F
+
|
the subsystem of authentication and identification
|
59
|
Т
|
|
A software program or script available through the Internet that searches documents and files for keywords and returns the results of any files containing those keywords:
|
A
|
+
|
Search Engine
|
B
|
|
All answers are correct
|
C
|
+
|
Web Browser
|
D
|
|
Netiquette
|
E
|
|
Banner
|
F
|
|
Homepage
|
60
|
Т
|
|
The illusion of motion created by the consecutive display of images of static elements is
|
A
|
+
|
Rendering
|
B
|
|
video protocol
|
C
|
|
compression
|
D
|
+
|
Animation
|
E
|
|
Sound
|
61
|
Т
|
|
Analytical instalments for analyze Big Data:
|
A
|
|
Apache galaxy
|
B
|
+
|
SubApache
|
C
|
|
Lex
|
D
|
|
Jaspersoft
|
E
|
|
Ker
|
F
|
+
|
Apache Hive
|
62
|
Т
|
|
Which application’s file can be imported into Access Database:
|
A
|
|
PaintFiles
|
B
|
+
|
Excel Files
|
C
|
|
PowerPoint File
|
D
|
|
HTML Files
|
E
|
+
|
Word Files
|
63
|
Т
|
|
A computer’s capability to run multiple applications at the same time:
|
A
|
+
|
Multi-tasking
|
B
|
|
Multi-user
|
C
|
|
Multi-point
|
D
|
|
Multimedia
|
E
|
|
Multi-server
|
F
|
+
|
Multiprocessing
|
64
|
Т
|
|
The advantages of using the computer networks are the following:
|
A
|
|
slow exchange of the data
|
B
|
|
impossibility of using standard applications
|
C
|
+
|
quick and timely exchange of the data
|
D
|
|
possibility of using standard applications
|
E
|
+
|
sharing the peripherals reduces costs
|
65
|
Т
|
|
Advances of fractal graphics:
|
A
|
|
large file size
|
B
|
|
unreliability
|
C
|
+
|
when the image is enlarged the quality is not lost
|
D
|
+
|
small file size
|
E
|
|
complexity
|
F
|
|
hierarchy
|
G
|
|
when the image is enlarged the quality is lost
|
66
|
Т
|
|
Bitmap graphics formats include:
|
A
|
+
|
PNG
|
B
|
|
DOC
|
C
|
+
|
GIF
|
D
|
|
TXT
|
E
|
|
RAW
|
67
|
Т
|
|
Select the networks by the type of environment transfer:
|
A
|
|
radio channels
|
B
|
|
heterogeneous
|
C
|
|
homogeneous
|
D
|
+
|
on twisted pair
|
E
|
+
|
optic fiber
|
F
|
|
wired
|
68
|
Т
|
|
Interaction of Consumer electronics approximately how many meters use of wires or cables:
|
A
|
+
|
50
|
B
|
|
43
|
C
|
|
44
|
D
|
|
51
|
E
|
+
|
10
|
F
|
|
42
|
69
|
Т
|
|
Computers connected to the network, depending on how far they are from each otheres called:
|
A
|
+
|
regional
|
B
|
|
computer
|
C
|
|
national
|
D
|
+
|
urban
|
E
|
|
republican
|
70
|
Т
|
|
A compact disc (CD) can store computer's data over
|
A
|
+
|
over 680 MB
|
B
|
|
ТВ
|
C
|
|
over 500 GB
|
D
|
+
|
over 590 MB
|
E
|
|
Human Can Interact
|
F
|
|
over 200 MB
|
71
|
Т
|
|
Characteristics of cloud technology when services that are available to consumer through the data network are used regardless of terminal device:
|
A
|
|
Elasticity.
|
B
|
+
|
Broad network access
|
C
|
|
Accounting for consumption.
|
D
|
+
|
Self-service computing resources (elasticity).
|
E
|
|
Network access.
|
F
|
|
Absolute.
|
72
|
Т
|
|
What standards are used in wired networks:
|
A
|
|
IrDA
|
B
|
|
NSS 2.1
|
C
|
|
GPRS
|
D
|
+
|
IEЕЕ 802.3u
|
E
|
|
GSM
|
F
|
+
|
IEЕЕ 802.3ab
|
73
|
Т
|
|
Models of the interaction between the subjects of e-commerce which focused on business partner and customer:
|
A
|
|
C2C.
|
B
|
|
SMART technology.
|
C
|
+
|
B2B.
|
D
|
+
|
E-business (e-commerce).
|
E
|
|
B2C.
|
74
|
Т
|
|
Standard Windows applications:
|
A
|
|
Excel
|
B
|
+
|
Paint
|
C
|
|
Word
|
D
|
+
|
Scan Disc
|
E
|
|
PowerPoint
|
75
|
Т
|
|
Methods used in the data analysis
|
A
|
+
|
Cluster Analysis
|
B
|
+
|
Classification
|
C
|
|
Functions in programming languages
|
D
|
|
Information space
|
E
|
|
Crowdsourcing
|
76
|
Т
|
|
Choose how to classify information security threats
|
|