|
Тест с ответами по ICT. ICT тест 2022. Апаратты жне коммуникациялы технологиялар (аылшын тілінде) Информационнокоммуникационные технологии (на английском языке)
Вопрос №237
V3
| Read the article and answer questions given below.
IP address definition An IP address is a unique address that identifies a device on the internet or a local network. IP stands for "Internet Protocol," which is the set of rules governing the format of data sent via the internet or local network.
In essence, IP addresses are the identifier that allows information to be sent between devices on a network: they contain location information and make devices accessible for communication. The internet needs a way to differentiate between different computers, routers, and websites. IP addresses provide a way of doing so and form an essential part of how the internet works.
An IP address is a string of numbers separated by periods. IP addresses are expressed as a set of four numbers — an example address might be 192.158.1.38. Each number in the set can range from 0 to 255. So, the full IP addressing range goes from 0.0.0.0 to 255.255.255.255. 1. IP stands for:
A) Information Protocol
B) Internet Protocol
C) Internet Provider
D) Information Provider 2. What is the purpose of an IP Address?
A) A unique identifier for computer
B) A intersection path location
C) A unique location identifier
D) A network location identifier 3. Which IP Address is wrong?
A) 196.145.1.102
B) 255.125.2.256
C) 155.97.4.35
D) 192.102.5.86
| 0
| 1 – A, 2 – A, 3 – C
| 0
| 1 – B, 2 – D, 3 – A
| 0
| 1 – C, 2 – C, 3 – B
| 1
| 1 – B, 2 – D, 3 – B
| 0
| 1 – D, 2 – B, 3 – A
|
Вопрос №238
V3
| Read the article and answer questions given below. Computer network topologies Network refers to the set of devices (nodes) connected by communication links. A node can be any device capable of sending and/or receiving data generated by other devices on the network.
Topology refers to the manner in which the network of computers is connected. Each topology is suited to specific tasks and has its own benefits and drawbacks. The choice of topology is dependent upon type of application, number of equipment being used, rate of data transfer required, response time, and cost.
The word network topology is used to explain the manner in which a network is physically connected. The aim is to exchange the data such as text, audio/video, and images from one point to another.
A bus topology consists of a single cable with the terminator at each end. All available devices are connected to the single cable. One single cable acts as the backbone for the whole network.
In a bus topology, one of the computers acts as the server and transmits the data from one end to the other in a single direction. When the data reaches to the extreme end, the terminator removes the data from the line.
In Ring Topology, each computer or node is connected with its neighboring computer forming the shape of ring hence it is known as Ring Topology.
In ring topology the data travels in a circular fashion from one computer to another (clockwise or counter clockwise). In case of any failure in a cable or device break the circular loop and can take down the entire network.
In Start Topology, all the computers (nodes) go to the central location having a device called as hub. All the devices on the network are connected with a hub device through a link. Each device requires a single wire for the connection to the hub.
In star Topology, there exists a point-to-point connection between a node and hub. The hub takes a signal from any node and passes it along to all the other nodes in the network. The hub controls and manages entire function of the network. 1. Which of the following networks will allow an internet connection?
A) Ring
B) Bus
C) Star
D) All of the above 2. What piece of hardware is usually at the center of a star network?
A) Hub
B) Modem
C) Router
D) Server 3. According to the text, what does mean nodes?
A) a basic unit of a data structure
B) any device capable of transferring data
C) number of equipment being used
D) a network is physically connected
| 1
| 1 – D, 2 – A, 3 – B
| 0
| 1 – B, 2 – D, 3 – C
| 0
| 1 – D, 2 – B, 3 – D
| 0
| 1 – A, 2 – A, 3 – D
| 0
| 1 – A, 2 – B, 3 – C
|
Вопрос №239
V3
| Read the article and answer questions given below. Cybersecurity
Information security is the practice, policies and principles to protect digital data and other kinds of information. Information security responsibilities include establishing a set of business processes that will protect information assets, regardless of how that information is formatted or whether it is in transit, is being processed or is at rest in storage.
Here, it is required to assure that your information is protected in terms of Confidentiality, Integrity, and Availability.
Confidentiality ensures that data exchanged is not accessible to unauthorized users. The users could be applications, processes, other systems and/or humans. When designing a system, adequate control mechanisms to enforce confidentiality should be in place, as well as policies that dictate what authorized users can and cannot do with the data.
Integrity is the ability to ensure that a system and its data has not suffered unauthorized modification. Integrity protection protects not only data, but also operating systems, applications and hardware from being altered by unauthorized individuals. Availability guarantees that systems, applications and data are available to users when they need them.
