Тренировочный тест ИКТ 540+ (1) PDF

Document Details

PamperedBigfoot

Uploaded by PamperedBigfoot

Asfendiyarov

Tags

MS Access database management information technology computer science

Summary

This document contains a past paper of Information and Communication Technology (ICT), focusing on questions regarding MS Access. The paper includes various questions on database operations, commands, and concepts.

Full Transcript

1 *!Operation with the data which is used to arrangement *+sorting of data *archiving of data *organization of data *transmission of data *formalization of data #2 *!MS Access. Functions of commands in “Datasheet” tab *"Home" commands of МS Аccess *+are intended for working with tables *provide s...

1 *!Operation with the data which is used to arrangement *+sorting of data *archiving of data *organization of data *transmission of data *formalization of data #2 *!MS Access. Functions of commands in “Datasheet” tab *"Home" commands of МS Аccess *+are intended for working with tables *provide supporting of created databases *provide creating basic components of database *are intended for organization exchange with external data #3 *!MS Access. Connected fields have *two files but different types of data *one file but different type of data *different names and different types of data *the same name but different type of data *+different names but the same type of data #4 *!MS Access. «Create» tab allows *split the table, query and report *perform auto format of the table *+create new table, form, report, query, macro and module *create the page, form, template, report, query, slide and database *create new table, template, resume, query, slide and new database #5 *!MS Access. Change the table structure *table wizard *+design view *datasheet view *create new table *open the table and rename fields #6 *!MS Access. A major database object used to display information in an attractive, easy-to-read screen format *table *form *+report *query *macros #7 *!MS Access. For copying records it’s necessary to select records and perform following command *home - font - copy *create - reports - copy *home - data collection - insert *+home - clipboard - copy *external data - clipboard - cut #8 *!MS Access. The function of «AutoNumber» in «ID» field of database *number the table *sum of form numbers *sum of report numbers *+auto input of sequential numbers *number of form records in consecutive order #9 *!There are in working area of MS Access: *desktop, task area *working area, task pane *status bar, start button *menu bar, toolbar *+database window and its objects windows #10 *!Commands of "Database tools" tab *forms, reports, analyze and others *Import, export, collect data, analyze *+macro, show/hide, analyze, move data *rich text, clipboard, records, sort and filter, find *tables, clipboard, font, show and hide, find, representation #11 *!MS Access. Records are sorted in increasing order *12, 144, 245, 53, 94 *+$10, $25, $35, $50 *Lily, Rose, Carnation, Aster *Folder, Directory, Container *10/12/96, 02/12/98, 02/11/97, 14/10/99 #12 *!MS Access. Logical operator «not» is used to select *coincident files *coincident values *coincident queries *+in coincident values *coincident first symbols #13 *!MS Access. Logical operator «not Т» is used for select *words which contain letter «Т» *words which end with letter «Т» *words which begin from letter «Т» *words which do not contain letter «Т» *+words which do not begin from letter «Т» #14 *!MS Access. Logical operator «С asterics» is used for select *words which contain letter «С» *words which end with letter «С» *+words which begin from letter «С» *words which do not contain letter «С» *words which do not begin from letter «С» #15 *!MS Access. Logical operator «[B-C]» is used for select *words which contain letter «D» *words which begin from letter «В» *words which don’t contain letter «В» *words which end with letters «В», «С», «D» *+words which begin from letters «В», «С», «D» #16 *!MS Access. Query is intended for *storing the database *creating relationships *deleting the document *+present data in printing view *output data and rename the document #17 *!MS Access. Form is intended for *printing the document *extract data from tables * present data in printing view * output data and display on the screen *+input data and perform acts defined the entered data #18 *!MS Access. The command of sorting text fields in descending order *+home – sort and filter – descending *home – sort and filter – ascending *datasheet view – font – sort on descending *external data – sort and filter – ascending *datasheet view – fields and columns – sort on ascending #19 *!MS Access. Database field *some area of database *set of values relating to records * set of values for one element of the object * set of values which satisfy of a given criteria *+concept describing one chosen property of an object #20 *!MS Access. Tables of database are intended for *+storing data *printing data *deleting of data *manipulation of data *output data on the screen #21 *!MS Access. For deleting records it’s necessary to select records and perform *create - font - delete *+home - records - delete *home - collect data - insert *home - clipboard - delete *external data - records - delete #22 *!MS Access. For searching data it’s necessary to perform command *+home - find - find *create - find - find *home - find - delete *home - data collection - insert *external data - records - find #23 *!MS Access. The command of sorting text fields in ascending order *home – sort and filter – descending *+home – sort and filter – ascending *datasheet view – font – sort on descending *external data – sort and filter – ascending *datasheet view – fields and columns – sort on ascending #24 *!MS Access. Query is intended for *input data and delete the document *rename the document and input data *output data and rename the document *+filter data, perform calculations and summarize the data *delete unnecessary data and display other data on the screen 25 *!MS Access. Group "Forms" is located on tab *home *+create *external data *datasheet mode *work with database #26 *!MS Access. According to formation method queries are grouped *currency, simple, linear *text, with a parameter, an auto query, numeric *linear, auto reports, auto forms, simple, dependent *+on a sample, with a parameter, crosstab, simple *circle, the linear, numeric, an auto request, monetary, the report #27 *!MS Access. The sequence of commands for formation of queries of the Create tab *list – datasheet *others – report design *+others – query design *tables – query design *views – query design #28 *!MS Access. Logical operator *dor *eqv *null *true *+not #29 *!Creating of database *toolbar – create the database *file – create – open the database *edit – create – open the database *+"Office" button- create – new database *create – "Office" button – create the database #30 *!Database management systems *Ms Excel, Supercalc, Turbopascal, Ms Access *+Clipper, Paradox, Foxpro, Foxbase, Ms Access *Inereader, Prompt98, Qtrans, Foxbase, Excel, Paradox *Ms Word, Wordperfect, Total Commander, Ms Access *Ms Powerpoint, Ms Access, Outlook Express, Total Commander #30 *!MS Access. To extract necessary data from one or several tables is used *fields *forms *reports *records *+queries #31 *!МS Access. Group "Fields&Columns" is located on ___ tab *home *create *external data *+datasheet view *data tools #32 *!MS Аccess. Short keys of "Minimize and maximize the ribbon" *Shift F6 *Alt Tab *+Ctrl F1 *Shift Tab *Shift F10 #33 *!MS Access. Set of tools which is displayed when choosing «Home» tab *clipboard, paragraph, text, views, font *create, records, sort and filter, alignment, find, styles *clipboard, tables, views, text, find, pages, editing *+views, clipboard, font, text, records, sort and filter, find *font, pages, views, clipboard, styles, alignment, find, text #34 *!МS Аccess. "Open" command of "Оffice" button allows to *save data in a table *look at data in a table *open the created table *open the «editing» window *+open the created database #35 *!Database which can be used in several spheres of human activity *+universal *specialized *public *single purpose *multipurpose #36 *!How to type criteria «50» in a query? *50 *+50 *50 *less than 80 and greater than 50 *less than 80 or greater than 50 #37 *!Query design window has two parts. The upper part shows *criteria *sorting check boxes *name of fields, field type and size *properties and format of the field *+tables with fields and relationships between tables #38 *!To change the size of text field from 255 to 50 symbols in MS Access table it’s necessary: *in design view change fields type *in design view change the criteria *+in design view change fields property *in datasheet view change fields property *in datasheet view change format of the field #39 *!To create parameter query which displays name of the doctor, it’s necessary to write: *+[Enter doctor’s name] *(Enter doctor’s name) *{Enter doctor’s name} */Enter doctor’s name/ * #40 *!МS Аccess is *a shell *system *teaching tool *accessory program *+application software #41 *!Columns and rows in MS Access are called *forms, fields *cells, records *+fields, records *columns, records *columns, fields #42 *!MS Аccess. The extension of database *.txt,.doc *.exe,.mdb *.bat,.accdb *.bmp,.accdb *+.mdb,.