D
|
Computer Disk Read Over Memory
|
E
|
|
Computer Disk Red Onto Memory
|
98
|
Т
|
|
RAM means:
|
A
|
|
Rapid Access Memory
|
B
|
+
|
Random Access Memory
|
C
|
|
Rigid Access Memory
|
D
|
|
Range Access Memory
|
E
|
|
Revolving Access Memory
|
99
|
Т
|
|
Choose the largest unit of storage among the followings:
|
A
|
|
Gigabyte
|
B
|
+
|
Terabyte
|
C
|
|
Megabyte
|
D
|
|
Kilobyte
|
E
|
|
Byte
|
100
|
Т
|
|
Which one of the following is not a network device:
|
A
|
|
Hub
|
B
|
+
|
CPU
|
C
|
|
Router
|
D
|
|
Switch
|
E
|
|
bridge
|
F
|
+
|
Central processing unit
|
101
|
Т
|
|
Choose an Operating System(s).
|
A
|
|
Microsoft Word
|
B
|
+
|
Microsoft Windows
|
C
|
|
Microsoft Excel
|
D
|
|
Microsoft Access
|
E
|
|
Microsoft Power Point
|
F
|
+
|
Linux
|
G
|
+
|
Mac
|
H
|
|
IPhone
|
102
|
Т
|
|
Computers on an Internet are identified by:
|
A
|
|
street address
|
B
|
+
|
IP address
|
C
|
|
e-mail address
|
D
|
|
Models of a computer
|
E
|
|
Users’ name
|
F
|
+
|
5.76.223.127
|
G
|
+
|
Internet Protocol address
|
H
|
|
Address
|
103
|
Т
|
|
The decimal number system consists of the following symbols:
|
A
|
|
0 .. 1
|
B
|
+
|
0..9
|
C
|
|
0..7
|
D
|
|
0..5
|
E
|
|
0..9, a..f
|
F
|
+
|
0,1,2,3,4,5,6,7,8,9
|
104
|
Т
|
|
The binary number system consists of the following symbols
|
A
|
|
0 ..9
|
B
|
+
|
0 and 1
|
C
|
|
0..7
|
D
|
|
0..5
|
E
|
|
0..9, a..f
|
F
|
+
|
10110011
|
105
|
Т
|
|
Communication:
|
A
|
|
keep track of data about customers, products, demographics and other information important to the business, uses secured mechanisms for storages
|
B
|
+
|
uses e-mails, publishes information on web, keeps in touch with stake holders via social networks, conference meetings avoids the need of physical availability of participants of the meetings
|
C
|
|
keep track of the financial status of the company on an annually, monthly or even day-to-day basis
|
D
|
|
shares resources, common database of files accessible for authorized members
|
E
|
|
Investigate new products, improve the quality of the existing products through effective research
|
F
|
+
|
is simply the act of transferring information from one place, person or group to another
|
106
|
Т
|
|
DNS in internet technology stands for:
|
A
|
|
Dynamic Name System
|
B
|
+
|
Domain Name System
|
C
|
|
Distributed Name System
|
D
|
|
Digited Name System
|
E
|
|
Delivered Name system
|
107
|
Т
|
|
Choose true statement(s).
|
A
|
|
Tan is smart card operating system
|
B
|
+
|
Smart cards and PCs use some operating system
|
C
|
|
The communication between reader and card is in full duplex mode.
|
D
|
|
Smart cards do not require an operating system
|
E
|
|
Computers on an internet are identified by e-mail address of user
|
F
|
+
|
An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.
|
G
|
+
|
Software, in its most general sense, is a set of instructions or programs instructing a computer to do specific tasks.
|
H
|
|
USB is the most important software that runs on a computer
|
108
|
Т
|
|
The hexadecimal number system consists of the symbols:
|
A
|
|
0..7
|
B
|
+
|
0..9, A..F
|
C
|
|
0..1
|
D
|
|
0..9
|
E
|
|
0..5, A..F
|
F
|
+
|
0,1,2,3,4,5,6,7,8,9 ,A, B, C, D, E … F
|
109
|
Т
|
|
Platform-as-a-service (PaaS) refers to:
|
A
|
|
Internet services that supply software applications
|
B
|
+
|
cloud computing services that supply an on-demand environment for developing, testing, delivering and managing software applications
|
C
|
|
Databases needed for development
|
D
|
|
software applications over the Internet
|
E
|
|
other datacenter infrastructure
|
110
|
Т
|
|
Multimedia Component(s):
|
A
|
|
Text, IP address, file size, file name
|
B
|
+
|
text, sound, images, animation, video
|
C
|
|
Internet
|
D
|
|
Talk
|
E
|
|
Graph
|
F
|
+
|
Animation, video
|
G
|
+
|
text, sound, images
|
H
|
|
Inter set
|
111
|
Т
|
|
SMART stands for:
|
A
|
|
Self-Managing Analysis and Regarding Technology
|
B
|
+
|
Self-Monitoring Analysis and Reporting Technology
|
C
|
|
Self-Meaning Analysis and Recording Technology
|
D
|
|
Safety-Monitoring Analysis and Recording Technology
|
E
|
|
Same-Monitoring Analysis and Recruitment Technology
|
112
|
Т
|
|
E-learning is .. .