The most common attack that impacts availability is denial-of-service in which the attacker interrupts access to information, system, devices or other network resources. 1. What is the essence of information security?
the practice, policies and principles to protect electronic data and different types of information protection of all library resources required to assure that protection of information is considered in view of Confidentiality, Integrity, and Availability required to assure that protection of information is not considered in view of Confidentiality, Integrity, and Availability
2. Which principle applies if the transmitted data is not available to unauthorized users?
Integrity Availability Confidentiality Reliability
3. In which stage is determined the adequate controls to ensure privacy and policies for authorized users?
In the stage of testing a system In the stage of implementing a system In the stage of realizing a system In the stage of designing a system
| 0
| 1-D,B, 2-A, 3-C
| 1
| 1-A,C, 2-C, 3-D
| 0
| 1-B,D, 2-D, 3-A
| 0
| 1-D,A, 2-B, 3-A
| 0
| 1-D,B,2-B, 3-B
|
Вопрос №240
V3
| Read the article and answer questions given below. What is a computer virus? Computer virus is a harmful computer program developed by a person that disrupts operations of a computer in various ways. It can be either malfunction of a program or set of programs, it can be a program which generates e-mails in thousands, it can be a program that damages important files such as documents beyond recovery, a program just simply destroys the files system of computer making it completely unusable or simply a harm less program.
The Creeper virus was first detected on ARPANET, the forerunner of the Internet in the early 1970s. Creeper was an experimental self-replicating program written by Bob Thomas at BBN in 1971. Creeper copied itself to the remote system where the message, "I'm the creeper, catch me if you can!" was displayed. The Reaper program was created to delete Creeper.
There are several types of computer viruses existing and basically they can be classified according to different categories. First two categories are resident viruses and nonresident viruses.
Boot Sector Virus
This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.
Worms
Worms do not require user actions to spread, they move from system to system over networks on their own. Worms can do nasty actions such as creating unnecessary files inside system folders, steal information from user‟s computers and upload to web sites, provide unnecessary load in database servers, infect files of selected file types like script files in web servers.
Macro viruses infect documents created by Microsoft Office programs (Word, Excel, PowerPoint and Access). Macro viruses infect to the files that are created using certain applications or programs that contain macros.
1. What is a computer virus?
library programs operating system translators malicious computer program
2. What was the name of the program that treated the first computer virus?
Creeper Reaper Rother J Thomas
3. A lot of unnecessary files appeared in the system folder. What type of computer virus has entered to your computer?
A) Worms
B) Boot Sector Virus
C) Macro viruses
D) Spyware
| 0
| 1-B, 2-A, 3-C
| 1
| 1-D, 2-B, 3-A
| 0
| 1-D, 2-A, 3-D
| 0
| 1-C, 2-C, 3-B
| 0
| 1-B,2-C, 3-B
|
Вопрос №241
V3
| Read the article and answer questions given below. Internet Protocols The Internet uses a variety of languages to transmit information from one place to the other. These languages are called protocols. Using these protocols we can acquire the services from the Internet. Each protocol has a specific functionality and www is considered to be the largest service acquired amongst the services provided by the Internet. If we take the above analogy in the hotel, we have seen in many hotels that even though there are so many dishes available, only one of these dishes will be popular. Likewise although there are so many services available in the Internet the most popular dish on the menu is www.
The Open Systems Interconnection (OSI) model is a conceptual model created by the International Organization for Standardization which enables diverse communication systems to communicate using standard protocols. The OSI model describes the structure of data transfer from one application to another, which is consists of seven layers. In the OSI model the network layer is layer 3. The Internet Protocol (IP) is one of the main protocols used at this layer, along with several other protocols for routing, testing, and encryption.
When we send an email, our computer connects to our email service‟s mail server. A server is a centralized computer which manages a specific type of service. An email server for instance, handles emails. The email server responsible for sending emails is called the SMTP (Simple Mail Transfer Protocol) server. 1. How information transferred from one place to the other on the Internet?
A) The Internet uses programming languages
B) The Internet uses digital resources
C) The Internet uses library programs
D) The Internet uses protocols
2. What type of protocol is used in the network layer of the OSI model?
IP HTTP SMTP POP3
3. Which type of protocol is responsible for sending emails between servers?
A) HTTPS
B) FTP
C) SMTP
D) POP3
| 0
| 1-A, 2-B, 3-D
| 1
| 1-D, 2-A, 3-C
| 0
| 1-B, 2-D, 3-A
| 0
| 1-A, 2-B, 3-A
| 0
| 1-B,2-B, 3-B
|
Вопрос №242
V3
| Read the article and answer questions given below. How to identify entities on the Internet? A URL (Uniform Resource Locator) is a form of URI and is a standardized naming convention for addressing documents accessible over the Internet and Intranet. An example of a URL is http://www.computerhope.com, which is the URL for the Computer Hope website.
A domain, in the context of networking, refers to any group of users, workstations, devices, printers, computers and database servers that share different types of data via network resources. There are also many types of subdomains.