ассdb #43 *!Database management system represents the program which is included into *hardware *operating system *system of programming *unique program software *+application program software #44 *!MS Аccess. «Asterisk» symbol means *new field *new file *new number *+new record *new column #45 *!MS Access. The type of a field is set in *pages *tables *reports *+design View *datasheet View #46 *!MS Аccess. The maximum number of text field signs *225 *155 *355 *455 *+255 47 *!MS Аccess. Command «Rename the table» *F6 *F1 *F4 *F5 *+F2 #48 *!MS Access. Name of the field with space *6 signs *4 signs *50 signs *10 signs *+64 signs #49 *!MS Аccess. Data type *reporting *+number *symbol *cycle *graphic #50 *!MS Аccess. Maximum numbers of symbols in «Memo» field *65 500 *65 000 *+65 536 *650 563 *65 0000 #51 *!Relational database is the database which *has file structure *describes spreadsheets *has Boolean algebra as a base of it *connects data by means of physical indicators *+consists of two dimensional table connected with themselves logically #52 *!The following operation is performed with records *+sort *projecting *forecasting *exploitation *searching on key #53 *!MS Access program is constructed on the base *С *Lisp *Html *MS Excel spreadsheets *+relational model of database management #54 *!The main object of database is *form *+table *macro *module *template #55 *!Creating of database includes *stage of copying slides *stage of output and project data *+stage of database project and input data *stage of defining and deleting information *stage of transmission and deleting of document #56 *!The main types of MS Access models *basic *cyclic *standard *application *+relational #57 *!MS Аccess. Objects of database *sort, filter *book, sheets *records, fields *+queries, tables *investment, model #58 *!MS Аccess. Types of data *+text *financial *graphical *fractional *percentage #59 *!MS Access. Type of query *logic *classic *empty *separate *+parameter #60 *!MS Access. Methods of creating tables *table wizard *simple table *project table *classic table *+table design #61 *!MS Access. Types of reports *number *project *simple report *classic *+report design #62 *!MS Access. Possible size of number field *serial *number *+integer *financial *percentage #63 *!MS Access. To start program it’s necessary *Start – Accessories – MS Office – MS Office Access *+Start – All programs – MS Office – MS Office Access *Start – All programs – Accessories – MS Office Access *Context menu – Create – MS Office Access 2007 Database *Start – Accessories – Application programs – MS Office Access #64 *!MS Access. The following operation is performed with queries *+filtration *projecting *forecasting *exploitation *searching on key #65 *!MS Access. Methods of creating query *classic *simple *project *+query wizard *Share Point lists #66 *!MS Access. Methods of creating forms *+form wizard *simple form *project form *logic form *classic form 67 *!Technology which distributes information from the server to the client, used on mobile devices *virtualization *online conference *computing clouds *+mobile push-notification messages *micronuclear architecture of a hypervisor #68 *!A model of providing cloud computing for access to use of operating systems and database management system *Software as a Service *Infrastructure as a Service *+Platform as a Service *Storage as a Service *Management as a Service #69 *!To create profiles in the cloud use Google Docs *documents *tables *presentations *+forms *my cards #70 *!To work with one Google Document in online mode it is necessary for group of users *remove the restriction *create a conference *open online chat *create "circles friends" *+open shared access #71 *!To create Google Presentation in the cloud it is necessary *create mail.ru *+have a Google account *be a Google Hangout User *have access to social networks *know the programming language #72 *!The place where various information on the user is stored *cloud *browser *+account *mailservice *questionnaire #73 *!Defect of a cloud computing is *flexibility *renting *economyy *availability and mobility *+not controllability of data #74 *!The convenient environment for processing and storage of various formats information with user support of the Internet *social networks *development environment *mobile services *operating system *+cloud technologies #75 Information and communication technologies are *social science *+applied science *medical science *humanity *fundamental science #76 *!Technology which distributes information from the server to the client, used on mobile devices *virtualization *online conference *computing clouds *+mobile push-notification messages *micronuclear architecture of a hypervisor #77 *!It is possible to change a profile photo, entering in service *play *disc *email *+google *translator #78 *!To work with the documents of GOOGLE