Possibility of using standard applications



Sharing the peripherals reduces costs

Quick and timely exchange of the data

slow exchange of the data

 

A software program or script available through the Internet that searches documents and files for keywords and returns the results of any files containing those keywords:

All answers are correct

Web Browser

Search Engine

Homepage

Netiquette

Banner

 

Choose a state program in Kazakhstan one of the goals is creation of necessary infrastructure for development of payment systems and logistics

New Kazakhstan 4.0

E-learning Kazakhstan

Technical State

Social Development of Kazakhstan 2020

Innovative Kazakhstan 2020

Educated Kazakhstan 2020

Kazakhstan for business 2020

 

Algorithms for solving classification problems

On the securities portfolio

Distance-based algorithms

on finding the minimax

using tuple classification

Rule-based

using DT

machine learning

Data clustering

 

What does the “echo” command do?

This designates anything that follows command on the line

This command interrupts the execution of the batch file and displays the message "Press any key to continue...."

This command displays message to Standard Output.

This stops commands in the batch file from being displayed to Standard Output

This command evaluates the current working directory for a file or subdirectory

This command causes the command processor to execute the first command line after the label referenced by the command.

 

Security means can be classified into:

probable means

moral and ethical means

mathematical means

organization means

physical means

statical means

Cryptographic means

dynamical means

 

A computer’s capability to run multiple applications at the same time

Multi-tasking

Multi-user

Multiprocessing

Multi-point

Multimedia

Multi-server

 

Information security means can be classified into:

auxiliary means

moral and ethical means

additional means

intellectual means

Software means

physical means

Hardware means

Artificial means

 

Choose the devices, which purpose is to expand the size of the network in the current environment:

Internet Protocol

Protocol

Protocol suite

TCP/IP Model

Bridge

Modem

 

Which application’s file can be imported into Access Database:

PowerPoint File

HTML Files

Excel Files

Word Files

PaintFiles

 

Components contained in modern integrated application packages:

Oracle

Database management system

Internet

MySQL

Word processor

Table processor

 

Used for computer to connect the telephone system is:

Modem

monitor

Plotter

hard drive

scanner

keyboard

printer

Hard disk

 

Key parameters that will define a Smart City in 2020

Smart governance and smart education

smart nature

smart life

smart citizen

Smart security

 

Main functions of text editors:

posting text in the file

Text formatting

spell checking

sound formatting

graphics formatting

 

Choose the examples of applications that use Blockchain technologies:

Ethlance

Picasa

TeamViewer

Network scan

Crypto Speech

Dropbox

 

Examples of web browser

ISP

Browser

Panel

IP

Firefox

Chrome

 

The main operating systems for mobile phones:

Unix

Java

MS DOS

Linux

Yahoo

Maemo

Bada

Android

 

Methods used in the data analysis

Information space

Crowdsourcing

Cluster Analysis

Classi fi cation

Functions in programming languages

 

The illusion of motion created by the consecutive display of images of static elements is

Animation

Rendering

video protocol

Sound

compression

 

Classification in Data Mining refers to:Supervised learningMachine learningManaged learningNeural networksTeaching with a teacherTeaching without a teacher The suitable HDD features are:20 sec7000 rpm120 Gb4 Gb30 GHZ150 dpi In the hypermedia database, information bits are stored in the form of:NodesSignalsBiteSymbolsCubesNumbersDisc MAN (city network) is capable of transmitting voice and data for:42 km43 km80 km50 miles44 miles5 miles The element of application window, which contains tabs with logically groupedcommands in the database:Buttons to manipulate the windowTitle barStatusbarRibbonQuick Access Toolbar Computers connected to the network, depending on how far they are from eachotheres called:republicancomputernationalurbanregional Types of coaxial cableTwisted pairLongThinnet cableThicknet cableShortFiber optic A mobile operating system developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such s smartphones and tablets:SymbianWindowsAndroidIOSUNIX According to the used search IP technology can be divided categories:Thematic catalogsspecialized directories (online directories)Desktop computersVirtual machines Search engines (full text search) Bitmap graphics formats include:RAW, PNGGIF, DOC,TIFFRAW, TXTGIF, BMPJPEG, TIFF, PCX Mobile technology which based on digital technology:1GPublic cloudVirtual reality.4G2GCloud technology.Data storage system.3G Multimedia device is:Mobile phoneVideoSimulationAudioText 21MP3 player, DVD playerAll answers are correctMotion capture Choose a set of procedures enabling the transfer of funds:CheckfreeE-coinECash Payment system E-logisticsWorldPayBillPointBidPay Requires a direct sight between transmitter and receiver. Any interference to beam interrupts the transmission: (удалить)Broadcast in a narrow rangeBroadcast in the scattered spectrum.Laserinfrared radiationMobile networksSocial networks What techniques and methods are used for data mining?Hamming-code parityDecision treesBit—level stripingDedicated parityStatistics Models of the interaction between the subjects of e-commerce which focused on business partner and customer:SMART technologyC2CE-business (e-commerce)B2CB2B Bitmap graphics formats include:PNG GIFRAWDOCTXT A computer system designed for searching information:databasesERP systemsThe search engineOffice suites programsinformational systemsOperating systems In what directions the collection of projects within the framework of the program KazInno is going on?IT technologyConsulting servicesElectronic moneyBusiness incubators LogisticsMechanical engineering / renewable energy sources By data models, databases are divided into:Hierarchical modelDynamic modelLocal modalNetwork model Relational modelNumerical modelStatic model

- factual information (as measurements or statistics) used as a basis for reasoning, discussion, or calculation

Bit

Dana visualization

Dana management

 Information

Methods of data

Byte

Data

Analysis of data:

 

