|
|||
Tests on ICT subject 4 страницаc) is designed to run from removable storage, such as a CD or USB flash drive. d) is a means of protecting software from illegal copying by requiring users to enter a product key or activation code before the software can be used. e) They are sometimes referred, because they offer features that really help get work done.
201. Рoint size a) Font size is measured, abbreviated pt. b) People who circumvent copyright law and illegally copy, distribute, or modify software are sometimes called software pirates, and their illegal copies are referred. c) is designed to run from removable storage, such as a CD or USB flash drive. d) is a means of protecting software from illegal copying by requiring users to enter a product key or activation code before the software can be used. e) They are sometimes referred, because they offer features that really help get work done.
202. Portable software a) is designed to run from removable storage, such as a CD or USB flash drive. b) People who circumvent copyright law and illegally copy, distribute, or modify software are sometimes called software pirates, and their illegal copies are referred. c) Font size is measured, abbreviated pt. d) is a means of protecting software from illegal copying by requiring users to enter a product key or activation code before the software can be used. e) They are sometimes referred, because they offer features that really help get work done.
203. Product activation a) is a means of protecting software from illegal copying by requiring users to enter a product key or activation code before the software can be used. b) People who circumvent copyright law and illegally copy, distribute, or modify software are sometimes called software pirates, and their illegal copies are referred. c) Font size is measured, abbreviated pt. d) is designed to run from removable storage, such as a CD or USB flash drive. e) They are sometimes referred, because they offer features that really help get work done.
204. productivity software a) They are sometimes referred, because they offer features that really help get work done. b) People who circumvent copyright law and illegally copy, distribute, or modify software are sometimes called software pirates, and their illegal copies are referred. c) Font size is measured, abbreviated pt. d) is designed to run from removable storage, such as a CD or USB flash drive. e) is a means of protecting software from illegal copying by requiring users to enter a product key or activation code before the software can be used.
205. Proprietary software a) has restrictions on its use that are delineated by copyright, patents, or license agreements. b) is not protected by copyright because the copyright has expired, or the author has placed the program in the public domain, making it available without restriction. c) contains code that is suspected of being part of a virus іn the context of antivirus software. d) describes the information you want to find. e) QBE) simply requires you to fill out a form with the type of data you want to locate.
206. Public domain software a) is not protected by copyright because the copyright has expired, or the author has placed the program in the public domain, making it available without restriction. b) has restrictions on its use that are delineated by copyright, patents, or license agreements. c) contains code that is suspected of being part of a virus іn the context of antivirus software. d) describes the information you want to find. e) QBE) simply requires you to fill out a form with the type of data you want to locate. 207. Quarantined file a) contains code that is suspected of being part of a virus іn the context of antivirus software. b) has restrictions on its use that are delineated by copyright, patents, or license agreements. c) is not protected by copyright because the copyright has expired, or the author has placed the program in the public domain, making it available without restriction. d) describes the information you want to find. e) QBE) simply requires you to fill out a form with the type of data you want to locate.
208. Query a) describes the information you want to find. b) has restrictions on its use that are delineated by copyright, patents, or license agreements. c) is not protected by copyright because the copyright has expired, or the author has placed the program in the public domain, making it available without restriction. d) contains code that is suspected of being part of a virus іn the context of antivirus software. e) QBE) simply requires you to fill out a form with the type of data you want to locate. .
209. Query by example a) (QBE) simply requires you to fill out a form with the type of data you want to locate. b) has restrictions on its use that are delineated by copyright, patents, or license agreements. c) is not protected by copyright because the copyright has expired, or the author has placed the program in the public domain, making it available without restriction. d) contains code that is suspected of being part of a virus іn the context of antivirus software. e) describes the information you want to find.
210. Query language a) such as SQL (Structured Query Language), provides a set of commands for locating and manipulating data. b) holds data for a single entity—a person, place, thing, or event. c) The process, but most consumers have no need to root their mobile devices. d) refers to software tools used to conceal malware and backdoors that have been installed on a victim’s computer. e) feature to hunt down mistakes that you habitually make in your writing.
211. Record a) holds data for a single entity—a person, place, thing, or event. b) such as SQL (Structured Query Language), provides a set of commands for locating and manipulating data. c) The process, but most consumers have no need to root their mobile devices. d) refers to software tools used to conceal malware and backdoors that have been installed on a victim’s computer. e) feature to hunt down mistakes that you habitually make in your writing.
212. Rooting a) The process, but most consumers have no need to root their mobile devices. b) such as SQL (Structured Query Language), provides a set of commands for locating and manipulating data. c) holds data for a single entity—a person, place, thing, or event. d) refers to software tools used to conceal malware and backdoors that have been installed on a victim’s computer. e) feature to hunt down mistakes that you habitually make in your writing.
