.


:




:

































 

 

 

 


Architecture of computer systems.

204. First Generation of computer:

A. integrated circuit

B. vacuum tube *

C. transistor

D. Instruction Register

E. microprocessor

 

205. Second Generation of computer:

A. integrated circuit

B. vacuum tube

C. transistor *

D. Instruction Register

E. microprocessor

 

206. Third Generation of computer:

A. integrated circuit *

B. vacuum tube

C. transistor

D. Instruction Register

E. microprocessor

 

207. Fourth Generation of computer:

A. integrated circuit

B. vacuum tube

C. transistor

D. Instruction Register

E. microprocessor *

 

208. A computer is...

A. electronic devices; the parts you can see and touch.

B. organized sets of instructions for controlling the computer.

C. raw facts, which the computer can manipulate and process into information that is useful to people.

D. an electronic device used to process data. *

E. responsible for interpreting and executing most of the commands from the computer's hardware and software.

 

209. Hardware consists of...

A. electronic devices; the parts you can see and touch. *

B. organized sets of instructions for controlling the computer.

C. raw facts, which the computer can manipulate and process into information that is useful to people.

D. an electronic device used to process data.

E. responsible for interpreting and executing most of the commands from the computer's hardware and software.

 

210. Software consists of...

A. electronic devices; the parts you can see and touch.

B. organized sets of instructions for controlling the computer. *

C. raw facts, which the computer can manipulate and process into information that is useful to people.

D. an electronic device used to process data.

E. responsible for interpreting and executing most of the commands from the computer's hardware and software.

 

211. Data consists of...

A. electronic devices; the parts you can see and touch.

B. organized sets of instructions for controlling the computer.

C. raw facts, which the computer can manipulate and process into information that is useful to people. *

D. an electronic device used to process data.

E. responsible for interpreting and executing most of the commands from the computer's hardware and software.

 

212. Printer is a/an

A. Output device *

B. Storage device

C. Input device

D. Processing device

E. Printing device.

 

213. Microphone is a ___

A. Output device

B. Storage device

C. Input device *

D. Processing device

E. Printing device.

 

214. Which one of the following can be called as a peripheral?

A. Control unit

B. Arithmetic unit

C. Speaker *

D. Logic unit

E. Main memory

 

215. Which one of the following can be called as a peripheral?

A. Control unit

B. Flash drive *

C. Printer

D. Plotter

E. Monitor.

 

216. The Central Processing Unit (CPU) is

A. responsible for interpreting and executing most of the commands from the computer's hardware and software. *

B. performs arithmetic and logical operations.

C. a sub-unit of CPU that controls and directs the flow of information throughout the computer system.

D. serves as a single platform to connect all of the parts of a computer together.

E. is a data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.

 

217. The arithmetic logic unit (ALU) is

A. responsible for interpreting and executing most of the commands from the computer's hardware and software.

B. performs arithmetic and logical operations. *

C. a sub-unit of CPU that controls and directs the flow of information throughout the computer system.

D. serves as a single platform to connect all of the parts of a computer together.

E. is a data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.

 

218. Control Unit is

A. responsible for interpreting and executing most of the commands from the computer's hardware and software.

B. performs arithmetic and logical operations.

C. a sub-unit of CPU that controls and directs the flow of information throughout the computer system. *

D. serves as a single platform to connect all of the parts of a computer together.

E. is a data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.

 

219. The motherboard is

A. responsible for interpreting and executing most of the commands from the computer's hardware and software.

B. performs arithmetic and logical operations.

C. a sub-unit of CPU that controls and directs the flow of information throughout the computer system.

D. serves as a single platform to connect all of the parts of a computer together. *

E. is a data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.

 

220. A hard disk drive (HDD) is

A. responsible for interpreting and executing most of the commands from the computer's hardware and software.

B. performs arithmetic and logical operations.

C. a sub-unit of CPU that controls and directs the flow of information throughout the computer system.

D. serves as a single platform to connect all of the parts of a computer together.

E. is a data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material. *

 

221. A key that is used to remove a letter/space which is behind the cursor on the screen, is called the

A. Backspace Key

B. Delete Key*

C. Caps Lock Key

D. Shift Key

E. Control Key

 

222. A key that is used to remove a letter/space which is in front of the cursor on the screen, is called the

A. Backspace Key *

B. Delete Key

C. Caps Lock Key

D. Shift Key

E. Control Key

 

223. The long key on a keyboard which is used when you want to separate one word from another when writing, is called the

