Òåñò: information and communication technology


Ñïèñîê âîïðîñîâ


1. The computer is:

1) analog signal processing device
2) device to store information of any kind
3) electronic computing device for handling numbers
4) device for working with text
5) multifunctional electronic device for information

2. What device is used by computer to process information?

1) monitor
2) RAM
3) processor
4) keyboard
5) the manipulator

3. Processor speed is:

1) the number of binary oper ations committed per unit of time processor
2) speed of information exchange between the processor and i/o devices
3) the number of generated pulses per second, clock work computer nodes
4) speed of information exchange between the CPU and ROM
5) the number of possible references to the operating memory in unit of time

4. Processor speed is:

1) the number of possible references to the operating memory in unit of time
2) the number of generated pulses per second, clock work computer nodes
3) the number of binary oper ations committed per unit of time processor
4) speed of information exchange between the CPU and ROM
5) speed of information exchange between the processor and i/o devices

5. RAM defines:

1) how much information you can print
2) how much information can use the Internet
3) how much information you can copy
4) how much information can be stored on the hard disk
5) how much information can be processed without the access to your hard drive

6. Specify the most complete list of main devices:

1) the CPU, memory, i/o devices
2) monitor, Winchester, printer
3) ALD, DD, coprocessor
4) microprocessor, coprocessors, monitor
5) scanner, mouse, monitor, printer

7. Name the device included in the processor:

1) cache memory, video memory
2) arithmetic logic unit, control unit
3) random access memory, printer
4) the display processor, video card
5) scanner, ROM

8. Processor handles information:

1) radix
2) binary
3) Basic language
4) as text
5) in ternary code

9. During the execution of an application program is stored:

1) ROM
2) hard disk space
3) the VRAM
4) RAM
5) processor

10. Personal computer will not function if you disable:

1) printer
2) scanner
3) memory
4) drive
5) mouse

11. For long-term storage information is:

1) RAM
2) drive
3) external storage
4) processor
5) power supply

12. Drive is a device for:

1) paper output
2) command processing executable program
3) read/write data from external media
4) long-term storage information
5) store commands executable program

13. Which device is used to enter information:

1) printer
2) keyboard
3) processor
4) monitor
5) ROM

14. The manipulator "mouse" is a device:

1) read
2) modulation and demodulation
3) to connect the printer to the computer
4) input information
5) long-term storage information

15. To connect your computer to the Internet using:

1) scanner
2) modem
3) monitor
4) fax
5) printer

16. Which one runs on a computer hardware and serves as a platform for other software to run on?

1) Operating System
2) Application Software
3) Malicious Software
4) System Software
5) Database System

17. Which of the following Operating System does not implement multitasking truly?

1) Linux
2) Windows XP
3) MS DOS
4) Unix
5) Windows 7

18. Which is the first program run on a computer when the computer boots up?

1) System software
2) System operations
3) System file
4) Operating system
5) Operating Shell

19. Which is the layer of a computer system between the hardware and the user program

1) System environment
2) Drivers
3) Operating environment
4) Utilities
5) Operating system

20. Specialized program that allows users to utilize in specific application is classified as

1) database packages
2) utilities
3) replicate programs
4) application programs
5) relative programs

21. Programs used to control system performance are classified as

1) experimental programs
2) specialized program
3) organized programs
4) system programs
5) utilities

22. Which application software would best be used when you need to print a letter for a legal client?

1) MS Publisher
2) MS Access
3) MS Excel
4) MS Word
5) Google Chrome

23. name the device included in the processor:

1) Double-click
2) Change page setup
3) Change the template
4) Use save as
5) Open file properties

24. In Windows operating system , an icon or a link that provides access to some original program or resource is known as ____________ .

1) Cursor
2) Shortcut
3) Icon
4) Desktop
5) Panel

25. Moving an item across the screen with the mouse

1) Double-click
2) Clipboard
3) Recycle bin
4) Drag and drop
5) Web browser

26. A picture that represents a file

1) Folder
2) Shortcut
3) Start menu
4) Desktop
5) Icon

27. Windows 7 Operating System is an upgrade from 

1) Windows 8
2) Windows Millennium
3) Windows XP or Vista
4) Windows 2000
5) Windows 98

28. Set of programs with full set of documentation is considered as

1) file package
2) database packages
3) software
4) software packages
5) operating system

29. When sizing a window

1) Mouse pointer turns into a cross
2) Mouse pointer change into a two-headed arrow
3) Mouse pointer has one-headed arrow
4) Mouse pointer change into a three-headed arrow
5) Mouse pointer does not change

