Главная страница

Икт тест. Экзаменационные вопросы по дисциплине Информационно коммуникационные технологии Подготовил Нестеренков П. А


Скачать 111.26 Kb.
НазваниеЭкзаменационные вопросы по дисциплине Информационно коммуникационные технологии Подготовил Нестеренков П. А
АнкорИкт тест
Дата16.09.2022
Размер111.26 Kb.
Формат файлаdocx
Имя файлаИкт тест.docx
ТипЭкзаменационные вопросы
#680860
страница16 из 17
1   ...   9   10   11   12   13   14   15   16   17

Вопрос №78

V2

The main type of software used to prevent data loss and malware infection on a computer system (including real-time network protection software):

1

Firewalls

0

Brand - maureas

1

Anti - viruses

0

Anti - encoders

0

Anti - decoders

1

Anti – malwares


Вопрос №79

V2

When using this type of software, there is an increased likelihood of data loss due to cybercrime

1

Malware

0

Protected

1

Pirated

0

Freeware

0

Shareware

1

Not licensed

0

Licensed



Вопрос №80

V2

What is the generic term for computer programs that can wreak havoc on your devices?

1

Malware

0

Damagedroids

0

Rudebots

0

Dangerware

1

Viruses

1

Pirated


Вопрос №81

V2

From this type of cyber threats, 100% protection with anti-malware software is NOT possible:

0

License updeates

1

Viruses

0

All of the above

1

Spyware

1

Network worms


Вопрос №82

V2

This technologies (methodology) allows users to restore data in case of accidentally deleting it from the local computer

0

Data licensing

1

Storing files on cloud technologies

1

Regular data backup

0

Data archiving technologies

0

Data defragmentation technologies

1

Storing a copy of data on secure removable devices


Вопрос №83

V2

The threats to information security of some Company may come from (commonly):

1

Hackers

1

Users

1

Malwares

0

The kind of architecture style in which the company building is built

0

Servers

0

RFID sensors

0

Licensed firewall software

0

WSN sensors


Вопрос №84

V2

Using the «ipconfig command» in command line (without additional attributes) the user can find out ___ of host

0

Subnet Mask only

0

IP Address only

1

DNS suffix

0

Local Network provider company name

1

Subnet Mask

0

Neither of the above

1

Default Gateway

0

Local Network provider company ip address


Вопрос №85

V2

What type of hardware is usually used in a local networks?

0

IP subnet devices

1

Modems

1

Hub

1

Router

0

Software interconnectors



Вопрос №86

V2

Which of the following network topologies will allow an Internet connection?

0

Car

0

Fast-internet

0

Plane

1

Bus

1

Star

1

Ring

0

Neither of the above


Вопрос №87

V2

Unified identifier defining the location of the host address in the network

1

IPv4 or IPv6 adresses

0

Subnet mask

1

IP address

0

Network Topology Id

0

Network gateway

1

Combination of system network and host addresseses

0

WWW address


Вопрос №88

V2

What the term LAN stands for?

1

Network connection of systems located relatively close to each other

1

Network connection of interacting devices within a building/company (relatively small distance between devices)

0

Local addressing netspace

0

Line area network

1

Local area network

0

Low addressing network


Вопрос №89

V2

As a result of the response to the ping command, you received a message about a large number of lost packets (for example, 100%). It means that ___

0

The requested node has already received all packets earlier

0

User entered the command syntax incorrectly

0

The ping successfully completed its work and provided the required information

1

The requested node is unavailable

0

User entered the command syntax within a wrong time period for a current local system

1

There were problems during establishing a connection (requested system is not responding)

1

Computer which user are pinging is not responding


Вопрос №90

V2

To send messages to all nodes of the network x.167.4.76 (where x – random number from 1 to 255), subnet mask - 255.0.0.0, the following address can be is used (broadcast):

0

192.0.255.0

0

0.167.255.255

0

192.167.255.255

1

192.255.255.255

0

148. 255.15.255

1

148. 255.255.255

0

12. 255.255.11

1

12. 255.255.255


Вопрос №91

V2

The response of the operating system to user actions is displayed by ___ and _______.

1

Graphical interfaces / output devices

0

System installers / perepherial devices

0

Software installers / storage devices

0

Network equipment / utilities

0

Firmware software / storage devices

1

Graphical interfaces /perepherial devices

1

Perepherial devices / output devices



Вопрос №92

V2

Which of the following is a part of a common database?

1

Tables

1

Table Records

1

Table Fields

0

Worksheets

0

Logical drives

0

Primary encoded name

0

Table author fields


Вопрос №93

V2

In e-commerce, all activities are carried out through

1

Online stores

0

Online portal administrators

0

Banks

1

Online services

0

Regular shops

0

Postal services

0

Online file transfer services

1

Online banking


Вопрос №94

V2

Which one of the following is NOT a feature of electronic commerce?

0

Goods can be advertised and prices compared

1

There is physical contact between buyer and seller

0

Transactions can be processed quickly

0

Services are available 24 hours a day

1

To complete any transaction, a personal presence of both parties (seller / buyer) representatives at an official meeting is mandatory

1

Security of transactions is achieved through many official offline meetings of buyers with sellers

1   ...   9   10   11   12   13   14   15   16   17


написать администратору сайта