Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Тренировочный тест ИКТ 540+ (1)-1

.pdf
Скачиваний:
1
Добавлен:
07.05.2025
Размер:
899.75 Кб
Скачать

*5

*+3

*6

#86

*!Level of cloud technologies. Platform as a Service - PaaS)

*auxiliary level *infrastructure level *top level of appendices

*the lowest level of a platform *+intermediate level of a platform

#87

*!Global system of coordinates determination

*+GPS

*GSM

*LTE

*Gmail

*FTP

#88

*!The system which allows to make calls and send messages

*GPS

*+GSM

*Symbian

*Tizen

*iOS

#89

*!Google services

*ICQ, Internet *Cloud

*Mailing, E-services *+Google+, My account *Documents

#90

*!In GOOGLE.com it is possible to create

*report, schemes *queries, reports *catalogs, books *programs, documents

*+documents, presentations

91

*!Cybersecurity. Information security from illegal access

*installation of the anti-virus program

*+each user of system shall have the personal password

*assignment of responsible persons for information output

*to define an information access only for a manual of MPI

*each user shall have the computer for operation with system

#92

*!Cybersecurity. The main types of computer viruses

*hardware, file *load, resident

*non-resident, not dangerous *+program, load, macro viruses *file - load, not dangerous, resident

#93

*!Cybersecurity. Antivirus programs

*Eset, MS Access *MS Word, MS Excel *ZIP, MS Power Point

*+AidsTest, Kaspersky Kav *MS DOS, DoctorWeb, RAR

#94

*!Cybersecurity. Formats of executed files

*.doc, .bat *.jpg, .txt, .doc *.bmp, rar, html

*+.exe, .com, .bat *xls, zip, .doc, .bat

#95

*!Cybersecurity. Depending on the habitat computer viruses are divided as

*resident, non-resident

*harmless, dangerous, very dangerous *+network, file, loading, file and loading *detectors, doctors, auditors, filters, vaccines

*parasitic, replicators, invisible beings, mutants, trojan

#96

*!Cybersecurity. On a way of infection computer viruses are divided as

*resident, non-resident

*+harmless, dangerous, very dangerous *network, file, loading, file and loading *detectors, doctors, auditors, filters, vaccines

*parasitic, replicators, invisible beings, mutants, trojan

#97

*!Cybersecurity. MS Windows. File characteristics

*changing, moving and deleting the file *copying, moving, deleting file and attributes *date of moving of the file, creation date and time

*renaming, moving, deleting file and time of creation *+file name, creation date and time, file size and attributes

#98

*!Cybersecurity. Stealth viruses

*infect drivers *infect boot sectors *+hide their presence

*destroy all information *display the graphic drawing

#99

*!Cybersecurity. The way of virus detection includes

*+scanning *copying files *heuristic analysis

*record of all files volume *checking of executing files

#100

*!Cybersecurity. Computer can be infected with the virus

*on incorrect loading *when loading drivers

*when text program is working *+when executing the infected program

*when inserting a floopy disk into the disk drive

#101

*!Cybersecurity. Detector programs

*modify programs *find the infected files *find changes and treat *+treat the infected files

*only find changes in files

#102

*!Cybersecurity. Doctor programs

*modify programs *find the infected files *find changes and treat *+treat the infected files

*only find changes in files

#103

*!Cybersecurity. The computer virus is

*the program providing compression of files

*the program intended for creation of the presentation

*the program used for increase in speed of operation of a disc *the program for coercion of the archived file to an initial look *+specially written program of small volume which spoils them

#104

*!Cybersecurity. The main two groups of viruses

*network, file *macro, micro *loading, dangerous

*+resident, non-resident *dangerous, not dangerous

#105

*!Cybersecurity. The viruses using errors and inaccuracies in a complex of software

*worms *trojan horses *propagandists *logical bombs

*+viruses interceptors

#106

*!Cybersecurity. Anti-virus programs

*MS DOS, NC

*ARJ, RAR, ZIP *AutoCAD, CorelDraw

*MS Word, MS Excel, MS Access *+AidsTest, Doctor Web, Kaspersky KAV

#107

*!Cybersecurity.In what case the computer can be infected with virus

*when formatting a disk *when testing the computer *when loading of the computer

*at start of the DoctorWeb program

*+during the work with the infected program

#108

*!Cybersecurity. Doctor Program

*Finds suspicious actions *Prevents infection of files

*+Finds the infected files and treats them *Looks for viruses with the known signature

