Хелпикс

Главная

Контакты

Случайная статья





Информационно-коммуникационные технологии 4 страница



< variant> CD

< variant> HD

< variant> Iphone

< variant> CKQ

 

< question2> The process of placing a program into a computer

< variant> Software installation

< variant> Store

< variant> Placing software

< variant> Program placing

< variant> Computer installation

 

< question2> Any device or material on which data can be electronically placed, kept, and retrieved is..

< variant> Storage medium

< variant> Storage density

< variant> Storage device

< variant> Videogame console

< variant> Programming language

 

< question2> A technology that allows you to send to the server several queries on a single connection, without waiting for the corresponding responses is…

< variant> Pipelining

< variant> Phishing

< variant> Social media

< variant> Machine code

< variant> Program code

 

< question2> A computer that is designed to be moved from one place to another and includes a display and keyboard is…

< variant> Portable computer

< variant> Head crash

< variant> Tower case

< variant> Tablet computer

< variant> Word size

 

< question2> Processing and storage unit of digital information; plurality of bits, the computer simultaneously processed is…

< variant> Byte

< variant> Bit

< variant> Data

< variant> Memory

< variant> File

 

< question2> The program a personal computer's microprocessor uses to get the computer system started after you turn it on is…

< variant> BIOS

< variant> CD

< variant> CISC

< variant> DVI

< variant> HDMI

 

< question2> Removes a record from a table..

< variant> DELETE

< variant> DBMS

< variant> Dimension

< variant> Database

< variant> Flat file

 

< question2> limits access to systems, such as computer databases..

< variant> Access control

< variant> DELETE

< variant> DBMS

< variant> Dimension

< variant> Database

 

< question2> Is a collection of information…

< variant> Database

< variant> Access control

< variant> DELETE

< variant> DBMS

< variant> Dimension

 

< question2> The underlying structure of a database is referred to…

< variant> Database model

< variant> Access control

< variant> DELETE

< variant> DBMS

< variant> Dimension

 

< question2> A filing cabinet full of folders and papers would be classified…

< variant> UPDATE

< variant> Access control

< variant> DELETE

< variant> DBMS

< variant> Dimension

 

< question2> …is normally assigned to fixed-length fields that hold character data-people’s names, album titles, and so on

< variant> Unstructured file

< variant> Access control

< variant> DELETE

< variant> DBMS

< variant> Dimension

 

< question2> uses a uniform format to store data for each person or thing in the file

< variant> Table

< variant> Text data type

< variant> Structured file

< variant> Static Web publishing

< variant> Dimension

 

< question2> …is a sequence of records, similar to a flat file

< variant> Text data type

< variant> Structured file

< variant> Static Web publishing

< variant> Dimension

< variant> Table

 

< question2> …is the order in which records are stored on disk

< variant> SQL

< variant> Static Web publishing

< variant> Structured file

< variant> Structured file

< variant> Dimension

 

< question2> that resides on a Web server and acts as an intermediary between your browser and a DBMS

< variant> Sort key

< variant> Static Web publishing

< variant> Structured file

< variant> Structured file

< variant> Dimension

 

< question2> One of the most common database operations is to query for a particular record or group of records by using…

< variant> Server-side program

< variant> Sort key

< variant> Static Web publishing

< variant> Structured file

< variant> Structured file

 

< question2> …is a field that contains data unique to a record

< variant> Primary key

< variant> Server-side program

< variant> Sort key

< variant> Static Web publishing

< variant> Structured file

 

< question2> … are detailed specifications for a command

< variant> Parameters

< variant> Primary key

< variant> Server-side program

< variant> Sort key

< variant> Static Web publishing

 

< question2> …is used to describe a variety of technologies that combine object-oriented and relational concepts

< variant> ODBMS

< variant> Parameters

< variant> Primary key

< variant> Server-side program

< variant> Sort key

 

