F
|
It provides data search and processing
|
G
|
+
|
The database is stored and processed in a computer system
|
45
|
Т
|
|
Cloud computing has the following features:
|
A
|
|
unreliability
|
B
|
|
hierarchy
|
C
|
|
inflexibility
|
D
|
|
complexity
|
E
|
+
|
shared infrastructure
|
F
|
+
|
dynamic resource allocation (scalability)
|
G
|
|
transparency
|
46
|
Т
|
|
MAN (city network) is capable of transmitting voice and data for:
|
A
|
+
|
miles
|
B
|
|
m
|
C
|
|
m
|
D
|
|
m
|
E
|
|
miles
|
F
|
|
44 miles
|
47
|
Т
|
|
The programs intended for fight against the malicious software:
|
A
|
+
|
Dr Web
|
B
|
+
|
Kaspersky
|
C
|
|
Worms
|
D
|
|
Trojans horses
|
E
|
+
|
Antiviruses
|
F
|
|
HTML
|
48
|
Т
|
|
In the hypermedia database, information bits are stored in the form of:
|
A
|
|
Signals
|
B
|
|
Disc
|
C
|
|
Cubes
|
D
|
|
Symbols
|
E
|
+
|
Nodes
|
F
|
|
Bite
|
G
|
|
Numbers
|
49
|
Т
|
|
The element of application window, which contains tabs with logically grouped commands in the database:
|
A
|
|
Quick Access Toolbar
|
B
|
|
Buttons to manipulate the window
|
C
|
|
Statusbar
|
D
|
+
|
Ribbon
|
E
|
|
Title bar
|
50
|
Т
|
|
What standards are used in wired networks:
|
A
|
+
|
IEEE 802.3u
|
B
|
|
NSS 2.1
|
C
|
|
GPRS
|
D
|
|
GSM
|
E
|
|
IrDA
|
F
|
+
|
IEЕЕ 802.3ab
|
51
|
Т
|
|
Teleconferences can be classified in several ways is:
|
A
|
|
the use of electronic communications devices, computers and the Internet to provide public services to citizens and other persons in a country or region
|
B
|
|
Computer architecture
|
C
|
+
|
The method of information exchange
|
D
|
|
the technology used for cellular communication
|
E
|
|
shared pools of configurable computer system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over the Internet
|
F
|
|
Smart technologies
|
52
|
Т
|
|
The third generation of mobile technology includes:
|
A
|
|
robotics
|
B
|
|
washing
|
C
|
|
cooking
|
D
|
+
|
IP-telephony
|
E
|
+
|
video telephony
|
F
|
|
voice call
|
53
|
Т
|
|
The main operating systems for mobile phones:
|
A
|
|
Yahoo
|
B
|
|
Maemo
|
C
|
|
Java
|
D
|
|
Linux
|
E
|
|
MS DOS
|
F
|
+
|
Android
|
G
|
|
Bada
|
H
|
|
Unix
|
54
|
Т
|
|
«Machine translation systems» is:
|
A
|
|
a software for processing electronic tables
|
B
|
|
an utility software
|
C
|
+
|
a sub-field of computational linguistics that investigates the use of software to translate text or speech from one language to another
|
D
|
|
Middleware
|
E
|
|
a Text Processor
|
F
|
|
an operating systems
|
G
|
|
Antivirus software
|
55
|
Т
|
|
Choose the devices, which purpose is to expand the size of the network in the current environment:
|
A
|
|
Internet Protocol
|
B
|
|
ТСР/IРModel
|
C
|
|
Modem
|
D
|
+
|
Bridge
|
E
|
|
Protocol suite
|
F
|
|
Protocol
|
56
|
Т
|
|
The electron beam do:
|
A
|
|
radiation
|
B
|
|
extremely low frequency (ELF) radiation
|
C
|
|
very low frequency (VLF) radiation
|
D
|
+
|
large frequency (CLF) radiation
|
E
|
|
not extremely large frequency (ELF) radiation
|
F
|
|
very low frequency (ELF) radiation
|
G
|
+
|
very large frequency (VL)
|
57
|
Т
|
|
A programming language's surface form:
|
A
|
+
|
Semantics
|
B
|
|
Protocol
|
C
|
|
Algorithm
|
D
|
|
Program
|
E
|
+
|
Syntax
|
58
|
Т
|
|
Subsystems of an Information Security System:
|
A
|
|
the subsystem of access control
|
B
|
|
the subsystem of antiviruses
|
C
|
+
|
the subsystem of the Entrusted Information Environment (EIE)
|
D
|
|
the subsystem of big data
|
E
|
|
the subsystem of direction
|
|