A. Backspace Key

B. Delete Key

C. Space Bar *

D. Shift Key

E. Control Key

 

Operating system

 

224. An operating system (OS) is

A. a software program that manages the hardware and software resources of a computer. *

B. a set of methods of interaction of a computer program and the user of this program.

C. a set of methods for communication between programs.

D. a way of interaction of physical devices.

E. a set of instructions, stored digitally within the computer's memory

 

225. User interface

A. a software program that manages the hardware and software resources of a computer.

B. a set of methods of interaction of a computer program and the user of this program. *

C. a set of methods for communication between programs.

D. a way of interaction of physical devices.

E. a set of instructions, stored digitally within the computer's memory

 

226. Software interface

A. a software program that manages the hardware and software resources of a computer.

B. a set of methods of interaction of a computer program and the user of this program.

C. a set of methods for communication between programs. *

D. a way of interaction of physical devices.

E. a set of instructions, stored digitally within the computer's memory

 

227. Physical interface

A. a software program that manages the hardware and software resources of a computer.

B. a set of methods of interaction of a computer program and the user of this program.

C. a set of methods for communication between programs.

D. a way of interaction of physical devices. *

E. a set of instructions, stored digitally within the computer's memory

 

 

Database

 

228. Database model:

A. Hierarchical *

B. textual

C. numeric

D. indexed

E. cyclic

 

229. Database model:

A. textual

B. numeric

C. Network *

D. indexed

E. cyclic

 

230. Database model:

A. textual

B. numeric

C. indexed

D. Relational *

E. cyclic

 

231.Here the focus is on describing the stages in data processing: data collection

A. gathering raw data to process *

B. arranging and systematizing data

C. double-checking and cleaning data

D. entering data into a system

E. arranging data into table format for analysis

 

232.Here the focus is on describing the stages in data processing: data coding

A. gathering raw data to process,

B. arranging and systematizing *

C. double-checking and cleaning data

D. entering data into a system

E. creating categories in order to organise data into groups

 

233.Here the focus is on describing the stages in data processing: data validation

A. double-checking and cleaning data *

B. entering data into a system

C. arranging data into table format for analysis

D. creating categories in order to organise data into groups

E. gathering raw data to process

 

234.Here the focus is on describing the stages in data processing: data entry

A. gathering raw data to process

B. arranging and systematizing

C. double-checking and cleaning data

D. entering data into a system *

E. creating categories in order to organise data into groups

 

235.Here the focus is on describing the stages in data processing: data tabulation

A. double-checking and cleaning data

B. entering data into a system

C. arranging data into table format for analysis *

D. creating categories in order to organise data into groups

E. gathering raw data to process

 

236.Here the focus is on describing the stages in data processing: data sorting

A. double-checking and cleaning data

B. entering data into a system

C. arranging data into table format for analysis

D. creating categories in order to organise data into groups *

E. gathering raw data to process

 

Cyber security

 

237. Cyber attacks is

A. attacks on acomputer from the internet *

B. use ativirussoftwars

C. insert firewalls

D. uninstall unnecessary software

E. check secutity settings

 

238.Anetwork perimeter is

A. the topologes as a star, a bus, a circle

B. the network boundary between a private user network and the internet*

C. improving the security of a computer system

D. a web application protection firewall (WAF)

E. the measure types of networks

 

239.Which means encryption

A. Encoding *

B. Secure Socket Layer (SSL)

C. Coding

D. factor authentication

E. method of Hackers

 

240. What is Secure Socket Layer (SSL)?

A. two-factor authentication

B. illegal access to a computer system

C. malicious software

D. a method of encryption*

E. antivirus software

241. Two-factor authentication include next independent forms of identification as

A. your name and an email adress

B. your name and a password or PIN number*

C. your loginand a password

D. your account and ipadress

E. your sername and fullname

 

242. Who are Hackers?

A. are people who servesyour computer system

B. are people who protects your computer system

C. are people who is troubleshooing in your computer system

D. are people who try to gain illegal access to a computer system*

E. a branch of computer security specifically related to the internet

 

24 3. Cyber security is

A. a method of encryption information in computer system

B. illegal access to a computer system

C. a branch of computer security specifically related to the internet *

D. method of Hackers, which hack codes in a computer system

E. the type of services a computer system

 

244. Hacking, denial of service attack, virus dissemination, computer vandalism are types of

A. Cyber Terrorism

B. Software Piracy

C. Cyber Crime *

D. Antivirus softwares

E. Cyber security

 