you need to enter in service *email *search *+disk *calendar *my account #79 *!To create questionnaires are used Google documents *+forms *tables *my cards *documents *presentations #80 *!To work with one Google document in online mode group of users has to: *lift a limit *open an online chat *create a conference *+open shared access *create "circles friends" #81 *!Mobile application is: *service *+software *data storage *cloud calculation *developing environment #82 *!Portable multi-function device of mobile communication *netbook *tablet (pad) *bluetooth *monoblock *+smartphone #83 *!The international organization defining recommendations in the field of telecommunications and radio *+ITU *LTE *APPLE *GPS *IES #84 *!The largest software developer, the creator a web - service Elastic Computer Cloud (EC2): *Kcell *Apple *Gmail *+Amazon *EPAM Systems #85 *!How many levels of cloud technologies are exist: *2 *4 *5 *+3 *6 #86 *!Level of cloud technologies. Platform as a Service - PaaS) *auxiliary level *infrastructure level *top level of appendices *the lowest level of a platform *+intermediate level of a platform #87 *!Global system of coordinates determination *+GPS *GSM *LTE *Gmail *FTP #88 *!The system which allows to make calls and send messages *GPS *+GSM *Symbian *Tizen *iOS #89 *!Google services *ICQ, Internet *Cloud *Mailing, E-services *+Google+, My account *Documents #90 *!In GOOGLE.com it is possible to create *report, schemes *queries, reports *catalogs, books *programs, documents *+documents, presentations 91 *!Cybersecurity. Information security from illegal access *installation of the anti-virus program *+each user of system shall have the personal password *assignment of responsible persons for information output *to define an information access only for a manual of MPI *each user shall have the computer for operation with system #92 *!Cybersecurity. The main types of computer viruses *hardware, file *load, resident *non-resident, not dangerous *+program, load, macro viruses *file - load, not dangerous, resident #93 *!Cybersecurity. Antivirus programs *Eset, MS Access *MS Word, MS Excel *ZIP, MS Power Point *+AidsTest, Kaspersky Kav *MS DOS, DoctorWeb, RAR #94 *!Cybersecurity. Formats of executed files *.doc,.bat *.jpg,.txt,.doc *.bmp, rar, html *+.exe,.com,.bat *xls, zip,.doc,.bat #95 *!Cybersecurity. Depending on the habitat computer viruses are divided as *resident, non-resident *harmless, dangerous, very dangerous *+network, file, loading, file and loading *detectors, doctors, auditors, filters, vaccines *parasitic, replicators, invisible beings, mutants, trojan #96 *!Cybersecurity. On a way of infection computer viruses are divided as *resident, non-resident *+harmless, dangerous, very dangerous *network, file, loading, file and loading *detectors, doctors, auditors, filters, vaccines *parasitic, replicators, invisible beings, mutants, trojan #97 *!Cybersecurity. MS Windows. File characteristics *changing, moving and deleting the file *copying, moving, deleting file and attributes *date of moving of the file, creation date and time *renaming, moving, deleting file and time of creation *+file name, creation date and time, file size and attributes #98 *!Cybersecurity. Stealth viruses *infect drivers *infect boot sectors *+hide their presence *destroy all information *display the graphic drawing #99 *!Cybersecurity. The way of virus detection includes *+scanning *copying files *heuristic analysis *record of all files volume *checking of executing files #100 *!Cybersecurity. Computer can be infected with the virus *on incorrect loading *when loading drivers *when text program is working *+when executing the infected program *when inserting a floopy disk into the disk drive #101 *!Cybersecurity. Detector programs *modify programs *find the infected files *find changes and treat *+treat the infected files *only find changes in files #102 *!Cybersecurity. Doctor programs *modify programs *find the infected files *find changes and treat *+treat the infected files *only find changes in files #103 *!Cybersecurity. The computer virus is *the program providing compression of files *the program intended for creation of the presentation *the program used for increase in speed of operation of a disc *the program for coercion of the archived file to an initial look *+specially written program of small volume which spoils them #104 *!Cybersecurity. The main two groups of viruses *network, file *macro, micro *loading, dangerous *+resident, non-resident *dangerous, not dangerous #105 *!Cybersecurity. The viruses using errors and inaccuracies in a complex of software *worms *trojan horses *propagandists *logical bombs *+viruses interceptors #106 *!Cybersecurity. Anti-virus programs *MS DOS, NC *ARJ, RAR, ZIP *AutoCAD, CorelDraw *MS Word, MS Excel, MS Access *+AidsTest, Doctor Web, Kaspersky KAV #107 *!Cybersecurity.In what case the computer can be infected with virus *when formatting a disk *when testing the computer *when loading of the computer *at start of the DoctorWeb program *+during the work with the infected program #108 *!Cybersecurity. Doctor Program *Finds suspicious actions *Prevents infection of files *+Finds the infected files and treats them *Looks for viruses with the known signature *Compares an initial condition of the file to current #109 *!Cybersecurity. Infection with loading viruses occurs at *Closing of the file *Opening of the file *Data recording in the file *Reading of information from the file *+Turning on the computer with busy floppy #110 *!Cybersecurity. Loading viruses can infect *еxe-files *OBJ-files *batch-files *COM-files *+Boot-Strap program #111 *!Cybersecurity. Replicators *Find a virus *Delete a virus *+Transfer a virus *Destroy a virus program *Warning infection with a virus #112 *!Cybersecurity. Auditor programs *Treat a disk *Use vaccines *Treat all computer *Delete only the infected files of Windows *+ Remember data on a condition of programs #113 *!Cybersecurity. Macro viruses are *Network files *Package files *Dialogue files *Loading files *+Macros #114 *!Cybersecurity. AVP is *graphics editor *+anti-virus program *the program spreading virus *program of defragmentation *the program, the pressing the file for saving of the place on a disk #115 *!Cybersecurity. The computer virus is *text editor *graphic editor *programming language *+the program damaging computer programs and data *the program which is carrying out start of the computer #116 *!Cybersecurity. Distinctive features of a computer virus are *ease of recognition *considerable volume of a program code *need of start of the program from the user *ability to increase in a noise stability of an operating system *+small volume ability to independent start and repeated copying of a code, to creation of noise to correct operation of the computer #117 *!How the computer can be infected a virus *when loading drivers *when opening the internet *in case of the wrong loading *+in case of execution of the infected program *when inserting the disc with the infected program #118 *!The computer virus is *the hidden programs which erase, but they aren't removed *the program which protects the computer from harmful files *not readable data which are kept on rigid or on a floppy disk *programs which don't give the chance to open data with the password *+the program which breeds itself and does harm to the computer of the user and other objects located in network #119 !*The text "SYRYECUMT SSTEI" deciphered by method of simple swap will look as follows *«SEQURITY RISK» *«STORAGE DEVICE» *+«SECURITY SYSTEM» *«INFORMATION SYSTEM» *«SECONDARY STORAGE » #120 !*The text ciphered by method of simple swap "INTEGRITY INFORMATION SYSTEMS" will look as follows *"RIGENTY SSYETSMFORMIONN" *"IRIGENTY SSYETSO MFORMIONN" *"SYETSMS NUITANIONF IYRIGETNI" *+"SMETSYS NOITAMRONF YTIRGETNI" *"YTIRGETNI NOITAMROFNI YTIRGETNI" 121 *!Main stages of e-government in the Republic of Kazakhstan *+Information, interactive, transactional *Democratic society, the information society *Bridging Digital Divide, information society *E-government portal, a single transport medium *Payment gateway, a national identification system #122 *!Program of forming «E-government» in Republic of Kazakhstan on 2005-2007 *25.10.2005, №991 *13.10. 2006, №995 *11.10. 2004, №1459 *18.08. 2003, №1166 *+10.11.2004, №1471 #123 *!The number of information services on web-portal of «E-government» *999 *900 *145 *300 *+933 #124 *!Citizens, government agencies, organizations and other economic entities utilizing the services of e-government *E- service *E-banking *E-government *E-service providers *+Consumers of e-services #125 *!State bodies, organizations and other economic entities providing services ict tools *E-service *E-banking *E-government *+E-service providers *Consumers e-services #126 *!The law "About the Electronic Document and the Digital Signature" was adopted *10th January 2005, № 37 *1st January 2007, № 370 *7th January 2002, № 37-2 *7th January 2000, № 70-2 *+7th January 2003, № 370-2 #127 *!The abbreviation designating interaction of government with citizens *consumer-to-consumer *government -to-business *consumer-to- government *+government-to-consumer *government-to- government #128 *!The abbreviation designating interaction of the state with government *business-to-consumer *consumer-to-consumer *government -to-business *consumer-to- government *+government-to- government #129 *!The abbreviation designating interaction of the state with