A
+
|
destruction of information
|
B
|
|
packers
|
C
|
+
|
accessibility violation (blocking) of information
|
D
|
|
computer worms
|
E
|
|
theft (copying) of information
|
F
|
|
«trojan horses»
|
G
|
|
hacking
|
77
|
Т
|
|
The third generation of mobile technology includes:
|
A
|
+
|
video telephony
|
B
|
|
cooking
|
C
|
|
washing
|
D
|
|
voice call
|
E
|
+
|
IP-telephony
|
F
|
|
robotics
|
78
|
Т
|
|
A computer system designed for searching information:
|
A
|
+
|
informational systems
|
B
|
|
Office suites programs
|
C
|
|
databases
|
D
|
+
|
The search engine
|
E
|
|
Operating systems
|
F
|
|
ERP systems
|
79
|
Т
|
|
The decimal number 99 in hexadecimal:
|
A
|
|
2B90
|
B
|
+
|
63
|
C
|
|
56
|
D
|
|
13A
|
E
|
|
783
|
80
|
Т
|
|
Decimal number corresponds to the binary number has the form:
|
A
|
|
|
B
|
+
|
|
C
|
|
|
D
|
|
|
E
|
|
|
F
|
|
|
G
|
|
|
81
|
Т
|
|
The element of application window, which contains tabs with logically grouped commands in the database:
|
A
|
+
|
Quick Access Toolbar
|
B
|
|
Buttons to manipulate the window
|
C
|
|
Ribbon
|
D
|
|
Statusbar
|
E
|
+
|
Title bar
|
82
|
Т
|
|
The information selected and concluded on the information carrier is:
|
A
|
|
signs
|
B
|
|
signals
|
C
|
|
knowledge
|
D
|
|
programs
|
E
|
+
|
data
|
83
|
Т
|
|
Network diameter is
|
A
|
+
|
the amount of information that can be transmitted on the network per time.
|
B
|
|
a computer in the network which is able to work with the data an the network resource.
|
C
|
|
a computer which controls the network and gives users access to their network resources.
|
D
|
|
the shortest distance between the two most distant nodes in the network.
|
E
|
|
a network in which the computer are located within a room, building or nearby building.
|
84
|
Т
|
|
Types of User Interface:
|
A
|
|
VR interface
|
B
|
|
Technical interface
|
C
|
+
|
Graphical interface
|
D
|
|
Command-line interface
|
E
|
|
Microsoft interface
|
F
|
|
Internet interface
|
G
|
|
SILK-interface
|
85
|
Т
|
|
What types of computer threats exist?
|
A
|
|
Psychological threats
|
B
|
|
Safety
|
C
|
|
Hardware
|
D
|
|
Antivirus
|
E
|
|
Crawlers
|
F
|
+
|
Worms
|
G
|
|
Password
|
H
|
|
Blockers
|
86
|
Т
|
|
Components contained in modem integrated application packages:
|
A
|
|
Word processor
|
B
|
|
Internet
|
C
|
|
Oracle
|
D
|
|
Table processor
|
E
|
+
|
Database management system
|
F
|
|
MySQL
|
87
|
Т
|
|
«Machine translation systems» is:
|
A
|
|
a Text Processor
|
B
|
|
a software for processing electronic tables
|
C
|
|
Middleware
|
D
|
+
|
a sub-field of computational linguistics that investigates the use of software to translate text or speech from one language to another
|
E
|
|
Antivirus software
|
F
|
|
an operating systems
|
G
|
|
an utility software
|
88
|
Т
|
|
Which application’s file can be imported into Access Database:
|
A
|
|
PaintFiles
|
B
|
+
|
Excel Files
|
C
|
|
Word Files
|
D
|
+
|
HTML Files
|
E
|
|
PowerPoint File
|
89
|
Т
|
|
A compact disc (CD) can store computer's data over
|
A
|
|
ТВ
|
B
|
+
|
over 500 GB
|
C
|
|
Human Can Interact
|
D
|
|
over 680 MB
|
E
|
+
|
over 200 MB
|
F
|
+
|
over 590 MB
|
90
|
Т
|
|
Subsystems of an Information Security System:
|
|