Select the slide in slide sorter view, right click and choose preset animations from the shortcut menu

17. Which types of fonts are best suitable for titles and headlines sans serif fonts

18. Which type of font is best suitable for large amount of text? Serif fonts

19. Which of the following is not one of PowerPoint’s views? Presentation view

20. Which of the following will not advance the slides in a slide show view? The esc key

21. In Ms-Dos what command you will use to display system date? Date command

22. While working with Ms-Dos which command transfers a specific file from one disk to another? Copy

23. If you don’t know the current time, which command will you use to display Time

24. Which command divides the surface of the blank disk into sectors and assign a unique address to each one Format

25. If you need to duplicate the entire disk, which command will you use? Diskcopy

26. Which command lists the contents of current directory of a disk Dir

27. In which year the first operating system was developed 1950

28. MS-DOS developed in 1984

29. Multiprogramming system execute more jobs in the same time period

30. ________________interface consists of things like program counter, registers, interrupts and terminals Hardware

31. The operating system creates ____________from the physical computer Virtual computers

32. Which of the following operating does not implement multitasking truly? MS DOS

33. What is the name of the latest server operating system developed by Microsoft? Windows 2003

34. MS Excel provides the default value for step in Fill Series dialog box 1

35. Ctrl + D shortcut key in Excel will shortcut for fill down

36. Excel. What is the short cut key to replace a data with another in sheet?  Ctrl+H

37. Which of the following describes how to select all the cells in a single column? Left click on the gray column title button

38. Which of the following is not a basic step in creating a worksheet? Copy the worksheet

39. To insert three columns between columns D and E you would Select column E

40. To drag a selected range of data to another worksheet in the same workbook, use the Ctrl key

1. How long is an IPv6 address? 128 bits

2. Which protocol does DHCP use at the Transport layer? UDP

3. Where is a hub specified in the OSI model? Physical layer

4. Which protocol is used to send a destination network unknown message back to originating hosts? ICMP

5. What PPP protocol provides dynamic addressing, authentication, and multilink? LCP

 

6. What is a stub network? A network that has only one entry and exit point

7. What is the main reason the OSI model was created? So different networks could communicate

8. What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? Host-to-host

 

 

9. Which of the following is private IP address? 192.168.24.43

10. If you use either Telnet or FTP, which is the highest layer you are using to transmit data? application

11. Which layer 4 protocol is used for a Telnet connection? TCP

12. Which topology is shown: a star network

13. Which layer 1 devices can be used to enlarge the area covered by a single LAN segment? Hub and repeater

14. Which network topology offers the highest reliability and availability? mesh

15. Segmentation of a data stream happens at which layer of the OSI model? transport

16. How to implement a network medium that is not susceptible to EMI. Which type of cabling should you use? Fiber –optic cable

17. When data is encapsulated, which is the correct order? Data, segment, packet, frame, bit

18. Which topology is shown:

19. When John Murphy created ARCNET? 1976

20. Which topology is shown:  

A tree network

21. Which of the following refers to a series of characters used to verify a user’s identity? password

22. Which of the following is the least important information to record when logging a

security violation? User’s name

23. The three primary methods for authenticating users to a system or network are…? Passwords, tokens, and biometrics

24. What role does biometrics have in logical access control? authentication

25. Which of the following is NOT a good property of a firewall? Traffic must only be allowed to pass from inside to outside the firewall

26. What can a firewall protect against? Unauthenticated interactive logins from the “outside” world

27. What is Internet security? Is a branch of computer security related to the internet

28. What is Cybercrime? Also called computer crime, is any illegal activity that involves a computer or network –connected device, such as a mobile phone

29. What is a vulnerability? In computer security, a vulnerability is a weakness which allows an attacker to reduce a system’s information assurance

