Smart governance and smart education
smart citizen
smart nature
Cloud Computing Characteristic
isolation
distributed computing
service on demand
equipment independence
consumption metering
elasticity
compatibility
encapsulation
Choose the most popular platforms for B2B:
VKontakte
ALL.BIZ
Alibaba
YouTube
What does the “echo” command do?
This command interrupts the execution of the batch file and displays the message "Press any key to continue..."
This stops commands in the batch file from being displayed to Standard Output
This command evaluates the current working directory for a file or subdirectory
This designates anything that follows command on the line
This command causes the command processor to execute the first command line after the label referenced by the command.
This command displays message to Standard Output.
Query is:
A question you ask a field
A question you ask a record
Modifying record occurrences
A question you ask a table
A question you ask a database
A request for data or information from a database table or combination of tables.
The purpose of digital signatures, which respect to security on the Internet:
To request receipts for all sent messages
To verify the identity of a message sender
To encrypt messages
To post anonymous messages to bulletin boards
To encrypt mail messages
Methods of increasing the flexibility of automated manufacturing systems:
sorting of rapid-changing automated production lines
routing of rapid-changing automated production lines
application of rapid-changing automated production lines
switching of automated system of technical training of the manufacture (STTM)
coding of automated system of technical training of the manufacture (STTM)
use of automated system of technical training of the manufacture (STTM)
Choose a state program in Kazakhstan one of the goals is creation of necessary infrastructure for development of payment systems and logistics:
E-learning Kazakhstan
Educated Kazakhstan 2020
New Kazakhstan 4.0
Social Development of Kazakhstan 2020
Innovative Kazakhstan 2020
Technical State
Kazakhstan for business 2020
Biometric data used for execution of users’ identification/authentication are:
the height
Fingerprints
|
|
the weight
hair color
blood type
eye retina and cornea
A video consists of a sequence of
Numbers
Frames
Packets
Pictures
Signals
Slots
Spreadsheet software is
OpenOffice Calc
Microsoft Excel
Microsoft Word
Emacs
Google Slides
EditPad
Notepad
Poet
Types of the User interface:
Human-Computer Interface
Software Interface
SILK interfaces
Graphical user interfaces (GUI)
Command line interfaces
Hardware interface
The heart (and brains) of the computer is the….
GUI
CMOS
ROM
CPU
RAM
BIOS
Choose how to classify information security threats
hacking
theft (Copying) of information
accessibility violation (blocking) of information
«trojan horses»
packers
Computer worms
destruction of information
Main types of computer graphics:
Raster
1G
IllustrationT
Vector
2G
The workstation is:
ordinary personal computer without connection to a network
Ordinary personal computer that is connected to а network
work place where concentrated computers
powerful desktop computers used for high-performance tasks
type of а notebook
type of a netbook
desktop used for calculations
type of a server
Requires a direct sight between transmitter and receiver. Any interference to beam interrupts the transmission: (удалить)
Social networks
Infrared radiation
Mobile networks
Laser
Broadcast in the scattered spectrum.
Broadcast in a narrow range
The most dangerous types of network attacks:
Trojan
scam
cross-site scripting or XSS
scan
Spyware
printing
Standard Windows applications:
PowerPoint
Paint
Word
ScanDisc
Excel
Models of the interaction between the subjects of e-commerce which focused on business partner and customer:
В 2 С .
E-business (e-commerce).
SMART technology.
B2B.
С2С.
FTP means:
|
|
File Transportation Protocol
Downloading sites and other documents from a private development device to a shared hosting server.
Downloading sites and other documents from a private development device to the monitor
File Transitive Protocol
Format Transfer Protocol
File Transfer Protocol
Functional Transfer Protocol
A mobile operating system developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such s smartphones and tablets:
IOS
Symbian
Windows
UNIX
Android
The element of application window, which contains tabs with logically grouped commands in the database:
Statusbar
Quick Access Toolbar
Ribbon
Buttons to manipulate the window
Title bar
Multimedia device is:
MP3 player, DVD player
Text
All answers are correct
Audio
Video
Simulation
Motion capture
Mobile phone
In computer technology, there are several types of interfaces:
Procedural interface
Computer Network interface
User interface.
Human-computer interaction.
Programming Interface.
Usability interface.
Hardware interface.
Software interface.
The operating system is used on mobile phones:
Windows 95
DOS
BlackBerry 0S
Windows 98
Android
Apple iOS
The third generation of mobile technology includes:
LP-telephony
washing
Voice call
cooking
Video telephony
robotics
According to the used search IP technology can be divided categories:Thematic catalogsDesktop computersSearch engines (full text search)Virtual machinessресialized directories (online directories) Cloud computing has the following features:hierarchyunreliabilityinflexibilitytransparencycomplexityshared infrastructuredynamic resource allocation (scalability) Confidential information can be divided into:easy and difficultsimple and complexsubject and officialinner and outeropen and hiddenvirtual and real Select the networks by the type of environment transfer:radio channelsheterogeneousoptic fiberon twisted pairhomogeneouswired Classification in Data Mining refers to:Teaching with a teacherTeaching without a teacherMachine learningNeural networksManaged learningSupervised learning
|
|
Дата добавления: 2020-01-07; просмотров: 421; Мы поможем в написании вашей работы! |
Мы поможем в написании ваших работ!