Possibility of using standard applications
Sharing the peripherals reduces costs
Quick and timely exchange of the data
slow exchange of the data
A software program or script available through the Internet that searches documents and files for keywords and returns the results of any files containing those keywords:
All answers are correct
Web Browser
Search Engine
Homepage
Netiquette
Banner
Choose a state program in Kazakhstan one of the goals is creation of necessary infrastructure for development of payment systems and logistics
New Kazakhstan 4.0
E-learning Kazakhstan
Technical State
Social Development of Kazakhstan 2020
Innovative Kazakhstan 2020
Educated Kazakhstan 2020
Kazakhstan for business 2020
Algorithms for solving classification problems
On the securities portfolio
Distance-based algorithms
on finding the minimax
using tuple classification
Rule-based
using DT
machine learning
Data clustering
What does the “echo” command do?
This designates anything that follows command on the line
This command interrupts the execution of the batch file and displays the message "Press any key to continue...."
This command displays message to Standard Output.
This stops commands in the batch file from being displayed to Standard Output
This command evaluates the current working directory for a file or subdirectory
This command causes the command processor to execute the first command line after the label referenced by the command.
Security means can be classified into:
probable means
moral and ethical means
mathematical means
organization means
physical means
statical means
Cryptographic means
dynamical means
A computer’s capability to run multiple applications at the same time
Multi-tasking
Multi-user
Multiprocessing
Multi-point
Multimedia
Multi-server
Information security means can be classified into:
auxiliary means
moral and ethical means
additional means
intellectual means
Software means
physical means
Hardware means
Artificial means
Choose the devices, which purpose is to expand the size of the network in the current environment:
Internet Protocol
Protocol
Protocol suite
TCP/IP Model
Bridge
Modem
Which application’s file can be imported into Access Database:
PowerPoint File
|
|
HTML Files
Excel Files
Word Files
PaintFiles
Components contained in modern integrated application packages:
Oracle
Database management system
Internet
MySQL
Word processor
Table processor
Used for computer to connect the telephone system is:
Modem
monitor
Plotter
hard drive
scanner
keyboard
printer
Hard disk
Key parameters that will define a Smart City in 2020
Smart governance and smart education
smart nature
smart life
smart citizen
Smart security
Main functions of text editors:
posting text in the file
Text formatting
spell checking
sound formatting
graphics formatting
Choose the examples of applications that use Blockchain technologies:
Ethlance
Picasa
TeamViewer
Network scan
Crypto Speech
Dropbox
Examples of web browser
ISP
Browser
Panel
IP
Firefox
Chrome
The main operating systems for mobile phones:
Unix
Java
MS DOS
Linux
Yahoo
Maemo
Bada
Android
Methods used in the data analysis
Information space
Crowdsourcing
Cluster Analysis
Classi fi cation
Functions in programming languages
The illusion of motion created by the consecutive display of images of static elements is
Animation
Rendering
video protocol
Sound
compression
Classification in Data Mining refers to:Supervised learningMachine learningManaged learningNeural networksTeaching with a teacherTeaching without a teacher The suitable HDD features are:20 sec7000 rpm120 Gb4 Gb30 GHZ150 dpi In the hypermedia database, information bits are stored in the form of:NodesSignalsBiteSymbolsCubesNumbersDisc MAN (city network) is capable of transmitting voice and data for:42 km43 km80 km50 miles44 miles5 miles The element of application window, which contains tabs with logically groupedcommands in the database:Buttons to manipulate the windowTitle barStatusbarRibbonQuick Access Toolbar Computers connected to the network, depending on how far they are from eachotheres called:republicancomputernationalurbanregional Types of coaxial cableTwisted pairLongThinnet cableThicknet cableShortFiber optic A mobile operating system developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such s smartphones and tablets:SymbianWindowsAndroidIOSUNIX According to the used search IP technology can be divided categories:Thematic catalogsspecialized directories (online directories)Desktop computersVirtual machines Search engines (full text search) Bitmap graphics formats include:RAW, PNGGIF, DOC,TIFFRAW, TXTGIF, BMPJPEG, TIFF, PCX Mobile technology which based on digital technology:1GPublic cloudVirtual reality.4G2GCloud technology.Data storage system.3G Multimedia device is:Mobile phoneVideoSimulationAudioText 21MP3 player, DVD playerAll answers are correctMotion capture Choose a set of procedures enabling the transfer of funds:CheckfreeE-coinECash Payment system E-logisticsWorldPayBillPointBidPay Requires a direct sight between transmitter and receiver. Any interference to beam interrupts the transmission: (удалить)Broadcast in a narrow rangeBroadcast in the scattered spectrum.Laserinfrared radiationMobile networksSocial networks What techniques and methods are used for data mining?Hamming-code parityDecision treesBit—level stripingDedicated parityStatistics Models of the interaction between the subjects of e-commerce which focused on business partner and customer:SMART technologyC2CE-business (e-commerce)B2CB2B Bitmap graphics formats include:PNG GIFRAWDOCTXT A computer system designed for searching information:databasesERP systemsThe search engineOffice suites programsinformational systemsOperating systems In what directions the collection of projects within the framework of the program KazInno is going on?IT technologyConsulting servicesElectronic moneyBusiness incubators LogisticsMechanical engineering / renewable energy sources By data models, databases are divided into:Hierarchical modelDynamic modelLocal modalNetwork model Relational modelNumerical modelStatic model
