouse C scanner
15. Doctors watched the patient’s heartbeat on a … .
A monitor B printer C keyboard
16. Your camera, computer and … all use color, but they may not all display it in the same way.
A microphone B mouse C printer
17. Students are encouraged to use the … as a resource.
A network B Internet C router
18. Companies need to use … to direct data traffic and connect to the Internet.
A IP addresses B signals C routers
19. Using a … , people can communicate efficiently and easily via email, telephone, chat rooms and more.
A IP address B configuration C network
20. A … is a computer network that interconnects computers in a limited area such as a home or a school.
A CAT-5 cable B LAN C DHCP
21. A common way to move or copy a file or folder is to select it and … it to another location.
A drag B minimize C maximize
22. A … is a virtual container within a digital file system, where groups of computer files can be kept and
organized.
A folder B pointer C menu
23. Shortcuts are very commonly placed on a desktop, and each shortcut can have its own … .
A menu B icon C pointer
24. I will send you the … by email.
A font B document C template
25. This software may not be … with older operating systems.
A processing B compatible C formatting
26. It’s always a good idea to run a … once you have finished writing your document.
A format B layout C spell check
27. Some … are free and give you as many emails as you want.
A POP3s B attachments C ISPs
28. Don’t forget to notify all your contacts when you change your … .
A password B email address C Inbox
29. You can’t get access to the computer system without entering your … .
A password B email address C Inbox
30. For more information concerning our services, don’t forget to visit our … .
A hyperlink B website C search engine
31. A … enables users to access, retrieve, and view documents and other resources on the Internet.
A web host B web browser C website
32. Although Google is the most popular … in the world, it is not the only one.
A hyperlink B website C search engine
33. He only wanted the face to appear on the photo, so he … it.
A resized B adjusted C cropped
34. I love her use of … , between light and darkness, in her photographs.
A contrast B exposure C graphics
35. The small size of … makes them invisible to the naked eye.
A pixels B graphics C images
36. Spreadsheets usually contain a number of supplied … , such as arithmetic operations and statistical
functions.
A operators B database fields C functions
37. The … has eased the increasing difficulties in designing, building, and maintaining complex information
systems.
A formula B operator C database
38. On table worksheets, you can … columns either individually or in groups.
A perform B sort C analyze
39. Candidates must have extensive experience in web design and … .
A visibility B usability C navigation
40. There is a huge demand for people skilled in every area of e-commerce, especially … .
A functionality B navigation C Web Development
41. Your website is quite dull. Why don’t you give it a more interesting … ?
A appearance B content C visibility
42. A graphic designer may use typography, visual arts, and … techniques to produce his final result.
A page layout B electronic pages C desktop publishing software
43. Programs such as Adobe InDesign, Microsoft Publisher, and Scribus are only some … .
A graphic designs B page layouts C desktop publishing software
44. If you want to use an extra picture use … .
A offset lithography B comprehensive layout C clip art
45. A webcam’s most popular use is the establishment of video links, permitting computers to act as
videophones or … stations.
A echo-cancellation B videoconference C bandwidth
46. The wider the … , the faster data can be sent.
A monitor B video bridge C bandwidth
47. My new laptop has a built-in … , so now we can communicate via Skype.
A monitor B webcam C bandwidth
48. When you select an item online, you can place it into a … , continue browsing and pay for it later.
A shopping cart B banner C page view
49. On a website, you can find many complex … , which can be advertisements with text, animated graphics,
and sound.
A banners B digital certificates C page views
50. Nowadays, using … is as safe as handing your credit card over at a store or restaurant.
A traffic B certificate authority C e-commerce
Key
1C 2B 3A 4A 5B 6A 7C 8C 9A 10 C 11 B 12 B 13 C 14 A
15 A 16 C 17 B 18 C 19 C 20 B 21 A 22 A 23 B 24 B 25 C 26 C 27 C 28 B
29 A 30 B 31 B 32 C 33 C 34 A 35 A 36 C 37 C 38 B 39 B 40 C 41 A 42 A
43 C 44 B 45 B 46 B 47 B 48 A 49 A 50 C
Book 2
Unit 01 Computer Memory
Video: Computer Terms – Processors and Memory
Fill in the blanks with the words below.
purchase optical cores read faster technology
Special Agent Nikolaos Contaxakis gives his advice on what 1) _________ terms one should be aware of,
prior to buying a new computer. A buyer can 2) _________ a dual core or quad core for their computer. Mr.
