17. Which types of fonts are best suitable for titles and headlines sans serif fonts
18. Which type of font is best suitable for large amount of text? Serif fonts
19. Which of the following is not one of PowerPoint’s views? Presentation view
20. Which of the following will not advance the slides in a slide show view? The esc key
21. In Ms-Dos what command you will use to display system date? Date command
22. While working with Ms-Dos which command transfers a specific file from one disk to another? Copy
23. If you don’t know the current time, which command will you use to display Time
24. Which command divides the surface of the blank disk into sectors and assign a unique address to each one Format
25. If you need to duplicate the entire disk, which command will you use? Diskcopy
26. Which command lists the contents of current directory of a disk Dir
27. In which year the first operating system was developed 1950
28. MS-DOS developed in 1984
29. Multiprogramming system execute more jobs in the same time period
30. ________________interface consists of things like program counter, registers, interrupts and terminals Hardware
31. The operating system creates ____________from the physical computer Virtual computers
32. Which of the following operating does not implement multitasking truly? MS DOS
33. What is the name of the latest server operating system developed by Microsoft? Windows 2003
34. MS Excel provides the default value for step in Fill Series dialog box 1
35. Ctrl + D shortcut key in Excel will shortcut for fill down
36. Excel. What is the short cut key to replace a data with another in sheet? Ctrl+H
37. Which of the following describes how to select all the cells in a single column? Left click on the gray column title button
|
|
38. Which of the following is not a basic step in creating a worksheet? Copy the worksheet
39. To insert three columns between columns D and E you would Select column E
40. To drag a selected range of data to another worksheet in the same workbook, use the Ctrl key
1. How long is an IPv6 address? 128 bits
2. Which protocol does DHCP use at the Transport layer? UDP
3. Where is a hub specified in the OSI model? Physical layer
4. Which protocol is used to send a destination network unknown message back to originating hosts? ICMP
5. What PPP protocol provides dynamic addressing, authentication, and multilink? LCP
6. What is a stub network? A network that has only one entry and exit point
7. What is the main reason the OSI model was created? So different networks could communicate
8. What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? Host-to-host
9. Which of the following is private IP address? 192.168.24.43
10. If you use either Telnet or FTP, which is the highest layer you are using to transmit data? application
11. Which layer 4 protocol is used for a Telnet connection? TCP
12. Which topology is shown: a star network
13. Which layer 1 devices can be used to enlarge the area covered by a single LAN segment? Hub and repeater
14. Which network topology offers the highest reliability and availability? mesh
15. Segmentation of a data stream happens at which layer of the OSI model? transport
16. How to implement a network medium that is not susceptible to EMI. Which type of cabling should you use? Fiber –optic cable
17. When data is encapsulated, which is the correct order? Data, segment, packet, frame, bit
18. Which topology is shown:
19. When John Murphy created ARCNET? 1976
20. Which topology is shown:
A tree network
21. Which of the following refers to a series of characters used to verify a user’s identity? password
22. Which of the following is the least important information to record when logging a
security violation? User’s name
23. The three primary methods for authenticating users to a system or network are…? Passwords, tokens, and biometrics
24. What role does biometrics have in logical access control? authentication
25. Which of the following is NOT a good property of a firewall? Traffic must only be allowed to pass from inside to outside the firewall
26. What can a firewall protect against? Unauthenticated interactive logins from the “outside” world
27. What is Internet security? Is a branch of computer security related to the internet
28. What is Cybercrime? Also called computer crime, is any illegal activity that involves a computer or network –connected device, such as a mobile phone
29. What is a vulnerability? In computer security, a vulnerability is a weakness which allows an attacker to reduce a system’s information assurance
|
|
30. What is Trojan horse? Is any malicious computer program
31. What is a computer virus? Is a type malicious software program
32. What is a computer worm? Is a standalone malware computer program
33. Indicate in information security standard: ISO / IEC 17799-2005
34. The acts of the Republic of Kazakhstan governing legal relations in the sphere of information security: the law of the republic of Kazakhstan “on informatization”
35. What is Antivirus? Is computer software used to prevent, detect and remove malicious software
36. What is Password manager? Is a software application that helps as user store and organize passwords
37. When was released the the Orange Book? 1985
38. What is a character encoding? Is used to represent a repertoire of characters by some kind of an encoding system
39. What is Identification? Is an assertion of who someone is or what something is
40. What is Malware? Is any software used to disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising
1. ____________ refers to any type of application or presentation that involves more than one type of media, such as text, graphics, video, animation, and sound. Multimedia
2. One of the disadvantages of multimedia is: cost
3. The text color in a presentation should contrast with the ________ color. background
4. Images included in many software titles are called _________. Clipart
5. A smaller version of an image is called a: thumbnail
