
675
.docx*when loading drivers
*when opening the internet
*in case of the wrong loading
*+in case of execution of the infected program
*when inserting the disc with the infected program
#273
*!The computer virus is:
*+the program which breeds itself and does harm to the computer of the user and other objects located in network
*not readable data which are kept on rigid or on a floppy disk
*the hidden programs which erase, but they aren't removed
*programs which don't give the chance to open data with the password
*the program which protects the computer from harmful files
#274
*!What general property do the interactive presentations have?
*are managed by events
*+are operated by the speaker
*the self-carried-out presentation
*are usually shown at different exhibitions
*surely the multimedia projector is required
#275
*!Expert systems are:
*set of knowledge
*hypertext systems
*systems of the contextual help
*the artificial intelligence which isn't relating to knowledge
*+the systems of an artificial intelligence based on knowledge
#276
*!Medical expert systems:
*diagnostic systems of fifth generation
*diagnostic systems of first generation
*diagnostic systems of third generation
*+diagnostic systems of second generation
*diagnostic systems of fourth generation
#277
*!Main objective of an artificial intelligence:
*separation of the main concepts of problem area
*assignment of the main concepts of problem area
*saving the main concepts of problem area
*simulation of intellectual activities of the person by transmission of a computer
*+simulation of intellectual activities of the person for transmission of a computer of routine processes
#278
*!Systems of an artificial intelligence are:
*directions of expert systems
*direction of an artificial intelligence
*activities, connected to the direction of an artificial intelligence
*the machine programs created in the direction of expert systems
*+the machine programs created in the direction of artificial intellectual systems
#279
*!Are engaged in expert systems:
*doctors
*experts, students
*students and specialists in the field of an artificial intelligence
*+experts and specialists in the field of an artificial intelligence
*experts, specialists in the field of an artificial intelligence, students
#280
*!Constructing process of expert systems consists of stages:
*8
*2
*3
*4
*+5
#281
*!MS Word 2007. The group symbols is on tab
*view
*home
*+insert
*references
*page layout
#282
*!MS Word 2007. The group table is on tab
*view
*home
*+insert
*references
*page layout
#283
*!MS Word 2007. The clipboard is on tab
*view
*insert
*+home
*references
*page layout
#284
*!MS Word 2007. The group font is on tab
*view
*insert
*+home
*references
*page layout
#285
*!MS Word 2007. The group styles is on tab
*view
*insert
*+home
*references
*page layout
#286
*!MS Word 2007. The group page setup is on tab
*view
*home
*insert
*references
*+page layout
#287
*!MS Word 2007. The group spelling is on tab
*view
*home
*insert
*+review
*page layout
#288
*!MS Word 2007. The group zoom is on tab
*home
*insert
*+view
*references
*page layout
#289
*!MS Word 2007. The ruler pictogram is located on tab
*insert
*home
*+view
*references
*page layout
#290
*!Excel displays the error message ____ in cells to indicate a cell reference error
*REF# *REF! *REF
*#REF# *+#REF!
#291
*!Excel. The Excel program file has an extension
*.txt
*.com
*.bmp
*.docx
*+.Xlsx
#292
*!MS Excel.Which keyboard shortcut should be used to display the format of cells dialog box
*CTRL+5
*CTRL+2
*CTRL+3
*CTRL+4
*+CTRL+1
#293
*!MS Excel.Which keyboard shortcut should be used to apply or remove an italic tracing
*CTRL+1
*CTRL+2
*CTRL+4
*CTRL+5
*+CTRL+3
#294
*!MS Excel. Which keyboard shortcut should be used to cross out the text or to remove deletion
*CTRL+1
*CTRL+2
*CTRL+3
*CTRL+4
*+CTRL+5
#295
*!MS Excel. Which keyboard shortcut should be used to fill a range of cells with the same data
*<Alt>+<Tab>+<Enter>
*<Ctrl>+<Tab>+<Enter>
*<Shift >+<Alt>+<Enter>
*+<Ctrl>+<Shift>+<Enter>
*<Ctrl>+<Shift>+<Space Bar>
#296
*!MS Excel. To add two cells (A1 and A2) together you use the following formula
*A1 + A2
*A1 plus A2
*=Add(A1+A2)
*+=sum(A1;A2)
*=together(A1:A
#297
*!Excel displays the error message ____ in cells to indicate a divide by zero error
*DIV/ # *+#DIV/ !
*#VALUE!