Contaxakis explains that the more 3) _________ the computer has, the more brain power it has. Regarding the
speed of the processor, the more gigahertz that are available are 4) _________ it will work. Also, the larger
the hard drive the more information can be stored on it. Lastly, the 5) _________ drive, otherwise known as a
CD or DVD drive, is the section of the computer that allows it to 6) _________ movies or regular music.
Key
1 technology 2 purchase 3 cores 4 faster 5 optical 6 read
Unit 04 Storage Devices
Video: How to Back Up Your Data
Fill in the blanks with the words below.
available consistently versions files program network
Backing up is the only way for a user to make sure that their 1) _________ are safe. If a user wants to back up
2) _________ and regularly then this should be left to the professionals. Apple’s built-in app called Time
Machine is a good example of a 3) _________ that can backup files regularly and even provide different 4)
_________ . Users can also do this process manually, but they should remember to back up their settings,
shortcuts and all the applications they have installed. Some of the equipment 5) _________ for manual
backups are USB keys, a portable external hard drive, and a NAS, otherwise known as a 6) _________ -
attached drive.
Key
1 files 2 consistently 3 program 4 versions 5 available 6 network
Unit 08 Communications
Video: Text Messaging – A New Form of Communication
Mark the following statements as True or False.
1. Mobile devices are becoming a lot easier to manipulate, allowing fast and instantaneous communication.
True / False
2. In the past, text messages dictated cellular phone use. True / False
3. Only teenagers send text messages, adults have no use for it. True / False
4. A recent study showed that the abbreviated sentences in texts are a regression of language. True / False
5. In a standard phone you have about 340 characters for each text message. True / False
6. Even in their abbreviated form, texts still allow people to catch the exact meaning. True / False
Key
1T 2F 3F 4F 5F 6T
Unit 09 Entertainment and Social Networking
Video: Social Video Games
Choose the correct answer.
1. What are Madden Superstars and Restaurant City?
A veterans B companies C projects D social network games
2. When was Playfish formed?
A 1997 B 2007 C 1207 D 1987
3. For which company did Playfish start making games for?
A Glu Mobiles B Facebook C EA D Space
4. What attribute has EA that benefits Playfish in their relationship?
A EA has a very strong publishing business.
B EA is successful in the connected digital downloaded game space.
C EA has a lot of social games.
D EA can launch a game in two years.
5. What is the distinguishing factor of Playfish games?
A they are social by nature B they grow virally C they are tied to social media sites D they build
their own momentum
6. In which of Playfish’s games can you trade players with your
A Connecting Friends B Restaurant City C Madden D Social Network
Key
1D 2B 3B 4A 5A 6C
Unit 15 Banking
Video: How to Stay Safe Online – Internet Security
Fill in the blanks with the words below.
instructions privacy vulnerabilities protect check bank
Although doing business online can be quick and easy, there are certain internet threats that could risk the
user’s 1) _________ and security. The main risk is identity theft. Although online security companies try their
best, new 2) _________ evolve each year. The best way for a user to 3) _________ their identity is to learn
about the technology. For example, when using a wireless access point, they should read the 4) _________
and security settings. Also, when giving out credit card details, the user should always 5) _________ out the
company. And, if their details are stolen, they should report it to the police and their 6) _________
immediately.
Key
1 privacy 2 vulnerabilities 3 protect 4 instructions 5 check 6 bank
Revision Test
Choose the correct answer.
1. On a … , the connections on each side of the module connect to different chips, which allows for a wider
path as more modules can be accessed at once.
A DIMM B SIM C RAM
2. My laptop has a … of 32 bits.
A bit size B motherboard C virtual memory
3. Some memory can be stored in physical RAM chips while other memory is stored on a … .
A bus speed B hard drive C motherboard
4. With … , the computer can look at RAM for areas that have not been used recently and copy them onto the
hard disk, and this frees up space in RAM to load the new application.
A MB B virtual memory C paging file
5. He ran his code through the … .
A linker B Java C compiler
6. … is a computer programming language which enables programmers to write computer instructions using
English based commands, instead of having to write in numeric codes.
A BASIC B CPU C Java
7. The … is the most important element of a computer system where most calculations take place.
A CPU B Assembler C machine code
8. There are Wi-Fi … in all the cafes in the city center.
A routers B hotspots C modems
9. It’s not so difficult to … the indexing software.
A upgrade B protect C access
10. Internet connection via … offers many advantages.
A broadband B ISP C modem
11. No matter how useful … can be, it can sometimes have drawbacks as it can impair a computer’s
performance.
