ICT Exam Paper PDF
Document Details
Uploaded by Deleted User
Tags
Summary
This document appears to be an ICT exam paper, containing a series of questions and answers. It covers a range of topics related to information and communication technology, including devices, cybersecurity, and e-government.
Full Transcript
1.Portable multi-function device of mobile communication (Баллов: 2 netbook tablet (pad) bluetooth monoblock smartphone 2.Cybersecurity. Information security from illegal access (Баллов: 2) installation of the anti-virus program each user of system shall have the personal password assignm...
1.Portable multi-function device of mobile communication (Баллов: 2 netbook tablet (pad) bluetooth monoblock smartphone 2.Cybersecurity. Information security from illegal access (Баллов: 2) installation of the anti-virus program each user of system shall have the personal password assignment of responsible persons for information output to define an information access only for a manual of MPI each user shall have the computer for operation with system 3.The international organization defining recommendations in the field of telecommunications and radio (Баллов: 2) ITU LTE APPLE GPS IES 4.The largest software developer, the creator a web - service Elastic Computer Cloud (EC2): (Баллов: 2) Kcell Apple Gmail Amazon EPAM Systems 5.Citizens, government agencies, organizations and other economic entities utilizing the services of e-government (Баллов: 2) E- service E-banking E-government E-service providers Consumers of e-services 6\. Level of cloud technologies. Platform as a Service - PaaS) (Баллов: 2) auxiliary level infrastructure level top level of appendices the lowest level of a platform intermediate level of a platform 7.Stream multimedia (Баллов: 2) specialized search innovations, for the house and office the project which has open source code of fund the broadcasting continuously received from provider \*the accounting entry storing information on the user 8.Information and communication technologies are (Баллов: 2) social science applied science medical science humanity fundamental science 9.Cybersecurity. The main types of computer viruses (Баллов: 2) hardware, file load, resident non-resident, not dangerous program, load, macro viruses file - load, not dangerous, resident 10.Google services (Баллов: 2) ICQ, Internet Cloud Mailing, E-services Google+, My account Documents 11.For authorization on the Web portal of \"Electronic government\" the following data are necessary: (Баллов: 2) marriage certficate e-mail address (e-mail) number of the identity card e-mail address (e-mail) and password of the user personal identification number and password of the user 12.Multimedia product is (Баллов: 2) presentation the training program application programs standard programs interactive computer development 13.The system which allows to make calls and send messages (Баллов: 2) GPS GSM Symbian Tizen iOS 14.In GOOGLE.com it is possible to create (Баллов: 2) report, schemes queries, reports catalogs, books programs, documents documents, presentations 15.Cybersecurity. Antivirus programs (Баллов: 2) Eset, MS Access MS Word, MS Excel ZIP, MS Power Point AidsTest, Kaspersky Kav MS DOS, DoctorWeb, RAR 16.Program of forming «E-government» in Republic of Kazakhstan on 2005-2007 (Баллов: 2) 25.10.2005, №991 13.10. 2006, №995 11.10. 2004, №1459 18.08. 2003, №1166 10.11.2004, №1471 17.Genlock is a device for (Баллов: 2) sync images convert the image output image accumulating the images receive copies of the images 18.To work with the documents of GOOGLE you need to enter in service (Баллов: 2) email search disk calendar 19.Cybersecurity. Formats of executed files (Баллов: 2).doc,.bat.jpg,.txt,.doc.bmp, rar, html.exe,.com,.bat xls, zip,.doc,.bat 20.Main stages of e-government in the Republic of Kazakhstan (Баллов: 2) Information, interactive, transactional Democratic society, the information society Bridging Digital Divide, information society E-government portal, a single transport medium Payment gateway, a national identification system 21.What belongs to special means of a multimedia (Баллов: 2) tuner, monitor, columns processor, monitor, sound card monitor, videocard, sound card speaker, microphone, columns monitor, videocard, microphone 22.