213. Search and Replace a) feature to hunt down mistakes that you habitually make in your writing. b) such as SQL (Structured Query Language), provides a set of commands for locating and manipulating data. c) holds data for a single entity—a person, place, thing, or event. d) The process, but most consumers have no need to root their mobile devices. e) refers to software tools used to conceal malware and backdoors that have been installed on a victim’s computer.
214. Software installation a) is the process of placing a program into a computer so that it can be run or executed. b) that limits use to one person at a time. c) is generally priced at a flat rate and allows software to be used on all computers at a specific location. d) or license agreement, is a legal contract that defines the ways in which you may use a computer program. e) (sometimes called a software patch) is a small section of program code that replaces part of the software you currently have installed.
215. Spreadsheet a) uses rows and columns of numbers to create a model or representation of a real situation. b) рeriodically, software publishers replace older versions of a software product with a new version that’s sometimes referred. c) that marks misspelled words in a document d) A spelling checker works by comparing each word from your document to a list of correctly spelled words stored in a data file. e) is a type of program that secretly gathers personal information without the victim’s knowledge, usually for advertising and other commercial purposes.
216. Spyware a) is a type of program that secretly gathers personal information without the victim’s knowledge, usually for advertising and other commercial purposes. b) рeriodically, software publishers replace older versions of a software product with a new version that’s sometimes referred. c) that marks misspelled words in a document d) A spelling checker works by comparing each word from your document to a list of correctly spelled words stored in a data file. e) uses rows and columns of numbers to create a model or representation of a real situation.
217. System requirements a) specify the operating system and minimum hardware capacities necessary for a software product to work correctly. b) that can track down and fix disk errors, repair corrupted files, and give your device a performance-enhancing tune-up. c) (sometimes simply called a Trojan) is a computer program that seems to perform one function while actually doing something else. d) which deletes the software’s files from various folders on your computer’s hard disk. e) As part of the installation process, this downloaded file must be reconstituted into the original collection of files.
218. System utilities a) that can track down and fix disk errors, repair corrupted files, and give your device a performance-enhancing tune-up. b) specify the operating system and minimum hardware capacities necessary for a software product to work correctly. c) (sometimes simply called a Trojan) is a computer program that seems to perform one function while actually doing something else. d) which deletes the software’s files from various folders on your computer’s hard disk. e) As part of the installation process, this downloaded file must be reconstituted into the original collection of files.
219. Trojan horse a) (sometimes simply called a Trojan) is a computer program that seems to perform one function while actually doing something else. b) specify the operating system and minimum hardware capacities necessary for a software product to work correctly. c) that can track down and fix disk errors, repair corrupted files, and give your device a performance-enhancing tune-up. d) which deletes the software’s files from various folders on your computer’s hard disk. e) As part of the installation process, this downloaded file must be reconstituted into the original collection of files.
220. Uninstall routine a) which deletes the software’s files from various folders on your computer’s hard disk. b) specify the operating system and minimum hardware capacities necessary for a software product to work correctly. c) that can track down and fix disk errors, repair corrupted files, and give your device a performance-enhancing tune-up. d) (sometimes simply called a Trojan) is a computer program that seems to perform one function while actually doing something else. e) As part of the installation process, this downloaded file must be reconstituted into the original collection of files.
221. unzipped a) As part of the installation process, this downloaded file must be reconstituted into the original collection of files. b) specify the operating system and minimum hardware capacities necessary for a software product to work correctly. c) that can track down and fix disk errors, repair corrupted files, and give your device a performance-enhancing tune-up. d) (sometimes simply called a Trojan) is a computer program that seems to perform one function while actually doing something else. e) which deletes the software’s files from various folders on your computer’s hard disk.
222. utility software a) A type of system software that is designed to help you monitor and configure settings for your digital gear, its operating system, or application software. b) is a number that you want to use in a calculation. c) Virus signatures and other information that antivirus software uses to identify and eradicate malware are stored in one or more files usually referred (or a virus database). d) usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose. e) (or Web app) is software that is accessed with a Web browser.
223. Value a) is a number that you want to use in a calculation. b) A type of system software that is designed to help you monitor and configure settings for your digital gear, its operating system, or application software. c) Virus signatures and other information that antivirus software uses to identify and eradicate malware are stored in one or more files usually referred (or a virus database). d) usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose. e) (or Web app) is software that is accessed with a Web browser. 224. What is Virus hoax a) usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose. b) A type of system software that is designed to help you monitor and configure settings for your digital gear, its operating system, or application software. c) is a number that you want to use in a calculation. d) Virus signatures and other information that antivirus software uses to identify and eradicate malware are stored in one or more files usually referred (or a virus database). e) (or Web app) is software that is accessed with a Web browser.
