Òåñò: ÈÊÒ 5
Ñïèñîê âîïðîñîâ
1. Which one of the following statements about the Internet is TRUE? |
||
1) Lack of human contact | ||
2) The Internet is a network operating system | ||
3) The Internet is a visual representation of linked documents | ||
4) The Internet is a private company network | ||
5) The Internet is a global network that links many computer networks together | ||
2. Which type of software is used to access the Internet? |
||
1) Spreadsheet | ||
2) System | ||
3) Presentation | ||
4) Interface | ||
5) Browser | ||
3. The Internet service that enable us to "surf the Web" (browse through web pages connected with hyperlinks) is called |
||
1) Transmission Control Protocol Internet Protocol (TCP IP) | ||
2) Hypertext Transfer Protocol (HTTP) | ||
3) World Wide Web (WWW) | ||
4) Hypertext Transfer Protocol (HTTP) | ||
5) Internet | ||
4. What characterizes e-mail? |
||
1) E-mail enables easy and fast transmission of messages | ||
2) The availability and transfer rate of the network | ||
3) E-mail enables free online mass storage of files | ||
4) E-mail enables broadcasting of Web based multimedia content | ||
5) E-mail enables voice communication between computer users | ||
5. Which part of the address http://www.itdesk.info represents the protocol (transfer rules)? |
||
1) www.itdesk.info | ||
2) http | ||
3) itdesk | ||
4) .info | ||
5) www | ||
6. Which of the following is a web browser? |
||
1) Mozilla Firefox | ||
2) Microsoft Excel | ||
3) Microsoft Outlook | ||
4) Google | ||
5) Yahoo | ||
7. What do we call the first page that a web browser loads when it is launched? |
||
1) Microsoft Explorer | ||
2) Microsoft Excel | ||
3) Google | ||
4) Íîmå page | ||
5) Blank page | ||
8. What do we call a program that installs on a computer and sends user information over the Internet to the program author without user approval? |
||
1) Shareware | ||
2) Software | ||
3) Spamware | ||
4) Spyware | ||
5) Hardware | ||
9. What do we call a text file that contains the record of visited web sites? |
||
1) Cookie | ||
2) DML (Data Manipulation Language) | ||
3) Internet Service Provider- ISP | ||
4) Really Simple Syndication –RSS | ||
5) Cache | ||
10. If a web address begins with "https", it means that |
||
1) Protects e-mail so that it can be received | ||
2) It is a web site with a secure communication and secure identification | ||
3) The web page is under construction | ||
4) There is a high risk of infecting the computer with a virus | ||
5) Spyware is found on that web site | ||
11. What are the functions of a Firewall? |
||
1) Contains a categorization of web pages and speeds up image upload | ||
2) Protects your computer from fire | ||
3) Using updated antivirus software to protect your computer | ||
4) Protects e-mail so that it can be received and read only by the appropriate recipient, and not others | ||
5) Controls and protects communication ports of computer, allowing only authorized communication | ||
12. What is the purpose of adding web sites to Favorites? |
||
1) Only encrypted e-mails | ||
2) This is the only way we can print the site | ||
3) Opens up the web site every time the browser is started | ||
4) Saves web site address for easier future access | ||
5) This is the only way we can send e-mail to site authors | ||
13. Which of the following statements is true? |
||
1) E-mail is a completely safe way to send and receive information | ||
2) Saves web site address for easier future access | ||
3) Only encrypted e-mails are charged | ||
4) E-mail is a quick and cheap way to send and receive messages | ||
5) By using electronic mail, we can send any file as an attachment | ||
14. Which of the following is a definition of the distribution list? |
||
1) List of all sent attachments | ||
2) List of e-mail recipients | ||
3) List of e-mail addresses of all received | ||
4) List of e-mail addresses of all received and sent messages | ||
5) List of all received attachments | ||
15. A computer offering its resources to other computers is called a |
||
1) Search | ||
2) Server or provider | ||
3) Customer | ||
4) Network | ||
5) Firewall | ||
16. A set of internet communication protocols is called |
||
1) Transmission Control Protocol Internet Protocol (TCP IP) | ||
2) Locator (URL) | ||
3) Uniform Resource Locator(URL) | ||
4) Firewall | ||
5) Search Engine | ||
17. There are different ways of connecting a computer to the WAN network. Which of the following is a wireless connection? |
||
1) Locator (URL) | ||
2) Modem connection | ||
3) Digital subscriber line (DSL) | ||
4) General Packet Radio Service (GPRS) | ||
5) Integrated Services Digital Network (ISDN) | ||
18. Computers mutually communicate via |
||
1) Addresses | ||
2) Web-addresses | ||
3) Domains | ||
4) Firewalls | ||
5) Protocols | ||
19. Which of the following networks connects computers on a wide geographical area? |
||
1) WPAN | ||
2) LAN | ||
3) PAN | ||
4) WLAN | ||
5) WAN | ||
20. The name of a private network primarily including the employees of a particular company is |
||
1) Explorer | ||
2) Ethernet | ||
3) Internet | ||
4) Ekstranet | ||
5) Intranet | ||
21. Which domain in the web address indicates governmental institutions? |
||
1) .edu | ||
2) .net | ||
3) .gov | ||
4) .com | ||
5) .org | ||
22. HTML is short for |
||
1) Hurried Textual Manipulation Language | ||
2) Hyper Text Marking Symbol | ||
3) Hurried Textual Multimedia Link | ||
4) Hyper Text Markup Language | ||
5) Hypno Tech Multi-Lateral | ||
23. Html files are actually plain textual files with the extension |
||
1) .http | ||
2) .exe | ||
3) .mdb | ||
4) .com | ||
5) .html or .htm | ||
24. On the very beginning of a HTML document, before the tag, there is |
||
1) |
||
2) ? DOCTYPE ? | ||
3) | ||
4) | ||
5) |
||
25. After the element, the tag marks the beginning of an HTML document. Within the element, there are the following two elements |
||
1) and | ||
2) and |
||
3) |
||
4) |
||
5) | ||
26. The |
||
1) | ||
2) | ||
3) |
||
4) |
||
5) | ||
27. The closing tag for the element is |
||
1) <_body> | ||
2) | ||
3) | ||
4) <=body> | ||
5) | ||
28. The closing tag for font size (e.g:) is |
||
1) | ||
2) | ||
3) | ||
4) | ||
5) | ||
29. What is HTML? |
||
1) A protocol for sending data via e-mail | ||
2) A language for describing/creating web-documents (webpages) | ||
3) An organization that deals with defining the standards of production of programming languages | ||
4) A device which measures the security of data traffic on the internet | ||
5) can't be set from within the tag body | ||
30. Basic elements of any HTML document are |
||
1) HTML tags | ||
2) classes | ||
3) functions | ||
4) pointers | ||
5) procedure | ||
31. Which of the following are the correct start and end tags in HTML? |
||
1)
|
||
2) <\p>
|
||
3) >\body> | ||
4) |
||
5) or | ||
32. To delete an object from a presentation, select it and press |
||
1) Esc | ||
2) F5 | ||
3) End | ||
4) Delete | ||
5) F1 | ||
33. Which software would you use for creating a set of slides to be shown to an audience? |
||
1) Presentation | ||
2) Database | ||
3) Desk Top Publishing | ||
4) Spreadsheet | ||
5) Speaker | ||
34. Which of the following chart types is used to graphically show the partial values of a whole as the part of a circle, with circular clips representing the partial value, and the full circle representing the sum of all the values)? |
||
1) Pie chart | ||
2) Table | ||
3) Line chart | ||
4) SmartArt | ||
5) Page | ||
35. In which tab of the Format Shape dialog box can the transparency be adjusted? |
||
1) Reflection | ||
2) Shadow | ||
3) Fill | ||
4) Artistic Effects | ||
5) Shape Effects | ||
36. Which image formats in Microsoft PowerPoint 2010 can be converted into drawing objects? |
||
1) .jpg | ||
2) .gif | ||
3) .png | ||
4) .wmf | ||
5) .tif | ||
37. The commands Group and Ungroup can be accessed through the menu |
||
1) Home or Format - in the Drawing Tools section | ||
2) Design | ||
3) Insert | ||
4) View | ||
5) Insert and View | ||
38. Hide background graphics option does not remove |
||
1) Images | ||
2) Drawing objects | ||
3) Patterns in background fill | ||
4) Background style Background color | ||
5) Artistic effects | ||
39. Which of the following security settings of macros is not recommended? |
||
1) Drawing objects | ||
2) Disable all macros except digitally signed macros | ||
3) Disable all macros with notification | ||
4) Disable all macros without notification | ||
5) Enable all macros | ||
40. We change the connector color with the command |
||
1) Shape Effects | ||
2) Shape Outline | ||
3) Shape Fill | ||
4) Artistic Effects | ||
5) Shadow | ||
41. How can the slide show be repeated continuously? |
||
1) Loop continuously until ‘Esc’ | ||
2) Repeat continuously | ||
3) Loop more | ||
4) None | ||
5) Outlines | ||
42. From where can we set the timing for each object? |
||
1) Slide show, custom transition | ||
2) Slide show, Slide transition | ||
3) Slide show, custom animation | ||
4) View, slide sorter | ||
5) View, slide sorter transition | ||
43. The arrangement of elements such as Title and subtitle text, pictures, tables etc. is called |
||
1) Layout | ||
2) Presentation | ||
3) Design | ||
4) Scheme | ||
5) Loop more | ||
44. A File which contains readymade styles that can be used for a presentation is called |
||
1) Auto Style | ||
2) Wizard | ||
3) Template | ||
4) Pre formatting | ||
5) None | ||
45. After choosing a predefined template, which option has to be chosen to change the background color? |
||
1) Design Template | ||
2) Animation Scheme | ||
3) Color Effects | ||
4) Color Scheme | ||
5) Preformatting | ||
46. Ellipse Motion is a predefined |
||
1) Animation Scheme | ||
2) Design Template | ||
3) Color Scheme | ||
4) Auto Style | ||
5) Color Effects | ||
47. To insert new slide in the current Presentation, we can choose |
||
1) Ctrl+N | ||
2) Ctrl+M | ||
3) Ctrl+O | ||
4) Ctrl+F | ||
5) Ctrl + A | ||
48. A Chart can be put as a part of the presentation using |
||
1) Insert –> Chart | ||
2) Edit –> Chart | ||
3) View -> Chart | ||
4) Insert -> Pictures –> Chart | ||
5) Tools ->Replace Fonts | ||
49. We can replace a font on all slides with another font using the option |
||
1) Format -> Replace Fonts | ||
2) Edit –> Fonts | ||
3) Tools –> Fonts | ||
4) Tools -> Replace Fonts | ||
5) View -> Chart | ||
50. Which key on the keyboard can be used to view Slide show? |
||
1) F5 | ||
2) F1 | ||
3) F2 | ||
4) F10 | ||
5) F4 |