- •1. Сұрақ: Give definition to information and communication technologies
- •2. Сұрақ: Describe computer systems
- •3. Сұрақ: Give definition to Operating system.
- •4. Сұрақ: Give definition to Software
- •5. Сұрақ: Describe Multimediacontents
- •6. Сұрақ: Describe Archiving of data
- •7. Сұрақ: Give definition to User interface
- •8. Сұрақ: Describe Databases systems
- •Examples of Database Applications
- •9. Сұрақ: Give definition to Computer networks
- •10. Сұрақ: Describe Browsers and search engines, domains
- •11. Сұрақ: Describe ip addressing
- •12. Сұрақ: Give definition to information security
- •13. Сұрақ: Give definition to Computer viruses
- •Best Antivirus Programs: nod32; Kaspersky; Norton; Avast; Eset, and etc.
- •14. Сұрақ: Describe Web technologies
- •15. Сұрақ: Describe Cloud computing
- •16. Сұрақ: Give definition to Main terms of Smart technology
- •17. Сұрақ: Give definition to e-learning
- •18. Сұрақ: Describe a free software
- •19. Сұрақ: Give definition to Main terms of mobile technologies
- •30 Баллдық емтихан сұрақ
- •1. Сұрақ: Explain Evolution of ict
- •2. Сұрақ: Explain the standards in the field of ict
- •35.020 Information technology (it) in general
- •Information technology.
- •3. Сұрақ: Explain development of necessary infrastructure of electronic payments and logistics
- •4. Сұрақ: Explain the architecture of computer systems
- •5. Сұрақ: Explain types of software, purposes and characteristics.
- •6. Сұрақ: Explain the basic concepts of os
- •7. Сұрақ: Explain the evolution of os
- •8. Сұрақ: Explain the classification of os
- •9. Сұрақ: Explain the types of interfaces: command line interface, text interface, graphic interface.
- •10. Сұрақ: Explain and give examples of electronic government services
- •11. Сұрақ: Explain development stages of the user interface.
- •-Designing -Implementing -Testing
- •12. Сұрақ: Explain the main concepts, characteristics and architecture of database systems
- •The picture below demonstrates the three Level Database Architecture
- •13. Explain the main forms of electronic education
- •14. Explain and give examples of electronic business
- •15. Explain the methods of design and development of databases
- •16. Сұрақ: Explain the methods of collection, classification, prediction, analysis and manage of data
- •18. Сұрақ: Explain the basic concepts of Internet
- •19. Сұрақ: Explain the principles of cloud technology
- •20. Сұрақ: Explain and give examples of multimedia technologies
- •Major uses of multimedia systems
- •50 Баллдық емтихан сұрақ (қолданады)
- •1. Сұрақ: Establish connection: ict and key sectors of society development.
- •2. Specify components of computer systems.
- •3. Specify evolution of operating systems.
- •4. Specify human-computer of interaction.
- •-Designing -Implementing -Testing
- •5.Design and development of database.
- •6. Specify local and wide area networks.
- •8. Specify End devices, data transfer devices, transmission medium.
- •Specify Cyber security and control of the Internet
- •10. Describe Internet protocols: ip, tcp, dmp
- •11.Specify web service in a cloud technology
- •12. Specify design and organization of e-learning
- •12.Specify Design and organization of e-learning.
- •13. Elements of information infrastructure of electronic business.
- •14. Design and implementation of the electronic government.
- •Describe the modern it trends in the professional sphere.
- •16. Exchange of information in office programs.
- •17. Specify the data representation stages in computer systems.
- •18. Specify concepts of mobile technologies.
- •19.Specify information processing in tabular processor
- •Entering Excel Formulas and Formatting Data
- •AutoSum
- •Perform Advanced Mathematical Calculations
- •Copy, Cut, Paste, and Cell Addressing
- •20. Show properties of operating systems.
- •20. Properties of os
- •Multitasking
- •Spooling
11. Сұрақ: Describe ip addressing
Жауап: Internet Protocol Address (or IP Address) is an unique address that computing devices such as personal computers, tablets, and smartphones use to identify itself and communicate with other devices in the IP network. Any device connected to the IP network must have an unique IP address within the network. An IP address is analogous to a street address or telephone number in that it is used to uniquely identify an entity.
An IP address consists of four numbers, each of which contains one to three digits, with a single dot (.) separating each number or set of digits. Each of the four numbers can range from 0 to 255. Here's an example of what an IP address might look like: 78.125.0.209.IP addresses can be either static or dynamic.
IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and provide a simple and reliable way for remote computers to contact you. Static IP addresses reveal such information as the continent, country, region, and city in which a computer is located; the ISP (Internet Service Provider) that services that particular computer; and such technical information as the preciselatitude and longitude of the country, as well as the locale, of the computer. Many websites provide IP address look-up services to their visitors, free of charge.
12. Сұрақ: Give definition to information security
Жауап: Information security, information from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction is the prevention of experience.
Information security (IS) is designed to protect the confidentiality, integrity and availability of computer system data from those with malicious intentions. Confidentiality, integrity and availability are sometimes referred to as the CIA Triad of information security. This triad has evolved into what is commonly termed the Parkerianhexad, which includes confidentiality, possession (or control), integrity, authenticity, availability and utility.
Information security (infosec) is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information. Infosec responsibilities include establishing a set of business processes that will protect information assets regardless of how the information is formatted or whether it is in transit, is being processed or is at rest in storage.
Infosec programs are built around the core objectives of the CIA triad: maintaining the confidentiality, integrity and availability of IT systems and business data. These objectives ensure that sensitive information is only disclosed to authorized parties (confidentiality), prevent unauthorized modification of data (integrity) and guarantee the data can be accessed by authorized parties when requested (availability).
13. Сұрақ: Give definition to Computer viruses
Жауап: The computer virus is the small program written by the programmer of high qualification, capable to self-reproduction and performance of different destructive actions. For today it is known over 50 thousand computer viruses.
A computer virus is a malicious program, which is transmitted from one computer to another, usually over a networks.
A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, logging their keystrokes, or even rendering the computer useless.
Computer viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.
To help avoid computer viruses, it's essential that you keep your computer current with the latest updates and antivirus tools, stay informed about recent threats, run your computer as a standard user (not as administrator), and that you follow a few basic rules when you surf the Internet, download files, and open attachments.
Once a virus is on your computer, its type or the method it used to get there is not as important as removing it and preventing further infection.
Types of computer viruses: Resident viruses, Overwrite viruses, Direct action viruses