225. Web application a) (or Web app) is software that is accessed with a Web browser. b) A type of system software that is designed to help you monitor and configure settings for your digital gear, its operating system, or application software. c) is a number that you want to use in a calculation. d) Virus signatures and other information that antivirus software uses to identify and eradicate malware are stored in one or more files usually referred (or a virus database). e) usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.
226. Worksheet. a) уou use spreadsheet software to create an on-screen. b) A feature which determines how your text flows from line to line by automatically moving words down to the next line as you reach the right margin. c) Usually all the files needed for the new software, consolidate them into one large file, which is compressed to decrease its size and reduce the download time. d) A computer under the control of a bad bot is sometimes referred, because it carries out instructions from a malicious leader. e) usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.
227. Zipped a) Usually all the files needed for the new software, consolidate them into one large file, which is compressed to decrease its size and reduce the download time. b) A feature which determines how your text flows from line to line by automatically moving words down to the next line as you reach the right margin. c) уou use spreadsheet software to create an on-screen. d) A computer under the control of a bad bot is sometimes referred, because it carries out instructions from a malicious leader. e) usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.
228. Analog data is a) represented using an infinite scale of values b) text, numbers, graphics, sound, and video that have been converted into discrete digits such as 0s and c) has only two digits: 0 and 1. d) requires only seven bits for each character. e) a superset of ASCII that uses eight bits to represent each character. 229. Digital data is
a) text, numbers, graphics, sound, and video that have been converted into discrete digits such as 0s and 1s b) represented using an infinite scale of values c) has only two digits: 0 and 1. d) requires only seven bits for each character. e) a superset of ASCII that uses eight bits to represent each character.
230. The binary number system a) has only two digits: 0 and 1. b) represented using an infinite scale of values c) text, numbers, graphics, sound, and video that have been converted into discrete digits such as 0s and 1s d) requires only seven bits for each character. e) a superset of ASCII that uses eight bits to represent each character. 231. ASCII
a) requires only seven bits for each character. b) represented using an infinite scale of values c) text, numbers, graphics, sound, and video that have been converted into discrete digits such as 0s and d) has only two digits: 0 and 1. e) a superset of ASCII that uses eight bits to represent each character. . 232. Extended ASCII is a) a superset of ASCII that uses eight bits to represent each character. b) represented using an infinite scale of values c) text, numbers, graphics, sound, and video that have been converted into discrete digits such as 0s and d) has only two digits: 0 and 1. e) requires only seven bits for each character.
233. Unicode a) uses sixteen bits and provides codes for 65, 000 characters—a real bonus for representing the alphabets of multiple languages b) a superset of ASCII that uses eight bits to represent each character. c) represented using an infinite scale of values d) text, numbers, graphics, sound, and video that have been converted into discrete digits such as 0s and e) has only two digits: 0 and 1. 234. The term peripheral device a) designates input, output, and storage equipment that might be added to a computer system to enhance its functionality. b) is the case that holds the computer’s main circuit boards, microprocessor, memory, power supply, and storage devices. c) is an input device designed to manipulate on-screen graphical objects and controls. d) can output digital music, digitally recorded speech, and a variety of sound effects. e) is an output device that produces computergenerated text or graphical images on paper.
235. The system unit f) is the case that holds the computer’s main circuit boards, microprocessor, memory, power supply, and storage devices. g) designates input, output, and storage equipment that might be added to a computer system to enhance its functionality. h) is an input device designed to manipulate on-screen graphical objects and controls. i) can output digital music, digitally recorded speech, and a variety of sound effects. j) is an output device that produces computergenerated text or graphical images on paper.
236. A mouse a) is an input device designed to manipulate on-screen graphical objects and controls. b) designates input, output, and storage equipment that might be added to a computer system to enhance its functionality. c) is the case that holds the computer’s main circuit boards, microprocessor, memory, power supply, and storage devices. d) can output digital music, digitally recorded speech, and a variety of sound effects. e) is an output device that produces computergenerated text or graphical images on paper.
237. The sound system
a) can output digital music, digitally recorded speech, and a variety of sound effects. b) designates input, output, and storage equipment that might be added to a computer system to enhance its functionality. c) is the case that holds the computer’s main circuit boards, microprocessor, memory, power supply, and storage devices. d) is an input device designed to manipulate on-screen graphical objects and controls. e) is an output device that produces computergenerated text or graphical images on paper.
238. A computer printer
k) is an output device that produces computergenerated text or graphical images on paper. l) designates input, output, and storage equipment that might be added to a computer system to enhance its functionality. m) is the case that holds the computer’s main circuit boards, microprocessor, memory, power supply, and storage devices. n) is an input device designed to manipulate on-screen graphical objects and controls. o) can output digital music, digitally recorded speech, and a variety of sound effects.
