Computer Virus and MS Access Quiz
54 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What characteristic is associated with stealth viruses?

  • Display annoying pop-ups
  • Infest operating systems
  • Destroy all hardware
  • Hide their presence (correct)
  • Which method is not commonly used for virus detection?

  • Checking of executing files
  • Heuristic analysis
  • Copying files (correct)
  • Scanning
  • A computer can be infected by a virus primarily when it is:

  • Running a system update
  • Performing routine maintenance
  • Loading drivers
  • Executing the infected program (correct)
  • What is the primary function of detector programs?

    <p>Treat the infected files</p> Signup and view all the answers

    Which best describes a computer virus?

    <p>A specially written program that harms systems</p> Signup and view all the answers

    What are the two main groups of viruses?

    <p>Resident and non-resident</p> Signup and view all the answers

    Which type of virus uses errors in software to function?

    <p>Viruses interceptors</p> Signup and view all the answers

    Which of the following is an example of an anti-virus program?

    <p>Kaspersky KAV</p> Signup and view all the answers

    Which operation is primarily used for arranging data?

    <p>Sorting of data</p> Signup and view all the answers

    What is the primary purpose of the 'Home' commands in MS Access?

    <p>To work with tables</p> Signup and view all the answers

    Connected fields in MS Access have what characteristic?

    <p>Different names but the same type of data</p> Signup and view all the answers

    What functionality does the 'Create' tab in MS Access provide?

    <p>Create new table, form, report, query, macro, and module</p> Signup and view all the answers

    Which view in MS Access is used to change the table structure?

    <p>Design view</p> Signup and view all the answers

    Which level does Platform as a Service (PaaS) primarily represent?

    <p>Intermediate level of a platform</p> Signup and view all the answers

    Which system is responsible for global coordinates determination?

    <p>GPS</p> Signup and view all the answers

    What allows users to make calls and send messages?

    <p>GSM</p> Signup and view all the answers

    What is the function of the 'AutoNumber' in the 'ID' field of a database?

    <p>Auto input of sequential numbers</p> Signup and view all the answers

    Which of the following is a Google service?

    <p>Google+, My account</p> Signup and view all the answers

    Which components are part of the working area in MS Access?

    <p>Database window and its objects windows</p> Signup and view all the answers

    What is essential for improving cybersecurity concerning user access?

    <p>Each user of the system shall have the personal password</p> Signup and view all the answers

    Which commands are included in the 'Database tools' tab?

    <p>Macro, show/hide, and analyze</p> Signup and view all the answers

    Which of the following are main types of computer viruses?

    <p>Program, load, macro viruses</p> Signup and view all the answers

    How are records sorted in MS Access if sorted in increasing order by numeric values?

    <p>$10, $25, $35, $50</p> Signup and view all the answers

    Which formats are associated with executed files in cybersecurity?

    <p>*.exe, .com, .bat</p> Signup and view all the answers

    How are computer viruses classified based on their habitat?

    <p>Network, file, loading, file and loading</p> Signup and view all the answers

    What does the logical operator 'not' select in MS Access?

    <p>Coincident values</p> Signup and view all the answers

    What is the primary purpose of a Query in MS Access?

    <p>Presenting data in printing view</p> Signup and view all the answers

    What is the intended function of a Form in MS Access?

    <p>Perform acts defined by entered data</p> Signup and view all the answers

    Which logical operator is used to select words that do not begin with the letter 'Т'?

    <p>not Т</p> Signup and view all the answers

    What is a method for creating queries in database management?

    <p>Classic</p> Signup and view all the answers

    Which form creation method is specific to MS Access?

    <p>Form wizard</p> Signup and view all the answers

    What is the technology that distributes information from a server to clients, particularly used on mobile devices?

    <p>Mobile push-notification messages</p> Signup and view all the answers

    Which cloud computing model provides access specifically to operating systems and database management systems?

    <p>Platform as a Service</p> Signup and view all the answers

    What feature is necessary to work with Google Documents in an online collaborative mode?

    <p>Open shared access</p> Signup and view all the answers

    What is a known defect of cloud computing?

    <p>Not controllability of data</p> Signup and view all the answers

    What defines an environment suited for processing and storing various formats of information on the Internet?

    <p>Cloud technologies</p> Signup and view all the answers

    Which application would be considered a mobile application?

    <p>Software</p> Signup and view all the answers

    Which organization sets international recommendations in telecommunications?

    <p>ITU</p> Signup and view all the answers

    How many levels of cloud technologies are generally recognized?

    <p>3</p> Signup and view all the answers

    What is a distinctive feature of a computer virus?