- factual information (as measurements or statistics) used as a basis for reasoning, discussion, or calculation
|
|
Bit
|
|
Dana visualization
Dana management
Information
Methods of data
Byte
Data
Analysis of data:
Analysis of accumulated information which is carried out quickly or periodically and allow to solve ensuring accountability of users, ensuring reconstruction or the events sequence problems:
encryption
Audit
checking
log—off
decryption
logging
Special type of memory which is used by BIOS:
Virtual Memory
Cash memory
CMOS
RAM
HDD
BIOS memory
ROM
The heart (and brains) of the computer is the
GUI
BIOS
ROM
CMOS
CPU
RAM
Most common forms of Internet commerce:a security method of regulation using the information system resourcesobject-oriented interfacecommercial Transactionsplacement of polytypic information in one windowan information security method of cryptographic transformationa managed selection and data output on the page in many parameters chosen by the userinternet Service Provider (ISPs)placement of a large volume of information on one page Types of the User interface:Graphical user interfaces (GUI)Hardware interfaceSILK interfaces.Software InterfaceHuman-Computer InterfaceCommand line interfaces. Main types of computer graphics1GVector2GIllustrationTRaster Multimedia device is:TextVideoAll answers are correctMotion captureMP3 player, DVD pLayerAudioMobile phoneSimulation When did the first anti-virus utilities appear?19371982199419802003200519811990 The workstation is:type of a serverdesktop used for calculationstype of a notebookordinary personal computer that is connected to a networkwork place where concentrated computersordinary personal computer without connection to a networktype of a netbookpowerful desktop computers used for high-performance tasks The information selected and concluded on the information carrier is:datasignssignalsknowledgeprograms Models of the interaction between the subjects of e-commerce which focused on business partner and customer:C2CB2CE-business (e-commerce).SMART technologyB2B Business incubators:supportimplementation in businesstechnoparkadvicebusiness assistance program
|
|
Mobile technology which based on digital technology:3G2GVirtual realityCloud technologyData storage systemPublic cloud4G1G Requires a direct sight between transmitter and receiver. Any interference to beam interrupts the transmission: (удалить):Mobile networksBroadcast in a narrow rangeSocial networksLaserInfrared radiationBroadcast in the scattered spectrum. FTP means:Downloading sites and other documents from a private development device to the monitorFile Transitive ProtocolFile Transportation ProtocolDownloading sites and other documents from s private development device to a shared hosting serverFormat Transfer ProtocolFile Transfer ProtocolFunctional Transfer Protocol Choose the most popular platforms for B2B:ALL.BIZVKontakteTwitterYouTubeFasebooklnstagram
Bitmap graphics formats include:JPEG, TIFF, PCX.RAW, TXTGIF, BMPGIF, DOC,TIFFRAW, PNG In computer technology, there are several types or interfaces:Programming InterfaceHuman-computer interactionSoftware interfaceComputer Network interfaceUsability interfaceUser interface Hardware interfaceProcedural interface Choose a state program in Kazakhstan one of goals is creation of necessary infrastructure for development of payment systems and logisticsSocial Development of Kazakhstan 2020Innovative Kazakhstan 2020Kazakhstan for business 2020E-learning KazakhstanTechnical StateNew Kazakhstan 4.0Educated Kazakhstan 2020 Algorithms for solving classification problemson finding the minimaxusing tuple classi fi cationmachine learningusing DTRule—basedOn the securities portfoliodata clusteringDistance-based algorithms
A software program or script available through the Internet that searches documents and files for keywords and returns the results of any files containing those keywords:
All answers are correct
Banner
Search Engine
Netiquette
Homepage
Web Browser
The schematic description of a network arrangement, connecting various nodes (sender and receiver) through lines of connection:
databases
flowchart
circuit
architecture
Topology
Business incubators:
support
Technopark
advice
implementation in business
business assistance program
Would be the best Password:
Qwerty
Uk6a2_3jk%
Kafu1 9$162_F
123456789
Password
What do the TV networks provide:
active services
only voice information
alphanumeric services
only picture
voice
Broadcasting services
interactive services
There are the following control modes of regulation:
dividing
Legislation
rules of social behavior in expectation, encouragement or censure
slow production management
non personnel
accounting devices
A programming language's surface form:
Semantics
Program
Protocol
Syntax
Algorithm
Analysis of accumulated information which is carried out quickly or periodically and allow to solve ensuring accountability of users, ensuring reconstruction of the events sequence problems:
decryption
log-off
checking
Audit
logging
encryption
Main functions of text editors:
graphics formatting
posting text in the file
sound formatting
spell checking
Text formatting
All of them are examples of hardware except:
Memory
AdobePS
Chrome
Speakers
CPU
The art of creating moving images via the use of computers:
Computer visualization
Vector graphics
Sprite graphics
Pixel art
Computer animation
Types of computer network
Local area network
bus area network
Wide area network
Metropolitan area network
star area network
The programs intended for fight against the malicious software:
Worms
Trojans horses
Antiviruses
Dr Web
HTML
Kaspersky
Key parameters that will define a Smart City in 2020
smart life
Smart security
Дата добавления: 2020-01-07; просмотров: 1542; Мы поможем в написании вашей работы! |
Мы поможем в написании ваших работ!