Graphical user interfaces (GUI).



Modem

 Hard disk

 printer

 

 The main varieties of virtualization are:

Application virtualization

 user virtualization

Server virtualization (paravirtualization and full virtualization)

 data virtualization

 Virtualization at the level of operating systems

 device virtualization

 

Methods used in the data analysis

 Information space

Cluster Analysis

 Crowdsourceing

 Classification

 Functions in programming languages

 

Choose the examples or applications that use Blockchain technologies:

 Dropbox

 Crypto Speech

Ethlance

 Picasa

 Network sean

 Team Viewer

 

Examples of web browser

Chrome

 Panel

 Browser

Firefox

 IP

 ISP

 

 By data models, databases are divided into: Static model Relational model Local modal Hierarchical model Dynamic model Network model Numerical model The attributes or the vertical alignment of the table on the page are: Bottom. Middle. Left, center. Title. Href. Top. Right. ISO means:International Organization for Standardization Interconnection Organization for Slandardization International Organization for Students Information Organization for Standardization International Organization for Systems Methods of increasing the flexibility automated manufacturing systems: routing of rapid-changing automated production lines coding of automated system of technical training of the manufacture (STTM) use or automated system of technical training of the manufacture (STTM) switching of automated system of technical training of the manufacture(STTM) application of rapid-changing automated production lines sorting of rapid-changing automated production lines The archiver is not a program: XML ARJ IZArc ZIP 7-ZIP JPEG RAR ZLS Standard Windows applications; Paint Word Excel PowerPoint ScanDisc The decimal number 99 in hexadecimal: 783 2B90 13A 56 63 The art of creating moving images via the use of computers: Sprite graphics pixel art Computer animation Vector graphics Computer Visualization Choose a set procedures enabling the transfer of funds: Checkfree Paiment system WorldPay ECash BidPay E-logistics BillPoint E—coin What techniques and methods are used for data mining? Bit level striping Hamming-code parity Dedicated parity Decision trees Statistics What types of computer threats exist? Psychological threats Blockers Antivirus Safety Hardware Worms Crawlers Password The use of electronic trading platforms provides one of the following benefits to entrepreneurs: non expansion of the consumer market and opening of new channels of procurement (goods) the impossibility , of increasing the number of customers without increasing costs for their maintenance receiving market data in real time the possibility of increasing the number of customers with increasing costsfor their maintenance increasing the costs of harmonization of conditions of sales -purchasesbetween buyers and sellers non optimization of the sales process-procurement of products (goods) What does the ”echo" command do?This designates anything that follows command on the lineThis command interrupts the execution Of the batch file and displays themessage "Press any key to Continue. "'This command displays message to Standard Output.'This stops commands in the batch file from being displayed to StandardOutput This command evaluates the current working directory for a file orsubdirectoryThis command causes the command processor to execute the first commandline after the label referenced by the command. Types of computer network bus area network metropolitan area network local area network wide area network star area network Components contained in modern integrated application packages: Database management system My SQL Oracle Table processor Internet Word processor In What directions the collection 0f projects Within the framework of theprogram KazInno is going on?LogisticsElectronic money IT technology Mechanical engineering / renewable energy sources Business Incubators Consulting services The components of the Microsoft cloud: Amazon's Elastic Compute Cloud NET Services Windows Azure QBasic SQL Azure Three features which distinguish the database from a simple set of data are: Table fields are not structurally related Types of links between elements unstructured The data database is well structured All data are distributed Data is not linked It provides data search and processing The database is stored and processed in a computer system Cloud computing has the following features: unreliability hierarchy inflexibility complexity shared infrastructure  dynamic resource allocation (scalability) transparency MAN (city network) is capable of transmitting voice and data for: 50 miles 42 km 43 km 80 km 5 miles 44 miles

A video consists of a sequence of

Slots

Pictures

Signals

Numbers

Frames

Packets

 

What types of computer threats exist?

Crawlers

Safety

Password

Hardware

Worms

Blockers

Antivirus

Psychological threats

 

Special type of memory which is used by BIOS:

ROM

BIOS memory

RAM

HDD

Cash memory

Virtual Memory

CMOS

 

Types of User Interface:

VR interface

Technical interface

Command-line interface

Internet interface

Graphical interface

Microsoft interface

SILK-interface

 

A compact disc (CD) can store computer's data over

Human Can Interact

over 200 MB

1 TB

over 590 MB

over 500 GB

Over 680 MB

 

Types of the User interface:

Software Interface

Graphical user interfaces (GUI).

Hardware interface

Command line interfaces.

SILK interfaces.

Human-Computer Interface

 

The information selected and concluded on the information carrier is:

signals

knowledge

signs

programs

Data

 

Choose the most popular platforms for B2B:

VKontakte

Alibaba

Twitter

Facebook

Instagram

YouTube

ALL.BIZ

 

Interaction of Consumer electronics approximately how many meters use of wires or cables:

51

50

10

43

42

44

 

All of them are examples of hardware except:

Chrome

AdobePS

Memory

CPU

Speakers

 

The programs intended for fight against the malicious software:

HTML

Worms

Antiviruses

Dr Web

Kaspersky

Trojans horses

 

The advantages of using the computer networks are the following:

impossibility of using standard applications

possibility of using standard applications

sharing the peripherals reduces costs


Дата добавления: 2020-01-07; просмотров: 208; Мы поможем в написании вашей работы!

Поделиться с друзьями:






Мы поможем в написании ваших работ!