*DIVIDE#
*#REF/DIVBYZER
#
#298
*!The cell A3 contains next formula: =В1+$С1; A3 is copied in A4. The formula in A4 will become
*=В1+С$1
*=В2+$С1
*=В1+С$4
*=В1+С$2
*+=В2+$С2
#299
*!The cell A3 contains next formula: =$В$1+$С1; A3 is copied in A4.The formula in A4 will become
*=В1+С$4
*=В1+С$1
*=$В$1+$С1
*+=$В$1+$С2
*=$В$1+$С$2
#300
*!The cell A3 contains next formula: =В1+С$1; A3 is moved in A4. The formula in A4 will become
*+=В2+С$1
*=В2+С$4
*=В1+С$1
*=$В$1+$С1
*=$В$1+$С$2
#301
*!MSExcel. It is specified in a formula row
*figure
*symbol
*formula
*+cell contents
*address of the current cell
#302
*!MS Excel. For creation of diagrams and drawing up formulas is used
*forms
*reports
*+function wizard
*drawing
*charts
#303
*!The document created in Excel is called
*worksheet
*workfile
*workdocument
*+workbook
*brief document
#304
*!MS Excel. Function of the Office button
*opens a toolbar
*+opens the only menu of the program
*creates and changes marking of the document pages
*provides the choice of various browse modes of the document
*provides spell check, addition of comments
#305
*!MS Excel. Selecting of cells range on the work sheet
*choose the command "editing-to clear-all"
*move the mouse pointer there and back
*right-click and choose the command "to allocate"
*+drag the mouse pointer from one corner of range to another
*drag the mouse pointer down numbers of lines in the left part of the screen
#306
*!МS Аccess.Which data type can store more than 255 characters
*text
*yes/no
*+memo
*long integer
*lookup wizard
#307
*!MS Access. There are 3 type of relationship that valid in MS Access 2007, except
*one to one
*one to many
*many to one
*many to many
*+intermediate
#308
*!MS Аccess. Format of database
*.txt, .doc
*.exe, .mdb
*.bat, .accdb
*.bmp, .accdb
*+.mdb, .ассdb
#309
*!MS Access. What queries are used to summarize data in tables
*Select
*Action
*Cascade
*Parameter
*+CrossTab
#310
*!MSАccess.What type of queries is a queries that select records from tables based on criteria
*Action Queries
*+Select Queries
*Cascade Queries
*CrossTab Queries
*Parameter Queries
#311
*!MSАccess.Table in Microsoft Access can be create by using all below except
*+Input Mask
*Design View
*Form Wizard
*Table Wizard
*Datasheet View
#312
*!MSАccess. Maximum number of symbols in text field of the table
*225
*155
*355
*455
*+255
#313
*!MSАccess. Rename the table
*F6
*F1
*F4
*F5
*+F2
#314
*!MSAccess. You can __________ macros setting so that the macros run automatically for any database you open
*Disable
*+Enable
*Ignoring
*Cancelling
*Removing
#315
*!MSАccess. Before printing a datasheet, you can use______ to determine whether to change the page orientation from portrait to vertical orientation
*Office View
*Design View
*+Print Preview
*Datasheet View
*Pivot chart view
#316
*!MSАccess. Maximum numbers of symbols in «Mемо» field
*65 500
*65 000
*+65 536
*650 563
*65 0000
#317
*!MS Access. A _____ is a major database object used to display information in an attractive, easy-to-read screen format
*table
*+form
*report
*query
*macros
#318
*!MS Access. What happens when a user selects a record in a form and presses [Delete]
*The record is not deleted only in the form
*+The record is deleted in the form and from its source table
*The record is deleted in the form, but not from its source table
*The record is neither deleted in the form, nor from its source table
*The record is not deleted in the form, but is deleted from its source table
#319
*!MS Access. Which of the following cannot be done to data using a form
*Edit
*Sort
*Filter
*+Store
#320
*!MS Access. What is one of the advantages for using a form over other Access objects
*Forms cannot be edited
*Forms store information more efficiently
*Forms show the summary of all the records
*+Utilizes field placement to improve the efficiency of data entry
*Forms output a financial summary for a period, or a set of mailing labels
#321
*!MS Access. The undo command is found where in Access
*Status bar
*Office button
*Quick Launch Bar
*Home command tab
*+Quick Access toolbar
#322
*!Comand to break slideshow of Power Point
*DEL
*ALT
*TAB
*+ESC
*ENTER
#323
*!The format of presentation created in MS Power Point 2003
*.pptx
*.jpg
*.xlsx
*.doc
*+.рpt
#324
*!Possibilities of the Power Point program
*creation of animation animated films and rollers
*creation of the presentation with the description of program language
*+creation of the presentation with multimedia animation
*creation of text documents with hyperlinks and communications
*creation of the telepresentations in specialized programs
#325
*!Stop or renewal of automatic display
*B or «-» symbol
