Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

675

.docx
Скачиваний:
2
Добавлен:
07.05.2025
Размер:
300.57 Кб
Скачать

*when loading drivers

*when opening the internet

*in case of the wrong loading

*+in case of execution of the infected program

*when inserting the disc with the infected program

#273

*!The computer virus is:

*+the program which breeds itself and does harm to the computer of the user and other objects located in network

*not readable data which are kept on rigid or on a floppy disk

*the hidden programs which erase, but they aren't removed

*programs which don't give the chance to open data with the password

*the program which protects the computer from harmful files

#274

*!What general property do the interactive presentations have?

*are managed by events

*+are operated by the speaker

*the self-carried-out presentation

*are usually shown at different exhibitions

*surely the multimedia projector is required

#275

*!Expert systems are:

*set of knowledge

*hypertext systems

*systems of the contextual help

*the artificial intelligence which isn't relating to knowledge

*+the systems of an artificial intelligence based on knowledge

#276

*!Medical expert systems:

*diagnostic systems of fifth generation

*diagnostic systems of first generation

*diagnostic systems of third generation

*+diagnostic systems of second generation

*diagnostic systems of fourth generation

#277

*!Main objective of an artificial intelligence:

*separation of the main concepts of problem area

*assignment of the main concepts of problem area

*saving the main concepts of problem area

*simulation of intellectual activities of the person by transmission of a computer

*+simulation of intellectual activities of the person for transmission of a computer of routine processes

#278

*!Systems of an artificial intelligence are:

*directions of expert systems

*direction of an artificial intelligence

*activities, connected to the direction of an artificial intelligence

*the machine programs created in the direction of expert systems

*+the machine programs created in the direction of artificial intellectual systems

#279

*!Are engaged in expert systems:

*doctors

*experts, students

*students and specialists in the field of an artificial intelligence

*+experts and specialists in the field of an artificial intelligence

*experts, specialists in the field of an artificial intelligence, students

#280

*!Constructing process of expert systems consists of stages:

*8

*2

*3

*4

*+5

#281

*!MS Word 2007. The group symbols is on tab

*view

*home

*+insert

*references

*page layout

#282

*!MS Word 2007. The group table is on tab

*view

*home

*+insert

*references

*page layout

#283

*!MS Word 2007. The clipboard is on tab

*view

*insert

*+home

*references

*page layout

#284

*!MS Word 2007. The group font is on tab

*view

*insert

*+home

*references

*page layout

#285

*!MS Word 2007. The group styles is on tab

*view

*insert

*+home

*references

*page layout

#286

*!MS Word 2007. The group page setup is on tab

*view

*home

*insert

*references

*+page layout

#287

*!MS Word 2007. The group spelling is on tab

*view

*home

*insert

*+review

*page layout

#288

*!MS Word 2007. The group zoom is on tab

*home

*insert

*+view

*references

*page layout

#289

*!MS Word 2007. The ruler pictogram is located on tab

*insert

*home

*+view

*references

*page layout

#290

*!Excel displays the error message ____ in cells to indicate a cell reference error

*REF#  *REF! *REF 

*#REF#  *+#REF!

#291

*!Excel. The Excel program file has an extension

*.txt

*.com

*.bmp

*.docx

*+.Xlsx

#292

*!MS Excel.Which keyboard shortcut should be used to display the format of cells dialog box

*CTRL+5

*CTRL+2

*CTRL+3

*CTRL+4

*+CTRL+1

#293

*!MS Excel.Which keyboard shortcut should be used to apply or remove an italic tracing

*CTRL+1

*CTRL+2

*CTRL+4

*CTRL+5

*+CTRL+3

#294

*!MS Excel. Which keyboard shortcut should be used to cross out the text or to remove deletion

*CTRL+1

*CTRL+2

*CTRL+3

*CTRL+4

*+CTRL+5

#295

*!MS Excel. Which keyboard shortcut should be used to fill a range of cells with the same data

*<Alt>+<Tab>+<Enter>

*<Ctrl>+<Tab>+<Enter>

*<Shift >+<Alt>+<Enter>

*+<Ctrl>+<Shift>+<Enter>

*<Ctrl>+<Shift>+<Space Bar>

#296

*!MS Excel. To add two cells (A1 and A2) together you use the following formula

*A1 + A2

*A1 plus A2

*=Add(A1+A2)

*+=sum(A1;A2)

*=together(A1:A

#297

*!Excel displays the error message ____ in cells to indicate a divide by zero error

*DIV/ # *+#DIV/ ! 

