Хелпикс

Главная

Контакты

Случайная статья





Ақпараттық коммуникациялық технологиялар пәні бойынша барлық мамандық студенттеріне арналған тест тапсырмалары 3 страница



c) Some cell phones, such as Droids and iPhones, can act as a WiFi hotspot by becoming the router for a wireless network.

d) Instant messaging, chat, and VoIP are forms of synchronous communications; the people communicating have to be online at the same time and the conversation happens in real time.

e) As a general rule, computers on the Internet that act as servers use static IP addresses.

154. Tweet

a) is a short message of 140 characters or less that is posted.

b) records a packet’s path in addition to its round trip speed.

c) is the rate of data that is uploaded from your computer to the Internet.

d) Sales representatives and telecommuters often access corporate networks from home or from a customer’s office by using a secured con‑ nection called a virtual private network(VPN).

e) usually referred to simply as a modem—converts the signals from your computer into audible analog sig‑ nals that can travel over telephone lines.

155. Upstream speed

a) is the rate of data that is uploaded from your computer to the Internet.

b) records a packet’s path in addition to its round trip speed.

c) is a short message of 140 characters or less that is posted

d) Sales representatives and telecommuters often access corporate networks from home or from a customer’s office by using a secured con‑ nection called a virtual private network(VPN).

e) usually referred to simply as a modem—converts the signals from your computer into audible analog sig‑ nals that can travel over telephone lines.

156. VoIP

a) (Voice over Internet Protocol), or Voice over IP, is a technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system.

b) (Wireless Application Protocol) is a communications protocol that provides Internet access from handheld devices, such as cell phones

c) is an area in which the public can access a WiFi network that offers Internet service

d) allows participants to modify posted material.

e) which stands for Worldwide Interoperability for Microwave Access, is an Ethernet compatible network standard designated as IEEE 802. 16.

157. WAP

a) (Wireless Application Protocol) is a com‑ munications protocol that provides Internet access from handheld devices, such as cell phones

b) (Voice over Internet Protocol), or Voice over IP, is a technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system.

c) is an area in which the public can access a WiFi network that offers Internet service

d) allows participants to modify posted material.

e) which stands for Worldwide Interoperability for Microwave Access, is an Ethernet compatible network standard designated as IEEE 802. 16.

158. WiFi hotspot

a) is an area in which the public can access a WiFi network that offers Internet service

b) (Voice over Internet Protocol), or Voice over IP, is a technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system.

c) (Wireless Application Protocol) is a com‑ munications protocol that provides Internet access from handheld devices, such as cell phones

d) allows participants to modify posted material.

e) which stands for Worldwide Interoperability for Microwave Access, is an Ethernet compatible network standard designated as IEEE 802. 16.

159. Wiki

a) allows participants to modify posted material.

b) (Voice over Internet Protocol), or Voice over IP, is a technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system.

c) (Wireless Application Protocol) is a com‑ munications protocol that provides Internet access from handheld devices, such as cell phones

d) is an area in which the public can access a WiFi network that offers Internet service

e) which stands for Worldwide Interoperability for Microwave Access, is an Ethernet compatible network standard designated as IEEE 802. 16.

160. WiMAX

a) which stands for Worldwide Interoperability for Microwave Access, is an Ethernet compatible network standard designated as IEEE 802. 16.

b) (Voice over Internet Protocol), or Voice over IP, is a technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system.

c) (Wireless Application Protocol) is a com‑ munications protocol that provides Internet access from handheld devices, such as cell phones

d) is an area in which the public can access a WiFi network that offers Internet service

e) allows participants to modify posted material.

161. Аbsolute reference

a) never changes when you insert rows, or copy or move formulas.

b) alter a device’s user interface to create an accessible environment by providing closed captions,

c) text-to-speech, speech-to-text, or large screen text.

d) feature ensures that the results in every cell are accurate for the information currently entered in the worksheet.

e) an intelligent agent behaves somewhat like a robot.

162. Adaptive utilities

a) alter a device’s user interface to create an accessible environment by providing closed captions,

b) text-to-speech, speech-to-text, or large screen text.

c) never changes when you insert rows, or copy or move formulas.

d) feature ensures that the results in every cell are accurate for the information currently entered in the worksheet.

e) an intelligent agent behaves somewhat like a robot.