30. What is Trojan horse? Is any malicious computer program

31. What is a computer virus? Is a type malicious software program

32. What is a computer worm? Is a standalone malware computer program

33. Indicate in information security standard: ISO / IEC 17799-2005

34. The acts of the Republic of Kazakhstan governing legal relations in the sphere of information security: the law of the republic of Kazakhstan “on informatization”

35. What is Antivirus? Is computer software used to prevent, detect and remove malicious software

36. What is Password manager? Is a software application that helps as user store and organize passwords

37. When was released the the Orange Book? 1985

38. What is a character encoding? Is used to represent a repertoire of characters by some kind of an encoding system

39. What is Identification? Is an assertion of who someone is or what something is

40. What is Malware? Is any software used to disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising

1. ____________ refers to any type of application or presentation that involves more than one type of media, such as text, graphics, video, animation, and sound. Multimedia  

2. One of the disadvantages of multimedia is: cost

3. The text color in a presentation should contrast with the ________ color. background

4. Images included in many software titles are called _________. Clipart

5. A smaller version of an image is called a: thumbnail

6. The process of planning your multimedia presentation is known as a: storyboard

7. In Real Time Interactive Audio Video, Jitter is introduced in real-time data by delay between packets

8. The slide ________ controls text characteristics, background color and special effects, such as shadowing and bullet style. master

9. Designed to create a particular look, a __________ contains color schemes, slide and title masters with custom formatting and fonts styles. template

10. Adding _________ to objects on your slides not only controls the flow of information, but adds interest to your presentation. transition

11. The ________ master controls the format and placement of the titles and text you type on slides, as well as, background items and graphics you want to appear on every slide. Slide

12. The first slide in a presentation is usually reserved for the _________. Title

13. ______________ is the special effect used to introduce each slide in a slide presentation. Transition

14. Notes that include the slide as well as key comments and points you may want to emphasis while you present your slide show are know as: speaker notes

15. A ________ displays a list of commands and usually appears in the toolbar at the top of the screen. Menu

16. Slide and title masters contain ___________ that reserve spaces for text and footers such as date, time and slide number. Placeholders

17. Changing the appearance of your slide _________ can alter the slide’s color, shade, pattern, or texture. Design

18. A ____________ is a series of slides displayed in a particular sequence. Slide show

19. Quick access to frequently used commands can be found in the ________ toolbar. Drawing

20. A ____________ can be added to your presentation and then used to go to a variety of locations for example, a web address, an e-mail address, a custom show or document, just to name a few. Hyperlink

21. What is the quicktime embedded HTML command? HREF

22. ______________is a shorthand representation of music stored in numeric form. MIDI

23. Who has coined the word ‘hypertext’? Ted Nelson

24. A video consists of a sequence of frames

25. If frames are displayed on screen fast enough, we get an impression of motions

26. Moving Picture Experts Group (MPEG) is used to compress video

27. Most common compression technique that is used to create CD-quality audio is based on perceptual encoding technique is called perceptual encoding

28. Joint Photographic Experts Group (JPEG) is used to compress images

29. For Music, we need to compress digitize signals at: 1.42 I-MHz

30. Audio compression can be used for speech or music

31. _________ computing refers to applications and services that run on a distributed network using virtualized resources. cloud

32. ________ as a utility is a dream that dates from the beginning of the computing industry itself. computing

33. Which of the following is essential concept related to Cloud? virtualization

34. Point out the wrong statement: all applications benefit from deployment in the cloud

35. Which of the following cloud concept is related to pooling and sharing of resources? virtualization

36. ________ has many of the characteristics of what is now being called cloud computing. internet

37. Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a ________ resource. virtual

38. Which of the following is best known service model? IAAS

39. When you add a software stack, such as an operating system and applications to the service, the model shifts to _____ model. SAAS

40. Which of the following is most refined and restrictive service model? PAAS

1. What is HCI? Human-Computer Interaction

2. Who was the first to use the term human-computer interaction? Stuart K.Card, Allen Newell, Thomas P.Moran

3. What is used for speech recognition and synthesising systems?

4. Select iterative design steps. Design the user interface; test; analyze results; repeat

5. The emergence of techniques of human-computer interaction have been in this year.

6. An operating system (OS) is ________ the software component of a computer system that is responsible for the management and coordination of activities and the sharing of the resources of the computer