A Wi-Fi B ISP C antivirus software
12. While … drives still have some limited uses, they have been replaced by data storage methods with much
greater capacity, such as USB flash drives.
A RAID B floppy disk C SATA
13. A … is a writable disc that is capable of having information written on the disc once.
A CD-RW B CD-R C USB flash drive
14. Due to the drive … , I have lost all of my latest data since I hadn’t used a backup.
A array B SATA C failure
15. Instead of having so many separate drives to deal with, why not put them together into one big drive? You
can use … software to accomplish this.
A magnetic tape B data compression C RAID
16. Those of you who don’t like computers or are unsure about photo editing software, then the … function
will enable you to get an accurate shot of the specific area you wish to photograph.
A digital zoom B megapixel C flash memory
17. My new smartphone has a 3.1 … built-in camera.
A DPI B megapixel C laser
18. Digital cameras need a(n) … to draw the image closer.
A optical zoom B digital zoom C laser printer
19. If you really want to take good quality pictures, buy a … !
A digital camera B transparency adapter C laser printer
20. Computers tend to … when too many programs are open at once.
A decode B upload C freeze
21. Once you are happy with your selected files, click … to continue.
A freeze B decode C upload
22. The number of songs that your MP3 player can potentially store is not only determined by its memory … ,
but also by the bit rate of your MP3 tracks.
A driver B capacity C dock
23. The radio station is confident that the new … will definitely please listeners.
A play lists B drivers C MP3s
24. I took a quick picture with my mobile phone and sent it by … to my laptop.
A Bluetooth B caller ID C touchscreen
25. He sent me a(n) … to say he would be arriving late.
A ringtone B app C text message
26. My cell phone came with 40 optional … .
A voicemails B apps C ringtones
27. The scanner at the checkout can pick up the different … on the packets ad charge the correct amount.
A emails B barcodes C PDAs
28. I can be contacted either by … or fax.
A email B EPC C spam
29. I get a lot of … at work which is quite annoying.
A instant-messages B barcodes C spam
30. Click on this … to visit our online shoe store.
A profile B blog C link
31. Most businesses now use … to spread their message.
A feeds B social networkings C avatars
32. She posted the pictures on her Facebook … .
A feed B profile C forum
33. At these … the sun doesn’t rise at all during the winter.
A waypoints B positions C latitudes
34. Don’t panic! Just look at your GPS and tell me your exact … .
A position B longitude C coordinates
35. In recent years, map production has been achieved through digital … .
A navigation B accuracy C cartography
36. This new law tries to protect consumers against … and credit card fraud.
A identity theft B account activity C lockouts
37. Never reveal your … to others for security reasons.
A PIN B SSL connection C bill pay
38. … has made our lives much easier as now we can access our savings and loan accounts from home or
office computer.
A Bank fraud B Online banking C Account activity
39. If you want to access … , please visit the electronic library resource’s page for more information.
A subscriptions B ejournals C boolean operators
40. The issue concerning bank fraud has been much discussed in the … .
A subscriptions B media C catalogs
41. I still don’t know why my firm’s … has not authorized my access to the network.
A EZproxy B media C VPN
42. Robots need to pick up, modify or destroy things and they do these with the … .
A actuator B pendant C manipulator
43. A(n) … robot may go for extended periods of time without human interaction.
A enabling B serial C autonomous
44. … are like the “muscles” of a robot which convert stored energy into movement.
A Actuators B Pendants C Manipulators
45. You can … free games on this site.
A download B upload C reflow
46. The … of the new office furniture have reduced back problems and eyestrain among the computer users.
A bitmapped graphics B system requirements C ergonomics
47. The most common type of … is based on technology known as TFT.
A ergonomics B active matrix display C PDF reader
48. An intelligent … is a system that perceives its environment and takes actions which maximized its chances
of success.
A computer vision B algorithm C agent
49. His … that he is different from most others makes him feel uncomfortable.
A heuristics B consciousness C pattern recognition
50. When intelligent … are sent into hazardous situations, fewer human lives are put at risk.
A robots B agents C algorithms
Key
1A 2A 3B 4B 5C 6C 7A 8B 9 A 10 A 11 C 12 B 13 B 14 C
15 C 16 A 17 B 18 A 19 A 20 C 21 C 22 B 23 A 24 A 25 C 26 C 27 B 28 A
29 C 30 C 31 B 32 B 33 C 34 A 35 C 36 A 37 A 38 B 39 B 40 B 41 C 42 C
43 C 44 A 45 A 46 C 47 B 48 C 49 B 50 A
Book 3
Unit 01 Macs® and PCs
Video: The History of Apple
Choose the correct answer.