163. Аutomatic recalculation

a) feature ensures that the results in every cell are accurate for the information currently entered in the worksheet.

b) never changes when you insert rows, or copy or move formulas.

c) alter a device’s user interface to create an accessible environment by providing closed captions,

d) text-to-speech, speech-to-text, or large screen text.

e) an intelligent agent behaves somewhat like a robot.

164. Сell

a) in the grid can contain a value, label, or formula.

b) Like a spider in its web, the person who controls many bot-infested computers can link them together into a network.

c) originated as the Berkeley Software Distribution license for a UNIX-like operating system.

d)  (like D4 and D5), numbers (like 110), а formula, such as =D4-D5+((D8/B2)*110

e) is usually sold in retail stores or at Web sites.

165. Сell references

a) (like D4 and D5), numbers (like 110), а formula, such as =D4-D5+((D8/B2)*110.

b) Like a spider in its web, the person who controls many bot-infested computers can link them together into a network.

c) originated as the Berkeley Software Distribution license for a UNIX-like operating system.

d) (like D4 and D5), numbers (like 110), а formula, such as =DDD4-D5+((DDD8/B2)*110.

e) is usually sold in retail stores or at Web sites.

166. Commercial software

a) is usually sold in retail stores or at Web sites.

b) Like a spider in its web, the person who controls many bot-infested computers can link them together into a network.

c) originated as the Berkeley Software Distribution license for a UNIX-like operating system.

d) in the grid can contain a value, label, or formula.

e) (like D4 and D5), numbers (like 110), а formula, such as =D4-D5+((D8/B2)*110

167. Сomputer virus

a) is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.

b) is a self-replicating program designed to carry out some unauthorized activity on a victim’s computer.

c) is a form of legal protection that grants the author of an original work an exclusive right to copy, distribute, sell, and modify that work.

d) Most software displays, such as © 2014 eCourse Corporation, on one of its screens.

e) is simply a collection of data that is stored on one or more computers, іn the context of modern usage.

168. Сomputer worm

a) is a self-replicating program designed to carry out some unauthorized activity on a victim’s computer.

b) is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.

c) is a form of legal protection that grants the author of an original work an exclusive right to copy, distribute, sell, and modify that work.

d) Most software displays, such as © 2014 eCourse Corporation, on one of its screens.

e) is simply a collection of data that is stored on one or more computers, іn the context of modern usage.

169. Сopyright

a) is a form of legal protection that grants the author of an original work an exclusive right to copy, distribute, sell, and modify that work.

b) is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.

c) is a self-replicating program designed to carry out some unauthorized activity on a victim’s computer.

d) Most software displays, such as © 2014 eCourse Corporation, on one of its screens.

e) is simply a collection of data that is stored on one or more computers, іn the context of modern usage.

170. database

a) is simply a collection of data that is stored on one or more computers, іn the context of modern usage.

b) is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.

c) is a self-replicating program designed to carry out some unauthorized activity on a victim’s computer.

d) is a form of legal protection that grants the author of an original work an exclusive right to copy, distribute, sell, and modify that work.

e) Most software displays, such as © 2014 eCourse Corporation, on one of its screens.

171. Device driver

a) is software that helps a peripheral device establish communication with a computer.

b) is distributed for free and often comes preinstalled on new computers, but it is limited in some way until you pay for it.

c) refers to the way that all the elements of a document— text, pictures, titles, and page numbers—are arranged on the page.

d) (end-user license agreement) is displayed on the screen when you first install software.

e) The main component of a software package, designed to be started by users or automatically launched by the operating system.

172. Document formatting

a) refers to the way that all the elements of a document— text, pictures, titles, and page numbers—are arranged on the page.

b) is distributed for free and often comes preinstalled on new computers, but it is limited in some way until you pay for it.

c) is software that helps a peripheral device establish communication with a computer.

d) (end-user license agreement) is displayed on the screen when you first install software.

e) The main component of a software package, designed to be started by users or automatically launched by the operating system.

