
Тренировочный тест ИКТ 540+ (1)-1
.pdf*5
*+3
*6
#86
*!Level of cloud technologies. Platform as a Service - PaaS)
*auxiliary level *infrastructure level *top level of appendices
*the lowest level of a platform *+intermediate level of a platform
#87
*!Global system of coordinates determination
*+GPS
*GSM
*LTE
*Gmail
*FTP
#88
*!The system which allows to make calls and send messages
*GPS
*+GSM
*Symbian
*Tizen
*iOS
#89
*!Google services
*ICQ, Internet *Cloud
*Mailing, E-services *+Google+, My account *Documents
#90
*!In GOOGLE.com it is possible to create
*report, schemes *queries, reports *catalogs, books *programs, documents
*+documents, presentations
91
*!Cybersecurity. Information security from illegal access
*installation of the anti-virus program
*+each user of system shall have the personal password
*assignment of responsible persons for information output
*to define an information access only for a manual of MPI
*each user shall have the computer for operation with system
#92
*!Cybersecurity. The main types of computer viruses
*hardware, file *load, resident
*non-resident, not dangerous *+program, load, macro viruses *file - load, not dangerous, resident
#93
*!Cybersecurity. Antivirus programs
*Eset, MS Access *MS Word, MS Excel *ZIP, MS Power Point
*+AidsTest, Kaspersky Kav *MS DOS, DoctorWeb, RAR
#94
*!Cybersecurity. Formats of executed files
*.doc, .bat *.jpg, .txt, .doc *.bmp, rar, html
*+.exe, .com, .bat *xls, zip, .doc, .bat
#95
*!Cybersecurity. Depending on the habitat computer viruses are divided as
*resident, non-resident
*harmless, dangerous, very dangerous *+network, file, loading, file and loading *detectors, doctors, auditors, filters, vaccines
*parasitic, replicators, invisible beings, mutants, trojan
#96
*!Cybersecurity. On a way of infection computer viruses are divided as
*resident, non-resident
*+harmless, dangerous, very dangerous *network, file, loading, file and loading *detectors, doctors, auditors, filters, vaccines
*parasitic, replicators, invisible beings, mutants, trojan
#97
*!Cybersecurity. MS Windows. File characteristics
*changing, moving and deleting the file *copying, moving, deleting file and attributes *date of moving of the file, creation date and time
*renaming, moving, deleting file and time of creation *+file name, creation date and time, file size and attributes
#98
*!Cybersecurity. Stealth viruses
*infect drivers *infect boot sectors *+hide their presence
*destroy all information *display the graphic drawing
#99
*!Cybersecurity. The way of virus detection includes
*+scanning *copying files *heuristic analysis
*record of all files volume *checking of executing files
#100
*!Cybersecurity. Computer can be infected with the virus
*on incorrect loading *when loading drivers
*when text program is working *+when executing the infected program
*when inserting a floopy disk into the disk drive
#101
*!Cybersecurity. Detector programs
*modify programs *find the infected files *find changes and treat *+treat the infected files
*only find changes in files
#102
*!Cybersecurity. Doctor programs
*modify programs *find the infected files *find changes and treat *+treat the infected files
*only find changes in files
#103
*!Cybersecurity. The computer virus is
*the program providing compression of files
*the program intended for creation of the presentation
*the program used for increase in speed of operation of a disc *the program for coercion of the archived file to an initial look *+specially written program of small volume which spoils them
#104
*!Cybersecurity. The main two groups of viruses
*network, file *macro, micro *loading, dangerous
*+resident, non-resident *dangerous, not dangerous
#105
*!Cybersecurity. The viruses using errors and inaccuracies in a complex of software
*worms *trojan horses *propagandists *logical bombs
*+viruses interceptors
#106
*!Cybersecurity. Anti-virus programs
*MS DOS, NC
*ARJ, RAR, ZIP *AutoCAD, CorelDraw
*MS Word, MS Excel, MS Access *+AidsTest, Doctor Web, Kaspersky KAV
#107
*!Cybersecurity.In what case the computer can be infected with virus
*when formatting a disk *when testing the computer *when loading of the computer
*at start of the DoctorWeb program
*+during the work with the infected program
#108
*!Cybersecurity. Doctor Program
*Finds suspicious actions *Prevents infection of files
*+Finds the infected files and treats them *Looks for viruses with the known signature
*Compares an initial condition of the file to current
#109
*!Cybersecurity. Infection with loading viruses occurs at
*Closing of the file *Opening of the file *Data recording in the file
