Главная страница

Тест с ответами по ICT. ICT тест 2022. Апаратты жне коммуникациялы технологиялар (аылшын тілінде) Информационнокоммуникационные технологии (на английском языке)


Скачать 101.68 Kb.
НазваниеАпаратты жне коммуникациялы технологиялар (аылшын тілінде) Информационнокоммуникационные технологии (на английском языке)
АнкорТест с ответами по ICT
Дата07.05.2022
Размер101.68 Kb.
Формат файлаdocx
Имя файлаICT тест 2022.docx
ТипДокументы
#516004
страница8 из 11
1   2   3   4   5   6   7   8   9   10   11


Вопрос №174

V2

Three primary principles of Information security

0

Reliability

1

Confidentiality

0

Accuracy

0

Accessibility

0

Comprehensibility

1

Integrity 

1

Availability

0

Versatility


Вопрос №175

V2

Integrity protection protects ... from being altered by unauthorized individuals

0

text

1

data

0

video

0

animation

0

hypertext

1

operating systems

1

applications

0

users


Вопрос №176

V2

Possible attacks that may arise with your computer if not proper security measures taken

0

Open the file or link

1

Harvest and sell email addresses and passwords

0

Data protection

0

Updating OS

0

Works properly and fast

1

Record keystrokes and steal passwords

1

Send spam and phishing emails

0

Automate series of operations


Вопрос №177

V2

The following steps can be followed to prevent being attacked your computer

0

Open any files or links

1

Use good, cryptic passwords

0

Backing up content of HDD

0

Update OS

0

Do not keep your passwords secret

1

Keep your passwords secret

1

Do not click on unknown links or attachments

0

Click on unknown links or attachments


Вопрос №178

V2

What is a computer virus?

0

A harmful computer program developed by a person that helps to perform operations of a computer in various ways

1

A harmful computer program developed by a person that disrupts operations of a computer in various ways

0

All browsers

0

An Operating System

0

A program that do not damage important files such as documents beyond recovery

1

A program that damages important files such as documents beyond recovery

1

A program just simply destroys the files system of computer making it completely unusable

0

A program just simply corrects the files system of computer making it completely usable


Вопрос №179

V2

What do you know about worms (computer virus)?

0

It requires user actions to spread, they need help to move from system to system over networks

1

Do not require user actions to spread, they move from system to system over networks on their own

0

Can not do nasty actions such as creating unnecessary files inside system folders

0

Do not steal information from user’s computers and upload to web sites

0

A program that do not damage important files such as documents beyond recovery

1

Can do nasty actions such as creating unnecessary files inside system folders

1

Steal information from user’s computers and upload to web sites

0

A program just simply corrects the files system of computer making it completely usable


Вопрос №180

V2

Examples of macro viruses

0

Confiker

1

Relax

0

PSWBugbear

0

Lovgate.F

0

Trile.C

1

Melissa.A

1

Bablas

0

Mapson


Вопрос №181

V2

Trojan horse

0

Main software that contains set of procedures and people through which information is processed to deceive users of its true intent

1

Any malicious software that disguises itself in order to deceive users of its true intent

0

They comprihend for about 8 in 10 of all new malware infections

0

They save for about 8 in 10 of all new malware infections

0

They modify for about 8 in 10 of all new malware infections

1

It can take the form of just about anything: an innocuous download link, an email attachment sent from a work colleague or an image sent via social media.

1

They account for about 8 in 10 of all new malware infections

0

They disrupt for about 8 in 10 of all new malware infections


Вопрос №182

V2

Hackers may use your computer …

0

Main software that contains set of procedures and people through which information is processed to deceive users of its true intent

