Об по Тело вопроса варианты ответов


A + destruction of information B



бет6/22
Дата11.12.2019
өлшемі193,84 Kb.
#53427
1   2   3   4   5   6   7   8   9   ...   22
Байланысты:
Информационно-коммуникационные технологии (ИКТ ВОУД 2019) 145 150 150 (1)
6 сынгып, stud.kz-53359, Педогогикалық зерттеу (1)

A

+

destruction of information

B




packers

C

+

accessibility violation (blocking) of information

D




computer worms

E




theft (copying) of information

F




«trojan horses»

G




hacking

77

Т




The third generation of mobile technology includes:

A

+

video telephony

B




cooking

C




washing

D




voice call

E

+

IP-telephony

F




robotics

78

Т




A computer system designed for searching information:

A

+

informational systems

B




Office suites programs

C




databases

D

+

The search engine

E




Operating systems

F




ERP systems

79

Т




The decimal number 99 in hexadecimal:

A




2B90

B

+

63

C




56

D




13A

E




783

80

Т




Decimal number corresponds to the binary number has the form:

A






B

+



C






D






E






F






G






81

Т




The element of application window, which contains tabs with logically grouped commands in the database:

A

+

Quick Access Toolbar

B




Buttons to manipulate the window

C




Ribbon

D




Statusbar

E

+

Title bar

82

Т




The information selected and concluded on the information carrier is:

A




signs

B




signals

C




knowledge

D




programs

E

+

data

83

Т




Network diameter is

A

+

the amount of information that can be transmitted on the network per time.

B




a computer in the network which is able to work with the data an the network resource.

C




a computer which controls the network and gives users access to their network resources.

D




the shortest distance between the two most distant nodes in the network.

E




a network in which the computer are located within a room, building or nearby building.

84

Т




Types of User Interface:

A




VR interface

B




Technical interface

C

+

Graphical interface

D




Command-line interface

E




Microsoft interface

F




Internet interface

G




SILK-interface

85

Т




What types of computer threats exist?

A




Psychological threats

B




Safety

C




Hardware

D




Antivirus

E




Crawlers

F

+

Worms

G




Password

H




Blockers

86

Т




Components contained in modem integrated application packages:

A




Word processor

B




Internet

C




Oracle

D




Table processor

E

+

Database management system

F




MySQL

87

Т




«Machine translation systems» is:

A




a Text Processor

B




a software for processing electronic tables

C




Middleware

D

+

a sub-field of computational linguistics that investigates the use of software to translate text or speech from one language to another

E




Antivirus software

F




an operating systems

G




an utility software

88

Т




Which application’s file can be imported into Access Database:

A




PaintFiles

B

+

Excel Files

C




Word Files

D

+

HTML Files

E




PowerPoint File

89

Т




A compact disc (CD) can store computer's data over

A




  1. ТВ

B

+

over 500 GB

C




Human Can Interact

D




over 680 MB

E

+

over 200 MB

F

+

over 590 MB

90

Т




Subsystems of an Information Security System:


Достарыңызбен бөлісу:
1   2   3   4   5   6   7   8   9   ...   22




©engime.org 2024
әкімшілігінің қараңыз

    Басты бет