173. EULA

a) (end-user license agreement) is displayed on the screen when you first install software.

b) is distributed for free and often comes preinstalled on new computers, but it is limited in some way until you pay for it.

c) is software that helps a peripheral device establish communication with a computer.

d) refers to the way that all the elements of a document— text, pictures, titles, and page numbers—are arranged on the page.

e) The main component of a software package, designed to be started by users or automatically launched by the operating system.

174. Еxecutable file

a) The main component of a software package, designed to be started by users or automatically launched by the operating system.

b) is distributed for free and often comes preinstalled on new computers, but it is limited in some way until you pay for it.

c) is software that helps a peripheral device establish communication with a computer.

d) refers to the way that all the elements of a document— text, pictures, titles, and page numbers—are arranged on the page.

e) (end-user license agreement) is displayed on the screen when you first install software.

175. Field

a) holds one item of data relevant to a record.

b) is a set of letters that share a unified design.

c) text that you specify to automatically appear in the bottom margin of every page.

d) works behind the scenes to tell the computer how to use the contents of cells in calculations.

e) is copyrighted software that—as you might expect—is available for free.

176. Font

a) is a set of letters that share a unified design.

b) holds one item of data relevant to a record.

c) text that you specify to automatically appear in the bottom margin of every page.

d) works behind the scenes to tell the computer how to use the contents of cells in calculations.

e) is copyrighted software that—as you might expect—is available for free.

177. Footer

a) text that you specify to automatically appear in the bottom margin of every page.

b) holds one item of data relevant to a record.

c) is a set of letters that share a unified design.

d) works behind the scenes to tell the computer how to use the contents of cells in calculations.

e) is copyrighted software that—as you might expect—is available for free.

178. Formula

a) works behind the scenes to tell the computer how to use the contents of cells in calculations.

b) holds one item of data relevant to a record.

c) is a set of letters that share a unified design.

d) text that you specify to automatically appear in the bottom margin of every page.

e) is copyrighted software that—as you might expect—is available for free.

179. Freeware

a) is copyrighted software that—as you might expect—is available for free.

b) holds one item of data relevant to a record.

c) is a set of letters that share a unified design.

d) text that you specify to automatically appear in the bottom margin of every page.

e) works behind the scenes to tell the computer how to use the contents of cells in calculations.

180. Function

a) уou can enter a formula from scratch by typing it into a cell, or you can use a built-in preset formula, provided by the spreadsheet software.

b) so that the text is aligned evenly on both the right and left margins.

c) (General Public License) was developed for a free operating system called GNU.

d) reads through your document and points out potential grammatical trouble spots, such as incomplete sentences, run-on sentences, and verbs that don’t agree with nouns.

e) In computer lingo refers to any picture, drawing, sketch, photograph, image, or icon that appears on your computer screen.

181. GPL

a) (General Public License) was developed for a free operating system called GNU.

b) so that the text is aligned evenly on both the right and left margins.

c) уou can enter a formula from scratch by typing it into a cell, or you can use a built-in preset formula, provided by the spreadsheet software.

d) reads through your document and points out potential grammatical trouble spots, such as incomplete sentences, run-on sentences, and verbs that don’t agree with nouns.

e) In computer lingo refers to any picture, drawing, sketch, photograph, image, or icon that appears on your computer screen.

182. Grammar checker

a) reads through your document and points out potential grammatical trouble spots, such as incomplete sentences, run-on sentences, and verbs that don’t agree with nouns.

b) so that the text is aligned evenly on both the right and left margins.

c) уou can enter a formula from scratch by typing it into a cell, or you can use a built-in preset formula, provided by the spreadsheet software.

d) (General Public License) was developed for a free operating system called GNU.

e) In computer lingo refers to any picture, drawing, sketch, photograph, image, or icon that appears on your computer screen.

183. Graphics

a) In computer lingo refers to any picture, drawing, sketch, photograph, image, or icon that appears on your computer screen.

b) so that the text is aligned evenly on both the right and left margins.

c) уou can enter a formula from scratch by typing it into a cell, or you can use a built-in preset formula, provided by the spreadsheet software.

d) (General Public License) was developed for a free operating system called GNU.

e) reads through your document and points out potential grammatical trouble spots, such as incomplete sentences, run-on sentences, and verbs that don’t agree with nouns.