< question2> Can be grouped into classes and defined by attributes and methods

< variant> Object-relational database

< variant> ODBMS

< variant> Parameters

< variant> Primary key

< variant> Server-side program

 

< question2> helps database designers create a database structure that minimizes storage space and increases processing efficiency …

< variant> Object database

< variant> Object-relational database

< variant> ODBMS

< variant> Parameters

< variant> Primary key

 

< question2> used for true/false or yes/no data using minimal storage space…

< variant> Lookup routine

< variant> Object database

< variant> Object-relational database

< variant> ODBMS

< variant> Parameters

 

< question2> by proprietary media formats that intentionally vary from standard formats

< variant> copy protected

< variant> Cropping

< variant> container formats

< variant> desktop video.

< variant> Digital audio

 

< question2> refers to the process of selecting part of an image-just like cutting out a section of a photograph.

< variant> Cropping

< variant> copy protected

< variant> container formats

< variant> desktop video.

< variant> Digital audio

 

< question2> is music, speech, and other sounds represented in binary format for use in digital devices.

< variant> Digital audio

< variant> Cropping

< variant> copy protected

< variant> container formats

< variant> desktop video.

 

< question2> is a term used for movies and other content that is stored digitally.

< variant> Digital content

< variant> Cropping

< variant> copy protected

< variant> container formats

< variant> desktop video.

 

< question2> creates a digital image of real objects

< variant> digital camera

< variant> Cropping

< variant> copy protected

< variant> container formats

< variant> desktop video.

 

< question2> (sometimes called a DVD volume) is essentially a prototype of your DVD, but it is stored on your

< variant> computer’s

< variant> hard disk.

< variant> DVD image

< variant> digital camera

< variant> Cropping

< variant> copy protected

 

< question2> Flash video. Mac Popular for Web-based video; requires Adobe Flash Player

< variant> Flash

< variant> DVD image

< variant> digital camera

< variant> Cropping

< variant> copy protected

 

< question2> is a smooth blending of shades from one color to another or from light to dark.

< variant> gradient

< variant> Flash

< variant> DVD image

< variant> digital camera

< variant> Cropping

 

< question2> (High-bandwidth Digital Content Protection) is a hardware- based DRM technology that requires compliant devices for content playback.

< variant> HDCP

< variant> gradient

< variant> Flash

< variant> DVD image

< variant> digital camera

 

< question2> MiFi

< variant> is a brand name for a compact, mobile, wireless router offered by Novatel Wireless.

< variant> is any access to data or programs by hackers, criminals, or other unauthorized persons.

< variant> Internet Protocol) is responsible for addressing packets so that they can be routed to their des‑ tination.

< variant> measures the variability of packet latency.

< variant> For the real Internet, cellular service providers offer data services, sometimes referred to as mobile broadband.

 

< question 2> Mobile broadband

< variant> For the real Internet, cellular service providers offer data services, sometimes referred to as mobile broadband.

< variant> is any access to data or programs by hackers, criminals, or other unauthorized persons.

< variant> Internet Protocol) is responsible for addressing packets so that they can be routed to their des‑ tination.

< variant> measures the variability of packet latency.

< variant> is a brand name for a compact, mobile, wireless router offered by Novatel Wireless.

 

< question 2> A worksheet

< variant> is based on a grid of columns and rows.

< variant> never changes when you insert rows, or copy or move formulas.

< variant> that is, a reference that can change from B4 to B3

< variant> feature ensures that the results in every cell are accurate for the information currently entered in the worksheet.

< variant> works behind the scenes to tell the computer how to use the contents of cells in calculations.

 

< question2> What becomes information when it is presented in a format that people can understand and use?

< variant> Data

< variant> Information

< variant> Web

< variant> Internet

< variant> Input

 

< question2> Data is used by….