1

to send spam or viruses

0

They comprehend for about 8 in 10 of all new malware infections

0

They save for about 8 in 10 of all new malware infections

0

They modify for about 8 in 10 of all new malware infections

1

host Web site

1

do other activities that cause computer malfunctions

0

They disrupt for about 8 in 10 of all new malware infections


Вопрос №183

V2

Cyber security is aimed … , or others, …

0

to send spam or viruses

1

at preventing cybercriminals

0

comprehend for about 8 in 10 of all new malware infections

0

host Web site

0

do other activities that cause computer malfunctions

1

malicious insiders

1

from accessing, harming, disrupting or modifying IT systems and applications

0

They disrupt for about 8 in 10 of all new malware infections


Вопрос №184

V2

The Internet Protocol is one of the main protocols used at the network layer, along with several other protocols for … 

0

sending spam or viruses

1

routing

0

about 8 in 10 of all new malware infections

0

hosting Web site

0

doing other activities that cause computer malfunctions

1

testing

1

encryption

0

disruption


Вопрос №185

V2

WWW is the software which is used ... and it consists of …, which are stored in different computers.

0

to send data

1

to access the information from the Internet

0

to access the digital resources from the Internet

0

to upload the information from the computer

0

to save the information from the Internet

1

files, folders

1

the documents

0

to read the information from the Internet


Вопрос №186

V2

HTML

0

to send data

1

stands for Hyper Text Markup Language

0

stands for Hyper Text Makeup Language

0

stands for Hyper Text Market Language

0

describes the structure of information technologies

1

describes the structure of a Web page

1

allows the documents author to embed hyperlinks

0

allows the user of a computer to embed hyperlinks.


Вопрос №187

V2

Common Internet file extensions include

0

tiff

1

Html or htm, php, asp

0

Ppts, docxt, xlcs

0

Pas, py, bas

0

Obj, bmp

1

Cgi, xml

1

Jpg, gif

0

Kz,ru, eu


Вопрос №188

V2

Search engine system is … which is programmed … and… .


0

Non-automated web-site

1

an automated web-site

0

to save specified keywords

0

to write specified keywords

0

give the web addresses and list of files as a result

1

to search specified keywords

1

give the websites and Internet based documents as a result

0

give the nothing as a result


Вопрос №189

V2

HTTPS …

0

stands for “Hyper Text Transfer Protocol Safety”

1

stands for “Hyper Text Transfer Protocol Secure”

0

Secure means that the data transferred electronically is descripted

0

Secure means that the data transferred electronically is encrypted

0

Secure means that the data transferred electronically is unpacked

1

Secure means that the data transferred electronically is encrypted

1

cannot be accessed by unauthorized people

0

Can be accessed by unauthorized people


Вопрос №190

V2

CSS … and may be used to change …, …

0

stands for Cascading Style Sheat

1

stands for Cascading Style Sheet

0

Location of the website

0

Location of all resources

0

Content of website

1

the type of font

1

size and color

0

Address of the website


Вопрос №191

V2

Email servers …, … , and … messages

0

provide, backup

1

accept, forward

0

save

0

duplicate

0

change

1

deliver

1

store

0

remove


Вопрос №192

V2

The POP3

0

Stands for Pre Office Protocol3

1

Stands for Post Office Protocol3

0

The number ‘3’ is the order number of the protocol in use

0

The number ‘3’ is the location layer of the protocol in OSI model

0

Stands for post official protocol3

1

The number ‘3’ is the version number of the protocol in use

1

have mail accounts (our email IDs).

0

have not mail accounts (our email IDs).


Вопрос №193

V2

An email client is … used to … and … a user's email

0

An information technology

1

a computer program

0

provide

0

write

0

control

1

access

1

manage

0

receive


Вопрос №194

V2

Which of them are included to the core components of a data Centre?

0

An information technology

1

Network infrastructure

0

All data in the library

0

Individual’s personal digital assistant

0

Database of organization

1

Computing resources

1

Storage infrastructure

0

The server of organization


Вопрос №195

V2

Cloud computing is the delivery of computing services such as …,…, … , and more over the Internet

0

An information technology

1

servers, storage

0

All data in the library

0

Individual’s personal digital assistant

0

Resources of organization

1

databases, networking

1

software, analytics

0

The server of organization


Вопрос №196

V2

What you can do with the cloud?