*S or «-» symbol
*B or «+» symbol
*W or «+» symbol
*+S or «+» symbol
#326
*!The presentation component containing various objects
*sheet
*+slide
*shot
*picture
*photo
#327
*!Set of the slides collected in one file
*sheet
*picture
*slideshow
*+presentation
*text document
#328
*!Transition to the slide under "X" number
*number+ALT
*number+ESC
*number+CTRL
*+number+ENTER
*number+SPACE
#329
*!Transition to the first or following hyperlink on a slide
*ALT+TAB
*ESC+TAB
*CTRL+TAB
*SHIFT+ALT
*+SHIFT+TAB
#330
*!The statistics studies
*periodic events
*single phenomena
*+mass phenomena
*properties of the studied phenomenon
*single signs of the studied phenomenon
#331
*!Origin of the term "statistics"
*statics
*+status
*network
*statistics
*the stately
#332
*!Term «Statistic» was introduced by
*А.Quetelet
*F.Galton
*А.Byushing
*G. Konring
*+G.Akhenval
#333
*!Specify two main groups of viruses:
*Macro, micro
*Network, file viruses
*Harmless, dangerous, very dangerous
*Easy, loading
*+Resident, non-resident
#334
*!Computer viruses are divided by extent of influence on:
*+resident, non-resident
*harmless, dangerous, very dangerous
*detectors, doctors, auditors, filters, vaccines
*network, file, loading, file and loading
*parasitic, replicators, invisible beings, mutants, trojan
#335
*!The viruses using mistakes and inaccuracies in a complex software:
*Worms
*Propagandists
*Trojan Horses
*Logical bombs
*+Virusesinterceptors
#336
*!On features of an algorithm computer viruses divide on:
*resident, non-resident
*harmless, dangerous, very dangerous
*detectors, doctors, auditors, filters, vaccines
*network, file, loading, file and loading
*+parasitic, replicators, invisible beings, mutants, trojan
#337
*!Types of antivirus programs:
*resident, non-resident
*harmless, dangerous, very dangerous
*network, file, loading, file and loading
*+detectors, doctors, auditors, filters, vaccines
*parasitic, replicators, invisible beings, mutants, trojan
#338
*!Antivirus programs can be divided into following main groups:
*filters, vaccines
*resident, non-resident
*+detectors, doctors, auditors
*macros, resident, polymorphic, non-resident, network
*detectors, doctors, auditors, doctors-auditors, filters, vaccines
#339
*!Antivirus programs:
*scanners
*archives
*+antivirus
*brandmauers
*antispammers
#340
*!Antivirus program:
*OutlookExpress
*+Doctor Web
*MS Ехсеl
*MS Word
*Rar
#341
*!Program for search and treatment of computer viruses:
*+Dr Web
*Chat, Excel
*Graphics, Word
*E-Mail, Power Point
*Use Net, Cache Man
#342
*!Computer virus is the program capable to:
*delete all images
*infect the person
*+create own copies
*damage the computer hardware
*destroy only the programs written on algorithmic languages
#343
*!Programs auditors:
*treat infected files
*+modify programs
*find changes and treat
*find the infected files
*find changes in files
#344
*!Polymorphic viruses:
*+are capable to change the code
*contain logical bombs
*can spoil disk drive heads
*the viruses affecting the carried-out files
*are capable to intercept the appeal to file system
#345
*!Programs auditors of disks:
*+find the latent viruses
*check files of windows
*archive the ms dos files
*write down the code in the end of the file
*restore the infected files in an initial state
#346
*!The first stage of creation of expert system:
*checking of expert system's work
*change of the main concepts of problem area
*purpose of the main concepts of problem area
*+definition of the purposes and outcomes for which the expert system is designed
*allocation of the main concepts of problem area which reflect experts' knowledge
#347
*!The second stage of creation of expert system:
*checking of expert system's work
*change of the main concepts of problem area
*purpose of the main concepts of problem area
*definition of the purposes and outcomes for which the expert system is designed
*+allocation of the main concepts of problem area which reflect experts' knowledge
#348
*!The fourth stage of creation of expert system:
*checking of expert system's work
*+directly creation of the knowledge base
*changing of the main concepts of problem area
*definition of the purposes and outcomes for which the expert system is designed
*allocation of the main concepts of problem area which reflect experts' knowledge
#349
*!The fifth stage of creation of expert system:
*+checking of expert system's work
*changing of the main concepts of problem area
*purpose of the main concepts of problem area
*definition of the purposes and outcomes for which the expert system is designed
*allocation of the main concepts of problem area which reflect experts' knowledge
#350