1. Until what date did the Apple ɪ remain on the market?
A 1980 B late 1977 C 1976 D June 1983
2. What did the company establish more of, than any other company before it?
A home computers B pioneering technology C millionaires D computer shows
3. With which people did the Mac brand NOT become standard use?
A artists B producers C accountants D video and movie people
4. What did Steve Jobs introduce in December 1997?
A the iMac B iTunes C the online Apple Store D his new company
5. What product changed the cell phone landscape?
A the iPad B the iPhone C the iPod D Wi-Fi
6. In which year did Steve Jobs resign as CEO?
A 2011 B 2007 C 2010 D 1998
Key
1B 2C 3C 4C 5B 6A
Unit 06 Telecommuting
Video: What Is VoIP1
Choose the correct answer.
1. What does VoIP stand for?
A internet telephony
B MSN voice chat
C Voice over Internet Protocol
D voice communication technology
2. What is the biggest advantage of using VoIP?
A there are no voice mail options
B low cost or even free long distance phone calls
C you need a high speed internet connection
D you can use a dial-up connection
3. What is one of the problems of using VoIP, if the internet connection is not reliable?
A you can’t make long distance calls
B the person will sound like they are stuttering
C you can’t listen to your voice mail
D you password will be rejected
4. Which one of the following is NOT a voice mail option on VoIP?
A dialing your number and listening to your messages
B voice mail can be sent to you as an attachment
C to have a voice recognition text sent to your SMS device
D to have a voice recognition text sent to you as an email
5. What is Find Me/Follow Me?
A a soft phone
B a hard phone
C a forwarding function
D a cell phone
6. What does a soft phone sound like?
A like a dialed phone
B like a configured phone
C like an installed telephone
D like a regular telephone
Key
1C 2B 3B 4D 5C 6D
Unit 08 Identity Theft
Video: How Facebook Can Lead to Identity Theft
Fill in the blanks with the words below.
essentials machine networking online potentially problem
There are many online dangers in social 1) _________ . If you go on to a site like Limewire, where there are a
lot of Trojan Horses, you can 2) _________ give the power to someone to go inside your 3) _________ and
take any personal information. These sites are great but the 4) _________ is that people talk too much,
without even knowing who is in front of them. You need to use common sense. To be safe 5) _________ you
need to protect your router, and if you go on the internet you need a firewall. Those are the 6) _________ :
firewall, antivirus and common sense.
Key
1 networking 2 potentially 3 machine 4 problem 5 online 6 essentials
Unit 10 Anti-virus Software
Video: Computer Software Malware Protection and More
Mark the following statements as True or False.
1. Most computers come with an operating system, such as Windows. True / False
2. Microsoft Office for Macintosh includes email and messenger software. True / False
3. Most computers also come with Malware Protection, which protects the computer from viruses, spam and
Trojans. True / False
4. Norton 360 is a complete protection package which also offers online back ups. True / False
5. Kaspersky is Norton’s biggest competitor because it offers the exact same things except system tune ups.
True / False
6. McAfee Anti-Virus Plus is the most complete anti-virus program out of the three and the most popular.
True / False
Key
1T 2T 3F 4T 5F 6F
Revision Test
Choose the correct answer.
1. This software can easily be … to your students’ needs.
A processed B printed C customized
2. Publishing industries use the … process for the creation of a print layout and for the final printing.
A color matching B prepress C speed
3. … best-known hardware products are the Mac® line of computers, the iPod®, the iPhone® and the iPad®.
A Apple’s® B Microsoft’s® C Windows’®
4. … is the world’s largest software maker measured by revenues and one of the most valuable companies.
A Apple® B Microsoft® C Windows®
5. My office computer has a network … , which allows me to get to other computers.
A interface B vendor C open-source
6. Most mainframe computers and supercomputers run on … , which is a free operating system.
A Linux® B TCP/IP protocol C open source
7. A computer … not only allows the user to connect with data saved on a hard disk, but also to the wealth of
information that is found on the Internet.
A command line B terminal C vendor
8. Advanced computer users prefer … interfaces as they are much easier to automate via scripting.
A Samba® B command line C open source
9. There is a useful control … which can be used to center the picture.
A anchor B CAD C applet
10. The new generation of LCD monitors has a built-in … which enables you to copy a movie or music to a
USB flash drive.