239. An optical drive a) is a storage device that works with CDs, DVDs. b) designates input, output, and storage equipment that might be added to a computer system to enhance its functionality. c) is the case that holds the computer’s main circuit boards, microprocessor, memory, power supply, and storage devices. d) is an input device designed to manipulate on-screen graphical objects and controls. e) can output digital music, digitally recorded speech
240. A hard disk drive a) is the main storage device on many computer systems. b) designates input, output, and storage equipment that might be added to a computer system to enhance its functionality. c) is the case that holds the computer’s main circuit boards, microprocessor, memory, power supply, and storage devices. d) is an input device designed to manipulate on-screen graphical objects and controls. e) can output digital music, digitally recorded speech, and a variety of sound effects.
241. A tower unit a) can be placed on the desk or on the floor b) is often placed under the monitor c) is a small, lightweight portable computer that opens like a clamshell to reveal a screen and keyboard d) is an enhanced mobile phone that also functions as a portable media player and has the capability to access the Internet. e) is integrated into the case that holds the screen.
242. A horizontal unit a) is often placed under the monitor b) can be placed on the desk c) is a small, lightweight portable computer that opens like a clamshell to reveal a screen and keyboard d) is an enhanced mobile phone that also functions as a portable media player and has the capability to access the Internet. e) is integrated into the case that holds the screen. f)
243. An all- in- one model A) is integrated into the case that holds the screen. B) can be placed on the desk or on the floor C) is often placed under the monitor D) is a small, lightweight portable computer that opens like a clamshell to reveal a screen and keyboard E) is an enhanced mobile phone that also functions as a portable media player and has the capability to access the Internet.
244. A laptop computer a) is a small, lightweight portable computer that opens like a clamshell to reveal a screen and keyboard b) can be placed on the desk or on the floor c) is often placed under the monitor d) is an enhanced mobile phone that also functions as a portable media player and has the capability to access the Internet. e) is integrated into the case that holds the screen.
245. A smartphone A) is an enhanced mobile phone that also functions as a portable media player and has the capability to access the Internet. B) can be placed on the desk or on the floor C) is often placed under the monitor D) is a small, lightweight portable computer that opens like a clamshell to reveal a screen and keyboard E) is integrated into the case that holds the screen.
246. A tablet computer a) is a handheld computer that is essentially a large version of an enhanced media player. b) is often placed under the monitor c) is a small, lightweight portable computer that opens like a clamshell to reveal a screen and keyboard d) is an enhanced mobile phone that also functions as a portable media player and has the capability to access the Internet. e) is integrated into the case that holds the screen.
247. The PC platform a) is based on the original IBM PC. b) is based on a proprietary design for a personal computer called the Macintosh (or Mac), manufactured almost exclusively by Apple Inc. c) uses a standard PC or Mac to run operating system. d) processor powered the original IBM PC. e) is Intel’s chief rival in the PC chip market.
248. The Mac platform a) is based on proprietary design for personal computer b) is based on the original IBM PC c) is integrated into the case that holds the screen
d) uses a standard PC or Mac to run operating system e) processor powered the original IBM PC
249. The Linux platform a) uses a standard PC or Mac to run operating system. b) is based on the original IBM PC c) is based on a proprietary design for a personal computer called the Macintosh (or Mac), manufactured almost exclusively by Apple Inc. d) processor powered the original IBM PC. e) is Intel’s chief rival in the PC chip market.
250. Intel’s 8088 a) processor powered the original IBM PC. b) is based on the original IBM PC c) is based on a proprietary design for a personal computer called the Macintosh (or Mac), manufactured almost exclusively by Apple Inc. d) uses a standard PC or Mac to run operating system. e) is Intel’s chief rival in the PC chip market.
251. AMD a) is Intel’s chief rival in the PC chip market. b) is based on the original IBM PC c) is based on a proprietary design for a personal computer called the Macintosh (or Mac), manufactured almost exclusively by Apple Inc. d) uses a standard PC or Mac to run operating system. e) processor powered the original IBM PC.
252. ARM a) processors are designed and licensed by a British technology company founded by Acorn Computers, Apple Inc., and VLSI Technology b) is based on the original IBM PC c) is based on a proprietary design for a personal computer called the Macintosh (or Mac), manufactured almost exclusively by Apple Inc. d) uses a standard PC or Mac to run operating system. e) processor powered the original IBM PC.
253. A storage medium a) is the disk tape, CD, DVD, paper, or other substance that contains data. b) is the mechanical apparatus that records and retrieves data from a storage medium c) refers to a storage device and the media it uses. d) stores data by magnetizing microscopic particles on a disk or tape surface e) is a technologies CD, DVD, and Bluray
254. A storage device a) is the mechanical apparatus that records and retrieves data from a storage medium. b) is the disk tape, CD, DVD, paper, or other substance that contains data.
|
|||
|