6. The process of planning your multimedia presentation is known as a: storyboard
7. In Real Time Interactive Audio Video, Jitter is introduced in real-time data by delay between packets
8. The slide ________ controls text characteristics, background color and special effects, such as shadowing and bullet style. master
9. Designed to create a particular look, a __________ contains color schemes, slide and title masters with custom formatting and fonts styles. template
10. Adding _________ to objects on your slides not only controls the flow of information, but adds interest to your presentation. transition
11. The ________ master controls the format and placement of the titles and text you type on slides, as well as, background items and graphics you want to appear on every slide. Slide
12. The first slide in a presentation is usually reserved for the _________. Title
13. ______________ is the special effect used to introduce each slide in a slide presentation. Transition
14. Notes that include the slide as well as key comments and points you may want to emphasis while you present your slide show are know as: speaker notes
15. A ________ displays a list of commands and usually appears in the toolbar at the top of the screen. Menu
16. Slide and title masters contain ___________ that reserve spaces for text and footers such as date, time and slide number. Placeholders
17. Changing the appearance of your slide _________ can alter the slide’s color, shade, pattern, or texture. Design
18. A ____________ is a series of slides displayed in a particular sequence. Slide show
19. Quick access to frequently used commands can be found in the ________ toolbar. Drawing
20. A ____________ can be added to your presentation and then used to go to a variety of locations for example, a web address, an e-mail address, a custom show or document, just to name a few. Hyperlink
21. What is the quicktime embedded HTML command? HREF
22. ______________is a shorthand representation of music stored in numeric form. MIDI
23. Who has coined the word ‘hypertext’? Ted Nelson
24. A video consists of a sequence of frames
25. If frames are displayed on screen fast enough, we get an impression of motions
26. Moving Picture Experts Group (MPEG) is used to compress video
27. Most common compression technique that is used to create CD-quality audio is based on perceptual encoding technique is called perceptual encoding
28. Joint Photographic Experts Group (JPEG) is used to compress images
29. For Music, we need to compress digitize signals at: 1.42 I-MHz
30. Audio compression can be used for speech or music
31. _________ computing refers to applications and services that run on a distributed network using virtualized resources. cloud
32. ________ as a utility is a dream that dates from the beginning of the computing industry itself. computing
33. Which of the following is essential concept related to Cloud? virtualization
34. Point out the wrong statement: all applications benefit from deployment in the cloud
35. Which of the following cloud concept is related to pooling and sharing of resources? virtualization
36. ________ has many of the characteristics of what is now being called cloud computing. internet
37. Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a ________ resource. virtual
38. Which of the following is best known service model? IAAS
39. When you add a software stack, such as an operating system and applications to the service, the model shifts to _____ model. SAAS
40. Which of the following is most refined and restrictive service model? PAAS
1. What is HCI? Human-Computer Interaction
2. Who was the first to use the term human-computer interaction? Stuart K.Card, Allen Newell, Thomas P.Moran
3. What is used for speech recognition and synthesising systems?
4. Select iterative design steps. Design the user interface; test; analyze results; repeat
5. The emergence of techniques of human-computer interaction have been in this year.
6. An operating system (OS) is ________ the software component of a computer system that is responsible for the management and coordination of activities and the sharing of the resources of the computer
7. What is APIs? Application programming interfaces
8. In the 1940s, electronic systems of this time were ___________________. programmed on rows of mechanical switches or by jumper wires on plug boards
9. When did not exist modern operating systems? Early 1960s
10. What connects the kernel? It connects the application software to the hardware of a computer
11. How many processors used supercomputers of the 21st century? Over 100,000
12. Supercomputers were introduced in the____________. 1960s
13. MPI is _____________________________ Message Passing Interface
14. What is qubits? Is a unit of quantum information-the quantum analogue of the classical bit
15. Who invented a supercomputer? Seymour Cray
|
|
16. Mobile user interface considers__________. Constraints&contexts, screen, input and mobility
17. What is BYOD? Bring Your Own device
18. Where to use Google Android Emulator? Windows PC
19. When the released version Android 3.0 «Honeycomb»? February 22, 2011
20. Silverlight for Windows Phone 7.5 is based ________. On Silverlight 4
21. WHO designed two mechanical machines that were capable of performing calculations in the early 1800’s Charles Babbage
22. What is NOT a component of a computer system Windows OS
23. Computer memory divided into …. main and secondary memory
24. Each memory cell has a ………, which uniquely identifies its location numeric address
25. What is measured by the clock speed? MHz(megahertz)
26. Data visualization are divided to…?
27. Tasks of Data mining are divided to…
28. Who coined the term of data mining? Gregory Piatetsky-Shapiro
29. What is Data analysis is a process of inspecting, cleansing, transforming, and modeling data with the goal of discovering useful information, suggesting conclusions, and supporting decision-making.