7. What is APIs? Application programming interfaces

8. In the 1940s, electronic systems of this time were ___________________. programmed on rows of mechanical switches or by jumper wires on plug boards

9. When did not exist modern operating systems? Early 1960s

10. What connects the kernel? It connects the application software to the hardware of a computer

11. How many processors used supercomputers of the 21st century? Over 100,000

12. Supercomputers were introduced in the____________. 1960s

13. MPI is _____________________________ Message Passing Interface

14. What is qubits? Is a unit of quantum information-the quantum analogue of the classical bit

15. Who invented a supercomputer? Seymour Cray

16. Mobile user interface considers__________. Constraints&contexts, screen, input and mobility

17. What is BYOD? Bring Your Own device                                          

18. Where to use Google Android Emulator? Windows PC

19. When the released version Android 3.0 «Honeycomb»? February 22, 2011

20. Silverlight for Windows Phone 7.5 is   based ________. On Silverlight 4

21. WHO designed two mechanical machines that were capable of performing calculations in the early 1800’s Charles Babbage

22. What is NOT a component of a computer system Windows OS

23. Computer memory divided into …. main and secondary memory

24. Each memory cell has a ………, which uniquely identifies its location numeric address

25. What is measured by the clock speed? MHz(megahertz)

26. Data visualization are divided to…?

27. Tasks of Data mining are divided to…

28. Who coined the term of data mining? Gregory Piatetsky-Shapiro

29. What is Data analysis is a process of inspecting, cleansing, transforming, and modeling data with the goal of discovering useful information, suggesting conclusions, and supporting decision-making.

30. What is data integration?   Is a precursor to data analysis, and data dissemination.

31. What is CDA?   CD Audio Track

32. What is EDA? Electronic Design Automation/Exploratory data analysis

33. The DBMS acts as an interface between what two components of an enterprise-class database system? Database application and the database

34. Which of the following products was an early implementation of the relational model developed by E.F. Codd of IBM? DB2

35. The following are components of a database except ________. reports

36. An application where only one user accesses the database at a given time is an example of a(n) ________. single-user database application

37. Which of the following products was the first to implement true relational algebra in a PC DBMS? R:base

38. SQL stands for ________. Structured Query Language

39. The following are functions of a DBMS except _____ _ __. creating and processing forms

40. Which of the following products implemented the CODASYL DBTG model? IDMS

 

1. Mobile application development is _______. a term used to denote the act or process which application software is developed for mobile devices

2. Mobile user interface considers _____________. Constraints&contexts, screen, input and mobility

3. The mobile back-end facilitates___________. data routing, security, authentication, authorization, working off-line, and service orchestration.

 

4. What is BYOD? Bring Your Own Device

5. What used to test mobile applications? Emulators

6. Where to use Google Android Emulator? Windows PC

7. The official Android SDK Emulator is ______. A mobile device emulator which mimics all of the hardware and software features of a typical mobile device.

8. TestiPhone is ___________________. A web browser-based simulator for quickly testing iPhone web applications.

9. Windows UI Automation is pre-installed        on ______________. Windows 7, Windows Server 2008 R2 and later versions of Windows

10. Android is _____________________. A mobile operating system developed by Google, based on the Linux kernel

11. When the released version Android 3.0 «Honeycomb»? February 22, 2011

12. Android's kernel is _________________. based on one of the Linux kernel’s long-term support (LTS) branches

13. What programming language used on the Android platform? Java, C, C++, Delphi

14. Windows Phone (WP) is _______________. A family of mobile operating systems developed by Microsoft for smartphones as the replacement successor to Windows Mobile and Zune