*Reading of information from the file *+Turning on the computer with busy floppy
#110
*!Cybersecurity. Loading viruses can infect
*еxe-files *OBJ-files *batch-files *COM-files
*+Boot-Strap program
#111
*!Cybersecurity. Replicators
*Find a virus *Delete a virus *+Transfer a virus
*Destroy a virus program *Warning infection with a virus
#112
*!Cybersecurity. Auditor programs
*Treat a disk *Use vaccines
*Treat all computer
*Delete only the infected files of Windows
*+ Remember data on a condition of programs
#113
*!Cybersecurity. Macro viruses are
*Network files *Package files *Dialogue files *Loading files *+Macros
#114
*!Cybersecurity. AVP is
*graphics editor *+anti-virus program
*the program spreading virus *program of defragmentation
*the program, the pressing the file for saving of the place on a disk
#115
*!Cybersecurity. The computer virus is
*text editor *graphic editor
*programming language
*+the program damaging computer programs and data *the program which is carrying out start of the computer
#116
*!Cybersecurity. Distinctive features of a computer virus are
*ease of recognition
*considerable volume of a program code *need of start of the program from the user
*ability to increase in a noise stability of an operating system
*+small volume ability to independent start and repeated copying of a code, to creation of noise to correct operation of the computer
#117
*!How the computer can be infected a virus
*when loading drivers *when opening the internet *in case of the wrong loading
*+in case of execution of the infected program *when inserting the disc with the infected program
#118
*!The computer virus is
*the hidden programs which erase, but they aren't removed *the program which protects the computer from harmful files *not readable data which are kept on rigid or on a floppy disk
*programs which don't give the chance to open data with the password
*+the program which breeds itself and does harm to the computer of the user and other objects located in network
#119
!*The text "SYRYECUMT SSTEI" deciphered by method of simple swap will look as follows
*«SEQURITY RISK» *«STORAGE DEVICE» *+«SECURITY SYSTEM» *«INFORMATION SYSTEM» *«SECONDARY STORAGE »
#120
!*The text ciphered by method of simple swap "INTEGRITY INFORMATION SYSTEMS" will look as follows
*"RIGENTY SSYETSMFORMIONN" *"IRIGENTY SSYETSO MFORMIONN" *"SYETSMS NUITANIONF IYRIGETNI" *+"SMETSYS NOITAMRONF YTIRGETNI" *"YTIRGETNI NOITAMROFNI YTIRGETNI"
121
*!Main stages of e-government in the Republic of Kazakhstan
*+Information, interactive, transactional *Democratic society, the information society *Bridging Digital Divide, information society *E-government portal, a single transport medium *Payment gateway, a national identification system
#122
*!Program of forming «E-government» in Republic of Kazakhstan on 2005-2007
*25.10.2005, №991 *13.10. 2006, №995 *11.10. 2004, №1459 *18.08. 2003, №1166 *+10.11.2004, №1471
#123
*!The number of information services on web-portal of «E-government»
*999
*900
*145
*300
*+933
#124
*!Citizens, government agencies, organizations and other economic entities utilizing the services of e-government
*E- service *E-banking *E-government *E-service providers
*+Consumers of e-services
#125
*!State bodies, organizations and other economic entities providing services ict tools
*E-service *E-banking *E-government *+E-service providers *Consumers e-services
#126
*!The law "About the Electronic Document and the Digital Signature" was adopted
*10th January 2005, № 37
*1st January 2007, № 370
*7th January 2002, № 37-2
*7th January 2000, № 70-2
*+7th January 2003, № 370-2
#127
*!The abbreviation designating interaction of government with citizens
*consumer-to-consumer *government -to-business *consumer-to- government *+government-to-consumer *government-to- government
#128
*!The abbreviation designating interaction of the state with government
*business-to-consumer *consumer-to-consumer *government -to-business *consumer-to- government *+government-to- government
#129
*!The abbreviation designating interaction of the state with private sectors
*consumer-to-consumer *business-to-government *+government -to-business *consumer-to- government *government-to- government
#130
*!The abbreviation designating interaction of business with the state
*business-to- business *consumer-to-business *business-to-consumer *government -to-business *+business-to-government
#131
*!The abbreviation designating interaction of citizens with the state
*consumer-to-business *business-to-consumer *consumer-to-consumer *+consumer-to- government *government-to- government