Òåñò: ÈÊÒ 1


Ñïèñîê âîïðîñîâ


1. Processor speed (CPU) is measured in:

1) Gigabit (Gb)
2) Megabyte (MB)
3) Megahertz (MHz)
4) Megabit (Mb)
5) Gigabyte (GB)

2. VR helmets. The creation of three helmets can be considered the start of interactive reality

1) Cyberspace and hardware
2) Accel World
3) Sword Art Online
4) Samsung Gear VR
5) HTC Vive, Oculus Rift

3. Which of the following is an operating system?

1) Microsoft Word
2) Linux
3) Libre Office
4) Microsoft Office
5) Microsoft Internet Explorer

4. What is the name of the container for the storage of currently running programs and currently processed data?

1) FTP (File Transfer Protocol)
2) ROM-Read-only Memory
3) CPU- Central Prossesing Unit
4) RAM – Random Access Memory
5) HDD- Hard Disk Drive

5. Which of these devices is an output device?

1) Speakers
2) Mouse
3) Microphone
4) Keyboard
5) Scanner

6. Which of the following is a «good practice» when using computers?

1) Use any lights near the computer
2) Sit as to the screen as possible for a better view
3) Do not use any lights near the computer
4) Keep the keyboard on the desk well above the wrists
5) Sit up straight? With elbows and knees bent approximately 90 degrees

7. Why format a disk drive?

1) To open the disk
2) To search the disk
3) To copy the disk
4) To lock the disk
5) To prepare the disk for data storage

8. Which of these terms is generally used to describe education via computer, characterized by flexible time and place of learning, reduced costs, etc.?

1) e-gov
2) e-retail
3) e-learning
4) e-study
5) e-class

9. Which of the following is a type of internet browser?

1) LAN (Local Area Network)
2) Instant Messaging – IM
3) FTP (File Transfer Protocol)
4) Extranet
5) WWW (World Wide Web)

10. What is the name of the service that facilitates the transfer of some information (news, blog entries, etc.) published on a Web page in a standardized manner (usually the title, a sentence or two of the article and a link to the page that contains the entire article)?

1) Really Simple Syndication - RSS
2) FTP (File Transfer Protocol)
3) Blog
4) Instant Messaging – IM
5) Voice over Internet Protocol – VoIP

11. Which of the following methods is used to increase data security?

1) Tasks that require speed
2) Informing the superiors of all the passwords you currently use
3) Regularly creating backup copies of all important data contained in the computer
4) Opening an attachment of each electronic message you receive
5) Never making copies of data in order to reduce the possibility of them being stolen

12. What is the common name for a software whose source code is publicly available for inspection, use, modification and redistribution?

1) Software
2) Hardware
3) Freeware
4) Shareware
5) Open Source

13. A touchscreen is:

1) Software
2) An output device
3) An input device
4) Both an input as well as an output device
5) Neither an input nor an output device

14. All the computer components are, in one world, called …

1) Open Source
2) Shareware
3) Freeware
4) Hardware
5) Software

15. Which type of a computer serves as a central unit for several other computers?

1) Freeware
2) Mainframe computer
3) Personal computer
4) Network computer
5) Laptop

16. Disc Defragmenter is used to

1) Remove the disc from the computer and add a new one
2) Compress the disc
3) Learn the amount of free space available on the disc
4) Fragment a disc in several parts
5) Defragment the disc

17. Which of the following extensions enable the computer to recognize compressed files and maps

1) .mpg and .rtf
2) .doc and .xls
3) .ppt and .pdf
4) .jpg and .png
5) .zip and .rar

18. Programs can be removed from the system using

1) Antivirus program
2) Compress program
3) Backspace key on the keyboard
4) Delete key on the keyboard
5) Add or Remove Programs within the Control Panel; Specialized programs for program removal

19. What is the name of a simple image editing program within Microsoft Windows OS

1) WordPad
2) GIMP
3) Fast Stone Image Viewer
4) Irfan View
5) Paint

20. Print Preview is used to

1) Add or Remove Programs
2) Manage the printer settings
3) Help to examine the document printout
4) View the print layout before printing the document
5) Manage the document content input

21. My Pictures Map is located in

1) My music
2) Control Panel
3) Program Files
4) My Computer
5) My Documents

22. To close an active window in Microsoft Windows OS, one can use the combination of the Alt key and

1) F4
2) Ctrl
3) Shift
4) Tab
5) Esc

23. Which of the following functions can be found within the Control Panel

1) File Compressor
2) File Manager
3) Disc Defragmenter
4) Date and Time; Programs and Features
5) Accessories

24. Screen properties can be accessed by clicking the right mouse-button on

1) My Documents
2) Control Panel
3) Start Menu
4) My Computer
5) Desktop

25. Choose the correct claims about Screen Saver

1) It protects the Program Files
2) It contains screen resolution settings
3) It opens Windows Explorer
4) It protects the computer Screen; It is installed within Windows OS
5) It is manually activated

26. What is the name of a network connecting computers that are physically close viz, within a company, an organizations, or a household?

