A key that is used to remove a letter/space which is behind the cursor on the screen, is called the



A. Backspace Key

B. Delete Key *

C. Caps Lock Key

D. Shift Key

E. Control Key

 

A key that is used to remove a letter/space which is in front of the cursor on the screen, is called the

A. Backspace Key *

B. Delete Key

C. Caps Lock Key

D. Shift Key

E. Control Key

 

The long key on a keyboard which is used when you want to separate one word from another when writing, is called the

A. Backspace Key

B. Delete Key

C. Space Bar *

D. Shift Key

E. Control Key

 

Operating system

 

An operating system (OS) is

A. a software program that manages the hardware and software resources of a computer. *

B. a set of methods of interaction of a computer program and the user of this program.

C. a set of methods for communication between programs.

D. a way of interaction of physical devices.

E. a set of instructions, stored digitally within the computer's memory

 

User interface

A. a software program that manages the hardware and software resources of a computer.

B. a set of methods of interaction of a computer program and the user of this program. *

C. a set of methods for communication between programs.

D. a way of interaction of physical devices.

E. a set of instructions, stored digitally within the computer's memory

 

Software interface

A. a software program that manages the hardware and software resources of a computer.

B. a set of methods of interaction of a computer program and the user of this program.

C. a set of methods for communication between programs. *

D. a way of interaction of physical devices.

E. a set of instructions, stored digitally within the computer's memory

 

Physical interface

A. a software program that manages the hardware and software resources of a computer.

B. a set of methods of interaction of a computer program and the user of this program.

C. a set of methods for communication between programs.

D. a way of interaction of physical devices. *

E. a set of instructions, stored digitally within the computer's memory

 

 

Database

 

228. Database model:

A. Hierarchical *

B. textual

C. numeric

D. indexed

E. cyclic

 

229. Database model:

A. textual

B. numeric

C. Network *

D. indexed

E. cyclic

 

230. Database model:

A. textual

B. numeric

C. indexed

D. Relational *

E. cyclic

 

Here the focus is on describing the stages in data processing: data collection

A. gathering raw data to process *

B. arranging and systematizing data

C. double-checking and cleaning data

D. entering data into a system

E. arranging data into table format for analysis

 

Here the focus is on describing the stages in data processing: data coding

A. gathering raw data to process,

B. arranging and systematizing *

C. double-checking and cleaning data

D. entering data into a system

E. creating categories in order to organise data into groups

 

Here the focus is on describing the stages in data processing: data validation

A. double-checking and cleaning data *

B. entering data into a system

C. arranging data into table format for analysis

D. creating categories in order to organise data into groups

E. gathering raw data to process

 

Here the focus is on describing the stages in data processing: data entry

A. gathering raw data to process

B. arranging and systematizing

C. double-checking and cleaning data

D. entering data into a system *

E. creating categories in order to organise data into groups

 

Here the focus is on describing the stages in data processing: data tabulation

A. double-checking and cleaning data

B. entering data into a system

C. arranging data into table format for analysis *

D. creating categories in order to organise data into groups

E. gathering raw data to process

 

Here the focus is on describing the stages in data processing: data sorting

A. double-checking and cleaning data

B. entering data into a system

C. arranging data into table format for analysis

D. creating categories in order to organise data into groups *

E. gathering raw data to process

 

Cyber security

 

Cyber attacks is

A. attacks on acomputer from the internet *

B. use ativirus softwars

C. insert firewalls

D. uninstall unnecessary software

E. check secutity settings

 

A network perimeter is

A. the topologes as a star, a bus, a circle

B. the network boundary between a private user network and the internet*

C. improving the security of a computer system

D. a web application protection firewall (WAF)

E. the measure types of networks

 

Which means encryption

A. Encoding *

B. Secure Socket Layer (SSL)

C. Coding

D. factor authentication

E. method of Hackers

 


Дата добавления: 2019-02-22; просмотров: 1167; Мы поможем в написании вашей работы!

Поделиться с друзьями:






Мы поможем в написании ваших работ!