< variant> Machines

< variant> Humans

< variant> Animals

< variant> Webpage

< variant> Google

 

< question2> Information is used by…

< variant> Humans

< variant> Machines

< variant> Animals

< variant> Webpage

< variant> Google

 

< question2> ………. is text, numbers, graphics, sounds and video that have been converted info discrete digits such as 0s and 1s

< variant> Digital data

< variant> Analog data

< variant> Numeric data

< variant> Character data

< variant> Operation system

 

< question2> ………is represented using an infinite scale of values

< variant> Analog data

< variant> Digital data

< variant> Numeric data

< variant> Character data

< variant> Operation system

 

< question2> The binary number system has only two digits:

< variant> 0 and 1

< variant> 0 and 2

< variant> 1 and 9

< variant> 0 and 9

< variant> 2 and 7

 

< question2> Decrypt the wordASCII

< variant> American Standard Code for information interchange

< variant> American Standard Code for information technology

< variant> American Standard Code for information invoice

< variant> American Standard Code for information is power

< variant> American Standard Club for information interchange

 

< question2> Decrypt the wordEBCDIC

< variant> Extended Binary-Coded Decimal Interchange Code

< variant> Extended Binary-Coded Decimal Information Code

< variant> Extended Basic-Coded Decimal Interchange Code

< variant> Extended Basic-Coded Devise Interchange Club

< variant> Extended Binary-Coded Devise Information Club

 

< question2> A group of eight bits is…

< variant> byte

< variant> kilobit

< variant> kilobyte

< variant> megabit

< variant> gigabyte

 

< question2> Zombie

< variant> A computer under the control of a bad bot is sometimes referred, because it carries out instructions from a malicious leader.

< variant> A feature which determines how your text flows from line to line by automatically movingwords down to the next line as you reach the right margin.

< variant> уou use spreadsheet software to create an on-screen.

< variant> Usually all the files needed for the new software, consolidate them into one large file, which is compressed to decrease its size and reduce the download time.

< variant> usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.

 

< question2> A kilobyte is…

< variant> 1024 bytes

< variant> 1024 bits

< variant> 1020 megabyte

< variant> 1080 kilobit

< variant> 1045 gigabit

 

< question2> Translate the numbers 1010 from binary system to decimal system

< variant> 10

< variant> 12

< variant> 20

< variant> 30

< variant> 100

 

< question2> A megabyte is…

< variant> 1048576 bytes

< variant> 1 048575 bits

< variant> 1 045 254 bytes

< variant> 1 025577 megabits

< variant> 1 014576 gigabytes

 

< question2> Translate the numbers 123 from octal system to decimal system

< variant> 83

< variant> 93

< variant> 96

< variant> 100

< variant> 45

 

< question2> Translate the numbers 1A from hexadecimal system to decimal system

< variant> 26

< variant> 56

< variant> 13

< variant> 286

< variant> 100

 

< question2> An input device designed at manipulate on-screen graphical objects is…

< variant> Mouse

< variant> Optical drive

< variant> Smartphone

< variant> Tablet Computer

< variant> Keyboard

 

< question2> The main storage device on many computer system is…

< variant> Hard disk drive

< variant> Display system

< variant> Operand

< variant> Operating system

< variant> Output

 

< question2> Storage device that works CDs, DVDs, Blu-ray discs or some combination of these storage media is…

< variant> Optical drive

< variant> Operating system

< variant> Input

< variant> Memory

< variant> Object Code

 

< question2> An output device that produces computer-generated text or graphical images on paper is…

< variant> Printer

< variant> Mouse

< variant> Password

< variant> Server

< variant> User ID

 

< question2> An enhanced mobile phone that also functions as a portable media player and has the combility to access the Internet is….