30. What is data integration? Is a precursor to data analysis, and data dissemination.
31. What is CDA? CD Audio Track
32. What is EDA? Electronic Design Automation/Exploratory data analysis
33. The DBMS acts as an interface between what two components of an enterprise-class database system? Database application and the database
34. Which of the following products was an early implementation of the relational model developed by E.F. Codd of IBM? DB2
35. The following are components of a database except ________. reports
36. An application where only one user accesses the database at a given time is an example of a(n) ________. single-user database application
37. Which of the following products was the first to implement true relational algebra in a PC DBMS? R:base
38. SQL stands for ________. Structured Query Language
39. The following are functions of a DBMS except _____ _ __. creating and processing forms
40. Which of the following products implemented the CODASYL DBTG model? IDMS
1. Mobile application development is _______. a term used to denote the act or process which application software is developed for mobile devices
2. Mobile user interface considers _____________. Constraints&contexts, screen, input and mobility
3. The mobile back-end facilitates___________. data routing, security, authentication, authorization, working off-line, and service orchestration.
4. What is BYOD? Bring Your Own Device
5. What used to test mobile applications? Emulators
6. Where to use Google Android Emulator? Windows PC
7. The official Android SDK Emulator is ______. A mobile device emulator which mimics all of the hardware and software features of a typical mobile device.
8. TestiPhone is ___________________. A web browser-based simulator for quickly testing iPhone web applications.
9. Windows UI Automation is pre-installed on ______________. Windows 7, Windows Server 2008 R2 and later versions of Windows
10. Android is _____________________. A mobile operating system developed by Google, based on the Linux kernel
11. When the released version Android 3.0 «Honeycomb»? February 22, 2011
12. Android's kernel is _________________. based on one of the Linux kernel’s long-term support (LTS) branches
13. What programming language used on the Android platform? Java, C, C++, Delphi
14. Windows Phone (WP) is _______________. A family of mobile operating systems developed by Microsoft for smartphones as the replacement successor to Windows Mobile and Zune
|
|
15. Windows Phone was first launched ______. In October 2010 with Windows Phone 7
16. Windows Phone 8.1 was the last public release of the operating system, released to manufacturing on _________________. April 14, 2014
17. Microsoft Silverlight is _____________. An application framework for writing and running rich Internet applications, similar to Adobe Flash
18. Silverlight for Windows Phone 7.5 is based ________________. on Silverlight 4
19. Microsoft XNA (a recursive acronym for XNA's Not Acronymed) is _____________. A freeware set of tools with a managed runtime environment provided by Microsoft that facilitates video game development and management
20. A first Community Technology Preview of XNA Build was released ______________. on March 14, 2006
21. An operating system (OS) is ________ the software component of a computer system that is responsible for the management and coordination of activities and the sharing of the resources of the computer
22. What is APIs? Application Programming Interfaces
23. The dominant desktop operating system is __________. Microsoft Windows
24. In the 1940s, electronic systems of this time were ___________________. Programmed on rows of mechanical switches or by jumper wires on plug boards
25. In the early 1950s, a computer could execute ___________. One program at a time
26. What is GUI? It is Graphical User Interface
27. When did not exist modern operating systems? The early 1960s
28. In the 1940s, the earliest electronic digital systems ________________. Had no operating systems
29. What had used the computer to work with program in early 1950? Data on punched paper cards or punched tape
30. What is produced UNIVAC in the 1970s? Real-Time Basic(RTB)
31. What is a process management? It is an integral part of any modern-day operating system(OS)
32. Memory management is ______________. The act of managing computer memory
33. What is a device driver? It is a computer program that operates or controls a particular type of device that is attached to a computer
34. What is a computer network? Is a telecommunications network which allows nodes to share resources
35. What is IT security? Is the protection of information systems from the theft or damage to the hardware, software or the information on them.