|
A
|
|
learning face-to-face
|
B
|
+
|
comprises of distributed learning, network or web-based learning
|
C
|
|
learning with electronic text
|
D
|
|
learning on a computer
|
E
|
|
traditional learning
|
F
|
+
|
online learning
|
G
|
+
|
learning with internet
|
113
|
Т
|
|
The main function of E-Government:
|
A
|
|
the non-digital interaction among the Government, citizens, and the commercial institutions
|
B
|
+
|
the digital interaction among the Government, citizens, and the commercial institutions
|
C
|
|
the usual interaction among the Government, citizens, and the commercial institutions
|
D
|
|
The computer interaction among the Government
|
E
|
|
the interaction among citizens, and the commercial institutions.
|
F
|
+
|
E-government is defined as a way for governments to use the most innovative information and communication technologies, particularly web-based Internet applications, to provide citizens and businesses…
|
114
|
Т
|
|
TCP/IP is necessary if one is to connect to the:
|
A
|
|
LAN
|
B
|
+
|
Internet
|
C
|
|
Server
|
D
|
|
Phone lines
|
E
|
|
PAN
|
F
|
+
|
Computer networks
|
G
|
+
|
World wide web
|
H
|
|
LLN
|
115
|
Т
|
|
Google chrome is type of:
|
A
|
|
Compiler
|
B
|
+
|
Browser
|
C
|
|
IP address
|
D
|
|
Operating System
|
E
|
|
Database management system
|
F
|
+
|
Web browser
|
G
|
+
|
software program that allows a user to locate, access, and display web pages
|
H
|
|
Inter set
|
116
|
Т
|
|
POP3 and IMAP are e-mail accounts in which:
|
A
|
|
One does not need any telephone lines
|
B
|
+
|
One only has to be connected to the server to send and receive email
|
C
|
|
One automatically gets one’s mail everyday
|
D
|
|
One has to be connected to the server to read or write one’s mail
|
E
|
|
Some peoples must to be connected to the server to read or write one’s mail
|
F
|
+
|
Only one of the suggested must be connected to the server to send and receive e-mail
|
G
|
+
|
Only one of the suggested must be connected to the server to send and receive information by e-mail
|
H
|
|
Work without internet
|
117
|
Т
|
|
The following protocol(s) are used by e-mail clients to download e-mails to the computer:
|
A
|
|
FTP
|
B
|
+
|
POP
|
C
|
|
TCP
|
D
|
|
SMTP
|
E
|
|
http
|
F
|
+
|
SMTP
|
G
|
+
|
IMAP
|
H
|
|
HELLO
|
118
|
Т
|
|
2 Gigabyte is equal to:
|
A
|
|
1024 Kilobytes
|
B
|
+
|
2048 Megabytes
|
C
|
|
2048 Terabytes
|
D
|
|
2048 Bytes
|
E
|
|
2000 bits
|
F
|
+
|
17179869184 BITS
|
G
|
+
|
16777216 KILOBITS
|
H
|
|
11111110000 bits
|
119
|
Т
|
|
A Compiler is a software which converts:
|
A
|
|
words to bits
|
B
|
+
|
high level language to machine language
|
C
|
|
characters to bits
|
D
|
|
machine language to high level language
|
E
|
|
Digits to bits
|
F
|
+
|
computer code written in one programming language (the source language) into another programming language (the target language)
|
120
|
Т
|
|
Computer networks can be classified by considering which of the following aspect:
|
A
|
|
Local and wide area networks
|
B
|
+
|
The functional relationship
|
C
|
|
fault-tolerant features
|
D
|
|
Media Access Control (MAC) address
|
E
|
|
Data Link Control (DLC) address
|
F
|
+
