You are on page 1of 2

Unit 8 test

Name: __________________________________________ Date: ___________

1 Choose the correct words in italics.


1 I might / must lose my work because I haven’t backed up my files.
2 We aren’t allowed to / shouldn’t use social networking sites at work.
3 You mustn’t / mightn’t put your cup of coffee on the computer.
4 They aren’t mustn’t / permitted to share their passwords with anyone.
5 You not allowed / shouldn’t use your date of birth as a password.
6 We are permitted / might have a virus in the system.
7 Employees shouldn’t / aren’t allowed to eat lunch at their desks.
8 You mustn’t / aren’t permitted to disconnect the keyboard.
9 There should / may be a problem with the server. I’m not sure.
10 I might / can be able to repair your computer.

2 Write sentences with may or might.


You need to have an anti virus programme on your computer. Without it:

Examples:
you / get a virus You might get a virus.
the computer / crash The computer may crash.

11 the computer / not run properly _______________________________________________


12 you / lose some files _______________________________________________
13 you / not finish the work today _______________________________________________
14 you / have a big problem _______________________________________________

3 Rewrite these sentences using the words in brackets.


15 Don’t unplug the computer. (mustn’t)
________________________________________________________________________
16 Don’t move your computer when it’s on. (allowed)
________________________________________________________________________
17 Don’t clean the computer with polish. (mustn’t)
________________________________________________________________________
18 Don’t write personal emails. (permitted)
________________________________________________________________________

PHOTOCOPIABLE © 2011 Pearson Longman ELT 1


4 Complete these sentences with the words in the box. You do not need all the words.
adware biometric scanning browser hijacker encryption
firewall hacker malware attack spyware Trojan

19 A(n) ____________ is someone who tries to break into a computer system.


20 A program which is usually free but contains a virus is called a(n) ____________
21 An effort to get unauthorised access to a computer is called a(n) ____________ .
22 A(n) ____________ is software that replaces the user’s search engine with its own.
23 ____________ blocks authorised access.
24 Software that sends information about the use of a computer system is called ____________ .
25 ____________ is one way to make sure that only authorised people access the network.
26 ____________ is software that automatically plays commercials on a computer.

5 Choose the correct words in italics.


27 Did you transfer / install the latest software?
28 You must use / take secure protocols.
29 They didn’t notice / notify the supervisor about the problem.
30 My job is to report / follow any incidents immediately to the IT manager.

PHOTOCOPIABLE © 2011 Pearson Longman ELT 2

You might also like