30. What is the key combination to Quit a program through Task Manager that is not responding?

1) Shift + Enter
2) Ctrl + Del
3) Ctrl + Alt + Del
4) Shift + Alt + Del
5) Alt + Del

31. Elements of the dialog box:

1) Menu bar
2) roll
3) working field
4) control button
5) scrollbar

32. The elements of the Windows desktop:

1)
2) Minimize, maximize, close
3) check box
4) text box
5) scrollbar

33. Right-click exercises

1) start
2) a context menu
3) selection
4) Cascade
5) hang

34. Icon is ...

1) Label
2) Taskbar
3) drawing
4) start
5) selection

35. What is the window bar displays the name of the disclosed subject?

1) Menu bar
2) Title bar
3) drawing
4) Status Bar
5) Toolbox

36. The set of tools and rules of user interaction with the computer is called

1) user interface
2) interface
3) Processor
4) the object of control
5) Menu bar

37. Double-clicking the left mouse button performs

1) the title  
2) start
3) selection
4) Drag and Drop
5) a context menu

38. Markup text, images and other objects on a web page is realized with the help of ...

1) the operands
2) Binary
3) Tag
4) Operators
5) Team

39. Browser - a program for ...

1) Programming Language
2) Web browsing
3) the creation of databases
4) creating web pages
5) creation of multimedia presentations

40. What is a shortcut?

1) /
2) the active control
3) a copy of the file
4) a pointer to an object
5) a graphical representation of the object
6) Window

41. Pressing the START button will open the

1) application
2) main Menu
3) command
4) document
5) window

42. As a context menu?

1) F5 key
2) Start button
3) Right-click
4) the left mouse button
5) key F1

43. Which of the following datatypes is used to attach Microsoft Office files, graphics files, sound files, and pdf files to a table in Access?

1) OLE object
2) Text
3) Hyperlink
4) Memo
5) Currency

44. Which of the following data types is more commonly called Boolean in Access ?

1) Date/Time
2) Yes/No
3) OLE object
4) Attachment
5) Hyperlink

45. Which of the following data types is used to enter more than 255 characters?

1) OLE object
2) Hyperlink
3) Memo
4) Text
5) Date/Time

46. Which of the following programs is used to work with DataBase?

1) MS Word
2) MS Excel
3) MS Access
4) Calculator
5) MS Power Point

47. What is an intersection of a row and a column in a Microsoft Access?

1) field
2) Form
3) Cell
4) Record
5) Cursor

48. Which is the not valid data type in Access?

1) Picture
2) Memo
3) Text
4) Number
5) Currency

49. How many relations may exist between tables in databases?

1) 1
2) 4
3) 5
4) 3
5) 2

50. What the object used for printed on paper the database in a Microsoft Access?

1) Form
2) Macros
3) Query
4) Report
5) Table

51. Which data type is better to use for storing phone number in the following format “977-1-1234567” in Access?

1) Memo
2) AutoNumber
3) Number
4) Text
5) Currency

52. Which criteria return only those addresses beginning with the letter “K” in Access??

1) Address = “K?”
2) Address = “K”
3) Address = “*K”
4) Address = “K*”
5) Address = “K#”

53. Which criteria return only a phone number ending the number "5" in Access??

1) number phone = “5”
2) number phone = “5*”
3) number phone = “5?”
4) number phone = “*5”
5) number phone = “*5*”

54. Which of the following Data Type is used to store picture in MS Access?

1) Memo
2) Image
3) Picture
4) OLE Object
5) Picture cannot be stored in MS Access

55. What is the maximum length a Text field can be in MS Access?

1) 256
2) 265
3) 255
4) 75
5) 120

56. What is the extension of Access Database files (2007 and later)?

1) mbd
2) accbd
3) accdc
4) accdb
5) mdb

57. The number of rows in Excel 2007 worksheet is:

1) 65536
2) 1048576 
3) 1024
4) 64536
5) 256

58. What key should be used to edit the content of a cell?

1) F3
2) F1
3) F5
4) F2
5) F4 

59. What key should be used to determine the absolute reference?

1) F7
2) F4
3) F6
4) F9
5) F3

60. Which of the following software programs is a powerful spreadsheet program that allows users to organize data, complete calculations, and graph data?

1) Calc
2) Word 2010
3) Windows
4) Excel 2010
5) Office 2010

61. Which of the following notebook- like features organizes the sheets for use in Excel?

1) File
2) Workbook
3) Notepad
4) Worksheet
5) Folder

62. Which of the following would you use to enter, calculate, manipulate, and analyze data such as numbers and text in Excel?