|
Network Architectures
|
G
|
+
|
The scale
|
H
|
|
Empty
|
121
|
Т
|
|
The basis of Metropolitan Area Network (MAN) category :
|
A
|
|
Node
|
B
|
+
|
Scale
|
C
|
|
Network Topology
|
D
|
|
Area
|
E
|
|
Entity
|
F
|
+
|
Scope
|
G
|
+
|
Measure
|
H
|
|
Empty
|
122
|
Т
|
|
A personal area network (PAN) a computer network that will be useful in communicating computerizes devices such as:
|
A
|
|
Node and server
|
B
|
+
|
Telephones and PDAs
|
C
|
|
HUB and client
|
D
|
|
Firewalls and routers
|
E
|
|
Servers and clients
|
F
|
+
|
Telephones and Personal digital assistant
|
G
|
+
|
Telephones/Fax and Personal digital assistant
|
H
|
|
HBB and so on
|
123
|
Т
|
|
A computer network covering a small geographic area, like a home, office, or group of buildings is
|
A
|
|
Wide Area Network (WAN):
|
B
|
+
|
A local area network
|
C
|
|
Security area Network
|
D
|
|
Mobile handheld devices
|
E
|
|
Firewalls
|
F
|
+
|
LAN
|
124
|
Т
|
|
A group of computers and network devices connected across large physical areas such as states or countries is called:
|
A
|
|
The Web Site connection
|
B
|
+
|
Wide Area Network
|
C
|
|
Router Area
|
D
|
|
LAN
|
E
|
|
Broadcast area
|
F
|
+
|
WAN
|
125
|
Т
|
|
The WAN is:
|
A
|
|
Mozilla
|
B
|
+
|
any telecommunications network
|
C
|
|
Ethernet
|
D
|
|
Optical fiber
|
E
|
|
Home PAN
|
F
|
+
|
computer network
|
G
|
+
|
leased telecommunication circuits
|
H
|
|
Google
|
126
|
Т
|
|
A network that interconnects users with computer resources in a geographic area or region larger than that covered by a local area network (LAN) but smaller than the area covered by wide area network (WAN) is called:
|
A
|
|
Wireless LAN
|
B
|
+
|
Metropolitan Area Network
|
C
|
|
Home PNA
|
D
|
|
The Internet
|
E
|
|
Firewall
|
F
|
+
|
MAN
|
127
|
Т
|
|
Network topology`s category(ies):
|
A
|
|
Client-server networking
|
B
|
+
|
Tree or Hierarchical topology
|
C
|
|
Peer-to-peer (workgroup)
|
D
|
|
Ethernet
|
E
|
|
Personal Area Network (PAN)
|
F
|
+
|
the arrangement of the elements (links, nodes, etc.) of a communication network
|
G
|
+
|
the topological structure of a network and may be depicted physically or logically
|
H
|
|
Internet
|
128
|
Т
|
|
The basis of Active-Networking category:
|
A
|
|
Scale
|
B
|
+
|
Functional Relationship
|
C
|
|
Network topology
|
D
|
|
Home PNA
|
E
|
|
Client-server networking
|
F
|
+
|
Architecture
|
129
|
Т
|
|
Choose comparison operators used in a computer program.
|
A
|
|
---
|
B
|
+
|
>, >=
|
C
|
|
***
|
D
|
|
+++
|
E
|
|
….
|
F
|
+
|
<, <=
|
G
|
+
|
!=
|
H
|
|
123
|
130
|
Т
|
|
Convert 103 from decimal numeral system into binary.
|
A
|
|
01234
|
B
|
+
|
01100111
|
C
|
|
123
|
D
|
|
123456
|
E
|
|
0123
|
F
|
|
10100111
|
131
|
Т
|
|
The first message sent over the Internet.
|
A
|
|
Hello, world!
|
B
|
|
Internet
|
C
|
|
IP
|
D
|
+
|
Login
|
E
|
|
Welcome
|
132
|
Т
|
|
Choose elements of a cryptosystem.
|
A
|
+
|
Ciphertext
|
B
|
|
Node
|
C
|
+
|
Plaintext
|
D
|
+
|
Encryption
|
E
|
|
Host
|
F
|
|
Hardware
|
G
|
|
Software
|
133
|
Т
|
|
A network topology in which each network node (workstation or other device) is connected directly to each of the others.