*!Expert system has to include not less than:
*three main elements
*five main elements
*two main elements
*six main elements
*+four main elements
#351
*!The resident virus is:
*DIR-viruses
*network virus
*well known viruses
*the virus which isn't kept in random access memory after completion of work of the program
*+the virus which is kept in random access memory after completion of work of the program
#352
*!Subject of information security is:
*drivers
*archivers
*operating system
*the data set containing information, the subject protection
*+the structural component of a system containing information which has to be protected
#353
*!The element of information security is:
*communication center
*stores
*means of display of information
*+the data set containing information, the subject protection
*the structural component of the system which contains information and has to be protected
#354
*!Kinds of information protection means:
*programs of a bookmark and net worms
*trojan horse, access differentiation
*copying of information, trojan horse
*+copying of information, access differentiation
*copying of information, program of a bookmark and net worms
#355
*!What operation is applied to reliability of work of anti-virus programs:
*definition through network
*operation of archive input
*performance without operations
*+operation of base updating
*operation of archive copying
#356
*!Information security in systems and networks is:
*program auditor
*hardware
*software
*processing of information
*+system ensuring reliability of information
#357
*!Which of the following programs can be a revisor:
*Dir-I
*Sherif
*DrWeb
*+Adinf
*Aidstest
#358
*!The filter program:
*prevents infection of files
*looks for viruses with the known signature
*finds the infected files and treats them
*+finds suspicious actions
*compares an initial condition of the file to current
#359
*!Technology which distributes information from the server to the client, used on mobile devices:
*+mobile push-notification messages
*computing clouds
*virtualization
*micronuclear architecture of a hypervisor
*online conference
#360
*!A model of providing cloud computing for access to use of operating systems and database management system
*Software as a Service
*Infrastructure as a Service
*+Platform as a Service
*Storage as a Service
*Management as a Service
#361
*!To create profiles in the cloud use Google Docs:
*documents
*tables
*presentations
*+forms
*my cards
#362
*!To work with one Google Document in online mode it is necessary for group of users:
*remove the restriction
*create a conference
*open online chat
*create "circles friends"
*+open shared access
#363
*!To create Google Presentation in the cloud it is necessary:
*create mail.ru
*+have a Google account
*be a Google Hangout User
*have access to social networks
*know the programming language
#364
*!Internet. The process of converting analog signals into digital signals so they can be processed by a receiving computer is referred to as
*Digitizing
*Computing
*Modulation
*Synchronizing
*+Demodulation
#365
*!Internet. Rules of an exchange of information between computers through a network
*+Protocol
*Text editor
*Spreadsheet
*Standard programs
*The executed program
#366
*!Internet. What is the difference between a switch and a hub
*None of these
*+Switches operate at data link while hubs operate at physical layer
*Switches operate at data link layer while hubs operate at transport layer
*Switches operate at transport layer while hubs operate at physical layer
*Switches operate at physical layer while hubs operate at data link layer
#367
*!Internet. Which of the following performs modulation and demodulation
*Satellite
*+Modem
*Flashcard
*Fiber optics
*Coaxial cable
#368
*!One of the internet services
*hypertext
*mail network
*+world wide web
*local network of users
*connection of telephones networks
#369
*!Internet. A network model where there is no server computer is
*Client Network
*Server Network
*Centralized Network
*+Peer to Peer Network
*Client /Server Network
#370
*!Internet. The name of data receiver in computer science
*Server
*Store
*+Client
*Storehouse
*Work station
#371
*!Internet. Language for creating web pages
*Basic, СИ++
* Pascal, Delphi
*Assembler language
*Lisp, Prolog, Basic
*+HTML, MS Front Page
#372
*!The tag defining an underlined font
*<i>…</i>
*<s> … </s>
*<b> … </b>
*<tt> … </tt>
*+<u> … </u>
#373
*!Internet. Special language of formatting of text documents
*Ada
*Basic
*Pascal
*+Html
*Fortran
#374
*!Internet The geometrical scheme of computer association is called
*Tire topology
*Local network
*Ring topology
*Local topology