Analysis of accumulated information which is carried out quickly or periodically and allow to solve ensuring accountability of users, ensuring reconstruction or the events sequence problems:

encryption

Audit

checking

log—off

decryption

logging

 

Special type of memory which is used by BIOS:

Virtual Memory

Cash memory

CMOS

RAM

HDD

BIOS memory

ROM

 

The heart (and brains) of the computer is the

GUI

BIOS

ROM

CMOS

CPU

RAM

 

Most common forms of Internet commerce:a security method of regulation using the information system resourcesobject-oriented interfacecommercial Transactionsplacement of polytypic information in one windowan information security method of cryptographic transformationa managed selection and data output on the page in many parameters chosen by the userinternet Service Provider (ISPs)placement of a large volume of information on one page Types of the User interface:Graphical user interfaces (GUI)Hardware interfaceSILK interfaces.Software InterfaceHuman-Computer InterfaceCommand line interfaces. Main types of computer graphics1GVector2GIllustrationTRaster Multimedia device is:TextVideoAll answers are correctMotion captureMP3 player, DVD pLayerAudioMobile phoneSimulation When did the first anti-virus utilities appear?19371982199419802003200519811990 The workstation is:type of a serverdesktop used for calculationstype of a notebookordinary personal computer that is connected to a networkwork place where concentrated computersordinary personal computer without connection to a networktype of a netbookpowerful desktop computers used for high-performance tasks The information selected and concluded on the information carrier is:datasignssignalsknowledgeprograms Models of the interaction between the subjects of e-commerce which focused on business partner and customer:C2CB2CE-business (e-commerce).SMART technologyB2B Business incubators:supportimplementation in businesstechnoparkadvicebusiness assistance program

 

Confidential information can be divided intosubject and officialinner and outervirtual and realopen and hiddeneasy and difficultsimple and complex Classification in Data Mining refers to:Neural networksTeaching without a teacherManaged learningteaching with a teacherSupervised learningMachine learning What do the TV networks provide:only voice informationinteractive servicesalphanumeric servicesactive servicesonly picturebroadcasting servicesvoice Choose how to classify information security threats !!! computer wormshacking«trojan horses»theft (copying) or informationpackersdestruction of informationaccessibility violation (blocking) of information

 

Mobile technology which based on digital technology:3G2GVirtual realityCloud technologyData storage systemPublic cloud4G1G Requires a direct sight between transmitter and receiver. Any interference to beam interrupts the transmission: (удалить):Mobile networksBroadcast in a narrow rangeSocial networksLaserInfrared radiationBroadcast in the scattered spectrum. FTP means:Downloading sites and other documents from a private development device to the monitorFile Transitive ProtocolFile Transportation ProtocolDownloading sites and other documents from s private development device to a shared hosting serverFormat Transfer ProtocolFile Transfer ProtocolFunctional Transfer Protocol Choose the most popular platforms for B2B:ALL.BIZVKontakteTwitterYouTubeFasebooklnstagram

 

Bitmap graphics formats include:JPEG, TIFF, PCX.RAW, TXTGIF, BMPGIF, DOC,TIFFRAW, PNG In computer technology, there are several types or interfaces:Programming InterfaceHuman-computer interactionSoftware interfaceComputer Network interfaceUsability interfaceUser interface Hardware interfaceProcedural interface Choose a state program in Kazakhstan one of goals is creation of necessary infrastructure for development of payment systems and logisticsSocial Development of Kazakhstan 2020Innovative Kazakhstan 2020Kazakhstan for business 2020E-learning KazakhstanTechnical StateNew Kazakhstan 4.0Educated Kazakhstan 2020 Algorithms for solving classification problemson finding the minimaxusing tuple classi fi cationmachine learningusing DTRule—basedOn the securities portfoliodata clusteringDistance-based algorithms

 

A software program or script available through the Internet that searches documents and files for keywords and returns the results of any files containing those keywords:

All answers are correct

Banner

Search Engine

Netiquette

Homepage

Web Browser

 

The schematic description of a network arrangement, connecting various nodes (sender and receiver) through lines of connection:

databases

flowchart

circuit

architecture

Topology

 

Business incubators:

support

Technopark

advice

implementation in business

business assistance program

 

Would be the best Password:

Qwerty

Uk6a2_3jk%

Kafu1 9$162_F

123456789

Password

 

What do the TV networks provide:

active services

only voice information

alphanumeric services

only picture

voice

Broadcasting services

interactive services

 

There are the following control modes of regulation:

dividing

Legislation

rules of social behavior in expectation, encouragement or censure

slow production management

non personnel

accounting devices

 

A programming language's surface form:

Semantics

Program

Protocol

Syntax

Algorithm

 

Analysis of accumulated information which is carried out quickly or periodically and allow to solve ensuring accountability of users, ensuring reconstruction of the events sequence problems:

decryption

log-off

checking

Audit

logging

encryption

 

Main functions of text editors:

graphics formatting

posting text in the file

sound formatting

spell checking

Text formatting

 

All of them are examples of hardware except:

Memory

AdobePS

Chrome

Speakers

CPU

 

The art of creating moving images via the use of computers:

Computer visualization

Vector graphics

Sprite graphics

Pixel art

Computer animation

 

Types of computer network

Local area network

bus area network

Wide area network

Metropolitan area network

star area network

 

The programs intended for fight against the malicious software:

Worms

Trojans horses

Antiviruses

Dr Web

HTML

Kaspersky

 

Key parameters that will define a Smart City in 2020

smart life

Smart security


Дата добавления: 2020-01-07; просмотров: 1542; Мы поможем в написании вашей работы!

Поделиться с друзьями:






Мы поможем в написании ваших работ!