A domain is used to manage all user functions, including username/password and shared system resource authentication and access.
A domain name is your website name. A domain name is the address where Internet users can access your website. A domain name is used for finding and identifying computers on the Internet. Computers use IP addresses, which are a series of number. However, it is difficult for humans to remember strings of numbers. Because of this, domain names were developed and used to identify entities on the Internet rather than using IP addresses.
. 1. What is URL address for? A) for delivering documents accessible over the post
B) for addressing documents accessible over the Internet
C) for receiving documents accessible over the Post
D) for encrypting documents accessible over the PAN
2. What is domain name?
website name the address where Internet users can access your website the address where you live the address where Internet users can access to your home
3. What is domain name for?
A) used to develope entities on the Internet
B) used to create entities on the Internet
C) used to clarify entities on the Internet
D) used to identify entities on the Internet
| 0
| 1-A, 2-A, 3-C
| 1
| 1-B, 2-B, 3-D
| 0
| 1-C, 2-D, 3-A
| 0
| 1-A, 2-A, 3-A
| 0
| 1-C,2-C, 3-B
|
Вопрос №243
V3
| Read the article and answer questions given below. What is Data Centre? A data centre is a network of computing and storage resources enabling the delivery of shared software applications and data. In the world of enterprise IT, the data centre supports business applications. These range from simple email and file sharing, through to customer relationship management (CRM) and enterprise resource planning (ERP) to Big Data, communications and collaboration services.
The core components of a data centre are as follows:
Network infrastructure that connects servers (including virtualised servers), data centre services, storage, and external connectivity to end-user locations
Storage infrastructure that provides storage arrays to store the ‘fuel’ of the data centre – data
Computing resources – the servers that provide processing, memory, local storage, and network connectivity for the ‘engines’ of the data centre – applications.
Data center services are typically deployed to protect the performance and integrity of the core data center components. 1. What is Data Centre for? A) providing the delivery of shared software applications and data
B) shutting the delivery of shared software applications and data
C) closing the delivery of shared software applications and data
D) encrypting the delivery of shared software applications and data
2. What is the main function of Network infrastructure?
connects organization’s servers links servers, data Centre services, storage, and external connectivity to end-user locations connects all databases in one connects all organizations
3. How do data centers operate? A) deployed to protect the performance and integrity of the core data center components
B) deployed to open the performance and integrity of the core data center components
C) deployed to close the performance and integrity of the core data center components D) deployed to link the performance and integrity of the core data center components
| 0
| 1-A, 2-D, 3-C
| 1
| 1-A, 2-B, 3-A
| 0
| 1-C, 2-D, 3-A
| 0
| 1-D, 2-A, 3-B
| 0
| 1-C,2-C, 3-D
|
Вопрос №244
V3
| Read the article and answer questions given below. Cloud computing Cloud computing is the delivery of computing services such as servers, storage, databases, networking, software, analytics and more over the Internet (“the cloud”). Companies offering these computing services are called cloud providers.
You are probably using cloud computing right now, even if you don’t realise it. If you use an online service to send email, edit documents, watch movies or TV, listen to music, play games or store pictures and other files, it is likely that cloud computing is making it all possible behind the scenes. Here are a few of the things you can do with the cloud:
Create new apps and services
Store, back up and recover data
Host websites and blogs
Stream audio and video
Deliver software on demand
Analyse data for patterns and make predictions
Why is it called cloud computing?
A fundamental concept behind cloud computing is that the location of the service, and many of the details such as the hardware or operating system on which it is running, are largely irrelevant to the user. It's with this in mind that the metaphor of the cloud was borrowed from old telecoms network schematics, in which the public telephone network (and later the internet) was often represented as a cloud to denote that the location didn't matter – it was just a cloud of stuff. This is an over-simplification of course; for many customers, location of their services and data remains a key issue. 1. What is Cloud computing? A) the delivery of computing services such as servers, storage, databases, networking, software, analytics and more over the Internet
B) the usage of computing services such as servers, databases, networking, software, analytics and more without the Internet
C) the usage of computing services such as servers, storage, databases, networking, software, analytics and more on your computer without the Internet
D) the implementation of computing services such as servers, storage, databases, networking, software, analytics and more without the Internet 2. What you can do with the cloud?
Create new applications and services Recover an old apps and services Back up new apps and service Delivery new apps and service
3. Why is it called cloud computing?
A) represented as a cloud to denote that the location didn't matter
B) deployed to open the performance and integrity of the core data center components
C) deployed to close the performance and integrity of the core data center components
D) deployed to link the performance and integrity of the core data center components
| 0
| 1-A, 2-D, 3-C
| 1
| 1-A, 2-A, 3-A
| 0
| 1-B, 2-D, 3-A
| 0
| 1-D, 2-B, 3-B
| 0
| 1-A,2-C, 3-D
| |
|
|