*#VALUE!  *DIVIDE#  *#REF/DIVBYZER

#298

*!The cell A3 contains next formula: =В1+$С1; A3 is copied in A4. The formula in A4 will become

*=В1+С$1

*=В2+$С1

*=В1+С$4

*=В1+С$2

*+=В2+$С2

#299

*!The cell A3 contains next formula: =$В$1+$С1; A3 is copied in A4.The formula in A4 will become

*=В1+С$4

*=В1+С$1

*=$В$1+$С1

*+=$В$1+$С2

*=$В$1+$С$2

#300

*!The cell A3 contains next formula: =В1+С$1; A3 is moved in A4. The formula in A4 will become

*+=В2+С$1

*=В2+С$4

*=В1+С$1

*=$В$1+$С1

*=$В$1+$С$2

#301

*!MSExcel. It is specified in a formula row

*figure

*symbol

*formula

*+cell contents

*address of the current cell

#302

*!MS Excel. For creation of diagrams and drawing up formulas is used

*forms

*reports

*+function wizard

*drawing

*charts

#303

*!The document created in Excel is called

*worksheet

*workfile

*workdocument

*+workbook

*brief document

#304

*!MS Excel. Function of the Office button

*opens a toolbar

*+opens the only menu of the program

*creates and changes marking of the document pages

*provides the choice of various browse modes of the document

*provides spell check, addition of comments

#305

*!MS Excel. Selecting of cells range on the work sheet

*choose the command "editing-to clear-all"

*move the mouse pointer there and back

*right-click and choose the command "to allocate"

*+drag the mouse pointer from one corner of range to another

*drag the mouse pointer down numbers of lines in the left part of the screen

#306

*!МS Аccess.Which data type can store more than 255 characters

*text

*yes/no

*+memo

*long integer

*lookup wizard

#307

*!MS Access. There are 3 type of relationship that valid in MS Access 2007, except

*one to one

*one to many

*many to one

*many to many

*+intermediate

#308

*!MS Аccess. Format of database

*.txt, .doc

*.exe, .mdb

*.bat, .accdb

*.bmp, .accdb

*+.mdb, .ассdb

#309

*!MS Access. What queries are used to summarize data in tables

*Select

*Action

*Cascade

*Parameter

*+CrossTab

#310

*!MSАccess.What type of queries is a queries that select records from tables based on criteria

*Action Queries

*+Select Queries

*Cascade Queries

*CrossTab Queries

*Parameter Queries

#311

*!MSАccess.Table in Microsoft Access can be create by using all below except

*+Input Mask

*Design View

*Form Wizard

*Table Wizard

*Datasheet View

#312

*!MSАccess. Maximum number of symbols in text field of the table

*225

*155

*355

*455

*+255

#313

*!MSАccess. Rename the table

*F6

*F1

*F4

*F5

*+F2

#314

*!MSAccess. You can __________ macros setting so that the macros run automatically for any database you open

*Disable

*+Enable

*Ignoring

*Cancelling

*Removing

#315

*!MSАccess. Before printing a datasheet, you can use______ to determine whether to change the page orientation from portrait to vertical orientation

*Office View

*Design View

*+Print Preview

*Datasheet View

*Pivot chart view

#316

*!MSАccess. Maximum numbers of symbols in «Mемо» field

*65 500

*65 000

*+65 536

*650 563

*65 0000

#317

*!MS Access. A _____ is a major database object used to display information in an attractive, easy-to-read screen format

*table

*+form

*report

*query

*macros

#318

*!MS Access. What happens when a user selects a record in a form and presses [Delete]

*The record is not deleted only in the form

*+The record is deleted in the form and from its source table

*The record is deleted in the form, but not from its source table

*The record is neither deleted in the form, nor from its source table

*The record is not deleted in the form, but is deleted from its source table

#319

*!MS Access. Which of the following cannot be done to data using a form

*Edit

*Sort

*Print

*Filter

*+Store

#320

*!MS Access. What is one of the advantages for using a form over other Access objects