private sectors *consumer-to-consumer *business-to-government *+government -to-business *consumer-to- government *government-to- government #130 *!The abbreviation designating interaction of business with the state *business-to- business *consumer-to-business *business-to-consumer *government -to-business *+business-to-government #131 *!The abbreviation designating interaction of citizens with the state *consumer-to-business *business-to-consumer *consumer-to-consumer *+consumer-to- government *government-to- government #132 *!Method how to obtain digital signature: *to register on Population service center website *to register on the website www.egov.kz *to enter a private office through e-mail *to set JavaScript and to get permission for registration *+it is necessary to submit the application for obtaining the electronic digital signature (EDS) on www.egov.kz #133 *!For authorization on the Web portal of "Electronic government" the following data are necessary: *marriage certficate *e-mail address (e-mail) *number of the identity card *e-mail address (e-mail) and password of the user *+personal identification number and password of the user #134 *!E-mail address of the electronic government web portal of Kazakhstan: *+www.e.gov.kz *www.e.kz *www.aic.gov.kz *www.aic.kz *www.aik.gov.kz #135 *!Web portal of the electronic government of Kazakhstan was created in *+12.04.2006 *17.11.1997 *12.04.2007 *14.04.2007 *20.07.2007 #136 *!Second stage of the electronic government development in Kazakhstan *+Interactive * Transaction * Information society * Democratic society * Information #137 *!First stage of the electronic government development in Kazakhstan * Interactive * Transaction * Information society * Democratic society *+Information #138 *!Third stage of the electronic government development in Kazakhstan * Interactive *+Transaction * Information society * Democratic society * Information #139 *!External contour of the electronic government of Kazakhstan *+G2C, G2B * G2B, G2G * G2G * G2C, G2G * B2G #140 *!Internal contour of the electronic government of Kazakhstan *+G2C, G2B * G2B, G2G * G2G * G2C, G2G * B2G #141 *!The service which is rendered by means of information communication tools *+E-service * E-government * E-banking * Suppliers of Ґ-services * Consumers of Ґ-services #142 *!An e-business that allows consumer to name their own price for products and services is following which e-business model * B2B * B2G * C2C *+C2B * G2B #143 *!E-Commerce is not suitable for * Sale/Purchase of expensive jewelers and antiques * Sale/Purchase of mobile phones * Sale/Purchase of branded clothes *+Online job searching * None of these #144 *!National Program for Building up e-Government in the Republic of Kazakhstan for 2005-2007 was approved with Presidential Decree *+No.1471 of November 10, 2004 * No.995 of October 13, 2006 * No. 991 ofOctober25, 2005 * No. 1166 ofAugust18, 2003 * No. 1459 of October 11, 2004 #145 *!Program for bridging digital divide in the Republic of Kazakhstan for 2007- 2009 was approved with Government Resolution * No.1471 of November 10, 2004 *+No.995 of October 13, 2006 * No. 991 of October 25, 2005 * No. 1166 of August 18, 2003 * No. 1459 of October 11, 2004 146 *!Е-learning system is *credit system *pedagogical way *operating system *traditional teaching *+innovative approach #147 *!Basic elements of distance learning *evening courses *pedagogical education *correspondence conference *+information transfer environment *international scientific and practical conference #148 *!Distance learning occupations forms are *discussion, debate *open lesson, master class *traditional lesson, conference *seminar, practical and laboratory classes *+chat occupation, web occupation, teleconference #149 *!System Internet of training E-learning *credit system *operating system *traditional training *pedagogical method *+innovative approach #150 *!Basic elements of distance learning *evening course *pedagogical education *correspondence conference *+information transmission medium *international scientific and practical conference #151 *!Law of Healthcare was accepted *March, 2009 *October, 2009 *February, 2010 *September, 2008 *+September, 2009 #152 *!Composition of a health care system *only state organizations *organizations of public sector *+state and non-state health sector *state and private medical organizations *public sector of health care and insurance companies #153 *! Beginning of implementation of a uniform national health care system *1st July, 2010 *1st March, 2011 *1st January, 2011 *1st February, 2011 *+1st January, 2010 #154 *!Advantages of distant education *well without the Internet *constant presence at a lecture *constant presence at a conference *constant presence on