36. What connects the kernel? It connects the application software to the hardware of a computer
37. What provides the operating system? The operating system provides an interface between an application program and the computer hardware
38. Interrupts are central to operating systems, as they provide an efficient way for the __________________. Operating system to interact with and react the environment
39. What provides an internal security? It allows each user of the system to have private files that the other users cannot tamper with or read
40. Who invented the Manchester Mark 1? Alan Turing
1. A supercomputer is a computer with a high-level computational capacity compared to_______________________ a general-purpose computer
2. Supercomputers were introduced in the____________ 1960s
3. Who made supercomputer? Seymour Gray
4. Who invented a supercomputer? Seymour Gray
5. As of 2015, there are supercomputers which can perform up to _____________ quadrillions of FLOPS
6. How many processors used supercomputers of the 1970s? only a few processors
7. How many processors used supercomputers of the 1990s? thousands of processors
8. How many processors used supercomputers of the 21st century? tens of thousands processors
9. Quantum computers it is _______________ a computer design which uses the principles of quantum physics to increase the computational power beyond what is attainable by a traditional computer
10. A theoretical model is the quantum _________________
11. What is qubits? Is a unit of quantum information-the quantum analogue of the classical bit
12. How many nodes using cluster computers?
13. MPI is _____________________________ Message Passing Interface
14. PVM is _____________________________ Parallel Virtual Machine
15. When and where PVM was developed? ORNL in 1989
16. A multi-core processor is ________________________________ a single computing component with two or more independent actual processing units, which are units that read and execute program instructions
17. Find the correct statement of multi-core processors and dual-core:
18. Multi-core processors are widely used across______________________________ many application domains, including general-purpose, embedded, network, digital signal processing(DSP) and graphics(GPU)
19. What is a computer cluster? A computer cluster consists of a set of loosely or tightly connected computers that work together so that, in many respects, they can be viewed as a single system.
20. When Seymour Cray devised Cray-1? 1976
21. What is HCI? Human-Computer Interaction
22. What researches human-computer interaction? Design and use of computer technology, focused on the interfaces between people(users) and computers
23. Who was the first to use the term human-computer interaction? Stuart A. Card, Allen Newell, and Thomas P. Moran
24. What is used for speech recognition and synthesising systems? Voice User Interfaces(VUI)
25. How is HCI also sometimes termed? Human-machine interaction( HMI) or computer-human interaction(CHI)
26. What steps are iterative design steps? Design the user interface; test; analyze results; repeat
27. When there have been the emergence of techniques of human-computer interaction?
28. For what use the activity theory? Used in HCI to define and study the context in which human interactions with computers take place
29. Please specify the seven principles of user interface design: The structure, simplicity, visibility, feedback, tolerance, affordance, consistency
30. What is the method for building technology that account for the values of the people? Value Sensitive Design (VSD)
31. The human–computer interface can be described as the point of communication ________ between the human user and the computer
32. What is UCD? User-Centered Design
33. What are the essential elements of UCD of a web site? Considerations of visibility, accessibility,legibility, language
34. According to Larry Constantine and Lucy Lockwood in their usage-centered design, these principles are: structure, simplicity, visibility, feedback, tolerance, reuse
35. What is the book of Stuart A. Card, Allen Newell, and Thomas P. Moran, where the term human-computer interaction is mentioned? “The Psychology of Human-Computer Interaction”
36. What is ACM? Association for Computing Machinery
37. Indicate institutions, which research human-computer interaction:
38. What is PIM? Protocol Independent Multicast
39. What is CSCW? Computer-Supported cooperative work
40. What is HIM? Health Information Management
1. What is IoT? Internet of Things
2. When was invented the concept of the Internet of Things? 1985
3. Big data is a term for data sets that are so large or complex_____________- that traditional data processing applications are inadequate to deal with them
4. The term Big data has been in use since the________ 1990s
5. Big data can be described by the following characteristics: Volume, Variety, Velocity, Variability, Veracity
6. What is Technology BlockChain? A blockchain is a distributed database that maintains a continuously-growing of records called blocks
7. What is Artificial intelligence? Is intelligence exhibited by machines
8. This Web site feature involves tailoring pages to individual users' characteristics or preferences. Personalization
9. This popular online payment service is owned by eBay. PayPal
10. This is an industry term used to describe the progression of steps a customer goes through when considering, purchasing, using, and maintaining loyalty to a product or service. Customer life style
11. This Internet business model generates revenue by offering pay-per-view Web pages, Web links, or Web services for small amounts of money. Micropayment
12. This approach to understanding customer behavior involves the integration of information gathered by traditional data mining techniques with information gathered over the World Wide Web. Web mining
13. This industry initiative, headed by Microsoft, was created to promote Extensible Markup Language (XML) as the common data exchange language for e-commerce. BizTalk
14. This is a method for business-to-business purchase and sale of supplies and services over the Internet. E-procurement
15. This type of Internet business charges individuals or enterprises an access fee for applications and related services that would otherwise have to be located in their own personal or enterprise computers. Application service provider
16. This XML-based protocol is intended to serve as a standard for managing complex business-to-business (B2B) transactions among multiple organizations. Business Transaction Protocol
17. This is an industry term for software that analyzes data about customers to develop a better understanding of the customer and how the customer is using a company's products and services. Enterprise relationship management
18. What is Smart TV? Is a television set with integrated Internet and interactive “Web 2.0” features
19. What is Electronic business? Is the application of information and communication technologies ICT in support of all activities of business