1) File
2) Folder
3) Worksheet
4) Notepad
5) Workbook

63. What is immediately visible on screen when you open Excel 2010?

1) A new workbook
2) Open a workbook dialog box
3) Create new workbook dialog box
4) A new workcell
5) The File panel

64. The number of columns in an Excel 2007 worksheet is:

1) 64536
2) 65536
3) 16385
4) 256
5) 1024

65. What do you use to navigate and display different portions of a worksheet in the worksheet window?

1) Slider bars
2) Scroll bars
3) Page Up or Page Down key
4) Arrow keys
5) Arrow bars

66. What is the intersection of a row and a column in a worksheet called?

1) Block
2) Sheet
3) Cell
4) Table
5) Cube

67. What symbol should be put in the cell address in the formula to make the Absolute reference?

1) !
2) @
3) %
4) $
5) ^

68. Which of the following do you use to move one cell to the right in an Excel worksheet?

1) Right arrow key
2) Page Up key
3) Down arrow key
4) Enter key
5) Home key

69. Which of the following do you use to move down one cell in an Excel worksheet?

1) Right arrow key
2) Insert key
3) Enter key
4) Page Up key
5) Home key

70. What is the name of the small black square in the lower-right corner of the heavy border of an active cell that repeats a cell's value in adjacent cells?

1) Insert box
2) Fill handle
3) Copy box
4) Filler
5) Copy handle

71. When copying values in Excel 2010, which feature automatically adjusts cell references for the new copy location?

1) Certain reference
2) Relative reference
3) Insert reference
4) Absolute reference
5) Variable reference

72. Information in computer networks is transmitted via communication channels as separate ones:

1) local network
2)  messages
3) messages
4) packages
5) data

73. Which device allows your computer to talk to other computers over a telephone line as well as access the internet?

1) Modem
2) Intranet
3) CD-ROM drive
4) Hard Drive
5) RAM

74. What is the name of the host computer on the network:

1) topology
2) terminal
3) host computer
4) browser.
5) modem

75. A _______ consists of two or more computers that are linked in order to share resources.

1) Network
2) Router
3) Communications Channel
4) Client/server
5) Peer-to-peer

76. Local computer network it?

1) the network to which all computers are connected
2) the network to which all computers in the same building are connected
3) the network to which all the computers of the town are connected
4) the network to which all the computers of the country are connected
5) the network to which all computers of one settlement are connected

77. Two variations of a WAN are:

1) NICs and Router
2) Transmission Media and Client
3) Bridge and Gateway
4) Intranet and Extranet
5) Modem and Hub

78. What is a LAN confined relatively to?

1) large area
2) huge area
3) small area
4) no area
5) medium area

79. What is consist of two or more LANs and connected by routers?

1) Microwaves
2) WAN
3) Communications Media
4) Satellite Transmission
5) Communication Hardware

80. What do most networks consist of?

1) Computer clients and Network server
2) Bridge and Gateway
3) Cable modem and modem
4) Wireless media and Physical media
5) Communication media and Communication hardware

81. Which of the following is NOT a banefit of a network?

1) expensive to install
2) printer sharing
3) Internet connection sharing
4) home entertainment
5) file sharing

82. An example of communication hardware:

1) Modem
2) Internet
3) Monitor
4) Keyboard
5) Microsoft Word

83. What is a modem?

1) Communications hardware device that facilitates the transmission of data.
2) A computer that uses the services of another program.
3) To transfer data from one computer to another.
4) Connects on computer to other computers and peripheral devices.
5) A special computer that connects on local area network to another.

84. What is the most expensive type of cable?

1) Microwaves
2) Twisted-pair cable
3) Coaxial cable
4) Satellites
5) Fibre-optic cable

85. The e-mail address in the Internet is set: user_name@mtu-net.ru. What is the name of the owner of this email address?