0

Create a new computer

1

Create new apps and services

0

Store, back up and recover data only on your computer’s HDD

0

Read information on illegal sites

0

Create resources for organization

1

Store, back up and recover data

1

Host websites and blogs

0

Remove resources from the server of organization’s library


Вопрос №197

V2

A few of the things you can do with the cloud:

0

Create a new computer

1

Stream audio and video

0

Store, back up and recover data only on your computer’s HDD

0

Read information on illegal sites

0

Create resources for organization

1

Analyse data for patterns and make predictions

1

Deliver software on demand

0

Remove resources from the server of organization’s library


Вопрос №198

V2

Types of cloud services:

0

Processor as a service

1

Platform as a service

0

Plug-in as a service

0

Information as a service

0

Server as a service

1

Infrastructure as a service

1

Software as a service

0

Spam as a service


Вопрос №199

V2

Types of cloud deployments:

0

common

1

public

0

Semi-structured

0

personal

0

individual

1

private

1

hybrid

0

Semi-private


Вопрос №200

V2

What terms are related to the virtualization?

0

Hardware that separates physical infrastructures to develop different dedicated resources

1

Software that separates physical infrastructures to develop different dedicated resources

0

Firmware that separates physical infrastructures to develop different dedicated resources

0

It is the fundamental technology that powers all information resources

0

It is the fundamental technology that helps to the library programs in your organization

1

It is the fundamental technology that powers cloud computing

1

Software of them makes it possible to run multiple operating systems and multiple applications on the same server at the same time

0

Software of them does not make it possible to run multiple operating systems and multiple applications on the same server at the same time


Вопрос №201

V2

With a public cloud, …, … and … is owned and managed by the cloud provider

0

All resources

1

all hardware

0

All Input devices

0

The Central Processing Unit

0

Translators

1

software

1

other supporting infrastructure

0

Library programs


Вопрос №202

V2

Advantages of Software as a service

0

Pay all for what you do not use

1

Pay only for what you use

0

Access app data from a local computer

0

Apply charged client software

0

Use charged client software

1

Use free client software

1

Access app data from anywhere

0

Access app data from organization’s computer


Вопрос №203

V2

Advantages of Infrastructure as a service

0

Lower security

1

Better security

0

No possibility to get new apps to users faster

0

Decrease stability, reliability and supportability

0

Increase non-stability, non-reliability and non-supportability

1

Increase stability, reliability and supportability

1

Gets new apps to users faster

0

Gets new apps to users slower


Вопрос №204

V2

The most famous image editors are

1

Corel DRAW

0

MS Excel

0

MS Access

0

MS Publisher

0

DEV C++

1

Adobe PhotoShop

1

Adobe Illustrator


Вопрос №205

V2

Publishing systems

1

Combine the possibilities of text and graphic editors

0

Allowed to control the size and font of figures

0

For processing only graphic documents

0

Manage and control budgets to ensure maximum value for money

0

Provide information to aid effective panel review of requests

1

For formatting strips with graphic materials and then printed

1

Targeted for use in publishing and typesetting systems


Вопрос №206

V2

The Basic Elements of Multimedia

0

Words

0

Social nets

1

Text

1

Graphics, Animation, Video

1

Audio

0

E-mail

0

Networks


Вопрос №207

V2

Audio is …

0

sequence

0

animation

1

music

0

sentence

1

speech

0

picture

1

other sound


Вопрос №208

V2

Graphics are digital representations of non-text information such as …

0

sequence

0

voice

1

drawings

0

sentence

1

charts

0

sounds

1

pictures


Вопрос №209

V2

The popular file compressions

0

Borland Pascal

0

Dev C++

1

WinRAR

0

Avast

1

WinZIP

0

Windows Explorer

1

7ZIP


Вопрос №210

V2

Compression formats that used for reduce the file size of images:

0

DOC

0

PPT

1

GIF

0

XLS

1

TIFF

0

MP4

1

GPEG


Вопрос №211

V2

Text was originally defined by printed media such as …

0

films

0

images

1

books

0

animations

1

newspapers

0

podcasts
1   2   3   4   5   6   7   8   9   10   11


написать администратору сайта