< variant> Smartphone

< variant> Telephone

< variant> Internet

< variant> Computer

< variant> Network

 

< question2> A handheld computer that is essentially a large version of an enhanced media player is…

< variant> Tablet computer

< variant> Computer

< variant> Smartphone

< variant> Printer

< variant> Network

 

< question2> Based on a proprietary design for a personal computer, manufactured almost exclusively by Apple Inc is…

< variant> Mac platform

< variant> PC platform

< variant> Linux platform

< variant> SIC platform

< variant> Mec platform

 

< question2> Based on the original IMB PC is…

< variant> PC platform

< variant> Mac platform

< variant> Linux platform

< variant> SIC platform

< variant> WEB

 

< question2> A type of memory circuitry that is housed in a single integrated circuit-usually a fairly large, caterpillar-like DIP package-which is plugged into the system board is…

< variant> ROM

< variant> RAM

< variant> Data

< variant> PC platform

< variant> Mac platform

 

< question2> A type of ROM that is non-volatile but user-modifiable is…

< variant> EEPROM

< variant> ROM

< variant> RAM

< variant> ASCII

< variant> EBCDIC

 

< question2> A temporary holding area for data, application program instructions, and the operating system is…

< variant> RAM

< variant> ROM

< variant> EEPROM

< variant> ASCII

< variant> EBCDIC

 

< question2> A touch-sensitive surface on which you can slide your fingers to move the onscreen pointer is..

< variant> Trackpad

< variant> Expansion port

< variant> System unit

< variant> Object code

< variant> Password

 

< question2> A long, narrow socket on the system board into which you can plug an expansion card is…

< variant> Expansion slot

< variant> Expansion port

< variant> Expansion card

< variant> Expansion bus

< variant> Analog data

 

< question2> Any connector that passes data into and out of a computer or peripheral device is…

< variant> Expansion port

< variant> Expansion slot

< variant> Expansion bus

< variant> Expansion card

< variant> Network port

 

< question2> A sudden increase in electrical energy affecting the current that flows to electrical outlets is…

< variant> Power surge

< variant> Compatible

< variant> Drive bays

< variant> Duty cycle

< variant> Lands

 

< question2> A device that contains electrical outlets protected by circuitry that blocks surges is…

< variant> Surge strip

< variant> Virtual memory

< variant> Overclocking

< variant> Optical storage

< variant> Microprocessor clock

 

< question2> A device that not only provides surge protection, but also furnishes desktop computers and network devices with battery backup power during a power outage is…

< variant> UPS

< variant> LCD

< variant> LEC

< variant> RISC

< variant> ROM

 

< question2> Designed for professional troubleshooting is…

< variant> Safe mode

< variant> Dangerous mode

< variant> Insecure mode

< variant> Storage medium

< variant> Trackpad

< variant> Flat panel display based on liquid crystals, as well as a device (monitor, TV) on the basis of such a display is…

< variant> LCD

< variant> LED

< variant> UPS

< variant> USB

< variant> LEC

 

< question2> Serial interface for connecting peripheral devices to a computer engineering is…

< variant> USB

< variant> UPS

< variant> LEC

< variant> RISC

< variant> AISCII

 

< question2> Component video interface used in monitors and display adapters is…

< variant> VGA

< variant> UPS

< variant> CPU

< variant> ALU

< variant> Apps

 

< question2> A device for reading memory cards and other electronic cards for various purposes is…

< variant> Card reader

< variant> Hard disc

< variant> Unicode

< variant> Stored program

< variant> Semiconducting materials

 

< question2> A question2 stated in a language

< variant> Natural language query

< variant> Keyword search

< variant> Query QBE

< variant> Summertime

< variant> Database software

 

< question2> Cable Internet service

< variant> is a means of distributing always‑ on broadband Internet access over the same infrastructure that offers cable television service.

< variant> which converts your computer’s signal into one that can travel over the CATV network.

< variant> the doorway that allows a computer to exchange data with other devices

< variant> a fixed Internet connection that uses a voiceband modem and telephone lines to transport data between your computer and your ISP.

< variant> has been used by governments to keeps citizens away from Web sites that supply politically or culturally inflammatory information.

 

< question2> Domain Name System

< variant> Every domain name corresponds to a unique IP address that has been entered into a huge database

< variant> (Data Over Cable Service Interface Specification) is a data transport technology that includes security filters.

