- •Best Antivirus Programs: nod32; Kaspersky; Norton; Avast; Eset, and etc.
- •15. Establish connection: ict and key sectors of society development.
- •39. Specify web servicein a cloud technology
- •40. Specify design and organization of e-learning
- •41. Describe Cloud computing
- •42. Give definition to Smart technology
- •43. Give definition to e-learning
- •45. Give definition to cell references in Excel
- •46. Describe graphical interface
- •2 Filter
Give definition to information and communication technologies
Information Communication Technology (ICT) includes all the technologies used for communication of information. These include devices such as computers, internet and intranet, local and wide area networks
2. Describe computer systems (Describe components of computer systems)
A computer is an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data.
Components of computer system: Software, Hardware
3. Give definition to Operating system.
An operating system is the most important software that runs on a computer
For example: Microsoft Windows, Apple Mac OS X, and Linux
Classification of Operating systems: Multi-user, Multiprocessing, Multitasking, Multithreading, Real time.
4.Give definition to Software
Software is any set of instructions that tells the hardware what to do and how to do it. two types of software: 1. systems software. 2. applications software.
5. Describe storage devices
Storage device is any computing hardware that is used for storing and recording of information.
There are two different types of storage devices:
1. Primary storage devices:
2. Secondary storage devices:
For example: hard drive, optical media, diskettes, magnetic tape
6.Describe Multimediacontents
Multimedia represents various types of media content used together.
Mutimedia contents: 1. Text. 2. Images. 3. Audio. 4. Video. 5. Animation.
7. Describe Archiving of data and computer virus
Archiving of data the process that reduce size of file. Compression of files. Archive programs are: WinZip, Winrar.
The computer virus is the small program written by the programmer of high qualification, capable to self-reproduction and performance of different destructive actions. For today it is known over 50 thousand computer viruses.
Types of computer viruses: Resident viruses, Overwrite viruses, Direct action viruses
Best Antivirus Programs: nod32; Kaspersky; Norton; Avast; Eset, and etc.
8. ExplainEvolutionof ICT
Premechanical, Mechanical, Electromechanical and Electronic.
9. Explain generations of computer
First generations computers (1940-1956) -vacuum tubes
Second generations computers (1956-1963) -Transistors
Third generations computers (1964-1971) – integrated circuits.
Fourth generation computers (1971-present) - microprocessor
Fifth generation computing - artificial intelligence
11. Data representation in computer systems
Number system is a writing system for expressing numbers, it is way to represent any number with a certain set of symbols called digits.
Positional number system. For example, Arabian digits
Non-positional For example, V, VI, X. XI
12. Explain types of software, purposes and characteristics.
Software is a general term for the programs that control the computer system. There are two types of software:
-systems software
-applications software:
13. Explain the basic concepts of OS
An operating system is the most important software that runs on a computer.
The structure of OS consists of 4 layers:
1. Hardware 2. Software 3. System programs 4.Application programs
Classification of Operating systems
Multi-user; Multiprocessing; Multitasking; Multithreading; Real time.
14. Explain the evolution of OS
An operating system is the most important software that runs on a computer. The three most common operating systems for personal computers are Microsoft Windows, Mac OS X, and Linux.
|
Operating systems |
Years |
Who developed |
1-st OS |
MS DOS |
1980 |
Tim Paterson |
1-st OS with GUI |
Windows |
1985 |
Bill Gayts |
1-st OS for mobile technol |
Android |
2007 |
Andi Rubin |
Multiuser OS |
Linux |
1983 |
Linus Torvalds |
Unix |
1969 |
Ken Thomson |
15. Establish connection: ict and key sectors of society development.
Computers are part of our everyday lives. They have an effect on almost everything you do. Computers are used:
Home art
Hospitals banking
Engineering libraries
Shopping film-making
Television advertising schools
ICT includes all the technologies used for communication of information. For example computers, internet, LAN, MAN, WAN, WI-FI, voice mail, e-mail, audio visual systems, CD, DVD, telecommunication systems, printed media, e- learning, education television, satellite communication, cable TV, interactive radio used in teaching and learning.
education
Hospital Art
Shopping Library
16. Specify hardware and software
Hardware is a general term for the physical components that make up a computer system, for example keyboard, mouse, monitor, processor, circuit board and so on.
Software is a general term for the programs that control the computer system.
-applications software:
-systems software:
17
18
19
20. Specify main concepts of database management system
A database management system (DBMS) is software package for creating and managing databases.
Examples of DBMS: Microsoft Access ; MySQL; Oracle; File maker ; Fox pro
21.Givedefinitionto User interface
User interface is visual part of computer application or operating system through which a user interacts with a computer or a software.
