Главная страница

Икт тест. Экзаменационные вопросы по дисциплине Информационно коммуникационные технологии Подготовил Нестеренков П. А


Скачать 111.26 Kb.
НазваниеЭкзаменационные вопросы по дисциплине Информационно коммуникационные технологии Подготовил Нестеренков П. А
АнкорИкт тест
Дата16.09.2022
Размер111.26 Kb.
Формат файлаdocx
Имя файлаИкт тест.docx
ТипЭкзаменационные вопросы
#680860
страница15 из 17
1   ...   9   10   11   12   13   14   15   16   17


Вопрос №61

V2

In order to place a horizontal line, which always (in case of changing window size) is half the width of the screen, you will add the code:

1




0




0




1




0




0




0



1






Вопрос №62

V2

What is the correct HTML for adding a background color?

1

< body bgcolor="black" text="#008000">

1



0

yellow

0



0



1

< body bgcolor="white">


Вопрос №63

V2

In order to define a font family, you must specify it in the ___ attribute of the ____ tag

1

Face attribute

0

tag

1

tag

0

Font family attribute

0

tag

1

Face attribute and tag

0

Neither of above


Вопрос №64

V2

In order to align the paragraph text in width, you have to add following code to the html file _____ .

0



1




1


center">

0




1


left">

0


left">

0




0


center">


Вопрос №65

V2

What is the correct HTML code for creating a hyperlink

1

www.kaznu.kz

0

W3Schools.com

0

W3Schools.com

0

http://www.kaznu.kz

1

W3Schools

0

Link to a site

1

Link to a site


Вопрос №66

V2

Most common types of html page links (anchor tags) are:

1

Within single web page (between different page elements)

1

Within system (web pages on a local computer)

0

Between remote servers

0

Within data base

0

In cloud (on a cloud service server)

1

External (on a different sites over network)


Вопрос №67

V2

Which of these html elements are relate to element?

0



1





1


0


1



0





Вопрос №68
tag (to indicate an empty cell value) must contain symbol:
tags

V2

In order to create an empty cell of the table, in html, the

0

*

1

Space

0

#

0

For an empty cell, adding the td tag is not required

0

For adding an empty cell user should enter alt+enter command within

1

Remains empty, but user should enter “Space” (without quotes) symbol in it

1

Non-printing “Space” (without quotes) symbol


Вопрос №69

V2

To set the text size, you can specify parameters in the “size” attribute of the tag as follows:

1

=“12pt”

1

=“+1”

1

=“5”

0

=“10points”

0

=“!10”

0

=“*10”


Вопрос №70

V2

It is necessary that in the absence of a picture on the server, instead of it at the same place on the web page, the inscription "Error" should be displayed. To do this, html code should be used:

1

error

0



1

error

1

error

0



0



0




Вопрос №71

V2

What is the correct HTML for inserting an image?

0

myimage image.gif

0

myimage

1

myimage

0

MyImage

1

myimage

1

myimage


Вопрос №72

V2

What kind of information can be stored in the table cell of the html page?

1

Text data

1

Numeric data

0

Neither of above

1

Symbols

0

Cannot be said


Вопрос №73

V2

Which of the following is the best definition for cybersecurity?

1

The process by which an organization manages cyber security risk to an acceptable level

1

The protection of information from unauthorized access or disclosure

0

Protection of paper documents and intellectual property in form of verbal or visual data

1

Protecting information assets by addressing threats to information that is processed, stored or transported by interworked information systems

0

Developing of application software for automatic management of Internet services



Вопрос №74

V2

In order to organize reliable protection of the digital information from various cyber attacks and to prevent cyber violations within some Company, it is necessary to provide

1

Installation of a reliable antivirus and firewall

1

Regular software updates

0

Neither of the above

1

Differentiation of rights to physical access for employees to company equipment

0

Daily check of employee workplaces

0

Checking the skill level of company employees (can they work with 3d applications or not)


Вопрос №75

V2

To gain access to data stored on a secure server, users need to go through the procedure

0

Malware сhecks

1

Registration

1

Authentication

0

Server source redirect

1

Authorization

0

Administrator rights checking

0

Drive defragmentation



Вопрос №76

V2

Choose statements that is not a cyber crime

1

Remote checking for updates available for shareware application software

1

Cracking down the computer security in order to improve the weaknesses

0

Stealing PINS at the ATM

0

Spoofing and stealing information

0

Buying credit card information and extracting the money

1

Creating reliable system protection against malwares


Вопрос №77

V2

The main sources of malware infection are

1

Malware-infected files transmitted over a network (e.g. over mail services)

1

Mail services

0

News Portals

0

Secure data servers

0

Remote computers

1

Fake Internet resource

0

Anti-malware application softwares

1   ...   9   10   11   12   13   14   15   16   17


написать администратору сайта