E REVISION AND PRACTICE 5 U L These are the key words you have met in this Module. VOCABULARY M O D UNIT 1 addiction all thumbs app billboard browser built-in camcorder client-server to expose face-to-face to face to fade to figure out to foster interactivity layers network outfitted peer to peer to pioneer to pop up to shift storage device to tag to tweet word of mouth UNIT 2 ancestor awareness arrow keys brand busbar byte client code connection cookie cursor domain dot to drag fixed-line formerly hacker inch interface to map mark-up middleman on hand pace piracy pixel property right protocol recycle bin registered relay chat row to scroll server shipment smart phone source stand-alone string to surf to switch on tablet toolbar towering expertise trademark trash can user-friendly valves via wastebasket waves wireless UNIT 3 artwork ATM (Automatic Teller Machine [AmE]) auction barcode reader to be in charge of booming briefs cardholder cash machine [BrE] committed consultancy cross-promotional e-flyer encryption endorsement free-lance fund to grab to implement junk on the move to perform scrambling system spam sponsorship techsavvy transaction trend usability value-added Complete the sentences by using some of the words above. a. A group of computers linked together in order to share resources and files/data is called a ........................... b. c. . A network with one powerful computer that takes charge of the network is called a ........................... network. ........................... are pieces of texts that websites put onto your hard disk drive when you visit them, in order to record the details of your navigation. d. A ........................... is a piece of computer equipment, usually in binary form, where data and instructions can be saved. e. ........................... are software packages that enable a user to find and read hypertext files. f. ........................... are people who, through a personal computer, break into the computer system of a company or government. g. ........................... can be defined as the unauthorized use or appropriation of patented or copyrighted material or ideas. h. In a computing context, to ..................... is to move text up and down on a screen in order to view text that cannot be contained within a single display image. i. A communication system based on broadcasting electromagnetic waves is known as ........................... . j. The unwanted e-mail, usually of commercial nature, sent out in bulk is called ........................... . Match each term with its definition. ancestor artwork barcode to grab e-learning encryption endorsement sponsorship trademark user-friendly a. The use of computers for education and training. b. Any procedure used in cryptography to convert plain text into cipher text in order to prevent ............................................... any but the intended recipient from reading that data. 204 ..........................................