Two main types of user interfaces are:Command Line Interface (CLI) and Graphical User Interface (GUI)
22.Describe data types in Access
Text ; Memo; Number; Currency; Data/time; Yes/No; Auto number; OLE
23. Give definition to Computer networks (Describe types of computer networks)
A computer network is a collection of computers and devices connected via communication devices and transmission media.
Network components:
- End Devices - End Device
- Network Media (medium) - Network environment.
Types of network:
Local-area network (LAN)
Wide-area network (WAN)
Metropolitan-area network (MAN)
LAN topologies: Ring topology; Star topology; Bus topology
24.Describe Browsers and search engines, domains
A browser is a software program which helps users to view internet sites and explore content on the WorldWideWeb. Web browsers are: Internet Explore, Google Chrome, Mozila Firefox,
A search engine is a software program available through the Internet that searches documents and files for key words and returns the results of any files containing those key words.
For example: Google, Yandex, Youtube, Rambler, Wikipedia and etc.
The domain code identifies the type of organization. For example:
.com commercial organization
.edu educational institution
.kz Kazakhstan, .ru Russia, .uk-United kingdom, .uz-Uzbekistan, .tr-Turkey
.org Organisation
.gov government of a nation
25. Describe IP addressing
An IP address consists of four numbers, each of which contains one to three digits, with a single dot (.) separating each number or set of digits. Each of the four numbers can range from 0 to 255. Here's an example of what an IP address might look like: 78.125.0.209.IP addresses can be either static or dynamic.
26.Give definition to information security
Information Security – practice of protecting digital information from unauthorized. Computer security is the protection of computing systems and the data that they store or access.
Access
Use
Recording
Disruption
Modification
C.I.A. triangle – 3 key characteristics of information that must be protected by information security:
Confidentiality
Integrity
Availability
27. Describe main objects in Access database
Microsoft Access is a powerful program to create and manage your databases. Main objects in MS Access: Module;Table; Query; Form; Report; Macros
Explain the classification of OS
An operating system is the most important software that runs on a computer.
The structure of OS consists of 4 layers:
Hardware
Software
System programs
Application programs
Classification of Operating systems
Multi-user; Multiprocessing; Multitasking; Multithreading; Real time.
29. Explain the types of interfaces
User interface is visual part of computer application or operating system through which a user interacts with a computer or a software. Two main types of user interfaces are: Command Line Interface (CLI) and Graphical User Interface (GUI)
30. Explain and give examples of electronic government services
Examples of the e-Technology include e-Commerce, e-Business, e-Procurement and e-Logistics.
E-government (short for electronic government) is the use of electronic communications devices, computers and the Internet to provide public services to citizens.
Explain the types of database systems
Types of database:
Distributed database
Document-oriented database
Embedded database
Graph database
Hypertext database
Operational database
32.Explain the main forms of electronic education
There are fundamentally two types of e-Learning:
Synchronous training
Asynchronous training
33. Explain and give examples of electronic business
The term "e-business" was coined by IBM's marketing and Internet team in 1996.
Examples of the e-Technology include e-Commerce, e-Business, e-Procurement and e-Logistics.
34. Explain functions in tabular processor
Microsoft Excel consists of worksheets. Each worksheet contains columns and rows. The columns are lettered A to Z and then continuing with AA, AB, AC and so on; the rows are numbered 1 to 1,048,576
Functions are predefined formulas and are already available in Excel: Count: AutoSum, Average, Min, Max.
35. Specify computer networks
A computer network is a collection of computers and devices connected via communication devices and transmission media.
Network components:
- End Devices - End Device
- Network Media (medium) - Network environment.
Types of network:
Local-area network (LAN)
Wide-area network (WAN)
Metropolitan-area network (MAN)
LANs
Ring topology
Star topology
Bus topology
36.Specify End devices, network devices(hub, switches, bridges, routers, reapeaters)
A computer network is a collection of computers and devices connected via communication devices and transmission media.
Network components:
- End Devices - End Device
- Network Media (medium) - Network environment.
Types of network:
Local-area network (LAN)
Wide-area network (WAN)
Metropolitan-area network (MAN)
LANs
Ring topology
Star topology
Bus topology
37. Specify Cyber security
Information Security – practice of protecting digital information from unauthorized. Computer security is the protection of computing systems and the data that they store or access.
Access
Use
Recording
Disruption
Modification
C.I.A. triangle – 3 key characteristics of information that must be protected by information security:
Confidentiality
Integrity
Availability
38. Describe URL address, domain name and protocols in Internet
Every websites on the Internet has a unique address known as its Uniform Resource Locator (URL)
For example: http://www.youtube.com, http://www.webdunia.com
The domain code identifies the type of organization. For example:
.com commercial organization
.edu educational institution
.kz Kazakhstan, .ru Russia, .uk-United kingdom, .uz-Uzbekistan, .tr-Turkey
.org Organisation
.gov government of a nation