1) mtu-net
2) mtu-net.ru
3) user_name
4) ru
5) @mtu

86. INTERNET is …

1) branch network
2) topology
3) regional network
4) global network
5) local network

87. This is a class of programs that searches your hard drive and floppy disks for unknown or potential viruses.

1) archive file
2) intrusion detection  
3) antivirus software
4) antigen
5) security identifier 

88. What is the name of a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document?

1) Norton
2) Virus
3) intrusion detection  
4) Spyware
5) Firewall

89. Encryption information is…:

1) The process of converting information into machine code
2) Identification protocol
3) A conversion process in which information is deleted.
4) The process of its transformation, in which the content of information is changed to a false
5) The process of its transformation, in which the content of the information becomes incomprehensible to non-authorized subjects

90. Software information protection

1) Desepticons invasion
2) cryptography
3) data duplication
4) backup
5) uninterrupted power supply unit

91. Ensuring the accuracy and completeness of information and methods of its processing.

1) Integrity
2) Dr. Web
3) Confidentiality
4) Feasibility
5) Availability

92. Providing access to information only to authorized users?

1) integrity
2) Privacy
3) Availability
4) Feasibility
5) Dr. Web

93. The greatest threat to network security pose

1) main menu
2) opening of the standard account administrator group
3) copying files that have been changed during the day, without a backup mark
4) unauthorized access, electronic eavesdropping and intentional or unintentional damage
5) opening standard user account

94. What is Information Security?

1) Software update
2) PC security measures
3) Measures to protect information from unauthorized access
4) Identification protocol
5) the security of personal information

95. Measures to protect information from unauthorized access is called

1) PC security
2) Information Security
3) security admin group
4) Desepticons invasion
5) Private security

96. What is the name of intentionally distorted information?

1) Stop being information
2) Misinformation
3) Short circuit
4) Reliable information
5) Informative stream

97. What is the name of the information to which access is limited?

1) Messages
2) Confidential
3) illegal
4) not available
5) Open

98. This is a computer system on the Internet that is expressly set up to attract and "trap" intruders.

1) Dr. Web
2) Honeypot
3) Trojan horse
4) Exploit
5) Demilitarized zone

99. Which of the following methods does spyware use to install on an end user'smachine?

1) Main menu
2) Bundling with free peer-to-peer programs
3) Search toolbars
4) Social engineering
5) All of the above

100. Which of these is Multimedia TYPE?

1) Internet Search Program
2) Published Book
3) Video
4) Photo
5) Computer Games

101. Which of these is Multimedia Product?

1) Limits
2) Table 
3) Movies
4) Still Image
5) Text

102. What is a multimedia device?

1) Text
2) Simulation
3) MP3 player
4) Shockwave 
5) Motion capture

103. Video is good for:

1) Developed facsimile equipment
2) Audio Only
3) Showing Action
4) Scenes where there is little or no movement
5) Scenes where the action is very quick and hard to capture

104. What is media?

1) Anything which conveys a message
2) Antivirus programs
3) Analyze results
4) Person
5) Anything which conveys a message electronically

105. What Media types are Included in a Photo?

1) Animation
2) Simulation
3) Engine
4) Still Image
5) Video

106. What is a Multemedia Product?

1) Antivirus programs
2) An object using all sorts of means to convey a message
3) file format
4) A cartoon
5) A still 2D Image

107. A video consists of a sequence of

1) Packets
2) Person
3) Signals
4) Slots
5) Frames

108. If frames are displayed on screen fast enough, we get an impression of

1) Bits
2) Slots
3) Signals
4) Packets
5) Motions

109. Which of the following file formats is a piece of film?

1) TFT
2) IT
3) AVI
4) USB
5) PDA

110. Movement created by displaying a series of pictures like cartoons.

1) Sound
2) Character
3) Animation
4) Premier
5) Images

111. Which is the biggest audio file format?

1) NIC
2) LAN
3) HDD
4) WAV
5) RAM

112. Which image file format can be animated?

1) RAM
2) NIC
3) CPU
4) DVD
5) GIF

113. A movie contains?

1) Sort
2) Audio
3) Add and alter records
4) Search
5) Create fields

114. What is a video?

1) Sophisticated navigation
2) A number of fixed parts
3) Amusing information
4) Credibility of information
5) The recording, broadcasting of moving visual images.

115. Voice-only connection between three or more locations

1) Blended Learning
2) Listening
3) Communication
4) Audio Conferencing
5) Application

116. An increasing popular combination of online and in-person learning activities

1) Certification
2) Audio Conferencing
3) Blended Learning
4) Weblog
5) Communication

117. Educational software that delivers course material and instruction via computer

1) E-Learning
2) Knowledge Management
3) Application
4) Courseware
5) Distance Education

118. Education designed for delivery where students and instructors not in the same location

1) Knowledge Management
2) Distance Education
3) E-Learning
4) Instructional Designer
5) Discussion Forums

119. Learning that is accomplished over the Internet, a computer network

1) Knowledge Management
2) Discussion Forums
3) Digital
4) Blended Learning
5) E-Learning