Е-learning system is (Баллов: 2) credit system pedagogical way operating system traditional teaching innovative approach 23.To work with one Google document in online mode group of users has to (Баллов: 2) lift a limit open an online chat create a conference open shared access create \"circles friends\" 24.Cybersecurity. MS Windows. File characteristics (Баллов: 2) changing, moving and deleting the file copying, moving, deleting file and attributes date of moving of the file, creation date and time renaming, moving, deleting file and time of creation file name, creation date and time, file size and attributes 25.The convenient environment for processing and storage of various formats information with user support of the Internet (Баллов: 2) social networks development environment mobile services operating system cloud technologies 26.Technology which distributes information from the server to the client, used on mobile devices (Баллов: 2) virtualization online conference computing clouds mobile push-notification messages micronuclear architecture of a hypervisor 27.Cybersecurity. Loading viruses can infect (Баллов: 2) еxe-files OBJ-files batch-files COM-files Boot-Strap program 28\. It is possible to change a profile photo, entering in service (Баллов: 2) play disc email google translator 29.The law \"About the Electronic Document and the Digital Signature\" was adopted (Баллов: 2) 10th January 2005, № 37 1st January 2007, № 370 7th January 2002, № 37-2 7th January 2000, № 70-2 7th January 2003, № 370-2 30.Cybersecurity. AVP is (Баллов: 2) graphics editor anti-virus program the program spreading virus program of defragmentation the program, the pressing the file for saving of the place on a disk 31.Internet. network telecommunication systems (Баллов: 2) MS Word MS Excel Norton Commander Windows NT Server, Novell Netware Windows, MS DOS, UNIX. Windows NT Server 32.For authorization on the Web portal of \"Electronic government\" the following data are necessary: (Баллов: 2) e-mail address (e-mail) number of the identity card e-mail address (e-mail) and password of the user personal identification number and password of the user marriage certficate 33.What do I need to tell the bot so that it can send and receive messages from users? (Баллов: 2) Server password Administrator login Token Keyword User code 34.What programming language was ChatGPT created in? (Баллов: 2) Python Java Ruby C++ HTML 35.A robot used in the field of surgery: (Баллов: 2) ASIMO FANUC Monarch by Auris Health. Da Vinci NAVIO by Smith & Nephew. 36.E-Commerce is not suitable for (Баллов: 2) Sale/Purchase of expensive jewelers and antiques \* Sale/Purchase of mobile phones Sale/Purchase of branded clothes Online job searching None of these 37.To create Google Presentation in the cloud it is necessary (Баллов: 2) create mail.ru have a Google account be a Google Hangout User have access to social networks know the programming language 38.National Program for Building up e-Government in the Republic of Kazakhstan for 2005-2007 was approved with Presidential Decree (Баллов: 2) No.1471 of November 10, 2004 No.995 of October 13, 2006 No. 991 ofOctober25, 2005 No. 1166 ofAugust18, 2003 No. 1459 of October 11, 2004 39.Cybersecurity. Replicators (Баллов: 2) Find a virus Delete a virus Transfer a virus Destroy a virus program Warning infection with a virus 40.What is the main function of Manybot? (Баллов: 2) Video content creation Setting up automatic mailings and responses Development of mobile applications Managing Telegram users Bot users 41.Cybersecurity. Auditor programs (Баллов: 2) Treat a disk Use vaccines Treat all computer Delete only the infected files of Windows Remember data on a condition of programs 42.The text ciphered by method of simple swap \"INTEGRITY INFORMATION SYSTEMS\" will look as follows (Баллов: 2) IRIGENTY SSYETSO MFORMIONN\" RIGENTY SSYETSMFORMIONN\" SYETSMS NUITANIONF IYRIGETNI\" \"SMETSYS NOITAMRONF YTIRGETNI\" \"YTIRGETNI NOITAMROFNI YTIRGETNI\" 43.Who first mentioned the term \"artificial intelligence\" in 1956? (Баллов: 2) Alan Touring Andrew Ng John McCartney Jurgen Schmidhuber John Von Neumann 44.Cybersecurity. Depending on the habitat computer viruses are divided as (Баллов: 2) resident, non-resident harmless, dangerous, very dangerous network, file, loading, file and loading detectors, doctors, auditors, filters, vaccines parasitic, replicators, invisible beings, mutants, trojan 45.What programming language was ChatGPT created in? (Баллов: 2) Python Java C++ Ruby SQL 46.AI technology used in image analysis to diagnose diseases: (Баллов: 2) Natural Language Processing (NLP) Generative networks Convolution Neural Networks (CNN) Bayesian networks Logistic regression 47.Cybersecurity. On a way of infection computer viruses are divided as (Баллов: 2) resident, non-resident harmless, dangerous, very dangerous network, file, loading, file and loading detectors, doctors, auditors, filters, vaccines parasitic, replicators, invisible beings, mutants, trojan 48.Specify a robotic radiosurgical system designed to treat tumors: (Баллов: 2) Medtronic Hugo ASIMO FANUC iRobot Cyber Knife 49.Global system of coordinates determination (Баллов: 2) GPS GSM LTE Gmail FTP 50.Node in the blockchain network: (Баллов: 2) The user who stores the private key A device or computer connected to the blockchain network A smart contract that manages all transactions The main server of the system Special mining software