245. A cyber criminal is a

A. are people who protectsyour computer system

B. are people who is troubleshooing in your computer system

C. are people who try to gain illegal access to a computer system

D. a branch of computer security specifically related to the internet

E. person who uses computers and the Internet to commit crimes*

 

246.Cyber Sapiens is

A.A prefix that indicates relevance to, or involvement with, computers, computer systems, and electronic control systems

B.The study of control system theory in terms of the relationship between animal and machine behavior

C.An expression for a computer or robot with artificial intelligence (AI) on the forefront of current technology*

D. The usage of computers and the Internet in conducting warfare in the cyberspace

E. A kind of cyber attack which results in unavailability of service.

 

247. The usage of computers and the Internet in conducting warfare in the cyberspace is

A. Cyber vandalism

B. Cyber war*

C. Hacktivism

D. Denial of Service

E. Cybernetics

 

248. Cyber vandalism is

A. Combination of words: hack(er) and activism

B. A kind of cyber attack which results in unavailability of service

C. Cyber attacks that deface web pages*

D. Denial of Service

E. Alternative expression for information super highway

 

249. What is Identity Theft?

A.software false negative, false positive, rootkit, security software, capabilities sweep, virus removal software, web page analysis

B.anti-virus software, backup, block, cyber criminal, detect

C. attack, audit log, authenticated, backdoor, bug, firewall, Checking Measures intruder, keylogger, popup, protocol, security certainty

D. card scanning, cyber, fraud, harming, identity theft, Discussing malware, phishing, pretexting, scanner, spyware, suspicions Trojan horse, worm*

E.overwriting virus, piggybacking, replicate, resident possible

 

250. Preventative Email is virus which

A. software false negative, false positive, rootkit, security software, capabilities sweep, virus removal software, web page analysis

B.anti-virus software, backup, block, cyber criminal, detect

C. attack, audit log, authenticated, backdoor, bug, firewall, Checking Measures intruder, keylogger, popup, protocol, security certainty*

D. card scanning, cyber, fraud, harming, identity theft, Discussing malware, phishing, pretexting, scanner, spyware, suspicions Trojan horse, worm

E.overwriting virus, piggybacking, replicate, resident possible

 

Cloud computing

 

251. _________ model consists of the particular types of services that you can access on a cloud computing platform.

A. Service*

B. Deployment

C. Application

D.Depatment

E. None of the mentioned

 

252. Point out the correct statement:

A. The use of the word cloud makes reference to the two essential concepts

B. Cloud computing abstracts systems by pooling and sharing resources*

C.Cloud computing is nothing more than the Internet

D.Model consists of the particular types of services that you can access on a cloud computing platform

E. All of the mentioned

 

253. ________ refers to the location and management of the clouds infrastructure.

A. Service

B. Deployment*

C. Application

D.Depatment

E. None of the mentioned

 

254. Which of the following is deployment model?

A. public

B. private

C. hybrid

D. statement

E. a), b), c) *

 

255. Point out the wrong statement:

A. Cloud Computing has two distinct sets of models

B. Amazon has built a worldwide network of datacenters to service its search engine*

C. Azure enables.NET Framework applications to run over the Internet

D.Cloud computing is nothing more than the Internet

E. None of the mentioned

 

256. Which of the following is best known service model?

a) SaaS

b) IaaS

c) PaaS

d) a-c*

e) All of the mentioned

 

257. The __________ model originally did not require a cloud to use virtualization to pool resources.

a) NEFT

b) NIST*

c) NIT

d) NIS

e) All of the mentioned

 

258. _______ model attempts to categorize a cloud network based on four dimensional factors.

A. Cloud Square

B. Cloud Service

C. Cloud Cube*

D. All of the mentioned

E. Cloud Owner

 

259. Which of the following dimension is related to organizations boundaries?

A. Physical location of data*

B. Ownership

C. Security boundary

D.Topologya

E. All of the mentioned

 

260. Telecommunication is

A.A form of free software; however, the author of shareware hopes you will make a voluntary

contribution for using the product

B. Software that searches, gathers, and identifies information from a database based on an index,

keywords or titles

C. Provides the tools for working with numbers and allows you to create and edit electronic

spreadsheets in managing and analyzing information

D. The act of sending and receiving information, such as data, text, pictures, voice, and video

Electronically*

E. Protection of a computer, its files, or a computer network from use without permission of the

owner or owners

 