184. Нash value

a) is a unique number derived from encoding one or more data sets, such as names, serial numbers, and validation codes.

b) text that you specify to automatically appear in the top margin of every page.

c) аpps are available from other sources, but using them requires an unauthorized change to the device’s software.

d) popular with search engines such as Google, is simply a collection of words relevant to your search.

e) is any text used to describe data.

185. Нeader

a) text that you specify to automatically appear in the top margin of every page.

b) is a unique number derived from encoding one or more data sets, such as names, serial numbers, and validation codes.

c) аpps are available from other sources, but using them requires an unauthorized change to the device’s software.

d) popular with search engines such as Google, is simply a collection of words relevant to your search.

e) is any text used to describe data.

186. jailbreak

a) аpps are available from other sources, but using them requires an unauthorized change to the device’s software.

b) is a unique number derived from encoding one or more data sets, such as names, serial numbers, and validation codes.

c) text that you specify to automatically appear in the top margin of every page.

d) popular with search engines such as Google, is simply a collection of words relevant to your search.

e) is any text used to describe data.

187. Кeyword search

a) popular with search engines such as Google, is simply a collection of words relevant to your search.

b) is a unique number derived from encoding one or more data sets, such as names, serial numbers, and validation codes.

c) text that you specify to automatically appear in the top margin of every page.

d) аpps are available from other sources, but using them requires an unauthorized change to the device’s software.

e) is any text used to describe data.

188. Label

a) is any text used to describe data.

b) is a unique number derived from encoding one or more data sets, such as names, serial numbers, and validation codes.

c) text that you specify to automatically appear in the top margin of every page.

d) аpps are available from other sources, but using them requires an unauthorized change to the device’s software.

e) popular with search engines such as Google, is simply a collection of words relevant to your search.

189. Leading

a) The spacing between lines of text, (pronounced “LED ding”).

b) refer to any computer program designed to surreptitiously enter a computer, gain unauthorized access to data, or disrupt normal processing operations.

c) displays satellite, aerial, or street maps used to locate places and get directions between two addresses.

d) spreads by sending itself to every address in the address book of an infected computer.

e) such as the multiplication symbol (*), the division symbol (/), the addition symbol, and the subtraction symbol.

190. Мapping application

a) displays satellite, aerial, or street maps used to locate places and get directions between two addresses.

b) The spacing between lines of text, (pronounced “LED ding”).

c) refer to any computer program designed to surreptitiously enter a computer, gain unauthorized access to data, or disrupt normal processing operations.

d) spreads by sending itself to every address in the address book of an infected computer.

e) such as the multiplication symbol (*), the division symbol (/), the addition symbol, and the subtraction symbol.

191. Мathematical operators

a) such as the multiplication symbol (*), the division symbol (/), the addition symbol, and the subtraction symbol.

b) The spacing between lines of text, (pronounced “LED ding”).

c) refer to any computer program designed to surreptitiously enter a computer, gain unauthorized access to data, or disrupt normal processing operations.

d) displays satellite, aerial, or street maps used to locate places and get directions between two addresses.

e) spreads by sending itself to every address in the address book of an infected computer.

192. Module

a) refers to a component, such as a word processing module.

b) is designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player.

c) is priced per copy and allows the allocated number of copies to be used simultaneously.

d) is a question stated in a language such as English, rather than anesoteric query language.

e) is a collection of programs that typically include word processing, spreadsheet, presentation, and database modules.

193. Natural language query

a) is a question stated in a language such as English, rather than anesoteric query language.

b) is designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player.

c) refers to a component, such as a word processing module.

d) is priced per copy and allows the allocated number of copies to be used simultaneously.

e) is a collection of programs that typically include word processing, spreadsheet, presentation, and database modules.

194. Оffice suite

a) is a collection of programs that typically include word processing, spreadsheet, presentation, and database modules.

b) is designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player.

c) refers to a component, such as a word processing module.

d) is priced per copy and allows the allocated number of copies to be used simultaneously.

e) is a question stated in a language such as English, rather than anesoteric query language.

195. Open source software

a) makes uncompiled program instructions—the source code—available to programmers who want to modify and improve the software.

b) refers to the physical position of each element on a page.

c) refers to the horizontal position of text—whether it is aligned at the left margin, aligned at the right margin.

d) includes the alignment of text within the margins and the space between each line of text.

e) (Portable Document Format) is a standard format for exchanging files, so most people will assume that your computer has PDF capability.