120. An information exchange forum where notes about a particular topic are posted and shared.

1) Digital
2) Newsgroup
3) Weblog
4) Netiquette
5) Portal

121. The area where students and instructors interact online.

1) Virtual classroom
2) Discussion Forums
3) Communication
4) Application
5) Audio Conferencing

122. Software for interacting with , accessing, and viewing information on the Internet

1) Portal
2) Certification
3) Weblog
4) Browser
5) Application

123. An online, real-time interactive communication method using text to send and receive instant messages.

1) E-Learning
2) Communication
3) Portal
4) Browser
5) Chat

124. Belief that the information you provide online will remain confidential

1) cyberspace
2) cybertrust
3) data communication
4) data cleansing
5) customer-oriented

125. Government services available online to citizens, employees, and businesses

1) e-learning
2) e-government
3) browser
4) e-business
5) e-commerce

126. Software that manages the transmission of e-mail and manages mailboxes

1) e-mail front end
2) e-learning
3) e-mail system
4) e-mail gateways
5) e-mail server

127. The conversion of data into a form, called a cipher, that cannot be easily understood by unauthorized people

1) e-government
2) end user
3) encryption
4) enterprise
5) encapsulation

128. The final link in the customer service request or computer program usage chain

1) information
2) end user
3) enterprise
4) e-government
5) encryption

129. Delivery method used in e-Learning:

1) data communication
2) E-Learning
3) Audio
4) Instructional Designer
5) Application

130. Listed below are some of the modes of electronic payments:

1) Direct, Indirect
2) Àccording to the method of payment
3) Credit Card, Debit Card, Smart Card, E-Money, Electronic Fund Transfer (EFT).
4) Ñommon, Åspecially celavie
5) Federal, regional, local

131. ___________is a small plastic card with a unique number attached with an account.

1) E-Money
2) Annuity payment
3) Smart Card
4) Credit card
5) Debit Card

132. What is the card holder?

1) Licensing
2) Payment
3) Money
4) Card
5) a plastic wallet for keeping credit cards.

133. What is the like credit card, is a small plastic card with a unique number mapped with the bank account number?

1) Licensing
2) Smart card
3) Payment
4) Money
5) Card

134. _________is again similar to a credit card or a debit card in appearance, but it has a small microprocessor chip embedded in it.

1) Card
2) Smart card
3) Debit card
4) Rates
5) Licensing

135. What are the operations with the use of credit cards, debit cards or smart cards, which are examples of transactions of electronic money?

1) Visa
2) Online payments
3) Electronic
4) Offline
5) Credit card

136. It is a very popular electronic payment method to transfer money from one bank account to another bank account.

1) Issuer bank
2) Electronic Fund Transfer
3) E-payments
4) Smart card
5) Debit Card

137. _______-hypothetical devices measuring dozens of nanometers, which can independently manipulate individual atoms.

1) Quantum computer
2) Nanotechnology
3) DNA computer
4) Nanorobots
5) Gesture interface

138. _____ a quantum computer or a computer with logical elements of the order of several nanometers, which has extremely high performance.

1) Quantum computer
2) Nanocomputer
3) DNA computer
4) Nanorobots
5) Gesture interface

139. Where the electronic customers of the bank of cash can now download money from their account?

1) Card
2) Electronic passports
3) À smart card reader
4) Rates
5) Ñredit limit

140. This may sound very much like shopping by the internet, but in fifty years time will be very different.

1) Customer
2) The card brand
3) The merchant
4) Electronic cash
5) Computer shopping

141. In the next decade we can have miniature computers inside use to monitor, and even regulate, our blood pressure, heart rate, and cholesterol.

1) Card
2) Visa
3) Smart card
4) Wearable computer
5) Body chips

142. Which payment has revolutionized the business processing by reducing the paperwork, transaction costs, and labor cost.

1) Fund Transfer
2) Electronic
3) Credit
4) Visa
5) Cash

143. A magnetic disk is:

1) Device for inputting an image from a sheet to a computer
2) Device for long-term storage of information
3) Device for outputting information on paper
4) The device for reading information from the CD-ROM
5) Device for information output

144. Which of computing refers to applications and services that run on a distributed network using virtualized resources.

1) Parallel
2) Math
3) Cloud
4) Distributed
5) Soft

145. Cloud ?

1) Abstraction
2) Model
3) Productivity
4) Polymorphism
5) Reliability

146. Which of the following cloud concept is related to pooling and sharing of resources?

1) Abstraction
2) Model
3) Polymorphism
4) None of the mentioned
5) Virtualization

147. Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a ________ resource.

1) memory
2) disk
3) virtual
4) real
5) cloud