15. Windows Phone was first launched ______. In October 2010 with Windows Phone 7

16. Windows Phone 8.1 was the last public release of the operating system, released to manufacturing on _________________. April 14, 2014

17. Microsoft Silverlight is _____________. An application framework for writing and running rich Internet applications, similar to Adobe Flash

18. Silverlight for Windows Phone 7.5 is   based ________________. on Silverlight 4

19. Microsoft XNA (a recursive acronym for XNA's Not Acronymed) is _____________. A freeware set of tools with a managed runtime environment provided by Microsoft that facilitates video game development and management

20. A first Community Technology Preview of XNA Build was released ______________. on March 14, 2006

21. An operating system (OS) is ________ the software component of a computer system that is responsible for the management and coordination of activities and the sharing of the resources of the computer

22. What is APIs? Application Programming Interfaces

23. The dominant desktop operating system        is __________. Microsoft Windows

24. In the 1940s, electronic systems of this time were ___________________. Programmed on rows of mechanical switches or by jumper wires on plug boards

25. In the early 1950s, a computer could execute ___________. One program at a time

26. What is GUI? It is Graphical User Interface

27. When did not exist modern operating systems? The early 1960s

28. In the 1940s, the earliest electronic digital systems ________________. Had no operating systems

29. What had used the computer to work with program in early 1950? Data on punched paper cards or punched tape

30. What is produced UNIVAC in the 1970s? Real-Time Basic(RTB)

31. What is a process management? It is an integral part of any modern-day operating system(OS)

32. Memory management is ______________. The act of managing computer memory

33. What is a device driver? It is a computer program that operates or controls a particular type of device that is attached to a computer

34. What is a computer network? Is a telecommunications network which allows nodes to share resources

35. What is IT security? Is the protection of information systems from the theft or damage to the hardware, software or the information on them.

36. What connects the kernel? It connects the application software to the hardware of a computer

37. What provides the operating system? The operating system provides an interface between an application program and the computer hardware

38. Interrupts are central to operating systems, as they provide an efficient way for the __________________. Operating system to interact with and react the environment

39. What provides an internal security? It allows each user of the system to have private files that the other users cannot tamper with or read

40. Who invented the Manchester Mark 1? Alan Turing


 

1. A supercomputer is a computer with a high-level computational capacity compared to_______________________ a general-purpose computer

2. Supercomputers were introduced in the____________ 1960s

3. Who made supercomputer? Seymour Gray

4. Who invented a supercomputer? Seymour Gray

5. As of 2015, there are supercomputers which can perform up to _____________ quadrillions of FLOPS

6. How many processors used supercomputers of the 1970s? only a few processors

7. How many processors used supercomputers of the 1990s? thousands of processors

8. How many processors used supercomputers of the 21st century? tens of thousands processors

9. Quantum computers it is _______________ a computer design which uses the principles of quantum physics to increase the computational power beyond what is attainable by a traditional computer

10. A theoretical model is the quantum _________________

11. What is qubits? Is a unit of quantum information-the quantum analogue of the classical bit

12. How many nodes using cluster computers?

13. MPI is _____________________________ Message Passing Interface

14. PVM is _____________________________ Parallel Virtual Machine

15. When and where PVM was developed? ORNL in 1989

16. A multi-core processor is ________________________________ a single computing component with two or more independent actual processing units, which are units that read and execute program instructions

17. Find the correct statement of multi-core processors and dual-core:

18. Multi-core processors are widely used across______________________________ many application domains, including general-purpose, embedded, network, digital signal processing(DSP) and graphics(GPU)

19. What is a computer cluster? A computer cluster consists of a set of loosely or tightly connected computers that work together so that, in many respects, they can be viewed as a single system.