practical occupations *+it is available to all segments of the population #155 *!Distance learning. Privileges of e-learning *high cost *+mobility *response in writing *geographical limitation *the response in the oral form 156 *!Second generation computers used value technology as *+transistors *microcircuits *vacuum tubes *integrated circuit chips *large scale integration chips #157 *!First computer *IBM *BASM *MINSK *+ENIAC *ZODIAC #158 *!The first computer was invented in *CIS *Japan *+USA *German *England #159 *!The first computer was invented in *1872 *1917 *1931 *1985 *+1946 #160 *!Hard drive is *zip disk *input/output *high capacity floopy disk *+high capacity integral disk *the device of input-output for floopy discs #161 *!Operative memory is *information containing on a hard disk *information containing on a floppy disk *device for direct perception of the information to the person *device for long storage of the information on magnetic disks or magnetic tapes *+device which addresses regularly to machine during performance of operations #162 *!In 32 Gbytes there are *224 bytes *222 bytes *+235 bytes *32000 bytes *16 220 bytes #163 *!Convert binary number 1001 into decimal system *7 *8 *1 *+9 *510 #164 *!Multiplication of binary numbers 1011 and 110 *0011100 *0000100 *0100000 *1000000 *+1000010 #165 *!Convert hexadecimal number 255 into decimal system *333 *531 *343 *211 *+597 #166 *!Decimal number 2 in binary system is written as *11 *01 *+10 *1001 *1111 #167 *!The sum of binary numbers 111011 101010 is equal to *1100111 *0111100 *0101100 *0011011 *+1100101 #168 *!The multiplication of binary numbers 110 and 111 *101100 *111100 *101110 *111000 *+101010 #169 *!Why is mathematical coprocessor necessary *printing information *for recording data on cd *reading of the information *+to help to basic processor in performance of mathematical operations *permanent storage of the information which is used at work in a computer #170 *!The modem and the fax-modem are used for *conversation with users *effective work with office equipment *+connections to satellite communication *information output on paper or on computer *exchanging information with other computers #171 *!Order of switching off of the computer *printer, system unit *system unit, monitor *system unit, monitor, printer *monitor, printer, system unit *+system unit, printer, monitor #172 *!The lowest level software is *+BIOS *system *service *applied *operating #173 *!Data are *text *table *properties of objects *+the registered signals *the data transferred between people #174 *!The binary number system concerns to *numerical systems *+positional systems *arithmetic notations *depositional systems *no numerical systems #175 *!The smallest unit of information measure *Hz *+Bit *File *Byte *Character #176 *!1 byte is equal to *4 bits *+8 bits *16 bits *8 Kbyte *1 Kbyte #177 *!Device of temporary storage of information *adder *+bufer *register *adapter *processor #178 *!Special program for control of the device *+driver *utilities *appendix *expanded memory *additional memory #179 *!The device which is managing operation of the computer and carrying out calculations *disk drive *graph plotter *+microprocessor *random access memory *internal memory of the processor #180 *!The device intended for input of graphic and text information *printer *plotter *mouse *modem *+scanner #181 *!Monitor is *data storage device *input equipment of data *the device for data exchange *+an equipment of visual representation of data *an input equipment and conclusion of graphic data #182 *!To output graphical information in the personal computer is used *mouse *scanner *printer *keyboard *+monitor #183 *!Hardware is *software *hard drive *compact disk *information support *+computer configuration #184 *!The streamer is intended for *output of drawings to paper *reading of graphic and text information *+fast saving of information in the hard drive *exchange of information with other computers *simplification of input of information in the computer #185 *!The central processor serves for *information output *input of information *storage of information *visual representation of data *+calculations and information processing 186 *!MS Excel. The range of cells В2:В10 contain numbers 44, 64, 52, 37, 82, 52, 32, 93, 48. Show result of MAX(В2:В10) *9 *32 *52 *56 *+93 #187 *!MS Excel. The range of cells В2:В10 contain numbers 44, 64, 52, 37, 82, 52, 32, 93, 48.Show result of MIN(В2:В10) *9 *+32 *52 *56 *93 #188 *!MS Excel. Number of cells in the following formula: =SUM(А1;С3) *6 *3 *4 *5 *+2 #189 *!MS Excel. Number of cells in highlited group А2:С4 *2 *4 *6 *8 *+9 #190 *!MS Excel. Samples belong to two different populations if *p

Use Quizgecko on...
Browser
Browser