*Forms cannot be edited

*Forms store information more efficiently

*Forms show the summary of all the records

*+Utilizes field placement to improve the efficiency of data entry

*Forms output a financial summary for a period, or a set of mailing labels

#321

*!MS Access. The undo command is found where in Access

*Status bar

*Office button

*Quick Launch Bar

*Home command tab

*+Quick Access toolbar

#322

*!Comand to break slideshow of Power Point

*DEL

*ALT

*TAB

*+ESC

*ENTER

#323

*!The format of presentation created in MS Power Point 2003

*.pptx

*.jpg

*.xlsx

*.doc

*+.рpt

#324

*!Possibilities of the Power Point program

*creation of animation animated films and rollers

*creation of the presentation with the description of program language

*+creation of the presentation with multimedia animation

*creation of text documents with hyperlinks and communications

*creation of the telepresentations in specialized programs

#325

*!Stop or renewal of automatic display

*B or «-» symbol

*S or «-» symbol

*B or «+» symbol

*W or «+» symbol

*+S or «+» symbol

#326

*!The presentation component containing various objects

*sheet

*+slide

*shot

*picture

*photo

#327

*!Set of the slides collected in one file

*sheet

*picture

*slideshow

*+presentation

*text document

#328

*!Transition to the slide under "X" number

*number+ALT

*number+ESC

*number+CTRL

*+number+ENTER

*number+SPACE

#329

*!Transition to the first or following hyperlink on a slide

*ALT+TAB

*ESC+TAB

*CTRL+TAB

*SHIFT+ALT

*+SHIFT+TAB

#330

*!The statistics studies

*periodic events

*single phenomena

*+mass phenomena

*properties of the studied phenomenon

*single signs of the studied phenomenon

#331

*!Origin of the term "statistics"

*statics

*+status

*network

*statistics

*the stately

#332

*!Term «Statistic» was introduced by

*А.Quetelet

*F.Galton

*А.Byushing

*G. Konring

*+G.Akhenval

#333

*!Specify two main groups of viruses:

*Macro, micro

*Network, file viruses

*Harmless, dangerous, very dangerous

*Easy, loading

*+Resident, non-resident

#334

*!Computer viruses are divided by extent of influence on:

*+resident, non-resident

*harmless, dangerous, very dangerous

*detectors, doctors, auditors, filters, vaccines

*network, file, loading, file and loading

*parasitic, replicators, invisible beings, mutants, trojan

#335

*!The viruses using mistakes and inaccuracies in a complex software:

*Worms

*Propagandists

*Trojan Horses

*Logical bombs

*+Virusesinterceptors

#336

*!On features of an algorithm computer viruses divide on:

*resident, non-resident

*harmless, dangerous, very dangerous

*detectors, doctors, auditors, filters, vaccines

*network, file, loading, file and loading

*+parasitic, replicators, invisible beings, mutants, trojan

#337

*!Types of antivirus programs:

*resident, non-resident

*harmless, dangerous, very dangerous

*network, file, loading, file and loading

*+detectors, doctors, auditors, filters, vaccines

*parasitic, replicators, invisible beings, mutants, trojan

#338

*!Antivirus programs can be divided into following main groups:

*filters, vaccines

*resident, non-resident

*+detectors, doctors, auditors

*macros, resident, polymorphic, non-resident, network

*detectors, doctors, auditors, doctors-auditors, filters, vaccines

#339

*!Antivirus programs:

*scanners

*archives

*+antivirus

*brandmauers

*antispammers

#340

*!Antivirus program:

*OutlookExpress

*+Doctor Web

*MS Ехсеl

*MS Word

*Rar

#341

*!Program for search and treatment of computer viruses:

*+Dr Web

*Chat, Excel

*Graphics, Word

*E-Mail, Power Point

*Use Net, Cache Man

#342

*!Computer virus is the program capable to:

*delete all images

*infect the person

*+create own copies

*damage the computer hardware

*destroy only the programs written on algorithmic languages

#343

*!Programs auditors:

*treat infected files

*+modify programs

*find changes and treat

*find the infected files

*find changes in files

#344

*!Polymorphic viruses:

*+are capable to change the code

*contain logical bombs

*can spoil disk drive heads

*the viruses affecting the carried-out files

*are capable to intercept the appeal to file system

#345

*!Programs auditors of disks:

*+find the latent viruses

*check files of windows

*archive the ms dos files

*write down the code in the end of the file

*restore the infected files in an initial state

#346

*!The first stage of creation of expert system:

*checking of expert system's work

*change of the main concepts of problem area

*purpose of the main concepts of problem area

*+definition of the purposes and outcomes for which the expert system is designed

*allocation of the main concepts of problem area which reflect experts' knowledge

#347

*!The second stage of creation of expert system:

*checking of expert system's work

*change of the main concepts of problem area

*purpose of the main concepts of problem area

*definition of the purposes and outcomes for which the expert system is designed

*+allocation of the main concepts of problem area which reflect experts' knowledge

#348

*!The fourth stage of creation of expert system:

*checking of expert system's work

*+directly creation of the knowledge base

*changing of the main concepts of problem area

*definition of the purposes and outcomes for which the expert system is designed

*allocation of the main concepts of problem area which reflect experts' knowledge

#349

*!The fifth stage of creation of expert system:

*+checking of expert system's work

*changing of the main concepts of problem area

*purpose of the main concepts of problem area

*definition of the purposes and outcomes for which the expert system is designed

*allocation of the main concepts of problem area which reflect experts' knowledge

#350

*!Expert system has to include not less than:

*three main elements

*five main elements

*two main elements

*six main elements

*+four main elements

#351

*!The resident virus is:

*DIR-viruses

*network virus

*well known viruses

*the virus which isn't kept in random access memory after completion of work of the program

*+the virus which is kept in random access memory after completion of work of the program

#352

*!Subject of information security is:

*drivers

*archivers

*operating system

*the data set containing information, the subject protection

*+the structural component of a system containing information which has to be protected

#353

*!The element of information security is:

*communication center

*stores

*means of display of information

*+the data set containing information, the subject protection

*the structural component of the system which contains information and has to be protected

#354

*!Kinds of information protection means:

*programs of a bookmark and net worms

*trojan horse, access differentiation

*copying of information, trojan horse

*+copying of information, access differentiation

*copying of information, program of a bookmark and net worms

#355

*!What operation is applied to reliability of work of anti-virus programs:

*definition through network

*operation of archive input

*performance without operations

*+operation of base updating

*operation of archive copying

#356

*!Information security in systems and networks is:

*program auditor

*hardware

*software

*processing of information

*+system ensuring reliability of information

#357

*!Which of the following programs can be a revisor:

*Dir-I

*Sherif

*DrWeb

*+Adinf

*Aidstest

#358

*!The filter program:

*prevents infection of files

*looks for viruses with the known signature

*finds the infected files and treats them

*+finds suspicious actions

*compares an initial condition of the file to current

#359

*!Technology which distributes information from the server to the client, used on mobile devices:

*+mobile push-notification messages

*computing clouds

*virtualization

*micronuclear architecture of a hypervisor

*online conference

#360

*!A model of providing cloud computing for access to use of operating systems and database management system

*Software as a Service

*Infrastructure as a Service

*+Platform as a Service

*Storage as a Service 

*Management as a Service

#361

*!To create profiles in the cloud use Google Docs:

*documents

*tables

*presentations

*+forms

*my cards

#362

*!To work with one Google Document in online mode it is necessary for group of users:

*remove the restriction

*create a conference

*open online chat

*create "circles friends"

*+open shared access

#363

*!To create Google Presentation in the cloud it is necessary:

*create mail.ru

*+have a Google account

*be a Google Hangout User

*have access to social networks

*know the programming language

#364

*!Internet. The process of converting analog signals into digital signals so they can be processed by a receiving computer is referred to as

*Digitizing

*Computing

*Modulation

*Synchronizing

*+Demodulation

#365

*!Internet. Rules of an exchange of information between computers through a network

