A key that is used to remove a letter/space which is behind the cursor on the screen, is called the
A. Backspace Key
B. Delete Key *
C. Caps Lock Key
D. Shift Key
E. Control Key
A key that is used to remove a letter/space which is in front of the cursor on the screen, is called the
A. Backspace Key *
B. Delete Key
C. Caps Lock Key
D. Shift Key
E. Control Key
The long key on a keyboard which is used when you want to separate one word from another when writing, is called the
A. Backspace Key
B. Delete Key
C. Space Bar *
D. Shift Key
E. Control Key
Operating system
An operating system (OS) is
A. a software program that manages the hardware and software resources of a computer. *
B. a set of methods of interaction of a computer program and the user of this program.
C. a set of methods for communication between programs.
D. a way of interaction of physical devices.
E. a set of instructions, stored digitally within the computer's memory
User interface
A. a software program that manages the hardware and software resources of a computer.
B. a set of methods of interaction of a computer program and the user of this program. *
C. a set of methods for communication between programs.
D. a way of interaction of physical devices.
E. a set of instructions, stored digitally within the computer's memory
Software interface
A. a software program that manages the hardware and software resources of a computer.
B. a set of methods of interaction of a computer program and the user of this program.
C. a set of methods for communication between programs. *
D. a way of interaction of physical devices.
E. a set of instructions, stored digitally within the computer's memory
Physical interface
A. a software program that manages the hardware and software resources of a computer.
B. a set of methods of interaction of a computer program and the user of this program.
C. a set of methods for communication between programs.
D. a way of interaction of physical devices. *
E. a set of instructions, stored digitally within the computer's memory
Database
228. Database model:
A. Hierarchical *
B. textual
C. numeric
D. indexed
E. cyclic
229. Database model:
A. textual
B. numeric
C. Network *
D. indexed
E. cyclic
230. Database model:
A. textual
B. numeric
C. indexed
D. Relational *
E. cyclic
Here the focus is on describing the stages in data processing: data collection
|
|
A. gathering raw data to process *
B. arranging and systematizing data
C. double-checking and cleaning data
D. entering data into a system
E. arranging data into table format for analysis
Here the focus is on describing the stages in data processing: data coding
A. gathering raw data to process,
B. arranging and systematizing *
C. double-checking and cleaning data
D. entering data into a system
E. creating categories in order to organise data into groups
Here the focus is on describing the stages in data processing: data validation
A. double-checking and cleaning data *
B. entering data into a system
C. arranging data into table format for analysis
D. creating categories in order to organise data into groups
E. gathering raw data to process
Here the focus is on describing the stages in data processing: data entry
A. gathering raw data to process
B. arranging and systematizing
C. double-checking and cleaning data
D. entering data into a system *
E. creating categories in order to organise data into groups
Here the focus is on describing the stages in data processing: data tabulation
A. double-checking and cleaning data
B. entering data into a system
C. arranging data into table format for analysis *
D. creating categories in order to organise data into groups
E. gathering raw data to process
Here the focus is on describing the stages in data processing: data sorting
A. double-checking and cleaning data
B. entering data into a system
C. arranging data into table format for analysis
D. creating categories in order to organise data into groups *
E. gathering raw data to process
Cyber security
Cyber attacks is
A. attacks on acomputer from the internet *
B. use ativirus softwars
C. insert firewalls
D. uninstall unnecessary software
E. check secutity settings
A network perimeter is
A. the topologes as a star, a bus, a circle
B. the network boundary between a private user network and the internet*
|
|
C. improving the security of a computer system
D. a web application protection firewall (WAF)
E. the measure types of networks
Which means encryption
A. Encoding *
B. Secure Socket Layer (SSL)
C. Coding
D. factor authentication
E. method of Hackers
Дата добавления: 2019-02-22; просмотров: 1167; Мы поможем в написании вашей работы! |
Мы поможем в написании ваших работ!