D
|
active services
|
E
|
|
only picture
|
F
|
+
|
broadcasting services
|
G
|
|
voice
|
17
|
Т
|
|
Choose howto classify information security threats
|
A
|
+
|
computer worms
|
B
|
|
hacking
|
C
|
+
|
«trojan horses»
|
D
|
+
|
theft (copying) of information
|
E
|
|
packers
|
F
|
|
destruction of information
|
G
|
|
accessibility violation (blocking) of information
|
18
|
Т
|
|
Mobile technology which based on digital technology:
|
A
|
+
|
3G.
|
B
|
+
|
2G.
|
C
|
|
Virtual reality.
|
D
|
|
Cloud technology.
|
E
|
|
Data storage system.
|
F
|
|
Public cloud.
|
G
|
+
|
4G.
|
H
|
|
1G.
|
19
|
Т
|
|
FTP means:
|
A
|
|
Downloading sites and other documents from a private development device to the monitor
|
B
|
|
File Transitive Protocol
|
C
|
|
File Transportation Protocol
|
D
|
|
Downloading sites and other documents from a private development device to a shared hosting server.
|
E
|
|
Format Transfer Protocol
|
F
|
|
File Transfer Protocol
|
G
|
+
|
Functional Transfer Protocol
|
20
|
Т
|
|
Choose the most popular platforms for B2B:
|
A
|
+
|
ALL.BIZ
|
B
|
|
VKontakte
|
C
|
|
Twitter
|
D
|
|
YouTube
|
E
|
|
Facebook
|
F
|
+
|
Alibaba
|
G
|
+
|
Instagram
|
21
|
Т
|
|
Bitmap graphics formats include:
|
A
|
|
JPEG, TIFF, PCX.
|
B
|
|
RAW, TXT
|
C
|
+
|
GIF, BMP
|
D
|
|
GIF, DOC,TIFF
|
E
|
|
RAW,PNG
|
22
|
Т
|
|
In computer technology, there are several types of interfaces:
|
A
|
+
|
Programming Interface.
|
B
|
|
Human-computer interaction.
|
C
|
|
Software interface.
|
D
|
|
Computer Network interface
|
E
|
+
|
Usability interface.
|
F
|
+
|
User interface.
|
G
|
|
Hardware interface.
|
H
|
|
Procedural interface
|
23
|
Т
|
|
Choose a state program in Kazakhstan one of the goals is creation of necessary infrastructure for development of payment systems and logistics
|
A
|
+
|
Social Development of Kazakhstan 2020
|
B
|
|
Innovative Kazakhstan 2020
|
C
|
|
Kazakhstan for business 2020
|
D
|
+
|
E-leaming Kazakhstan
|
E
|
|
Technical State
|
F
|
|
New Kazakhstan 4.0
|
G
|
+
|
Educated Kazakhstan 2020
|
24
|
Т
|
|
Algorithms for solving classification problems
|
A
|
|
on finding the minimax
|
B
|
|
using tuple classification
|
C
|
|
machine learning
|
D
|
+
|
using DT
|
E
|
+
|
Rule-based
|
F
|
|
On the securities portfolio
|
G
|
+
|
data clustering
|
25
|
Т
|
|
Used for computer to connect the telephone system is:
|
A
|
|
keyboard
|
B
|
|
scanner
|
C
|
|
Plotter
|
D
|
|
hard drive
|
E
|
|
monitor
|
F
|
+
|
modem
|
G
|
|
Hard disk
|
H
|
|
printer
|
26
|
Т
|
|
The main varieties of virtualization are:
|
A
|
+
|
application virtualization
|
B
|
|
user virtualization
|
C
|
+
|
server virtualization (paravirtualization and full virtualization)
|
D
|
|
data virtualization
|
E
|
|
virtualization at the level of operating systems
|
F
|
|
device virtualization
|
27
|
Т
|
|
Methods used in the data analysis
|
A
|
|
Information space
|
B
|
+
|
Cluster Analysis
|
C
|
|
Crowdsourcing
|
D
|
|
Classification
|
E
|
|
Functions in programming languages
|
28
|
Т
|
|
Examples of web browser
|
A
|
+
|
Chrome
|
B
|
|
Panel
|
C
|
|
Browser
|
D
|
+
|
Firefox
|
E
|
|
IP
|
F
|
|
ISP
|
29
|
Т
|
|
By data models, databases are divided into:
|
A
|
|
Static model
|
B
|
+
|
Relational model
|
C
|
|
Local modal
|
D
|
+
|
Hierarchical model
|
E
|
|
Dynamic model
|
F
|
+
|
Network model
|
G
|
|
Numerical model
|
30
|
|