Вопрос №61
V2
| In order to place a horizontal line, which always (in case of changing window size) is half the width of the screen, you will add the code:
| 1
|
| 0
|
| 0
|
| 1
|
| 0
|
| 0
|
| 0
|
| 1
|
|
Вопрос №62
V2
| What is the correct HTML for adding a background color?
| 1
| < body bgcolor="black" text="#008000">
| 1
|
| 0
| yellow
| 0
|
| 0
|
| 1
| < body bgcolor="white">
|
Вопрос №63
V2
| In order to define a font family, you must specify it in the ___ attribute of the ____ tag
| 1
| Face attribute
| 0
| tag
| 1
| tag
| 0
| Font family attribute
| 0
| tag
| 1
| Face attribute and tag
| 0
| Neither of above
|
Вопрос №64
V2
| In order to align the paragraph text in width, you have to add following code to the html file _____ .
| 0
|
| 1
|
| 1
|
center">
| 0
|
| 1
|
left">
| 0
|
left">
| 0
|
| 0
|
center">
|
Вопрос №65
V2
| What is the correct HTML code for creating a hyperlink
| 1
| www.kaznu.kz
| 0
| W3Schools.com
| 0
| W3Schools.com
| 0
| http://www.kaznu.kz
| 1
| W3Schools
| 0
| Link to a site
| 1
| Link to a site
|
Вопрос №66
V2
| Most common types of html page links (anchor tags) are:
| 1
| Within single web page (between different page elements)
| 1
| Within system (web pages on a local computer)
| 0
| Between remote servers
| 0
| Within data base
| 0
| In cloud (on a cloud service server)
| 1
| External (on a different sites over network)
|
Вопрос №67
V2
| Which of these html elements are relate to element? 0
|
1
|
Вопрос №68
V2
| In order to create an empty cell of the table, in html, the | | tag (to indicate an empty cell value) must contain symbol: 0
| *
| 1
| Space
| 0
| #
| 0
| For an empty cell, adding the td tag is not required
| 0
| For adding an empty cell user should enter alt+enter command within | | tags 1
| Remains empty, but user should enter “Space” (without quotes) symbol in it
| 1
| Non-printing “Space” (without quotes) symbol
|
Вопрос №69
V2
| To set the text size, you can specify parameters in the “size” attribute of the tag as follows:
| 1
| =“12pt”
| 1
| =“+1”
| 1
| =“5”
| 0
| =“10points”
| 0
| =“!10”
| 0
| =“*10”
|
Вопрос №70
V2
| It is necessary that in the absence of a picture on the server, instead of it at the same place on the web page, the inscription "Error" should be displayed. To do this, html code should be used:
| 1
|
| 0
|
| 1
|
| 1
|
| 0
|
| 0
|
| 0
|
|
Вопрос №71
V2
| What is the correct HTML for inserting an image?
| 0
| image.gif
| 0
|
| 1
|
| 0
|
| 1
|
| 1
|
|
Вопрос №72
V2
| What kind of information can be stored in the table cell of the html page?
| 1
| Text data
| 1
| Numeric data
| 0
| Neither of above
| 1
| Symbols
| 0
| Cannot be said
|
Вопрос №73
V2
| Which of the following is the best definition for cybersecurity?
| 1
| The process by which an organization manages cyber security risk to an acceptable level
| 1
| The protection of information from unauthorized access or disclosure
| 0
| Protection of paper documents and intellectual property in form of verbal or visual data
| 1
| Protecting information assets by addressing threats to information that is processed, stored or transported by interworked information systems
| 0
| Developing of application software for automatic management of Internet services
|
Вопрос №74
V2
| In order to organize reliable protection of the digital information from various cyber attacks and to prevent cyber violations within some Company, it is necessary to provide
| 1
| Installation of a reliable antivirus and firewall
| 1
| Regular software updates
| 0
| Neither of the above
| 1
| Differentiation of rights to physical access for employees to company equipment
| 0
| Daily check of employee workplaces
| 0
| Checking the skill level of company employees (can they work with 3d applications or not)
|
Вопрос №75
V2
| To gain access to data stored on a secure server, users need to go through the procedure
| 0
| Malware сhecks
| 1
| Registration
| 1
| Authentication
| 0
| Server source redirect
| 1
| Authorization
| 0
| Administrator rights checking
| 0
| Drive defragmentation
|
Вопрос №76
V2
| Choose statements that is not a cyber crime
| 1
| Remote checking for updates available for shareware application software
| 1
| Cracking down the computer security in order to improve the weaknesses
| 0
| Stealing PINS at the ATM
| 0
| Spoofing and stealing information
| 0
| Buying credit card information and extracting the money
| 1
| Creating reliable system protection against malwares
|
Вопрос №77
V2
| The main sources of malware infection are
| 1
| Malware-infected files transmitted over a network (e.g. over mail services)
| 1
| Mail services
| 0
| News Portals
| 0
| Secure data servers
| 0
| Remote computers
| 1
| Fake Internet resource
| 0
| Anti-malware application softwares
|
|
| | |