A request for data or information from a database table or combination of tables.
The purpose of digital signatures, which respect to security on the Internet:
To request receipts for all sent messages
To verify the identity of a message sender
To encrypt messages
To post anonymous messages to bulletin boards
To encrypt mail messages
Methods of increasing the flexibility of automated manufacturing systems:
sorting of rapid-changing automated production lines
routing of rapid-changing automated production lines
application of rapid-changing automated production lines
switching of automated system of technical training of the manufacture (STTM)
coding of automated system of technical training of the manufacture (STTM)
use of automated system of technical training of the manufacture (STTM)
Choose a state program in Kazakhstan one of the goals is creation of necessary infrastructure for development of payment systems and logistics:
E-learning Kazakhstan
Educated Kazakhstan 2020
New Kazakhstan 4.0
Social Development of Kazakhstan 2020
Innovative Kazakhstan 2020
Technical State
Kazakhstan for business 2020
Biometric data used for execution of users’ identification/authentication are:
the height
Fingerprints
the weight
hair color
blood type
eye retina and cornea
A video consists of a sequence of
Numbers
Frames
Packets
Pictures
Signals
Slots
Spreadsheet software is
OpenOffice Calc
Microsoft Excel
Microsoft Word
Emacs
Google Slides
EditPad
Notepad
Poet
Types of the User interface:
Human-Computer Interface
Software Interface
SILK interfaces
Graphical user interfaces (GUI)
Command line interfaces
Hardware interface
The heart (and brains) of the computer is the….
GUI
CMOS
ROM
CPU
RAM
BIOS
Choose how to classify information security threats
hacking
theft (Copying) of information
accessibility violation (blocking) of information
«trojan horses»
packers
Computer worms
destruction of information
Main types of computer graphics:
Raster
1G
IllustrationT
Vector
2G
The workstation is:
ordinary personal computer without connection to a network
Ordinary personal computer that is connected to а network
work place where concentrated computers
|
|
powerful desktop computers used for high-performance tasks
type of а notebook
type of a netbook
desktop used for calculations
type of a server
Requires a direct sight between transmitter and receiver. Any interference to beam interrupts the transmission: (удалить)
Social networks
Infrared radiation
Mobile networks
Laser
Broadcast in the scattered spectrum.
Broadcast in a narrow range
The most dangerous types of network attacks:
Trojan
scam
cross-site scripting or XSS
scan
Spyware
printing
Standard Windows applications:
PowerPoint
Paint
Word
ScanDisc
Excel
Models of the interaction between the subjects of e-commerce which focused on business partner and customer:
В 2 С .
E-business (e-commerce).
SMART technology.
B2B.
С2С.
FTP means:
File Transportation Protocol
Downloading sites and other documents from a private development device to a shared hosting server.
Downloading sites and other documents from a private development device to the monitor
File Transitive Protocol
Format Transfer Protocol
File Transfer Protocol
Functional Transfer Protocol
A mobile operating system developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such s smartphones and tablets:
IOS
Symbian
Windows
UNIX
Android
The element of application window, which contains tabs with logically grouped commands in the database:
Statusbar
Quick Access Toolbar
Ribbon
Buttons to manipulate the window
Title bar
Multimedia device is:
MP3 player, DVD player
Text
All answers are correct
Audio
Video
Simulation
Motion capture
Mobile phone
In computer technology, there are several types of interfaces:
Procedural interface
Computer Network interface
User interface.
Human-computer interaction.
Programming Interface.
Usability interface.
Hardware interface.
Software interface.
The operating system is used on mobile phones:
|
|
Windows 95
DOS
BlackBerry 0S
Windows 98
Android
Apple iOS
The third generation of mobile technology includes:
LP-telephony
washing
Voice call
cooking
Video telephony
robotics
According to the used search IP technology can be divided categories:Thematic catalogsDesktop computersSearch engines (full text search)Virtual machinessресialized directories (online directories) Cloud computing has the following features:hierarchyunreliabilityinflexibilitytransparencycomplexityshared infrastructuredynamic resource allocation (scalability) Confidential information can be divided into:easy and difficultsimple and complexsubject and officialinner and outeropen and hiddenvirtual and real Select the networks by the type of environment transfer:radio channelsheterogeneousoptic fiberon twisted pairhomogeneouswired Classification in Data Mining refers to:Teaching with a teacherTeaching without a teacherMachine learningNeural networksManaged learningSupervised learning
ISO means:Information Organization for StandardizationInternational Organization for SystemsInternational Organization for StudentsInternational Organization for StandardizationInterconnection Organization for Standardization Analytical instruments for analyze Big Data:Apache galaxyApache HiveJaspersoftSubApacheMarKerLex Choose the examples of applications that use Blockchain technologies:DropboxNetwork scanCrypto SpeechTeamViewerPicasaEthlance Teleconferences can be classified in several ways is:The use of electronic communications devices, computers and the Internet to provide public services to citizens and other persons in a country or regionThe technology used for cellular communicationComputer architectureThe method of information exchangeShared pools of configurable computer system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over the InternetSmart technologies Bitmap graphics formats include:GIF, BMPRAW, TXTGIF, DOC,TIFFJPEG, TIFF, PCX.RAW, PNG
|
|
Дата добавления: 2020-01-07; просмотров: 413; Мы поможем в написании вашей работы! |
Мы поможем в написании ваших работ!