1) LAN (Local Area Network)
2) Instant Messaging – IM
3) FTP (File Transfer Protocol)
4) Extranet
5) WWW (World Wide Web)

27. To manage the Hidden files visibility, go to

1) Control Panel
2) Folder Options
3) Program Files
4) My Documents
5) Windows Explorer

28. Apart from Notepad, which of the following is a part of the Microsoft Windows OS

1) Word
2) Writer
3) Wordperfect
4) Writerpad
5) WordPad

29. Which of the following is the extension of an executable file

1) .doc
2) .exe
3) .rtf
4) .gif
5) .ppt

30. In order permanently delete a file, one should select it and, before pressing the Delete key, press

1) Shift
2) Enter
3) Alt
4) F1
5) Home

31. Simultaneously pressing Ctrl+Alt+Del keys activates

1) Windows Explorer
2) Registry Editor
3) Windows Task Manager
4) Computer Shut Down
5) Program Files

32. Which of the generally describes the effects of computer viruses?

1) all the text files are always deleted
2) viruses cannot damage compressed files
3) files can be corrupted
4) viruses can only damage the image files
5) viruses can only damage the music files

33. Which of the listed tasks can be executed directly from the desktop?

1) change date and time
2) uninstall a program
3) open calculator
4) change font
5) open WordPad

34. Which of the following statements describes what happens when a file restored from the Recycle Bin?

1) file is moved to its original location
2) computer restarts
3) file is copied to the desktop
4) file is deleted from the computer
5) file is compressed

35. What happens when a disc is formatted?

1) disc is prepared for data storage
2) disc is permanently protected from viruses
3) all files on the disc are locked
4) all files on the disc are compressed
5) disc is temporarily protected from viruses

36. Which of the following keyboard keys is used for capturing the screen image?

1) Esc
2) PrtSc
3) Tab
4) Ctrl
5) Shift

37. Why is it important for a file to have the correct extension?

1) so that the computer may restart when necessary
2) so that the file can be deleted
3) so that the file can be automatically opened with the appropriate application
4) so that the file can be closed
5) so that the file can be copied

38. What is the name of a desktop element which displays running programs, opened folders and files i.e. what the RAM is currently “working on” ?

1) Icons
2) Folder
3) Windows
4) Start menu
5) Taskbar

39. In case an application does not respond to user commands, you can open the Task Manager by simultaneously pressing the Ctrl, Alt, and which of listed keys?

1) Delete
2) F1
3) Insert
4) Shift
5) Tab

40. Which of the following extensions represents a sound file type?

1) .jpg
2) .mp3
3) .zip
4) .ppt
5) .doc

41. What the name of the tool located on the Start menu, used for running programs (by entering the name of the executable file)?

1) Control Panel
2) Run
3) Search
4) My Recent Documents
5) My Computer

42. How do we call a computer software that automatically loads when the computer is starting up?

1) Icon
2) Desktop
3) Package of office programs
4) Operating System
5) File Manager

43. Which of the following is not a window element?

1) Title bar
2) Horizontal slider
3) Vertical slider
4) Instruments bar
5) Diagonal slider

44. Which of these is an example of hardware?

1) Monitor
2) Microsoft Word
3) Microsoft Excel
4) Internet Explorer
5) Microsoft Media Player

45. Which of these is an example of software?

1) Monitor
2) Keyboard
3) Printer
4) Scanner
5) Microsoft Excel

46. Which of the following actions selects the whole document?

1) Triple click the left mouse button in the left margin
2) Double click the left mouse button in the left margin
3) Clicking the right mouse button in the left margin
4) Double click the right mouse button in the left margin
5) Clicking the left mouse button in the left margin

47. Which of the following extensions indicates a Microsoft Word file?

1) .odf
2) .jpeg
3) .docx
4) .mdb
5) .xls

48. Which type of text formatting is performed by the tool shown in the image?

1) Strikethrough
2) Bold
3) Underline
4) Italic
5) Informal Roman

49. Which tab contains the Find and Replace options:

1) Page Layout
2) Home
3) References
4) View
5) Menu

50. Which tab contains the Header and Footer tool:

1) Home
2) Page Layout
3) View
4) Insert
5) Menu