*Compares an initial condition of the file to current

#109

*!Cybersecurity. Infection with loading viruses occurs at

*Closing of the file *Opening of the file *Data recording in the file

*Reading of information from the file *+Turning on the computer with busy floppy

#110

*!Cybersecurity. Loading viruses can infect

*еxe-files *OBJ-files *batch-files *COM-files

*+Boot-Strap program

#111

*!Cybersecurity. Replicators

*Find a virus *Delete a virus *+Transfer a virus

*Destroy a virus program *Warning infection with a virus

#112

*!Cybersecurity. Auditor programs

*Treat a disk *Use vaccines

*Treat all computer

*Delete only the infected files of Windows

*+ Remember data on a condition of programs

#113

*!Cybersecurity. Macro viruses are

*Network files *Package files *Dialogue files *Loading files *+Macros

#114

*!Cybersecurity. AVP is

*graphics editor *+anti-virus program

*the program spreading virus *program of defragmentation

*the program, the pressing the file for saving of the place on a disk

#115

*!Cybersecurity. The computer virus is

*text editor *graphic editor

*programming language

*+the program damaging computer programs and data *the program which is carrying out start of the computer

#116

*!Cybersecurity. Distinctive features of a computer virus are

*ease of recognition

*considerable volume of a program code *need of start of the program from the user

*ability to increase in a noise stability of an operating system

*+small volume ability to independent start and repeated copying of a code, to creation of noise to correct operation of the computer

#117

*!How the computer can be infected a virus

*when loading drivers *when opening the internet *in case of the wrong loading

*+in case of execution of the infected program *when inserting the disc with the infected program

#118

*!The computer virus is

*the hidden programs which erase, but they aren't removed *the program which protects the computer from harmful files *not readable data which are kept on rigid or on a floppy disk

*programs which don't give the chance to open data with the password

*+the program which breeds itself and does harm to the computer of the user and other objects located in network

#119

!*The text "SYRYECUMT SSTEI" deciphered by method of simple swap will look as follows

*«SEQURITY RISK» *«STORAGE DEVICE» *+«SECURITY SYSTEM» *«INFORMATION SYSTEM» *«SECONDARY STORAGE »

#120

!*The text ciphered by method of simple swap "INTEGRITY INFORMATION SYSTEMS" will look as follows

*"RIGENTY SSYETSMFORMIONN" *"IRIGENTY SSYETSO MFORMIONN" *"SYETSMS NUITANIONF IYRIGETNI" *+"SMETSYS NOITAMRONF YTIRGETNI" *"YTIRGETNI NOITAMROFNI YTIRGETNI"

121

*!Main stages of e-government in the Republic of Kazakhstan

*+Information, interactive, transactional *Democratic society, the information society *Bridging Digital Divide, information society *E-government portal, a single transport medium *Payment gateway, a national identification system

#122

*!Program of forming «E-government» in Republic of Kazakhstan on 2005-2007

*25.10.2005, №991 *13.10. 2006, №995 *11.10. 2004, №1459 *18.08. 2003, №1166 *+10.11.2004, №1471

#123

*!The number of information services on web-portal of «E-government»

*999

*900

*145

*300

*+933

#124

*!Citizens, government agencies, organizations and other economic entities utilizing the services of e-government

*E- service *E-banking *E-government *E-service providers

*+Consumers of e-services

#125

*!State bodies, organizations and other economic entities providing services ict tools

*E-service *E-banking *E-government *+E-service providers *Consumers e-services

#126

*!The law "About the Electronic Document and the Digital Signature" was adopted

*10th January 2005, № 37

*1st January 2007, № 370

*7th January 2002, № 37-2

*7th January 2000, № 70-2

*+7th January 2003, № 370-2

#127

*!The abbreviation designating interaction of government with citizens

*consumer-to-consumer *government -to-business *consumer-to- government *+government-to-consumer *government-to- government

#128

*!The abbreviation designating interaction of the state with government

*business-to-consumer *consumer-to-consumer *government -to-business *consumer-to- government *+government-to- government

#129

*!The abbreviation designating interaction of the state with private sectors

*consumer-to-consumer *business-to-government *+government -to-business *consumer-to- government *government-to- government

#130

*!The abbreviation designating interaction of business with the state

*business-to- business *consumer-to-business *business-to-consumer *government -to-business *+business-to-government

#131

*!The abbreviation designating interaction of citizens with the state

*consumer-to-business *business-to-consumer *consumer-to-consumer *+consumer-to- government *government-to- government