20. When Seymour Cray devised Cray-1? 1976

21. What is HCI? Human-Computer Interaction

22. What researches human-computer interaction? Design and use of computer technology, focused on the interfaces between people(users) and computers

23. Who was the first to use the term human-computer interaction? Stuart A. Card, Allen Newell, and Thomas P. Moran

24. What is used for speech recognition and synthesising systems? Voice User Interfaces(VUI)

25. How is HCI also sometimes termed? Human-machine interaction(  HMI) or computer-human interaction(CHI)

26. What steps are iterative design steps? Design the user interface; test; analyze results; repeat

 

27. When there have been the emergence of techniques of human-computer interaction?

28. For what use the activity theory? Used in HCI to define and study the context in which human interactions with computers take place

29. Please specify the seven principles of user interface design: The structure, simplicity, visibility, feedback, tolerance, affordance, consistency

  30. What is the method for building technology that account for the values of the people? Value Sensitive Design (VSD)

31. The human–computer interface can be described as the point of communication ________ between the human user and the computer

32. What is UCD? User-Centered Design

33. What are the essential elements of UCD of a web site? Considerations of visibility, accessibility,legibility, language

34. According to Larry Constantine and Lucy Lockwood in their usage-centered design, these principles are: structure, simplicity, visibility, feedback, tolerance, reuse

35. What is the book of Stuart A. Card, Allen Newell, and Thomas P. Moran, where the term human-computer interaction is mentioned? “The Psychology of Human-Computer Interaction”

36. What is ACM? Association for Computing Machinery

37. Indicate institutions, which research human-computer interaction:

38. What is PIM? Protocol Independent Multicast

39. What is CSCW? Computer-Supported cooperative work

40. What is HIM? Health Information Management

 

 

1. What is IoT? Internet of Things

2. When was invented the concept of the Internet of Things? 1985

3. Big data is a term for data sets that are so large or complex_____________- that traditional data processing applications are inadequate to deal with them

4. The term Big data has been in use since the________ 1990s

5. Big data can be described by the following characteristics: Volume, Variety, Velocity, Variability, Veracity

6. What is Technology BlockChain? A blockchain is a distributed database that maintains a continuously-growing of records called blocks

7. What is Artificial intelligence? Is intelligence exhibited by machines

8. This Web site feature involves tailoring pages to individual users' characteristics or preferences. Personalization

9. This popular online payment service is owned by eBay. PayPal

10. This is an industry term used to describe the progression of steps a customer goes through when considering, purchasing, using, and maintaining loyalty to a product or service. Customer life style

11. This Internet business model generates revenue by offering pay-per-view Web pages, Web links, or Web services for small amounts of money. Micropayment

12. This approach to understanding customer behavior involves the integration of information gathered by traditional data mining techniques with information gathered over the World Wide Web. Web mining

13. This industry initiative, headed by Microsoft, was created to promote Extensible Markup Language (XML) as the common data exchange language for e-commerce. BizTalk

14. This is a method for business-to-business purchase and sale of supplies and services over the Internet. E-procurement

15. This type of Internet business charges individuals or enterprises an access fee for applications and related services that would otherwise have to be located in their own personal or enterprise computers. Application service provider

16. This XML-based protocol is intended to serve as a standard for managing complex business-to-business (B2B) transactions among multiple organizations. Business Transaction Protocol

17. This is an industry term for software that analyzes data about customers to develop a better understanding of the customer and how the customer is using a company's products and services. Enterprise relationship management

18. What is Smart TV? Is a television set with integrated Internet and interactive “Web 2.0” features

19. What is Electronic business? Is the application of information and communication technologies ICT in support of all activities of business

20. The term "e-business" was coined by IBM's marketing and Internet team in____ 1996

21. What is E-commerce? Is trading in products or services using computer networks, such as the Internet.

22. What is E-training? Is the convergence of the internet and learning, or Internet-enabled learning

23. Electronic learning or E-learning_________ is a general term used to refer to computer-enhanced learning

24. The first e-learning system was _______ PLATO

25. What is E-government? Is the use of electronic communications devices, computers and the Internet to provide public services to citizens and other persons in a country or region