261. What are presentations?

A. A sequence of slides that usually incorporate text, sound, graphics, and animation *

B. A speech

C. Information presented using more text than graphics and animation

D. A television interview or news report

E. Set of slides

 

262. What is multimedia?

A. Moving images and text

B. Images and audio

C. Integration of still and moving images, text, and sounds by means of computer technology *

D. Programs that combine text and images on a television screen

E. Integration of still and moving images, text, and sounds

 

263. What does SSL stand for?

A. Saving Sharing and Limits

B. Safe Secured and Locked

C. Secure Socket Limbs

D. Secure Socket Layers *

E. Secure Sets for Layers

 

264. What advances in multimedia were made in the early 1970's

A. Advances in the ability to fit more text in a presentation

B. Advances in making supercomputers

C. Advances in integrating computers with CDs

D. Advances in graphics, movies, and audio *

E. Advances in presentations

 

265. What is computer-based training?

A. A video game

B. A method of training a computer to reject viruses

C. A method of education that allows people to learn at their own pace, using specifically designed interactive software *

D. A method of training the computer to perform routine tasks

E. A method of training with computer

 

266. Every web page has its own

A. Database connection

B. Personal search engine

C. Animation scheme

D. URL *

E. IP-address

 

267. The website that offers a service that let users search a specific content on the internet is __________.

A. Search Engine*

B. Social Network

C. Online Storage

D. Searching Website

E. Service Website

 

268. Which of the following is an example of search engines?

A. command.com

B. Yahoo.com *

C. vk.com

D. Facebook.com

E. gmail.com

 

269. ______ is a type of website that offers free creation of websites.

A. Prezi.com

B. Wix.com *

C. MS Power Point

D. Google.com

E. Powtoon.com

 

270. What is a forum?

A. A type of website that allows users to create a social network

B. A type of website where users can create, reply and discuss on topics *

C. A website that offers free online storage.

D. Open on-line Internet Conference

E. A type of dialogue

 

271. Which domains are the most reiable?

A..gov and.edu *

B..net and.gov

C..com and.net

D..org and.uk

E..kz

 

272. The.com domain web sites are _______?

A. Commercial enterprises and other mixed sites*

B. Government institutions

C. Educational institutions

D. Non-profit organizations

E. Personal web sites

 

273. The.org domains

A. Are always non-profit organizations that are reputable.

B. Contain reputable non-profit organizations with reliable information always.

C. Contain only advocacy group web sites with political agendas

D. Must be evaluated well because this domain contains both very reputable non-profit organization web sites and advocacy groups with hidden agendas *

E. contain databases of world-wide organizations

 

274. If the web site has an author and looks professional

A. You should expect good research

B. You should research the author only

C. You should look at the domain

D. You should research the author, look at the domain, check the links, check for errors, look for bias, etc. *

E. You can be sure that its a popular site

 

275. What is Cloud Computing replacing?

A. Corporate data centers

B. Expensive personal computer hardware

C. Expensive software upgrades

D. All answers are correct*

E. Your personal computer

 

276. "Cloud" in cloud computing represents what?

A. Wireless

B. Hard drives

C. People

D. Internet *

E. Software

 

277. Cloud Computing has below layers

A. User, Software, Platform, Infrastructure, Server

B. Client, Application, Platform, Infrastructure, Server *

C. Software, Application, Platform, Infrastructure, Server

D. Software, Hardware, Operating System, Server

E. Platform, Infrastructure, Server

 

278. Deployment Models are

A. Public Cloud, Protected Cloud, Default Cloud and Private Cloud

B. Community Cloud, Hybrid Cloud, Protected Cloud and Default Cloud

C. Public Cloud, Community Cloud, Hybrid Cloud and Private Cloud *

D. Default Cloud, Community Cloud, Protected Cloud

E. All of the above

 

279. Which of these should a company consider before implementing cloud computing technology?

A. Employee satisfaction

B. Potential cost reduction

C. Information sensitivity

D. All of the above *

E. All answers are incorrect

 

280. What is the number one concern about cloud computing?

A. Too expensive

B. Security concerns *

C. Too many platforms

D. Accessability

E. All of the above

 

281. The term "Cloud" in cloud computing represents what

A. People

B. Computer

C. Wireless Device

D. Internet *

E. All of the above

 

282. What is Cloud Computing replacing?

A. Corporate data centers

B. Expensive personal computer hardware

C. Expensive software upgrades

D. All of the above *

E. No correct answer

 

