|
|||
Информационно-коммуникационные технологии 4 страница< variant> CD < variant> HD < variant> Iphone < variant> CKQ
< question2> The process of placing a program into a computer < variant> Software installation < variant> Store < variant> Placing software < variant> Program placing < variant> Computer installation
< question2> Any device or material on which data can be electronically placed, kept, and retrieved is.. < variant> Storage medium < variant> Storage density < variant> Storage device < variant> Videogame console < variant> Programming language
< question2> A technology that allows you to send to the server several queries on a single connection, without waiting for the corresponding responses is… < variant> Pipelining < variant> Phishing < variant> Social media < variant> Machine code < variant> Program code
< question2> A computer that is designed to be moved from one place to another and includes a display and keyboard is… < variant> Portable computer < variant> Head crash < variant> Tower case < variant> Tablet computer < variant> Word size
< question2> Processing and storage unit of digital information; plurality of bits, the computer simultaneously processed is… < variant> Byte < variant> Bit < variant> Data < variant> Memory < variant> File
< question2> The program a personal computer's microprocessor uses to get the computer system started after you turn it on is… < variant> BIOS < variant> CD < variant> CISC < variant> DVI < variant> HDMI
< question2> Removes a record from a table.. < variant> DELETE < variant> DBMS < variant> Dimension < variant> Database < variant> Flat file
< question2> limits access to systems, such as computer databases.. < variant> Access control < variant> DELETE < variant> DBMS < variant> Dimension < variant> Database
< question2> Is a collection of information… < variant> Database < variant> Access control < variant> DELETE < variant> DBMS < variant> Dimension
< question2> The underlying structure of a database is referred to… < variant> Database model < variant> Access control < variant> DELETE < variant> DBMS < variant> Dimension
< question2> A filing cabinet full of folders and papers would be classified… < variant> UPDATE < variant> Access control < variant> DELETE < variant> DBMS < variant> Dimension
< question2> …is normally assigned to fixed-length fields that hold character data-people’s names, album titles, and so on < variant> Unstructured file < variant> Access control < variant> DELETE < variant> DBMS < variant> Dimension
< question2> uses a uniform format to store data for each person or thing in the file < variant> Table < variant> Text data type < variant> Structured file < variant> Static Web publishing < variant> Dimension
< question2> …is a sequence of records, similar to a flat file < variant> Text data type < variant> Structured file < variant> Static Web publishing < variant> Dimension < variant> Table
< question2> …is the order in which records are stored on disk < variant> SQL < variant> Static Web publishing < variant> Structured file < variant> Structured file < variant> Dimension
< question2> that resides on a Web server and acts as an intermediary between your browser and a DBMS < variant> Sort key < variant> Static Web publishing < variant> Structured file < variant> Structured file < variant> Dimension
< question2> One of the most common database operations is to query for a particular record or group of records by using… < variant> Server-side program < variant> Sort key < variant> Static Web publishing < variant> Structured file < variant> Structured file
< question2> …is a field that contains data unique to a record < variant> Primary key < variant> Server-side program < variant> Sort key < variant> Static Web publishing < variant> Structured file
< question2> … are detailed specifications for a command < variant> Parameters < variant> Primary key < variant> Server-side program < variant> Sort key < variant> Static Web publishing
< question2> …is used to describe a variety of technologies that combine object-oriented and relational concepts < variant> ODBMS < variant> Parameters < variant> Primary key < variant> Server-side program < variant> Sort key
< question2> Can be grouped into classes and defined by attributes and methods < variant> Object-relational database < variant> ODBMS < variant> Parameters < variant> Primary key < variant> Server-side program
< question2> helps database designers create a database structure that minimizes storage space and increases processing efficiency … < variant> Object database < variant> Object-relational database < variant> ODBMS < variant> Parameters < variant> Primary key
< question2> used for true/false or yes/no data using minimal storage space… < variant> Lookup routine < variant> Object database < variant> Object-relational database < variant> ODBMS < variant> Parameters
< question2> by proprietary media formats that intentionally vary from standard formats < variant> copy protected < variant> Cropping < variant> container formats < variant> desktop video. < variant> Digital audio
< question2> refers to the process of selecting part of an image-just like cutting out a section of a photograph. < variant> Cropping < variant> copy protected < variant> container formats < variant> desktop video. < variant> Digital audio
< question2> is music, speech, and other sounds represented in binary format for use in digital devices. < variant> Digital audio < variant> Cropping < variant> copy protected < variant> container formats < variant> desktop video.
< question2> is a term used for movies and other content that is stored digitally. < variant> Digital content < variant> Cropping < variant> copy protected < variant> container formats < variant> desktop video.
< question2> creates a digital image of real objects < variant> digital camera < variant> Cropping < variant> copy protected < variant> container formats < variant> desktop video.
< question2> (sometimes called a DVD volume) is essentially a prototype of your DVD, but it is stored on your < variant> computer’s < variant> hard disk. < variant> DVD image < variant> digital camera < variant> Cropping < variant> copy protected
< question2> Flash video. Mac Popular for Web-based video; requires Adobe Flash Player < variant> Flash < variant> DVD image < variant> digital camera < variant> Cropping < variant> copy protected
< question2> is a smooth blending of shades from one color to another or from light to dark. < variant> gradient < variant> Flash < variant> DVD image < variant> digital camera < variant> Cropping
< question2> (High-bandwidth Digital Content Protection) is a hardware- based DRM technology that requires compliant devices for content playback. < variant> HDCP < variant> gradient < variant> Flash < variant> DVD image < variant> digital camera
< question2> MiFi < variant> is a brand name for a compact, mobile, wireless router offered by Novatel Wireless. < variant> is any access to data or programs by hackers, criminals, or other unauthorized persons. < variant> Internet Protocol) is responsible for addressing packets so that they can be routed to their des‑ tination. < variant> measures the variability of packet latency. < variant> For the real Internet, cellular service providers offer data services, sometimes referred to as mobile broadband.
< question 2> Mobile broadband < variant> For the real Internet, cellular service providers offer data services, sometimes referred to as mobile broadband. < variant> is any access to data or programs by hackers, criminals, or other unauthorized persons. < variant> Internet Protocol) is responsible for addressing packets so that they can be routed to their des‑ tination. < variant> measures the variability of packet latency. < variant> is a brand name for a compact, mobile, wireless router offered by Novatel Wireless.
< question 2> A worksheet < variant> is based on a grid of columns and rows. < variant> never changes when you insert rows, or copy or move formulas. < variant> that is, a reference that can change from B4 to B3 < variant> feature ensures that the results in every cell are accurate for the information currently entered in the worksheet. < variant> works behind the scenes to tell the computer how to use the contents of cells in calculations.
< question2> What becomes information when it is presented in a format that people can understand and use? < variant> Data < variant> Information < variant> Web < variant> Internet < variant> Input
< question2> Data is used by…. < variant> Machines < variant> Humans < variant> Animals < variant> Webpage < variant> Google
< question2> Information is used by… < variant> Humans < variant> Machines < variant> Animals < variant> Webpage < variant> Google
< question2> ………. is text, numbers, graphics, sounds and video that have been converted info discrete digits such as 0s and 1s < variant> Digital data < variant> Analog data < variant> Numeric data < variant> Character data < variant> Operation system
< question2> ………is represented using an infinite scale of values < variant> Analog data < variant> Digital data < variant> Numeric data < variant> Character data < variant> Operation system
< question2> The binary number system has only two digits: < variant> 0 and 1 < variant> 0 and 2 < variant> 1 and 9 < variant> 0 and 9 < variant> 2 and 7
< question2> Decrypt the wordASCII < variant> American Standard Code for information interchange < variant> American Standard Code for information technology < variant> American Standard Code for information invoice < variant> American Standard Code for information is power < variant> American Standard Club for information interchange
< question2> Decrypt the wordEBCDIC < variant> Extended Binary-Coded Decimal Interchange Code < variant> Extended Binary-Coded Decimal Information Code < variant> Extended Basic-Coded Decimal Interchange Code < variant> Extended Basic-Coded Devise Interchange Club < variant> Extended Binary-Coded Devise Information Club
< question2> A group of eight bits is… < variant> byte < variant> kilobit < variant> kilobyte < variant> megabit < variant> gigabyte
< question2> Zombie < variant> A computer under the control of a bad bot is sometimes referred, because it carries out instructions from a malicious leader. < variant> A feature which determines how your text flows from line to line by automatically movingwords down to the next line as you reach the right margin. < variant> уou use spreadsheet software to create an on-screen. < variant> Usually all the files needed for the new software, consolidate them into one large file, which is compressed to decrease its size and reduce the download time. < variant> usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.
< question2> A kilobyte is… < variant> 1024 bytes < variant> 1024 bits < variant> 1020 megabyte < variant> 1080 kilobit < variant> 1045 gigabit
< question2> Translate the numbers 1010 from binary system to decimal system < variant> 10 < variant> 12 < variant> 20 < variant> 30 < variant> 100
< question2> A megabyte is… < variant> 1048576 bytes < variant> 1 048575 bits < variant> 1 045 254 bytes < variant> 1 025577 megabits < variant> 1 014576 gigabytes
< question2> Translate the numbers 123 from octal system to decimal system < variant> 83 < variant> 93 < variant> 96 < variant> 100 < variant> 45
< question2> Translate the numbers 1A from hexadecimal system to decimal system < variant> 26 < variant> 56 < variant> 13 < variant> 286 < variant> 100
< question2> An input device designed at manipulate on-screen graphical objects is… < variant> Mouse < variant> Optical drive < variant> Smartphone < variant> Tablet Computer < variant> Keyboard
< question2> The main storage device on many computer system is… < variant> Hard disk drive < variant> Display system < variant> Operand < variant> Operating system < variant> Output
< question2> Storage device that works CDs, DVDs, Blu-ray discs or some combination of these storage media is… < variant> Optical drive < variant> Operating system < variant> Input < variant> Memory < variant> Object Code
< question2> An output device that produces computer-generated text or graphical images on paper is… < variant> Printer < variant> Mouse < variant> Password < variant> Server < variant> User ID
< question2> An enhanced mobile phone that also functions as a portable media player and has the combility to access the Internet is…. < variant> Smartphone < variant> Telephone < variant> Internet < variant> Computer < variant> Network
< question2> A handheld computer that is essentially a large version of an enhanced media player is… < variant> Tablet computer < variant> Computer < variant> Smartphone < variant> Printer < variant> Network
< question2> Based on a proprietary design for a personal computer, manufactured almost exclusively by Apple Inc is… < variant> Mac platform < variant> PC platform < variant> Linux platform < variant> SIC platform < variant> Mec platform
< question2> Based on the original IMB PC is… < variant> PC platform < variant> Mac platform < variant> Linux platform < variant> SIC platform < variant> WEB
< question2> A type of memory circuitry that is housed in a single integrated circuit-usually a fairly large, caterpillar-like DIP package-which is plugged into the system board is… < variant> ROM < variant> RAM < variant> Data < variant> PC platform < variant> Mac platform
< question2> A type of ROM that is non-volatile but user-modifiable is… < variant> EEPROM < variant> ROM < variant> RAM < variant> ASCII < variant> EBCDIC
< question2> A temporary holding area for data, application program instructions, and the operating system is… < variant> RAM < variant> ROM < variant> EEPROM < variant> ASCII < variant> EBCDIC
< question2> A touch-sensitive surface on which you can slide your fingers to move the onscreen pointer is.. < variant> Trackpad < variant> Expansion port < variant> System unit < variant> Object code < variant> Password
< question2> A long, narrow socket on the system board into which you can plug an expansion card is… < variant> Expansion slot < variant> Expansion port < variant> Expansion card < variant> Expansion bus < variant> Analog data
< question2> Any connector that passes data into and out of a computer or peripheral device is… < variant> Expansion port < variant> Expansion slot < variant> Expansion bus < variant> Expansion card < variant> Network port
< question2> A sudden increase in electrical energy affecting the current that flows to electrical outlets is… < variant> Power surge < variant> Compatible < variant> Drive bays < variant> Duty cycle < variant> Lands
< question2> A device that contains electrical outlets protected by circuitry that blocks surges is… < variant> Surge strip < variant> Virtual memory < variant> Overclocking < variant> Optical storage < variant> Microprocessor clock
< question2> A device that not only provides surge protection, but also furnishes desktop computers and network devices with battery backup power during a power outage is… < variant> UPS < variant> LCD < variant> LEC < variant> RISC < variant> ROM
< question2> Designed for professional troubleshooting is… < variant> Safe mode < variant> Dangerous mode < variant> Insecure mode < variant> Storage medium < variant> Trackpad < variant> Flat panel display based on liquid crystals, as well as a device (monitor, TV) on the basis of such a display is… < variant> LCD < variant> LED < variant> UPS < variant> USB < variant> LEC
< question2> Serial interface for connecting peripheral devices to a computer engineering is… < variant> USB < variant> UPS < variant> LEC < variant> RISC < variant> AISCII
< question2> Component video interface used in monitors and display adapters is… < variant> VGA < variant> UPS < variant> CPU < variant> ALU < variant> Apps
< question2> A device for reading memory cards and other electronic cards for various purposes is… < variant> Card reader < variant> Hard disc < variant> Unicode < variant> Stored program < variant> Semiconducting materials
< question2> A question2 stated in a language < variant> Natural language query < variant> Keyword search < variant> Query QBE < variant> Summertime < variant> Database software
< question2> Cable Internet service < variant> is a means of distributing always‑ on broadband Internet access over the same infrastructure that offers cable television service. < variant> which converts your computer’s signal into one that can travel over the CATV network. < variant> the doorway that allows a computer to exchange data with other devices < variant> a fixed Internet connection that uses a voiceband modem and telephone lines to transport data between your computer and your ISP. < variant> has been used by governments to keeps citizens away from Web sites that supply politically or culturally inflammatory information.