    <p>Ability to run without user interaction</p> Signup and view all the answers

    How can a computer become infected with a virus?

    <p>When executing an infected program</p> Signup and view all the answers

    What defines a computer virus?

    <p>Malicious software that can replicate and damage systems</p> Signup and view all the answers

    What are the main stages of e-government development in Kazakhstan?

    <p>Information, interactive, transactional</p> Signup and view all the answers

    What is a necessary data requirement for authorizing on the Web portal of 'Electronic government'?

    <p>Personal identification number and password of the user</p> Signup and view all the answers

    What is the primary function of e-services in the context of e-government?

    <p>To streamline service delivery through ICT tools</p> Signup and view all the answers

    What is the main purpose of the law 'About the Electronic Document and the Digital Signature'?

    <p>To establish standards for digital documentation</p> Signup and view all the answers

    Which document approved the National Program for Building up e-Government in Kazakhstan for 2005-2007?

    <p>Presidential Decree No. 1471</p> Signup and view all the answers

    What form of e-commerce allows consumers to set their own prices?

    <p>Consumer-to-business (C2B)</p> Signup and view all the answers

    Which stage of the e-government development in Kazakhstan came first?

    <p>Information</p> Signup and view all the answers

    What is a characteristic of the second stage of e-government development in Kazakhstan?

    <p>Transactional stage</p> Signup and view all the answers

    What is the main function of the e-learning system?

    <p>Providing an innovative approach to education</p> Signup and view all the answers

    Which component is essential for distance learning?

    <p>Web conferences</p> Signup and view all the answers

    What is not suitable for e-commerce?

    <p>Online job searching</p> Signup and view all the answers

    What is the focus of the Program for Bridging Digital Divide in Kazakhstan?

    <p>Increasing access to ICT for marginalized communities</p> Signup and view all the answers

    Study Notes

    Information and Communication Technology (Alpha-Q) Study Notes

    • This document contains study notes for an Information and Communication Technology exam, covering MS Access and related topics.
    • Operations with data: Data arrangement, sorting, archiving, organization, transmission, and formalization are covered.
    • MS Access functions: Commands in the Datasheet tab, intended for table manipulation and database creation, are detailed.
    • Connected fields in MS Access:
      • Different types of data in two files.
      • Single file with different data types.
      • Different names with different data types.
      • Same names with different data types.
      • Different names with the same data types.
    • MS Access "Create" tab: This tab enables splitting of tables, querying, creating reports, forms, templates, and database modules.
    • MS Access table structure: Functions to change the table structure, including the table wizard, design view, and datasheet view, are discussed.
    • MS Access major database objects: Tables, forms, reports, queries, and macros are included, focused on their use for displaying information effectively.
    • Copying records in MS Access: A method is provided, explaining the process of copying selected records through specific commands.
    • AutoNumber function: The function automatically inputs sequential numbers in specified fields.
    • MS Access working area: Elements like desktop, task area, menus, toolbars, database window, and other objects are mentioned.
    • Database tools tab: This tab contains commands for working with forms, reports, queries, analysis, and more.
    • Record sorting: Methods for sorting records in ascending and descending order are provided.
    • Data extraction: Data retrieval from tables is described focusing on queries for proper data presentation.
    • Query usage: Operations like storing a database, establishing relationships, presenting data for printing, and renaming documents within queries are included.
    • Forms usage: Formatting for printing, extracting data, presenting data on screen, and accepting user inputs for data are covered.
    • Database fields: The concept, related values, description of records, and criteria are detailed.
    • Database tables: Their use for data storage is highlighted.
    • Data retrieval and sorting methods: Different methods, like selecting records and performing commands for copying, are discussed.
    • Data sorting and filtering: Commands for sorting and filtering data in different views are explained.
    • General database structure: Concepts like tables, forms, queries, reports, and more, along with their functions and relationships, are explained for comprehending database structure and use.
    • Data types: Text, numerical, and others are explained.
    • Methods of creating and manipulating data: Information, such as sorting, filtering, copying records, and more, are described to better understand database use.
    • Database sorting: Ascending and descending order sorting commands for various database views are noted.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on computer viruses and their detection methods, as well as the functionalities of MS Access. This quiz covers key concepts such as the characteristics of viruses, capabilities of anti-virus software, and various features within MS Access. Challenge yourself with questions that span major topics in computer science.

    More Like This

    Mastering Computer Viruses & Malware
    5 questions
    Computer Viruses: Symptoms and Prevention
    16 questions
    Use Quizgecko on...
    Browser
    Browser