283. E-commerce is:

A. Business-to-Business transactions and Business-to-Consumer transactions *

B. Getting money from your computer online

C. Selling your home on the Internet

D. A revolution in business practices

E. All of the above

 

284. What is telemedicine?

A. Something that gives people access to the expertise of specialties in urban hospitals through the use of multimedia and computer networks *

B. A computer game that allows people to pretend to be doctors

C. A database that lists and explains all known medicines

D. An advertisement for the local grocery store's pharmacy

E. All of the above

 

285. What are the benefits of groupware?

A. Member of the group can feel like they can belong

B. Members of the group can share programs, computer files, and other resources *

C. Members of the group can read e-mails sent to other group members

D. Members of the group can rely on the other people in the group to do their work

E. All of the above

 

286. How does multimedia help school-age children?

A. It replaces direct textbook reading

B. It helps students learn in new and stimulating ways and allows them to apply their knowledge creatively *

C. It allows students to control all their learning

D. It replaces teacher lectures

E. All of the above

 

287. What did ARPA do?

A. Developed facsimile equipment

B. Linked several computers into a network called ARPANET *

C. Laid the first transatlantic communication cables

D. Created the first server-based email

E. All of the above

 

288. What are some examples of multimedia?

A. Video games, movies, and television *

B. Television series

C. Computer-generated graphics

D. Digital pictures

E. All of the above

 

289. To protect your privacy online fill out forms only when the website displays

A. Http://

B. Ftps://

C. Ftp://

D. Https: *

E. All of the above

 

290. An individual's ability to restrict or eliminate the collection, use, and sale of his/her confidential personal information

A. Protection

B. Privacy *

C. Ethics

D. Anonymity

E. All of the above

 

291. _______ activities committed using the Internet that violate state, federal, or international laws.

A. Hacker

B. Spector

C. Computer crime

D. Cybercime *

E. Criminal

 

292. An area of law dedicated to computer crime

A. Cyberlaw *

B. Cyberstalking

C. Cybercrime

D. Cyberbulling

E. Cyberdealer

 

293. Passwords should consist of _______

A. Numbers

B. Lowercase letters

C. Special characters

D. Uppercase letters

E. All of the above *

 

294. Which of the following is FALSE about teachers using email and instant messaging with their students?

A. It is a way to communicate with your students, their families, and professional colleagues

B. Children and adolescents are the largest users of email and instant messaging technologies

C. Teachers who use email and instant message to communicate with students and their families are lazy *

D. Fewer teachers use instant messaging because the kind of informal language found in IM can often be misunderstood or misused

E. All of the above

 

295. What is a Wiki?

A. Electronic forums where teachers and students discuss educational topics

B. A publicaly accessible online journal written by an individual for others to read and comment on.

C. A website or blogspace that is collaboratively edited and maintained by a group of people, in our case teachers and students *

D. Learning resource

E. All of the above

 

296. In schools, wikis allow students and teachers to which of the following?

A. Use technology in meaningful ways in the classroom

B. Collaborate with peers and colleagues

C. Publish their writing and other creative or scientific work

D. Receive feedback about their learning both inside and outside the classroom

E. All of the above*

 

297. Streaming multimedia is a(n) _______ method that facilitates the transmission of audio and video files from computer to computer in a stream.

A. Intranet data transfer

B. Internet data transfer *

C. Primer

D. Media server application

E. All of the above

 

298. _______ and _______ provide an inexpensive way to up-to-the-minute news and information to a classroom.

A. Pull technology and client pull

B. Web feeds and RSS

C. Push technologies and data channels *

D. RSS and data channels

E. All of the above

 

299. _______ differs from ordinary e-mail in the immediacy of the message exchange and also makes a continued exchange simpler than sending e-mail back and forth.

A. Media transfer

B. Web whiteboarding

C. Streaming video

D. Instant messaging *

E. All of the above

 

300. _______ allows users, regardless of location or connection speed, to share practically any kind of file with a limitless population of Internet users (i.e. Napster). As for educational purposes, this model will work great as an exchange for learning objects or units of learning.

A. Peer-to-peer file sharing *

B Push technologies

C. Internet telephony

D. Streaming audio

E. All of the above

 



<== | ==>
Introduction to computer systems. | - .
:


: 2018-11-11; !; : 1006 |


:

:

,
==> ...

1904 - | 1672 -


© 2015-2024 lektsii.org - -

: 0.387 .