*+Protocol

*Text editor

*Spreadsheet

*Standard programs

*The executed program

#366

*!Internet. What is the difference between a switch and a hub

*None of these

*+Switches operate at data link while hubs operate at physical layer

*Switches operate at data link layer while hubs operate at transport layer

*Switches operate at transport layer while hubs operate at physical layer

*Switches operate at physical layer while hubs operate at data link layer

#367

*!Internet. Which of the following performs modulation and demodulation

*Satellite

*+Modem

*Flashcard

*Fiber optics

*Coaxial cable

#368

*!One of the internet services

*hypertext

*mail network

*+world wide web

*local network of users

*connection of telephones networks

#369

*!Internet. A network model where there is no server computer is

*Client Network

*Server Network

*Centralized Network

*+Peer to Peer Network

*Client /Server Network

#370

*!Internet. The name of data receiver in computer science

*Server

*Store

*+Client

*Storehouse

*Work station

#371

*!Internet. Language for creating web pages

*Basic, СИ++

* Pascal, Delphi

*Assembler language

*Lisp, Prolog, Basic

*+HTML, MS Front Page

#372

*!The tag defining an underlined font

*<i>…</i>

*<s> … </s>

*<b> … </b>

*<tt> … </tt>

*+<u> … </u>

#373

*!Internet. Special language of formatting of text documents

*Ada

*Basic

*Pascal

*+Html

*Fortran

#374

*!Internet The geometrical scheme of computer association is called

*Tire topology

*Local network

*Ring topology

*Local topology

*+Network topology

#375

*!The tag defining the crossed font

*<u> … </u>

*<big> … </big>

*<blink>…</blink>

*<small> … </small>

*+<strike> … </strike>

#376

*!Html. Tag is

*typing

* typing

*+character set

*hypertext set

*markup language hyper Tex

#377

*!Html. Writing of the text between tags <i> and </i> makes text

*bold

*+italic

*interlinear

*overlined

*underlined

#378

*!Html. Bgcolor attribute gives

*page color

*+background color

*frame color

*font color

*background picture

#379

*!Tags including picture in html-document

*<ig src="file name">

*<img rc="file name">

*<mg src="file name">

*<src img="file name">

*+<img src="file name">

#380

*!Html. Each new element of the list begins with a tag

*<pi>

*<lp>

*<lg>

*<gl>

*+<li>

#381

*!Html. <marquee> and </marquee> tags are used for

*line

*filter

*table

*+running line

*the running column

#382

*!Internet technologies. A tag by means of which transition from one fragment of the text to another is carried out

*<a hr="[jump address]"> the selected text fragment </a>

*<a ref="[ jump address]"> the selected text fragment </a>

*<a hef="[ jump address]"> the selected text fragment </a>

*<aa href="[ jump address]"> the selected text fragment </a>

*+<a href="[ jump address]"> the selected text fragment </a>

#383

*!Html. Tag which defines the background of the screen

*<tt>

*<br>

*<table>

*<noshade>

*+<bgcolor>

#384

*!The menu containing a command of viewing Html code of Web page

*+view

*refresh

*browse

*favorites

*stop

#385

*!WWW Internet service is based on

*Pascal, Delphi

*HTML, MS Excel

*HTML, Turbo Pascal

*WordPad, гипертекст

*+HTML,гипертекст

#386

*!Html. Tags of marking paragraph

*<b>

*<tr>

*<hr>

*<td>

*+<p>

#387

*!Html. Tags which contain the main part of the document

*<tr>_</tr>

*<htm>_</htm>

*<align>_</align>

*<color>_</color>

*+<body>_</body>

#388

*!Html. Тэг <tr…> includes attributes

*head, alt, title

*title, head, height

*noshade, align, width

*+align, valign, bottom

*frameset, color, checkbox

#389

*!Html. Tag which is used to create horizontal rules

*TD

*TR

*OL

*LI

*+HR

#390

*!The place where various information on the user is stored:

*cloud

*browser

*+account

*mailservice

*questionnaire

#391

*!Stream multimedia:

*specialized search

*innovations, for the house and office

*the project which has open source code of fund

*+the broadcasting continuously received from provider

*the accounting entry storing information on the user

#392

*!Defect of a cloud computing is:

*flexibility

*renting

*economy

*availability and mobility

*+not controllability of data

#393

*!Technology which distributes information from the server to the client, used on mobile devices:

*virtualization

*online conference

*computing clouds

*+mobile push-notification messages

*micronuclear architecture of a hypervisor

#394

*!The convenient environment for processing and storage of various formats information with user support of the Internet:

*social networks

*development environment

*mobile services

*operating system

*+cloud technologies

#395

*!Information and communication technologies are:

*social science

*+applied science

*medical science

*humanity

*fundamental science

#396

*!What information volume does contain the text page typed by means of the computer which consists of 50 lines on 80 characters? (1 Kbyte ≈ 1000 bytes)

*400 bytes

*+4 Kbytes

*3200 bits

*40 Kbits

*800 bytes

#397

*!Internet. Сетевые операционные системы

*MS Word

*MS Excel

*Norton Commander

*+Windows NT Server, Novell Netware

*Windows, MS DOS, UNIX. Windows NT Server

#398

*!Definition of the Internet

*database

*text editor

*spreadsheet

*+worldwide global computer network

*the universal tool for preparation and design of the presentation

#399

*!Internet. World Wide Web is

*Internet

*hyperlink

*+world wide web

*separate document

*information space

#400

*!Internet. Program for web browsing

*tags

*+browser

*hypertext

*Web-surfing

*hypertext link

#401

*!Internet. The form of direct communication in Internet in Online mode

*+chat

*filter

*host-computer

*line of the message

*electronic textbook

#402

*!Internet. The program for operation with e-mail

*MS Word

*Clipboard

*+Outlook Express

*Windows, MS DOS, UNIX

*Windows NT Server, Novell Netware

#403

*!Internet. Правила обмена информации между компьютерами посредством сети

*+protocol

*text editor

*accessories

*spreadsheet

*executed program

#404

*!Formats of Html document

*.txt и. xls

*.exe и. htl

*.doc.txt

*.mht и xml

*+.htm и html

#405

*!Html. Heading tags

*<p>_</p>

*<title>_</title>

*<font>_</font>

*<html>_</html>

*+<head>_</head>

#406

*!The address of Web-site on world wide web, for instance, http://www.microsoft.com

*IP address

*locator

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]