*+Network topology
#375
*!The tag defining the crossed font
*<u> … </u>
*<big> … </big>
*<blink>…</blink>
*<small> … </small>
*+<strike> … </strike>
#376
*!Html. Tag is
*typing
* typing
*+character set
*hypertext set
*markup language hyper Tex
#377
*!Html. Writing of the text between tags <i> and </i> makes text
*bold
*+italic
*interlinear
*overlined
*underlined
#378
*!Html. Bgcolor attribute gives
*page color
*+background color
*frame color
*font color
*background picture
#379
*!Tags including picture in html-document
*<ig src="file name">
*<img rc="file name">
*<mg src="file name">
*<src img="file name">
*+<img src="file name">
#380
*!Html. Each new element of the list begins with a tag
*<pi>
*<lp>
*<lg>
*<gl>
*+<li>
#381
*!Html. <marquee> and </marquee> tags are used for
*line
*filter
*table
*+running line
*the running column
#382
*!Internet technologies. A tag by means of which transition from one fragment of the text to another is carried out
*<a hr="[jump address]"> the selected text fragment </a>
*<a ref="[ jump address]"> the selected text fragment </a>
*<a hef="[ jump address]"> the selected text fragment </a>
*<aa href="[ jump address]"> the selected text fragment </a>
*+<a href="[ jump address]"> the selected text fragment </a>
#383
*!Html. Tag which defines the background of the screen
*<tt>
*<br>
*<table>
*<noshade>
*+<bgcolor>
#384
*!The menu containing a command of viewing Html code of Web page
*+view
*refresh
*browse
*favorites
*stop
#385
*!WWW Internet service is based on
*Pascal, Delphi
*HTML, MS Excel
*HTML, Turbo Pascal
*WordPad, гипертекст
*+HTML,гипертекст
#386
*!Html. Tags of marking paragraph
*<b>
*<tr>
*<hr>
*<td>
*+<p>
#387
*!Html. Tags which contain the main part of the document
*<tr>_</tr>
*<htm>_</htm>
*<align>_</align>
*<color>_</color>
*+<body>_</body>
#388
*!Html. Тэг <tr…> includes attributes
*head, alt, title
*title, head, height
*noshade, align, width
*+align, valign, bottom
*frameset, color, checkbox
#389
*!Html. Tag which is used to create horizontal rules
*TD
*TR
*OL
*LI
*+HR
#390
*!The place where various information on the user is stored:
*cloud
*browser
*+account
*mailservice
*questionnaire
#391
*!Stream multimedia:
*specialized search
*innovations, for the house and office
*the project which has open source code of fund
*+the broadcasting continuously received from provider
*the accounting entry storing information on the user
#392
*!Defect of a cloud computing is:
*flexibility
*renting
*economy
*availability and mobility
*+not controllability of data
#393
*!Technology which distributes information from the server to the client, used on mobile devices:
*virtualization
*online conference
*computing clouds
*+mobile push-notification messages
*micronuclear architecture of a hypervisor
#394
*!The convenient environment for processing and storage of various formats information with user support of the Internet:
*social networks
*development environment
*mobile services
*operating system
*+cloud technologies
#395
*!Information and communication technologies are:
*social science
*+applied science
*medical science
*humanity
*fundamental science
#396
*!What information volume does contain the text page typed by means of the computer which consists of 50 lines on 80 characters? (1 Kbyte ≈ 1000 bytes)
*400 bytes
*+4 Kbytes
*3200 bits
*40 Kbits
*800 bytes
#397
*!Internet. Сетевые операционные системы
*MS Word
*MS Excel
*Norton Commander
*+Windows NT Server, Novell Netware
*Windows, MS DOS, UNIX. Windows NT Server
#398
*!Definition of the Internet
*database
*text editor
*spreadsheet
*+worldwide global computer network
*the universal tool for preparation and design of the presentation
#399
*!Internet. World Wide Web is
*Internet
*hyperlink
*+world wide web
*separate document
*information space
#400
*!Internet. Program for web browsing
*tags
*+browser
*hypertext
*Web-surfing
*hypertext link
#401
*!Internet. The form of direct communication in Internet in Online mode
*+chat
*filter
*host-computer
*line of the message
*electronic textbook
#402
*!Internet. The program for operation with e-mail
*MS Word
*Clipboard
*+Outlook Express
*Windows, MS DOS, UNIX
*Windows NT Server, Novell Netware
#403
*!Internet. Правила обмена информации между компьютерами посредством сети
*+protocol
*text editor
*accessories
*spreadsheet
*executed program
#404
*!Formats of Html document
*.txt и. xls
*.exe и. htl
*.doc.txt
*.mht и xml
*+.htm и html
#405
*!Html. Heading tags
*<p>_</p>
*<title>_</title>
*<font>_</font>
*<html>_</html>
*+<head>_</head>
#406
*!The address of Web-site on world wide web, for instance, http://www.microsoft.com
*IP address
*locator