0% found this document useful (0 votes)
60 views2 pages

Quiz 3 Adv 2

The document is a quiz that assesses knowledge on technology, specifically focusing on the LifePhone and spam emails. It includes multiple-choice questions, true/false statements, and fill-in-the-blank exercises. The total score for the quiz is out of 50 points.

Uploaded by

Jamal Morelli
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views2 pages

Quiz 3 Adv 2

The document is a quiz that assesses knowledge on technology, specifically focusing on the LifePhone and spam emails. It includes multiple-choice questions, true/false statements, and fill-in-the-blank exercises. The total score for the quiz is out of 50 points.

Uploaded by

Jamal Morelli
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Name: _______________________________________________

Unit3Quiz Date: ------------------------------- Score: _ _ _ __

A Listen to an advertisement. Then check (.f) true or false. A


True False _/10 points
1. The LifePhone only checks your e-mail and plays games. D D (2 points each)
2. The LifePhone won't confirm your appointments. D D
3. The LifePhone makes reservations at restaurants. D D
4. You can use the LifePhone to find a baby-sitter. D D
5. The LifePhone can't help you if you're in an accident. D D

B Circle the words that best complete each sentence. B


1. Technology /The technology is making people's lives both easier and more complicated. _/6points
2. A /The cell phone in japan can read bar codes and give tourist information. (1 point each)

3. Blogs /The blogs are being used for many different purposes these days.
4. Wireless computing depends on a I the signal from a wireless router.
5. The I A first personal computers were very large and heavy:
6. Online communication I The online communication may replace the cell phone one day.

C Complete the sentences with words from the box. c


audacious _/6points
frivolous prudent
confidential hazardous unethical (1 point each)

1. Many batteries were recalled because they were causing fires.


2. Imitating another company's products is but not illegal.
3. Security laws assure that information on banking websites is ______________
4. The company presented technology that shocked the public.
5. Owning five gadgets to keep track of your life seems _______________
6. It's to be sure your credit information is secure.

D Read each pair of sentences. Then complete the sentences below with an -ing clause. D
Example: I was talking on the phone to a classmate. I typed our class project. _/10points
\""l\:.i\\!,1 O\\ t-he pho\\e to a classmate, I typed our class project. (2 points each)

1. I am terrible with computers. I break my laptop all the time.


_ _ _ _ _ _ _ _ _ _ _ , I break my laptop all the time.
2. My printer died. It was printing out my dissertation.
My printer died _____________
3. I entered my phone number on an insecure website. I received hundreds of calls.
----------------------- on an insecure website, I received hundreds of calls.

T-216 © Cambridge University Press 2008 Photocopiable


4. I am at an Internet cafe. I am checking my e-mail.
I am at an Internet cafe _ __ __ _ __ _ _ __
5. I typed an e-mail. I clicked "send" and lost it.
_ __ _ ________ , I clicked "send" and lost it.

E Circle the expressions that best complete each sentence. E


1. I can't live without my laptop. I've become very reliant on I suspicious ofit. _/8 points
2. I'm crazy about I intimidated by new phones that have features I don't know how to use. (1 point each)

3. I'm fed up with I knowledgeable about my new laptop. I keep having to get it fixed.
4. I'm sick ofI curious about digital photography, but I always use my old film camera.
5. People are leery of/fed up with eye surgery, but today the technology is safe.
6. I'm knowledgeable about I aware ofthe new software, but don't understand it.
7. My cell phone wasn't always necessary before, but I'm now leery of/ reliant on it.
8. I thought I would never use my MP3 player, but now I'm crazy about I aware of it.

F Read the article about spam. Then check (J') true or false. F
_/10 points
What's for breakfast? Spam! (2 points each)
Many people, after they've brewed their morning coffee and turned on their computer, face an inbox
full of spam. Getting rid of spam is increasingly cutting into workers' productivity, and spammers are
finding new ways to get past the filters set up to block their messages.
Spammers use tricks to avoid being trapped by e-mail spam filters, or programs designed to block
spam. The first clue to a spam e-mail is the name of the sender. Names like Briskie Meltdowns seem
human to spam filters, even if they seem fake to people. Also, fake e-mail addresses such as
[email protected] show that the sender simply typed letters and numbers at random to
generate the address. In addition, the subject line is usually something that seems like a phrase, but it
doesn't make sense, such as "Innocent playtimes courage!"
Experts offer this advice for avoiding spam: Open a free e-mail account just for spam. Use this
address whenever you are unsure about the privacy policy of the website you are using. Use your
personal e-mail account only for companies you trust. Never click on a link in a spam e-mail message
that reads, "Click here to unsubscribe." This only confirms to the spammers that your e-mail address
is valid.

True False
1. Spammers use real names to avoid being trapped by filters. 0 0
2. Spammers use randomly generated e-mail addresses. 0 0
3. The subject line of spam seems logical, but it isn't. 0 0
4. To manage spam, use your personal e-mail address. 0 0
5. Clicking links in spam confirms your e-mail address. 0 0

Total:
_out of 50

© Cam bridge University Press 2008 Photocopiable T-217

You might also like