< question2> Domain Name System < variant> Every domain name corresponds to a unique IP address that has been entered into a huge database < variant> (Data Over Cable Service Interface Specification) is a data transport technology that includes security filters. < variant> is a key component of Web page addresses and e‑ mail addresses < variant> computer that hosts this database is referred to < variant> s the rate of data downloaded to your computer. Many ISPs limit these speeds to make sure everyone gets an equal share of the bandwidth.
< question2> Intrusion < variant> is any access to data or programs by hackers, criminals, or other unauthorized persons. < variant> Internet Protocol) is responsible for addressing packets so that they can be routed to their des‑ tination. < variant> measures the variability of packet latency. < variant> is a brand name for a compact, mobile, wireless router offered by Novatel Wireless. < variant> For the real Internet, cellular service providers offer data services, sometimes referred to as mobile broadband.
< question2> Jitter < variant> measures the variability of packet latency. < variant> is any access to data or programs by hackers, criminals, or other unauthorized persons. < variant> Internet Protocol) is responsible for addressing packets so that they can be routed to their des‑ tination. < variant> is a brand name for a compact, mobile, wireless router offered by Novatel Wireless. < variant> For the real Internet, cellular service providers offer data services, sometimes referred to as mobile broadband.
< question3> unzipped < variant> As part of the installation process, this downloaded file must be reconstituted into the original collection of files. < variant> specify the operating system and minimum hardware capacities necessary for a software product to work correctly. < variant> that can track down and fix disk errors, repair corrupted files, and give your device a performance-enhancing tune-up. < variant> (sometimes simply called a Trojan) is a computer program that seems to perform one function while actually doing something else. < variant> which deletes the software’s files from various folders on your computer’s hard disk.
< question3> utility software < variant> A type of system software thatis designed to help you monitor and configure settings for yourdigital gear, its operating system, or application software. < variant> is a number that you want to use in a calculation. < variant> Virus signatures and other information that antivirus software uses to identify and eradicate malware are stored in one or more files usually referred (or a virus database). < variant> usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose. < variant> (or Web app) is software that is accessed with a Web browser.
< question3> Value < variant> is a number that you want to use in a calculation. < variant> A type of system software thatis designed to help you monitor and configure settings for yourdigital gear, its operating system, or application software. < variant> Virus signatures and other information that antivirus software uses to identify and eradicate malware are stored in one or more files usually referred (or a virus database). < variant> usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose. < variant> (or Web app) is software that is accessed with a Web browser.
< question3> What is Virus hoax < variant> usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose. < variant> A type of system software thatis designed to help you monitor and configure settings for yourdigital gear, its operating system, or application software. < variant> is a number that you want to use in a calculation. < variant> Virus signatures and other information that antivirus software uses to identify and eradicate malware are stored in one or more files usually referred (or a virus database). < variant> (or Web app) is software that is accessed with a Web browser.
< question3> Web application < variant> (or Web app) is software that is accessed with a Web browser. < variant> A type of system software thatis designed to help you monitor and configure settings for yourdigital gear, its operating system, or application software. < variant> is a number that you want to use in a calculation. < variant> Virus signatures and other information that antivirus software uses to identify and eradicate malware are stored in one or more files usually referred (or a virus database). < variant> usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.
< question3> Worksheet. < variant> уou use spreadsheet software to create an on-screen. < variant> A feature which determines how your text flows from line to line by automatically movingwords down to the next line as you reach the right margin. < variant> Usually all the files needed for the new software, consolidate them into one large file, which is compressed to decrease its size and reduce the download time. < variant> A computer under the control of a bad bot is sometimes referred, because it carries out instructions from a malicious leader. < variant> usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.
< question3> Zipped < variant> Usually all the files needed for the new software, consolidate them into one large file, which is compressed to decrease its size and reduce the download time. < variant> A feature which determines how your text flows from line to line by automatically movingwords down to the next line as you reach the right margin.
|
|||
|