E
+
|
topology
|
105
|
Т
|
|
The components of the Microsoft cloud:
|
A
|
|
Amazon’s Elastic Compute Cloud
|
B
|
+
|
SQL Azure
|
C
|
|
NET Services
|
D
|
+
|
Windows Azure
|
E
|
|
Qbasic
|
106
|
Т
|
|
The heart (and brains) of the computer is the...
|
A
|
|
GUI
|
B
|
|
CMOS
|
C
|
|
RAM
|
D
|
+
|
CPU
|
E
|
|
ROM
|
F
|
|
BIOS
|
107
|
Т
|
|
The workstation is:
|
A
|
+
|
powerful desktop computers used for high-performance tasks
|
B
|
|
type of a netbook
|
C
|
|
type of a server
|
D
|
|
type of a notebook
|
E
|
|
ordinary personal computer without connection to a network
|
F
|
|
desktop used for calculations
|
G
|
|
ordinary personal computer that is connected to a network
|
H
|
|
work place where concentrated computers
|
108
|
Т
|
|
Select the networks by the type of environment transfer:
|
A
|
|
heterogeneous
|
B
|
|
homogeneous
|
C
|
+
|
optic fiber
|
D
|
|
radio channels
|
E
|
|
wired
|
F
|
+
|
on twisted pair
|
109
|
Т
|
|
A mobile operating system developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such s smartphones and tablets:
|
A
|
+
|
Android
|
B
|
|
UNIX
|
C
|
|
Windows
|
D
|
|
Symbian
|
E
|
|
IOS
|
110
|
Т
|
|
Characteristics of cloud technology when services that are available to consumer through the data network are used regardless of terminal device:
|
A
|
+
|
Broad network access
|
B
|
|
Network access.
|
C
|
+
|
Self-service computing resources (elasticity).
|
D
|
|
Elasticity.
|
E
|
|
Accounting for consumption.
|
F
|
|
Absolute.
|
111
|
Т
|
|
According to the used search IP technology can be divided categories:
|
A
|
|
Desktop computers
|
B
|
+
|
Thematic catalogs
|
C
|
|
specialized directories (online directories)
|
D
|
+
|
Search engines (full text search)
|
E
|
|
Virtual machines
|
112
|
Т
|
|
In the hypermedia database, information bits are stored in the form of:
|
A
|
+
|
Nodes
|
B
|
|
Cubes
|
C
|
|
Symbols
|
D
|
|
Numbers
|
E
|
|
Signals
|
F
|
|
Bite
|
G
|
|
Disc
|
113
|
Т
|
|
Security means can be classified into:
|
A
|
|
cryptographic means
|
B
|
|
probable means
|
C
|
|
mathematical means
|
D
|
+
|
moral and ethical means
|
E
|
+
|
organization means
|
F
|
|
statical means
|
G
|
+
|
physical means
|
H
|
|
dynamical means
|
114
|
Т
|
|
Information security means can be classified into:
|
A
|
|
artificial means
|
B
|
|
intellectual means
|
C
|
|
physical means
|
D
|
+
|
hardware means
|
E
|
|
auxiliary means
|
F
|
|
additional means
|
G
|
|
moral and ethical means
|
H
|
+
|
software means
|
115
|
Т
|
|
Interaction of Consumer electronics approximately how many meters use of wires or cables:
|
A
|
|
10
|
B
|
|
50
|
C
|
|
44
|
D
|
|
43
|
E
|
|
51
|
F
|
+
|
42
|
116
|
Т
|
|
The advantages of using the computer networks are the following:
|
A
|
|
possibility of using standard applications
|
B
|
|
slow exchange of the data
|
C
|
|
impossibility of using standard applications
|
D
|
+
|
quick and timely exchange of the data
|
E
|
+
|
sharing the peripherals reduces costs
|
117
|
Т
|
|
The most dangerous types of network attacks:
|
A
|
|
spyware
|
B
|
|
scam
|
C
|
|
cross-site scripting or XSS
|
D
|
|
printing
|
E
|
|
scan
|
F
|
+
|
trojan
|
118
|
Т
|
|
The electron beam do:
|
A
|
|
not extremely large frequency (ELF) radiation
|
B
|
|
extremely low frequency (ELF) radiation
|
C
|
+
|
large frequency (CLF) radiation
|
D
|
|
very low frequency (VLF) radiation
|
E
|
|
very low frequency (ELF) radiation
|
F
|
|
radiation
|
G
|
+
|
very large frequency (VL)
|
119
|
Т
|
|
A computer’s capability to run multiple applications at the same time:
|
|