A electronic bulletin board B DVD C media player
11. They brought me a … of ‘Twilight’ for my birthday.
A DVD B applet C media player
12. Should you come up against any problem whatsoever, you can consult the … on our website.
A CBT’s B MPEG’s C FAQ’s
13. Ads that are … may be more expensive, but they are more visible once the page has loaded.
A above the fold B geo targeting C click tracking
14. … is an Internet marketing formula where advertisers will pay Internet publishers based on the number of
clicks a specific ad gets.
A CPC B CPM C Geo targeting
15. The program has a bug that can … the system.
A click B track C hang
16. The group has continued to invest substantial amounts in the development of its … application software
packages.
A fault tolerant B open system C integrated circuit
17. The … uses the newest software and hardware.
A latency time B Ethernet network C embedded system
18. The concept has been developed to create variable voltage levels that can be measured using … .
A encoders B automation C oscilloscopes
19. Every weekend I talk my sister who lives abroad via … .
A Skype™ B Basecamp® C message board
20. Select the function you want by pointing to the … with the mouse and then click on it.
A toggle B gallery C message board
21. The things I sometimes read on the … of this site are so funny!
A dashboard B gallery C message board
22. The main line graph in the … shows daily traffic to our site over the past ten days.
A message board B dashboard C Basecamp®
23. You can always … by using your name and password.
A infect B log in C replicate
24. Computer viruses … themselves and are passed along from user to user.
A infect B log in C replicate
25. Viruses have … our computer network.
A hacked B replicated C infected
26. Several … have attempted to gain access to files in the computer network at the Pentagon.
A hackers B resident viruses C hosts
27. I got a … in my email and now my computer has crashed.
A worm B Trojan horse C scanner
28. Nowadays, anyone can become a victim of … due to advanced technology.
A malware B warm C fraud
29. Email users are being bombarded with authentic-looking messages that instruct them to provide personal
information. This is called … .
A pretexting B phishing C spyware
30. Parents can use a … to track what their children do on the Internet.
A popup B keylogger C firewall
31. … can be implemented in both software and hardware and can be used to prevent unauthorized Internet
users from accessing private network.
A Patches B Keyloggers C Firewalls
32. A … was what caused the company’s computer system to crash.
A bug B patch C backdoor
33. Investigators can now … cyber crime.
A secure B sweep C detect
34. You should always make a … of all your important files.
A webpage analysis B backup C rootkit
35. You definitely need to install … which can detect, prevent, and remove any malware.
A webpage analysis B anti-virus software C malicious software
36. Nowadays, as more aspects of daily life move online, organizations use … to accelerate mobile content,
video, games and so on.
A CDN B private clouds C pay as you go
37. Google took … a step further by offering free spreadsheet software over a browser.
A cloud computing B deployment C SaaS
38. Cloud computing offers more … than normal computing.
A deployment B PaaS C scalability
39. Doctors can now operate in very small areas by using … .
A implanted microchips B optic scanners C micro robotic tweezers
40. Many doctors use … systems, which decrease delay in order completion, reduce handwriting errors, and
provide error-checking for incorrect doses.
A EMM B CDSS C CPOE
41. Doctors can easily read and record information on medicine labels and match patients to their medicine by
using … .
A implanted microchips B bar coding C micro robotic tweezers
42. My brother’s computer has a network … , which allows him to get to other computers.
A keyword B interface C mask
43. They will … their website in order to attract more customers.
A redesign B mask C comply
44. He deleted his … this morning since he thought it was too silly!
A trust logo B keyword C blog
45. She sent her … to so many companies, but unfortunately she didn’t even get an interview.
A system administrator B cover letter C résumé
46. Tom, can you please help me … this software?
A maintain B install C archive
47. Some software can easily be … in order to prevent kids from giving out their phone numbers on the
Internet.
A configured B installed C tuned
48. She works as a … for a major firm.
A web developer B decipher C script
49. For many years, airline reservations have been handled by … computer systems.
A visual B interactive C user-friendly
50. This is the most … personal computer on the market.
A visual B interactive C user-friendly
Key
1C 2B 3A 4B 5A 6A 7B 8B 9C 10 C 11 A 12 C 13 A 14 A
15 B 16 B 17 C 18 C 19 A 20 A 21 C 22 B 23 B 24 C 25 C 26 A 27 A 28 C
29 B 30 B 31 C 32 A 33 C 34 B 35 B 36 A 37 A 38 C 39 C 40 C 41 B 42 B
43 A 44 C 45 C 46 B 47 A 48 A 49 B 50 C