|
A
|
|
Ring
|
B
|
+
|
Mesh
|
C
|
|
Bus
|
D
|
|
Star
|
E
|
|
Tree
|
134
|
Т
|
|
Cartridge of the printer is used to hold:
|
A
|
|
Paper
|
B
|
+
|
Toner
|
C
|
|
Laser
|
D
|
|
Ribbon
|
E
|
|
Pins
|
F
|
+
|
Liquid ink
|
135
|
Т
|
|
Sections of the document that appears in the top and bottom margins:
|
A
|
+
|
Footer
|
B
|
|
Indent
|
C
|
+
|
Header
|
D
|
|
Breaks
|
E
|
|
Scroll bar
|
F
|
|
Portrait
|
136
|
Т
|
|
Choose types of charts, which have circular shape.
|
A
|
+
|
Pie
|
B
|
|
Line
|
C
|
|
Radar
|
D
|
|
Area
|
E
|
+
|
Doughnut
|
F
|
|
Bar
|
137
|
Т
|
|
Choose a shortcut key used to paste.
|
A
|
|
CTRL+S
|
B
|
+
|
CTRL+V
|
C
|
|
CTRL+C
|
D
|
|
CTRL+A
|
E
|
|
CTRL+P
|
138
|
Т
|
|
A small program that is used to compress or decompress video or audio files.
|
A
|
|
Container
|
B
|
+
|
Codec
|
C
|
|
Compression program
|
D
|
|
File extension
|
E
|
|
Metadata
|
139
|
Т
|
|
Choose HTML tag(s) used to set a background of a web page.
|
A
|
|
B
|
+
|
|
C
|
|
|
D
|
|
|
E
|
+
|
|
F
|
|
|
140
|
Т
|
|
Choose commonly used database types.
|
A
|
|
Sequential
|
B
|
+
|
Hierarchical
|
C
|
|
Parallel
|
D
|
|
Matrix
|
E
|
|
Text-oriented
|
F
|
+
|
Relational
|
G
|
+
|
Network
|
141
|
Т
|
|
An advantage of ink-jet printers over laser printers:
|
A
|
|
Liquid ink is consumed faster than the toner
|
B
|
+
|
Ideal to print photo of high quality
|
C
|
|
Ideal to print a large amount of text documents
|
D
|
|
Ink dries more slowly
|
E
|
|
A higher printing speed
|
142
|
Т
|
|
Formulae in Excel are categorized as:
|
A
|
|
Main
|
B
|
+
|
Simple
|
C
|
|
Additional
|
D
|
|
Primary
|
E
|
|
Secondary
|
F
|
+
|
Complex
|
143
|
Т
|
|
MS-DOS command(s) used to move a file from one directory to another.
|
A
|
+
|
MOVE
|
B
|
|
COPY
|
C
|
|
DEL
|
D
|
|
RD
|
E
|
|
START
|
144
|
Т
|
|
In a cryptosystem key is a secret value used to control these processes:
|
A
|
|
Sorting
|
B
|
+
|
Encryption
|
C
|
|
Plaintext
|
D
|
+
|
Decryption
|
E
|
|
Filtering
|
F
|
|
Formatting
|
145
|
Т
|
|
Choose main objects of Ms Access.
|
A
|
|
Sheet
|
B
|
+
|
Table
|
C
|
|
Slide
|
D
|
|
Page
|
E
|
+
|
Query
|
F
|
+
|
Form
|
146
|
Т
|
|
Choose HTML tags used to set red background of a web page.
|
A
|
|
|
B
|
+
|
|
C
|
|
|
D
|
|
|
E
|
|
|
F
|
+
|
|
147
|
Т
|
|
Choose example(s) of mixed cell references used in Ms Excel.
|
A
|
|
A1
|
B
|
+
|
$A1
|
C
|
|
$A$1
|
D
|
|
A$1$
|
E
|
|
A5
|
F
|
+
|
A$1
|
G
|
+
|
$A5
|
148
|
Т
|
|
The term cryptology is derived from:
|
A
|
+
|
Greek
|
B
|
|
Latin
|
C
|
|
Roman
|
D
|
|
French
|
E
|
|
German
|
149
|
Т
|
|
In Ms PowerPoint a sound can be played:
|
A
|
|
Right-click
|
B
|
+
|
Automatically
|
C
|
|
Double click
|
D
|
+
|
On Click
|
E
|
+
|
Across slides
|
150
|
Т
|
|
Choose well-known viruses.
|
A
|
|
Avast
|
B
|
+
|
CodeRed
|
C
|
|
Avira
|
D
|
|
Panda
|
E
|
|
McAfee
|
F
|
+
|
Melissa
|
G
|
+
|
Sasser
| |