A request for data or information from a database table or combination of tables.



 

The purpose of digital signatures, which respect to security on the Internet:

To request receipts for all sent messages

To verify the identity of a message sender

To encrypt messages

To post anonymous messages to bulletin boards

To encrypt mail messages

 

Methods of increasing the flexibility of automated manufacturing systems:

sorting of rapid-changing automated production lines

routing of rapid-changing automated production lines

application of rapid-changing automated production lines

switching of automated system of technical training of the manufacture (STTM)

coding of automated system of technical training of the manufacture (STTM)

use of automated system of technical training of the manufacture (STTM)

 

Choose a state program in Kazakhstan one of the goals is creation of necessary infrastructure for development of payment systems and logistics:

E-learning Kazakhstan

Educated Kazakhstan 2020

New Kazakhstan 4.0

Social Development of Kazakhstan 2020

Innovative Kazakhstan 2020

Technical State

Kazakhstan for business 2020

 

Biometric data used for execution of users’ identification/authentication are:

the height

Fingerprints

the weight

hair color

blood type

eye retina and cornea

 

A video consists of a sequence of

Numbers

Frames

Packets

Pictures

Signals

Slots

 

Spreadsheet software is

OpenOffice Calc

Microsoft Excel

Microsoft Word

Emacs

Google Slides

EditPad

Notepad

Poet

 

Types of the User interface:

Human-Computer Interface

Software Interface

SILK interfaces

Graphical user interfaces (GUI)

Command line interfaces

Hardware interface

 

The heart (and brains) of the computer is the….

GUI

CMOS

ROM

CPU

RAM

BIOS

 

Choose how to classify information security threats

hacking

theft (Copying) of information

accessibility violation (blocking) of information

«trojan horses»

packers

Computer worms

destruction of information

 

Main types of computer graphics:

Raster

1G

IllustrationT

Vector

2G

 

The workstation is:

ordinary personal computer without connection to a network

Ordinary personal computer that is connected to а network

work place where concentrated computers

powerful desktop computers used for high-performance tasks

type of а notebook

type of a netbook

desktop used for calculations

type of a server

 

Requires a direct sight between transmitter and receiver. Any interference to beam interrupts the transmission: (удалить)

Social networks

Infrared radiation

Mobile networks

Laser

Broadcast in the scattered spectrum.

Broadcast in a narrow range

 

The most dangerous types of network attacks:

Trojan

scam

cross-site scripting or XSS

scan

Spyware

printing

 

Standard Windows applications:

PowerPoint

Paint

Word

ScanDisc

Excel

 

Models of the interaction between the subjects of e-commerce which focused on business partner and customer:

В 2 С .

E-business (e-commerce).

SMART technology.

B2B.

С2С.

 

FTP means:

File Transportation Protocol

Downloading sites and other documents from a private development device to a shared hosting server.

Downloading sites and other documents from a private development device to the monitor

File Transitive Protocol

Format Transfer Protocol

File Transfer Protocol

Functional Transfer Protocol

 

A mobile operating system developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such s smartphones and tablets:

IOS

Symbian

Windows

UNIX

Android

 

The element of application window, which contains tabs with logically grouped commands in the database:

Statusbar

Quick Access Toolbar

Ribbon

Buttons to manipulate the window

Title bar

 

Multimedia device is:

MP3 player, DVD player

Text

All answers are correct

Audio

Video

Simulation

Motion capture

Mobile phone

 

In computer technology, there are several types of interfaces:

Procedural interface

Computer Network interface

User interface.

Human-computer interaction.

Programming Interface.

Usability interface.

Hardware interface.

Software interface.

 

The operating system is used on mobile phones:

Windows 95

DOS

BlackBerry 0S

Windows 98

Android

Apple iOS

 

The third generation of mobile technology includes:

LP-telephony

washing

Voice call

cooking

Video telephony

robotics

 

According to the used search IP technology can be divided categories:Thematic catalogsDesktop computersSearch engines (full text search)Virtual machinessресialized directories (online directories) Cloud computing has the following features:hierarchyunreliabilityinflexibilitytransparencycomplexityshared infrastructuredynamic resource allocation (scalability) Confidential information can be divided into:easy and difficultsimple and complexsubject and officialinner and outeropen and hiddenvirtual and real Select the networks by the type of environment transfer:radio channelsheterogeneousoptic fiberon twisted pairhomogeneouswired Classification in Data Mining refers to:Teaching with a teacherTeaching without a teacherMachine learningNeural networksManaged learningSupervised learning

 

ISO means:Information Organization for StandardizationInternational Organization for SystemsInternational Organization for StudentsInternational Organization for StandardizationInterconnection Organization for Standardization Analytical instruments for analyze Big Data:Apache galaxyApache HiveJaspersoftSubApacheMarKerLex Choose the examples of applications that use Blockchain technologies:DropboxNetwork scanCrypto SpeechTeamViewerPicasaEthlance Teleconferences can be classified in several ways is:The use of electronic communications devices, computers and the Internet to provide public services to citizens and other persons in a country or regionThe technology used for cellular communicationComputer architectureThe method of information exchangeShared pools of configurable computer system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over the InternetSmart technologies Bitmap graphics formats include:GIF, BMPRAW, TXTGIF, DOC,TIFFJPEG, TIFF, PCX.RAW, PNG

 

 


Дата добавления: 2020-01-07; просмотров: 413; Мы поможем в написании вашей работы!

Поделиться с друзьями:






Мы поможем в написании ваших работ!