< variant> is a key component of Web page addresses and e‑ mail addresses

< variant> computer that hosts this database is referred to

< variant> s the rate of data downloaded to your computer. Many ISPs limit these speeds to make sure everyone gets an equal share of the bandwidth.

 

< question2> Intrusion

< variant> is any access to data or programs by hackers, criminals, or other unauthorized persons.

< variant> Internet Protocol) is responsible for addressing packets so that they can be routed to their des‑ tination.

< variant> measures the variability of packet latency.

< variant> is a brand name for a compact, mobile, wireless router offered by Novatel Wireless.

< variant> For the real Internet, cellular service providers offer data services, sometimes referred to as mobile broadband.

 

< question2> Jitter

< variant> measures the variability of packet latency.

< variant> is any access to data or programs by hackers, criminals, or other unauthorized persons.

< variant> Internet Protocol) is responsible for addressing packets so that they can be routed to their des‑ tination.

< variant> is a brand name for a compact, mobile, wireless router offered by Novatel Wireless.

< variant> For the real Internet, cellular service providers offer data services, sometimes referred to as mobile broadband.

 

< question3> unzipped

< variant> As part of the installation process, this downloaded file must be reconstituted into the original collection of files.

< variant> specify the operating system and minimum hardware capacities necessary for a software product to work correctly.

< variant> that can track down and fix disk errors, repair corrupted files, and give your device a performance-enhancing tune-up.

< variant> (sometimes simply called a Trojan) is a computer program that seems to perform one function while actually doing something else.

< variant> which deletes the software’s files from various folders on your computer’s hard disk.

 

< question3> utility software

< variant> A type of system software thatis designed to help you monitor and configure settings for yourdigital gear, its operating system, or application software.

< variant> is a number that you want to use in a calculation.

< variant> Virus signatures and other information that antivirus software uses to identify and eradicate malware are stored in one or more files usually referred (or a virus database).

< variant> usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.

< variant> (or Web app) is software that is accessed with a Web browser.

 

< question3> Value

< variant> is a number that you want to use in a calculation.

< variant> A type of system software thatis designed to help you monitor and configure settings for yourdigital gear, its operating system, or application software.

< variant> Virus signatures and other information that antivirus software uses to identify and eradicate malware are stored in one or more files usually referred (or a virus database).

< variant> usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.

< variant> (or Web app) is software that is accessed with a Web browser.

 

< question3> What is Virus hoax

< variant> usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.

< variant> A type of system software thatis designed to help you monitor and configure settings for yourdigital gear, its operating system, or application software.

< variant> is a number that you want to use in a calculation.

< variant> Virus signatures and other information that antivirus software uses to identify and eradicate malware are stored in one or more files usually referred (or a virus database).

< variant> (or Web app) is software that is accessed with a Web browser.

 

< question3> Web application

< variant> (or Web app) is software that is accessed with a Web browser.

< variant> A type of system software thatis designed to help you monitor and configure settings for yourdigital gear, its operating system, or application software.

< variant> is a number that you want to use in a calculation.

< variant> Virus signatures and other information that antivirus software uses to identify and eradicate malware are stored in one or more files usually referred (or a virus database).

< variant> usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.

 

< question3> Worksheet.

< variant> уou use spreadsheet software to create an on-screen.

< variant> A feature which determines how your text flows from line to line by automatically movingwords down to the next line as you reach the right margin.

< variant> Usually all the files needed for the new software, consolidate them into one large file, which is compressed to decrease its size and reduce the download time.

< variant> A computer under the control of a bad bot is sometimes referred, because it carries out instructions from a malicious leader.

< variant> usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.

 

< question3> Zipped

< variant> Usually all the files needed for the new software, consolidate them into one large file, which is compressed to decrease its size and reduce the download time.

< variant> A feature which determines how your text flows from line to line by automatically movingwords down to the next line as you reach the right margin.



  

© helpiks.su При использовании или копировании материалов прямая ссылка на сайт обязательна.