26. What is Electronic mail? Is a method of exchanging digital messages between computer users

27. Email first entered substantial use in the ____ 1960s

28. A computer system may be categorised as a: General purpose or special purpose

29. Expand the acronym ALU: Arithmetic Logic Unit

30. Main memory is also known as: Immediate access storage

31. Which of the following best suits the statement below? It's the main memory of the computer system and is volatile.

32. All of the following are processing modes except:

33. What are types of user interface?

34. What does SATA stands for?

35. All are secondary storage media except:

36. What happens when you press CTRL + V key?

37. What is the short cut key for Print a Document?

38. The binary system uses the symbols

39. Which of the following is not a function of a network?

A.

40. An _____________ is the generic term for a collection of private computer networks within an organization.

 

 


1. WHO designed two mechanical machines that were capable of performing calculations in the early 1800’s (the Difference Engine and the Analytical Engine)? Charles Babbage

2. Which of the following is NOT related to Neumann principles? The basic units are – ALU, memory, input and output

3. Define computer type by the definition- a powerful, single-user computer. It is like a personal computer, but it has a more powerful microprocessor and a higher-quality monitor.   Workstation

4. What is NOT a component of a computer system: Windows OS

5. Find FALSE statement about Central Processing Unit: CPU can storage different types of variables

6. What part of CPU coordinates all processing steps? Control Unit

7. Computer memory divided into …. Bits/Bytes/Words

8. Kilobyte (KB) = 1024 Bytes

9. Terabyte (TB) = 1024 Gigabytes

10. Find FALSE statement about Main Memory: Each word within memory can hold addresses of memory locations

11. Each memory cell has a ………, which uniquely identifies its location: Numeric address

12. Main Memory Characteristic: Very closely connected to the CPU

13. How many ways the processor interacts with the main memory? 2

14. Secondary Storage Characteristic: Used for long-term storage of programs and data

15. Programs instructions are stored in …….. Secondary Storage

16. What tell the computer’s CPU what to do? Instructions

17. What is measured by the clock speed? Hertz

18. One Hertz is …   one clock tick per second

19. Fast memory is …. Cache memory

20. What refers to the hardware? CPU

21. The part of the computer which displays information to the user in soft copy format is the: Monitor

 

22. The sharpness of an image on a monitor screen is determined by the number of: Pixels

 

23. Which of the following can be used as an input device and at the same time as an output device? Modern

 

24. The device that uses the magnetic method to store data is: Hard disk

 

25. Which of the following devices has the largest storage capacity? Hard disk

 

26. By default, the drive letter assigned to the hard disk drive is: C:

 

27. Which of the following devices must be turned on first when booting a computer? System Unit

 

28. The program that is loaded into the main memory when a computer is booted is: Operating System

 

29. To copy a file means to: make a duplicate of the file

 

30. A group of files are stored in a: Folder

 

31. The area of the taskbar that displays small icons of some programs such as the system clock is: System tray

 

 

32. Which of the following is a problem to computer users as a result of radiation from the monitor? Eye irritation

 

33. Dragging a folder from one drive to a window on another drive is equivalent to a: Copy operation

 

34. Which of the following safety precaution(s) is/are advisable to practice?
I. Do not answer or receive calls when charging mobile phones
II. Do not overload sockets
III. Plugging ICT tools in damaged sockets can be allowed sometimes.







I and II only

35. A computer program that can copy itself and infect the computer without the permission or knowledge of the user is: Virus

 

36. The software that assists students in learning and can also be used to take online examinations is: Education software

 

37. ICT tools can be used in all the following areas except: Starting cabinetry

 

38. The act of clicking on an object and dragging it to a different location is referred to as: Drag-and-drop

 

39. When pursuing typing lessons, computer users are expected to use: 10 fingers

 

40. Which of the following keys is not a function key on the computer keyboard? F13

 


Понравилась статья? Добавь ее в закладку (CTRL+D) и не забудь поделиться с друзьями:  



double arrow
Сейчас читают про: