Òåñò: information and communication technology
Ñïèñîê âîïðîñîâ
1. The computer is: |
|
1) analog signal processing device | |
2) device to store information of any kind | |
3) electronic computing device for handling numbers | |
4) device for working with text | |
5) multifunctional electronic device for information | |
2. What device is used by computer to process information? |
|
1) monitor | |
2) RAM | |
3) processor | |
4) keyboard | |
5) the manipulator | |
3. Processor speed is: |
|
1) the number of binary oper ations committed per unit of time processor | |
2) speed of information exchange between the processor and i/o devices | |
3) the number of generated pulses per second, clock work computer nodes | |
4) speed of information exchange between the CPU and ROM | |
5) the number of possible references to the operating memory in unit of time | |
4. Processor speed is: |
|
1) the number of possible references to the operating memory in unit of time | |
2) the number of generated pulses per second, clock work computer nodes | |
3) the number of binary oper ations committed per unit of time processor | |
4) speed of information exchange between the CPU and ROM | |
5) speed of information exchange between the processor and i/o devices | |
5. RAM defines: |
|
1) how much information you can print | |
2) how much information can use the Internet | |
3) how much information you can copy | |
4) how much information can be stored on the hard disk | |
5) how much information can be processed without the access to your hard drive | |
6. Specify the most complete list of main devices: |
|
1) the CPU, memory, i/o devices | |
2) monitor, Winchester, printer | |
3) ALD, DD, coprocessor | |
4) microprocessor, coprocessors, monitor | |
5) scanner, mouse, monitor, printer | |
7. Name the device included in the processor: |
|
1) cache memory, video memory | |
2) arithmetic logic unit, control unit | |
3) random access memory, printer | |
4) the display processor, video card | |
5) scanner, ROM | |
8. Processor handles information: |
|
1) radix | |
2) binary | |
3) Basic language | |
4) as text | |
5) in ternary code | |
9. During the execution of an application program is stored: |
|
1) ROM | |
2) hard disk space | |
3) the VRAM | |
4) RAM | |
5) processor | |
10. Personal computer will not function if you disable: |
|
1) printer | |
2) scanner | |
3) memory | |
4) drive | |
5) mouse | |
11. For long-term storage information is: |
|
1) RAM | |
2) drive | |
3) external storage | |
4) processor | |
5) power supply | |
12. Drive is a device for: |
|
1) paper output | |
2) command processing executable program | |
3) read/write data from external media | |
4) long-term storage information | |
5) store commands executable program | |
13. Which device is used to enter information: |
|
1) printer | |
2) keyboard | |
3) processor | |
4) monitor | |
5) ROM | |
14. The manipulator "mouse" is a device: |
|
1) read | |
2) modulation and demodulation | |
3) to connect the printer to the computer | |
4) input information | |
5) long-term storage information | |
15. To connect your computer to the Internet using: |
|
1) scanner | |
2) modem | |
3) monitor | |
4) fax | |
5) printer | |
16. Which one runs on a computer hardware and serves as a platform for other software to run on? |
|
1) Operating System | |
2) Application Software | |
3) Malicious Software | |
4) System Software | |
5) Database System | |
17. Which of the following Operating System does not implement multitasking truly? |
|
1) Linux | |
2) Windows XP | |
3) MS DOS | |
4) Unix | |
5) Windows 7 | |
18. Which is the first program run on a computer when the computer boots up? |
|
1) System software | |
2) System operations | |
3) System file | |
4) Operating system | |
5) Operating Shell | |
19. Which is the layer of a computer system between the hardware and the user program |
|
1) System environment | |
2) Drivers | |
3) Operating environment | |
4) Utilities | |
5) Operating system | |
20. Specialized program that allows users to utilize in specific application is classified as |
|
1) database packages | |
2) utilities | |
3) replicate programs | |
4) application programs | |
5) relative programs | |
21. Programs used to control system performance are classified as |
|
1) experimental programs | |
2) specialized program | |
3) organized programs | |
4) system programs | |
5) utilities | |
22. Which application software would best be used when you need to print a letter for a legal client? |
|
1) MS Publisher | |
2) MS Access | |
3) MS Excel | |
4) MS Word | |
5) Google Chrome | |
23. name the device included in the processor: |
|
1) Double-click | |
2) Change page setup | |
3) Change the template | |
4) Use save as | |
5) Open file properties | |
24. In Windows operating system , an icon or a link that provides access to some original program or resource is known as ____________ . |
|
1) Cursor | |
2) Shortcut | |
3) Icon | |
4) Desktop | |
5) Panel | |
25. Moving an item across the screen with the mouse |
|
1) Double-click | |
2) Clipboard | |
3) Recycle bin | |
4) Drag and drop | |
5) Web browser | |
26. A picture that represents a file |
|
1) Folder | |
2) Shortcut | |
3) Start menu | |
4) Desktop | |
5) Icon | |
27. Windows 7 Operating System is an upgrade from |
|
1) Windows 8 | |
2) Windows Millennium | |
3) Windows XP or Vista | |
4) Windows 2000 | |
5) Windows 98 | |
28. Set of programs with full set of documentation is considered as |
|
1) file package | |
2) database packages | |
3) software | |
4) software packages | |
5) operating system | |
29. When sizing a window |
|
1) Mouse pointer turns into a cross | |
2) Mouse pointer change into a two-headed arrow | |
3) Mouse pointer has one-headed arrow | |
4) Mouse pointer change into a three-headed arrow | |
5) Mouse pointer does not change | |
30. What is the key combination to Quit a program through Task Manager that is not responding? |
|
1) Shift + Enter | |
2) Ctrl + Del | |
3) Ctrl + Alt + Del | |
4) Shift + Alt + Del | |
5) Alt + Del | |
31. Elements of the dialog box: |
|
1) Menu bar | |
2) roll | |
3) working field | |
4) control button | |
5) scrollbar | |
32. The elements of the Windows desktop: |
|
1) | |
2) Minimize, maximize, close | |
3) check box | |
4) text box | |
5) scrollbar | |
33. Right-click exercises |
|
1) start | |
2) a context menu | |
3) selection | |
4) Cascade | |
5) hang | |
34. Icon is ... |
|
1) Label | |
2) Taskbar | |
3) drawing | |
4) start | |
5) selection | |
35. What is the window bar displays the name of the disclosed subject? |
|
1) Menu bar | |
2) Title bar | |
3) drawing | |
4) Status Bar | |
5) Toolbox | |
36. The set of tools and rules of user interaction with the computer is called |
|
1) user interface | |
2) interface | |
3) Processor | |
4) the object of control | |
5) Menu bar | |
37. Double-clicking the left mouse button performs |
|
1) the title | |
2) start | |
3) selection | |
4) Drag and Drop | |
5) a context menu | |
38. Markup text, images and other objects on a web page is realized with the help of ... |
|
1) the operands | |
2) Binary | |
3) Tag | |
4) Operators | |
5) Team | |
39. Browser - a program for ... |
|
1) Programming Language | |
2) Web browsing | |
3) the creation of databases | |
4) creating web pages | |
5) creation of multimedia presentations | |
40. What is a shortcut? |
|
1) / | |
2) the active control | |
3) a copy of the file | |
4) a pointer to an object | |
5) a graphical representation of the object | |
6) Window | |
41. Pressing the START button will open the |
|
1) application | |
2) main Menu | |
3) command | |
4) document | |
5) window | |
42. As a context menu? |
|
1) F5 key | |
2) Start button | |
3) Right-click | |
4) the left mouse button | |
5) key F1 | |
43. Which of the following datatypes is used to attach Microsoft Office files, graphics files, sound files, and pdf files to a table in Access? |
|
1) OLE object | |
2) Text | |
3) Hyperlink | |
4) Memo | |
5) Currency | |
44. Which of the following data types is more commonly called Boolean in Access ? |
|
1) Date/Time | |
2) Yes/No | |
3) OLE object | |
4) Attachment | |
5) Hyperlink | |
45. Which of the following data types is used to enter more than 255 characters? |
|
1) OLE object | |
2) Hyperlink | |
3) Memo | |
4) Text | |
5) Date/Time | |
46. Which of the following programs is used to work with DataBase? |
|
1) MS Word | |
2) MS Excel | |
3) MS Access | |
4) Calculator | |
5) MS Power Point | |
47. What is an intersection of a row and a column in a Microsoft Access? |
|
1) field | |
2) Form | |
3) Cell | |
4) Record | |
5) Cursor | |
48. Which is the not valid data type in Access? |
|
1) Picture | |
2) Memo | |
3) Text | |
4) Number | |
5) Currency | |
49. How many relations may exist between tables in databases? |
|
1) 1 | |
2) 4 | |
3) 5 | |
4) 3 | |
5) 2 | |
50. What the object used for printed on paper the database in a Microsoft Access? |
|
1) Form | |
2) Macros | |
3) Query | |
4) Report | |
5) Table | |
51. Which data type is better to use for storing phone number in the following format “977-1-1234567” in Access? |
|
1) Memo | |
2) AutoNumber | |
3) Number | |
4) Text | |
5) Currency | |
52. Which criteria return only those addresses beginning with the letter “K” in Access?? |
|
1) Address = “K?” | |
2) Address = “K” | |
3) Address = “*K” | |
4) Address = “K*” | |
5) Address = “K#” | |
53. Which criteria return only a phone number ending the number "5" in Access?? |
|
1) number phone = “5” | |
2) number phone = “5*” | |
3) number phone = “5?” | |
4) number phone = “*5” | |
5) number phone = “*5*” | |
54. Which of the following Data Type is used to store picture in MS Access? |
|
1) Memo | |
2) Image | |
3) Picture | |
4) OLE Object | |
5) Picture cannot be stored in MS Access | |
55. What is the maximum length a Text field can be in MS Access? |
|
1) 256 | |
2) 265 | |
3) 255 | |
4) 75 | |
5) 120 | |
56. What is the extension of Access Database files (2007 and later)? |
|
1) mbd | |
2) accbd | |
3) accdc | |
4) accdb | |
5) mdb | |
57. The number of rows in Excel 2007 worksheet is: |
|
1) 65536 | |
2) 1048576 | |
3) 1024 | |
4) 64536 | |
5) 256 | |
58. What key should be used to edit the content of a cell? |
|
1) F3 | |
2) F1 | |
3) F5 | |
4) F2 | |
5) F4 | |
59. What key should be used to determine the absolute reference? |
|
1) F7 | |
2) F4 | |
3) F6 | |
4) F9 | |
5) F3 | |
60. Which of the following software programs is a powerful spreadsheet program that allows users to organize data, complete calculations, and graph data? |
|
1) Calc | |
2) Word 2010 | |
3) Windows | |
4) Excel 2010 | |
5) Office 2010 | |
61. Which of the following notebook- like features organizes the sheets for use in Excel? |
|
1) File | |
2) Workbook | |
3) Notepad | |
4) Worksheet | |
5) Folder | |
62. Which of the following would you use to enter, calculate, manipulate, and analyze data such as numbers and text in Excel? |
|
1) File | |
2) Folder | |
3) Worksheet | |
4) Notepad | |
5) Workbook | |
63. What is immediately visible on screen when you open Excel 2010? |
|
1) A new workbook | |
2) Open a workbook dialog box | |
3) Create new workbook dialog box | |
4) A new workcell | |
5) The File panel | |
64. The number of columns in an Excel 2007 worksheet is: |
|
1) 64536 | |
2) 65536 | |
3) 16385 | |
4) 256 | |
5) 1024 | |
65. What do you use to navigate and display different portions of a worksheet in the worksheet window? |
|
1) Slider bars | |
2) Scroll bars | |
3) Page Up or Page Down key | |
4) Arrow keys | |
5) Arrow bars | |
66. What is the intersection of a row and a column in a worksheet called? |
|
1) Block | |
2) Sheet | |
3) Cell | |
4) Table | |
5) Cube | |
67. What symbol should be put in the cell address in the formula to make the Absolute reference? |
|
1) ! | |
2) @ | |
3) % | |
4) $ | |
5) ^ | |
68. Which of the following do you use to move one cell to the right in an Excel worksheet? |
|
1) Right arrow key | |
2) Page Up key | |
3) Down arrow key | |
4) Enter key | |
5) Home key | |
69. Which of the following do you use to move down one cell in an Excel worksheet? |
|
1) Right arrow key | |
2) Insert key | |
3) Enter key | |
4) Page Up key | |
5) Home key | |
70. What is the name of the small black square in the lower-right corner of the heavy border of an active cell that repeats a cell's value in adjacent cells? |
|
1) Insert box | |
2) Fill handle | |
3) Copy box | |
4) Filler | |
5) Copy handle | |
71. When copying values in Excel 2010, which feature automatically adjusts cell references for the new copy location? |
|
1) Certain reference | |
2) Relative reference | |
3) Insert reference | |
4) Absolute reference | |
5) Variable reference | |
72. Information in computer networks is transmitted via communication channels as separate ones: |
|
1) local network | |
2) messages | |
3) messages | |
4) packages | |
5) data | |
73. Which device allows your computer to talk to other computers over a telephone line as well as access the internet? |
|
1) Modem | |
2) Intranet | |
3) CD-ROM drive | |
4) Hard Drive | |
5) RAM | |
74. What is the name of the host computer on the network: |
|
1) topology | |
2) terminal | |
3) host computer | |
4) browser. | |
5) modem | |
75. A _______ consists of two or more computers that are linked in order to share resources. |
|
1) Network | |
2) Router | |
3) Communications Channel | |
4) Client/server | |
5) Peer-to-peer | |
76. Local computer network it? |
|
1) the network to which all computers are connected | |
2) the network to which all computers in the same building are connected | |
3) the network to which all the computers of the town are connected | |
4) the network to which all the computers of the country are connected | |
5) the network to which all computers of one settlement are connected | |
77. Two variations of a WAN are: |
|
1) NICs and Router | |
2) Transmission Media and Client | |
3) Bridge and Gateway | |
4) Intranet and Extranet | |
5) Modem and Hub | |
78. What is a LAN confined relatively to? |
|
1) large area | |
2) huge area | |
3) small area | |
4) no area | |
5) medium area | |
79. What is consist of two or more LANs and connected by routers? |
|
1) Microwaves | |
2) WAN | |
3) Communications Media | |
4) Satellite Transmission | |
5) Communication Hardware | |
80. What do most networks consist of? |
|
1) Computer clients and Network server | |
2) Bridge and Gateway | |
3) Cable modem and modem | |
4) Wireless media and Physical media | |
5) Communication media and Communication hardware | |
81. Which of the following is NOT a banefit of a network? |
|
1) expensive to install | |
2) printer sharing | |
3) Internet connection sharing | |
4) home entertainment | |
5) file sharing | |
82. An example of communication hardware: |
|
1) Modem | |
2) Internet | |
3) Monitor | |
4) Keyboard | |
5) Microsoft Word | |
83. What is a modem? |
|
1) Communications hardware device that facilitates the transmission of data. | |
2) A computer that uses the services of another program. | |
3) To transfer data from one computer to another. | |
4) Connects on computer to other computers and peripheral devices. | |
5) A special computer that connects on local area network to another. | |
84. What is the most expensive type of cable? |
|
1) Microwaves | |
2) Twisted-pair cable | |
3) Coaxial cable | |
4) Satellites | |
5) Fibre-optic cable | |
85. The e-mail address in the Internet is set: user_name@mtu-net.ru. What is the name of the owner of this email address? |
|
1) mtu-net | |
2) mtu-net.ru | |
3) user_name | |
4) ru | |
5) @mtu | |
86. INTERNET is … |
|
1) branch network | |
2) topology | |
3) regional network | |
4) global network | |
5) local network | |
87. This is a class of programs that searches your hard drive and floppy disks for unknown or potential viruses. |
|
1) archive file | |
2) intrusion detection | |
3) antivirus software | |
4) antigen | |
5) security identifier | |
88. What is the name of a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document? |
|
1) Norton | |
2) Virus | |
3) intrusion detection | |
4) Spyware | |
5) Firewall | |
89. Encryption information is…: |
|
1) The process of converting information into machine code | |
2) Identification protocol | |
3) A conversion process in which information is deleted. | |
4) The process of its transformation, in which the content of information is changed to a false | |
5) The process of its transformation, in which the content of the information becomes incomprehensible to non-authorized subjects | |
90. Software information protection |
|
1) Desepticons invasion | |
2) cryptography | |
3) data duplication | |
4) backup | |
5) uninterrupted power supply unit | |
91. Ensuring the accuracy and completeness of information and methods of its processing. |
|
1) Integrity | |
2) Dr. Web | |
3) Confidentiality | |
4) Feasibility | |
5) Availability | |
92. Providing access to information only to authorized users? |
|
1) integrity | |
2) Privacy | |
3) Availability | |
4) Feasibility | |
5) Dr. Web | |
93. The greatest threat to network security pose |
|
1) main menu | |
2) opening of the standard account administrator group | |
3) copying files that have been changed during the day, without a backup mark | |
4) unauthorized access, electronic eavesdropping and intentional or unintentional damage | |
5) opening standard user account | |
94. What is Information Security? |
|
1) Software update | |
2) PC security measures | |
3) Measures to protect information from unauthorized access | |
4) Identification protocol | |
5) the security of personal information | |
95. Measures to protect information from unauthorized access is called |
|
1) PC security | |
2) Information Security | |
3) security admin group | |
4) Desepticons invasion | |
5) Private security | |
96. What is the name of intentionally distorted information? |
|
1) Stop being information | |
2) Misinformation | |
3) Short circuit | |
4) Reliable information | |
5) Informative stream | |
97. What is the name of the information to which access is limited? |
|
1) Messages | |
2) Confidential | |
3) illegal | |
4) not available | |
5) Open | |
98. This is a computer system on the Internet that is expressly set up to attract and "trap" intruders. |
|
1) Dr. Web | |
2) Honeypot | |
3) Trojan horse | |
4) Exploit | |
5) Demilitarized zone | |
99. Which of the following methods does spyware use to install on an end user'smachine? |
|
1) Main menu | |
2) Bundling with free peer-to-peer programs | |
3) Search toolbars | |
4) Social engineering | |
5) All of the above | |
100. Which of these is Multimedia TYPE? |
|
1) Internet Search Program | |
2) Published Book | |
3) Video | |
4) Photo | |
5) Computer Games | |
101. Which of these is Multimedia Product? |
|
1) Limits | |
2) Table | |
3) Movies | |
4) Still Image | |
5) Text | |
102. What is a multimedia device? |
|
1) Text | |
2) Simulation | |
3) MP3 player | |
4) Shockwave | |
5) Motion capture | |
103. Video is good for: |
|
1) Developed facsimile equipment | |
2) Audio Only | |
3) Showing Action | |
4) Scenes where there is little or no movement | |
5) Scenes where the action is very quick and hard to capture | |
104. What is media? |
|
1) Anything which conveys a message | |
2) Antivirus programs | |
3) Analyze results | |
4) Person | |
5) Anything which conveys a message electronically | |
105. What Media types are Included in a Photo? |
|
1) Animation | |
2) Simulation | |
3) Engine | |
4) Still Image | |
5) Video | |
106. What is a Multemedia Product? |
|
1) Antivirus programs | |
2) An object using all sorts of means to convey a message | |
3) file format | |
4) A cartoon | |
5) A still 2D Image | |
107. A video consists of a sequence of |
|
1) Packets | |
2) Person | |
3) Signals | |
4) Slots | |
5) Frames | |
108. If frames are displayed on screen fast enough, we get an impression of |
|
1) Bits | |
2) Slots | |
3) Signals | |
4) Packets | |
5) Motions | |
109. Which of the following file formats is a piece of film? |
|
1) TFT | |
2) IT | |
3) AVI | |
4) USB | |
5) PDA | |
110. Movement created by displaying a series of pictures like cartoons. |
|
1) Sound | |
2) Character | |
3) Animation | |
4) Premier | |
5) Images | |
111. Which is the biggest audio file format? |
|
1) NIC | |
2) LAN | |
3) HDD | |
4) WAV | |
5) RAM | |
112. Which image file format can be animated? |
|
1) RAM | |
2) NIC | |
3) CPU | |
4) DVD | |
5) GIF | |
113. A movie contains? |
|
1) Sort | |
2) Audio | |
3) Add and alter records | |
4) Search | |
5) Create fields | |
114. What is a video? |
|
1) Sophisticated navigation | |
2) A number of fixed parts | |
3) Amusing information | |
4) Credibility of information | |
5) The recording, broadcasting of moving visual images. | |
115. Voice-only connection between three or more locations |
|
1) Blended Learning | |
2) Listening | |
3) Communication | |
4) Audio Conferencing | |
5) Application | |
116. An increasing popular combination of online and in-person learning activities |
|
1) Certification | |
2) Audio Conferencing | |
3) Blended Learning | |
4) Weblog | |
5) Communication | |
117. Educational software that delivers course material and instruction via computer |
|
1) E-Learning | |
2) Knowledge Management | |
3) Application | |
4) Courseware | |
5) Distance Education | |
118. Education designed for delivery where students and instructors not in the same location |
|
1) Knowledge Management | |
2) Distance Education | |
3) E-Learning | |
4) Instructional Designer | |
5) Discussion Forums | |
119. Learning that is accomplished over the Internet, a computer network |
|
1) Knowledge Management | |
2) Discussion Forums | |
3) Digital | |
4) Blended Learning | |
5) E-Learning | |
120. An information exchange forum where notes about a particular topic are posted and shared. |
|
1) Digital | |
2) Newsgroup | |
3) Weblog | |
4) Netiquette | |
5) Portal | |
121. The area where students and instructors interact online. |
|
1) Virtual classroom | |
2) Discussion Forums | |
3) Communication | |
4) Application | |
5) Audio Conferencing | |
122. Software for interacting with , accessing, and viewing information on the Internet |
|
1) Portal | |
2) Certification | |
3) Weblog | |
4) Browser | |
5) Application | |
123. An online, real-time interactive communication method using text to send and receive instant messages. |
|
1) E-Learning | |
2) Communication | |
3) Portal | |
4) Browser | |
5) Chat | |
124. Belief that the information you provide online will remain confidential |
|
1) cyberspace | |
2) cybertrust | |
3) data communication | |
4) data cleansing | |
5) customer-oriented | |
125. Government services available online to citizens, employees, and businesses |
|
1) e-learning | |
2) e-government | |
3) browser | |
4) e-business | |
5) e-commerce | |
126. Software that manages the transmission of e-mail and manages mailboxes |
|
1) e-mail front end | |
2) e-learning | |
3) e-mail system | |
4) e-mail gateways | |
5) e-mail server | |
127. The conversion of data into a form, called a cipher, that cannot be easily understood by unauthorized people |
|
1) e-government | |
2) end user | |
3) encryption | |
4) enterprise | |
5) encapsulation | |
128. The final link in the customer service request or computer program usage chain |
|
1) information | |
2) end user | |
3) enterprise | |
4) e-government | |
5) encryption | |
129. Delivery method used in e-Learning: |
|
1) data communication | |
2) E-Learning | |
3) Audio | |
4) Instructional Designer | |
5) Application | |
130. Listed below are some of the modes of electronic payments: |
|
1) Direct, Indirect | |
2) Àccording to the method of payment | |
3) Credit Card, Debit Card, Smart Card, E-Money, Electronic Fund Transfer (EFT). | |
4) Ñommon, Åspecially celavie | |
5) Federal, regional, local | |
131. ___________is a small plastic card with a unique number attached with an account. |
|
1) E-Money | |
2) Annuity payment | |
3) Smart Card | |
4) Credit card | |
5) Debit Card | |
132. What is the card holder? |
|
1) Licensing | |
2) Payment | |
3) Money | |
4) Card | |
5) a plastic wallet for keeping credit cards. | |
133. What is the like credit card, is a small plastic card with a unique number mapped with the bank account number? |
|
1) Licensing | |
2) Smart card | |
3) Payment | |
4) Money | |
5) Card | |
134. _________is again similar to a credit card or a debit card in appearance, but it has a small microprocessor chip embedded in it. |
|
1) Card | |
2) Smart card | |
3) Debit card | |
4) Rates | |
5) Licensing | |
135. What are the operations with the use of credit cards, debit cards or smart cards, which are examples of transactions of electronic money? |
|
1) Visa | |
2) Online payments | |
3) Electronic | |
4) Offline | |
5) Credit card | |
136. It is a very popular electronic payment method to transfer money from one bank account to another bank account. |
|
1) Issuer bank | |
2) Electronic Fund Transfer | |
3) E-payments | |
4) Smart card | |
5) Debit Card | |
137. _______-hypothetical devices measuring dozens of nanometers, which can independently manipulate individual atoms. |
|
1) Quantum computer | |
2) Nanotechnology | |
3) DNA computer | |
4) Nanorobots | |
5) Gesture interface | |
138. _____ a quantum computer or a computer with logical elements of the order of several nanometers, which has extremely high performance. |
|
1) Quantum computer | |
2) Nanocomputer | |
3) DNA computer | |
4) Nanorobots | |
5) Gesture interface | |
139. Where the electronic customers of the bank of cash can now download money from their account? |
|
1) Card | |
2) Electronic passports | |
3) À smart card reader | |
4) Rates | |
5) Ñredit limit | |
140. This may sound very much like shopping by the internet, but in fifty years time will be very different. |
|
1) Customer | |
2) The card brand | |
3) The merchant | |
4) Electronic cash | |
5) Computer shopping | |
141. In the next decade we can have miniature computers inside use to monitor, and even regulate, our blood pressure, heart rate, and cholesterol. |
|
1) Card | |
2) Visa | |
3) Smart card | |
4) Wearable computer | |
5) Body chips | |
142. Which payment has revolutionized the business processing by reducing the paperwork, transaction costs, and labor cost. |
|
1) Fund Transfer | |
2) Electronic | |
3) Credit | |
4) Visa | |
5) Cash | |
143. A magnetic disk is: |
|
1) Device for inputting an image from a sheet to a computer | |
2) Device for long-term storage of information | |
3) Device for outputting information on paper | |
4) The device for reading information from the CD-ROM | |
5) Device for information output | |
144. Which of computing refers to applications and services that run on a distributed network using virtualized resources. |
|
1) Parallel | |
2) Math | |
3) Cloud | |
4) Distributed | |
5) Soft | |
145. Cloud ? |
|
1) Abstraction | |
2) Model | |
3) Productivity | |
4) Polymorphism | |
5) Reliability | |
146. Which of the following cloud concept is related to pooling and sharing of resources? |
|
1) Abstraction | |
2) Model | |
3) Polymorphism | |
4) None of the mentioned | |
5) Virtualization | |
147. Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a ________ resource. |
|
1) memory | |
2) disk | |
3) virtual | |
4) real | |
5) cloud |