20. The term "e-business" was coined by IBM's marketing and Internet team in____ 1996
21. What is E-commerce? Is trading in products or services using computer networks, such as the Internet.
22. What is E-training? Is the convergence of the internet and learning, or Internet-enabled learning
23. Electronic learning or E-learning_________ is a general term used to refer to computer-enhanced learning
24. The first e-learning system was _______ PLATO
25. What is E-government? Is the use of electronic communications devices, computers and the Internet to provide public services to citizens and other persons in a country or region
26. What is Electronic mail? Is a method of exchanging digital messages between computer users
27. Email first entered substantial use in the ____ 1960s
28. A computer system may be categorised as a: General purpose or special purpose
29. Expand the acronym ALU: Arithmetic Logic Unit
30. Main memory is also known as: Immediate access storage
31. Which of the following best suits the statement below? It's the main memory of the computer system and is volatile.
32. All of the following are processing modes except:
33. What are types of user interface?
34. What does SATA stands for?
35. All are secondary storage media except:
36. What happens when you press CTRL + V key?
37. What is the short cut key for Print a Document?
38. The binary system uses the symbols
39. Which of the following is not a function of a network?
A.
40. An _____________ is the generic term for a collection of private computer networks within an organization.
1. WHO designed two mechanical machines that were capable of performing calculations in the early 1800’s (the Difference Engine and the Analytical Engine)? Charles Babbage
2. Which of the following is NOT related to Neumann principles? The basic units are – ALU, memory, input and output
3. Define computer type by the definition- a powerful, single-user computer. It is like a personal computer, but it has a more powerful microprocessor and a higher-quality monitor. Workstation
4. What is NOT a component of a computer system: Windows OS
5. Find FALSE statement about Central Processing Unit: CPU can storage different types of variables
6. What part of CPU coordinates all processing steps? Control Unit
7. Computer memory divided into …. Bits/Bytes/Words
8. Kilobyte (KB) = 1024 Bytes
9. Terabyte (TB) = 1024 Gigabytes
10. Find FALSE statement about Main Memory: Each word within memory can hold addresses of memory locations
11. Each memory cell has a ………, which uniquely identifies its location: Numeric address
12. Main Memory Characteristic: Very closely connected to the CPU
13. How many ways the processor interacts with the main memory? 2
14. Secondary Storage Characteristic: Used for long-term storage of programs and data
15. Programs instructions are stored in …….. Secondary Storage
16. What tell the computer’s CPU what to do? Instructions
17. What is measured by the clock speed? Hertz
18. One Hertz is … one clock tick per second
19. Fast memory is …. Cache memory
20. What refers to the hardware? CPU
21. The part of the computer which displays information to the user in soft copy format is the: Monitor
22. The sharpness of an image on a monitor screen is determined by the number of: Pixels
23. Which of the following can be used as an input device and at the same time as an output device? Modern
24. The device that uses the magnetic method to store data is: Hard disk
25. Which of the following devices has the largest storage capacity? Hard disk
26. By default, the drive letter assigned to the hard disk drive is: C:
27. Which of the following devices must be turned on first when booting a computer? System Unit
28. The program that is loaded into the main memory when a computer is booted is: Operating System
29. To copy a file means to: make a duplicate of the file
30. A group of files are stored in a: Folder
31. The area of the taskbar that displays small icons of some programs such as the system clock is: System tray
32. Which of the following is a problem to computer users as a result of radiation from the monitor? Eye irritation
33. Dragging a folder from one drive to a window on another drive is equivalent to a: Copy operation
34. Which of the following safety precaution(s) is/are advisable to practice?
I. Do not answer or receive calls when charging mobile phones
II. Do not overload sockets
III. Plugging ICT tools in damaged sockets can be allowed sometimes.
I and II only
35. A computer program that can copy itself and infect the computer without the permission or knowledge of the user is: Virus
36. The software that assists students in learning and can also be used to take online examinations is: Education software
37. ICT tools can be used in all the following areas except: Starting cabinetry
38. The act of clicking on an object and dragging it to a different location is referred to as: Drag-and-drop
39. When pursuing typing lessons, computer users are expected to use: 10 fingers
40. Which of the following keys is not a function key on the computer keyboard? F13