196. Page layout

a) refers to the physical position of each element on a page.

b) makes uncompiled program instructions—the source code—available to programmers who want to modify and improve the software.

c) refers to the horizontal position of text—whether it is aligned at the left margin, aligned at the right margin.

d) includes the alignment of text within the margins and the space between each line of text.

e) (Portable Document Format) is a standard format for exchanging files, so most people will assume that your computer has PDF capability.

197. Paragraph alignment

a) refers to the horizontal position of text—whether it is aligned at the left margin, aligned at the right margin.

b) makes uncompiled program instructions—the source code—available to programmers who want to modify and improve the software.

c) refers to the physical position of each element on a page.

d) includes the alignment of text within the margins and the space between each line of text.

e) (Portable Document Format) is a standard format for exchanging files, so most people will assume that your computer has PDF capability.

198. Paragraph style

a) includes the alignment of text within the margins and the space between each line of text.

b) makes uncompiled program instructions—the source code—available to programmers who want to modify and improve the software.

c) refers to the physical position of each element on a page.

d) refers to the horizontal position of text—whether it is aligned at the left margin, aligned at the right margin.

e) (Portable Document Format) is a standard format for exchanging files, so most people will assume that your computer has PDF capability.

199. PDF

a) (Portable Document Format) is a standard format for exchanging files, so most people will assume that your computer has PDF capability.

b) makes uncompiled program instructions—the source code—available to programmers who want to modify and improve the software.

c) refers to the physical position of each element on a page.

d) refers to the horizontal position of text—whether it is aligned at the left margin, aligned at the right margin.

e) includes the alignment of text within the margins and the space between each line of text.

200. Рirated software

a) People who circumvent copyright law and illegally copy, distribute, or modify software are sometimes called software pirates, and their illegal copies are referred.

b) Font size is measured, abbreviated pt.

c) is designed to run from removable storage, such as a CD or USB flash drive.

d) is a means of protecting software from illegal copying by requiring users to enter a product key or activation code before the software can be used.

e) They are sometimes referred, because they offer features that really help get work done.

201. Рoint size

a) Font size is measured, abbreviated pt.

b) People who circumvent copyright law and illegally copy, distribute, or modify software are sometimes called software pirates, and their illegal copies are referred.

c) is designed to run from removable storage, such as a CD or USB flash drive.

d) is a means of protecting software from illegal copying by requiring users to enter a product key or activation code before the software can be used.

e) They are sometimes referred, because they offer features that really help get work done.

202. Portable software

a) is designed to run from removable storage, such as a CD or USB flash drive.

b) People who circumvent copyright law and illegally copy, distribute, or modify software are sometimes called software pirates, and their illegal copies are referred.

c) Font size is measured, abbreviated pt.

d) is a means of protecting software from illegal copying by requiring users to enter a product key or activation code before the software can be used.

e) They are sometimes referred, because they offer features that really help get work done.

203. Product activation

a) is a means of protecting software from illegal copying by requiring users to enter a product key or activation code before the software can be used.

b) People who circumvent copyright law and illegally copy, distribute, or modify software are sometimes called software pirates, and their illegal copies are referred.

c) Font size is measured, abbreviated pt.

d) is designed to run from removable storage, such as a CD or USB flash drive.

e) They are sometimes referred, because they offer features that really help get work done.

204. productivity software

a) They are sometimes referred, because they offer features that really help get work done.

b) People who circumvent copyright law and illegally copy, distribute, or modify software are sometimes called software pirates, and their illegal copies are referred.

c) Font size is measured, abbreviated pt.

d) is designed to run from removable storage, such as a CD or USB flash drive.

e) is a means of protecting software from illegal copying by requiring users to enter a product key or activation code before the software can be used.

205. Proprietary software

a) has restrictions on its use that are delineated by copyright, patents, or license agreements.

b) is not protected by copyright because the copyright has expired, or the author has placed the program in the public domain, making it available without restriction.

c) contains code that is suspected of being part of a virus іn the context of antivirus software.



  

© helpiks.su При использовании или копировании материалов прямая ссылка на сайт обязательна.