Разработки тестовых заданий по ИКТ
Оценка 5

Разработки тестовых заданий по ИКТ

Оценка 5
Контроль знаний +1
docx
28.02.2021
Разработки тестовых заданий по ИКТ
Разработки тестовых заданий по ИКТ
Разработки тестовых заданий по ИКТ.docx

1. Can you tell what passes into and out from the computer via its ports?
A) Data*
B) Bytes
C) Graphics
D) Pictures

E) Formula

2. Which of the following is not purely output device?
A) Screen*
B) Printer
C) Speaker
D) Plotter

E) Napier

3. The first Macintosh computer was from
A) First generation
B) Second generation
C) Third generation
D) Fourth generation*

B) Second and Third generation

4. Which of the following is internal memory?
A) Disks
B) Pen Drives
C) RAM*
D) CDs

E) SRAM

5. The magnetic storage chip used to provide non-volatile direct access storage of data and that have no moving parts are known as
A) Magnetic core memory
B) Magnetic tape memory
C) Magnetic disk memory
D) Magnetic bubble memory*

E) Stores data in the memory

6. A collection of related instructions organized for a common purpose is referred to as
A) File
B) Database
C) Program*
D) None of above

E) Notebook

7. Plotter accuracy is measured in terms of repeatability and
A) Buffer size
B) Resolution*
C) Vertical dimensions
D) Intelligence

E) Understanding

8. Computer instructions written with the use of English words instead of binary machine code is called
A) Mnemonics
B) Symbolic code*
C) Gray codes
D) Opcode

E) None of above

9. Which language is directly understood by the computer without translation program?
A) Machine language*
B) Assembly language
C) High level language
D) None of above

E) Both C and D

10. Which of the following processors use RISC technology?
A) 486dx
B) Power PC*
C) 486sx
D) 6340

E) 1320

11. How many numbers could ENIAC store in its internal memory
A) 100
B) 20*
C) 80
D) 40

E) 60

12. The subject of cybernetics deals with the science of
A) Genetics
B) Control and communication*
C) Molecular biology
D) Biochemistry

E) Both A and D

13. Binary circuit elements have
A) One stable state
B) Two stable state*
C) Three stable state
D) None of above

E) Both A and D

14. The value of each bead in earth is 
A) 1*
B) 3
C) 5
D) 7

E) 6

15. When did John Napier develop logarithm?
A) 1416
B) 1614*
C) 1641
D) 1804

E) 1408

16. Which of the following terms is the most closely related to main memory?
A) Non volatile
B) Permanent
C) Control unit
D) Temporary*

E) Control bus

17. The word length of a computer is measured in
A) Bytes
B) Millimeters
C) Meters
D) Bits*

A) Cylinders

18. Which unit holds data permanently?
A) Input unit
B) Secondary storage unit*
C) Output Unit
D) Primary Memory Unit

E) Control unit

 

19. Before a disk can be used to store data. It must be_______
A) Formatted*
B) Reformatted
C) Addressed
D) None of the above

E) Extended

20. The first general purpose electronic digital computer in the world was
A) UNIVAC
B) EDVAC
C) ENIAC*
D) All of above

E) Power PC

21. Human beings are referred to as Homosapinens, which device is called Silico Sapiens?
A) Monitor
B) Hardware
C) Robot
D) Computer*

E) Digital Computer

22. Which company is the biggest player in the microprocessor industry?
A) Motorola
B) IBM
C) Intel*
D) AMD

E) ISAM

23. EBCDIC can code up to how many different characters?
A) 256*
B) 216
C) 232
D) 264

E) 228

24. Number crunchier is the informal name for
A) Mini computer
B) Super computer*
C) Microcomputer
D) Mainframe computer

E) Digital Computer

25. Which technology is used in Compact disks?
A) Mechanical
B) Electrical
C) Electro Magnetic
D) Laser*

E) Magnetic Ink Code Reader

26. Different components of the motherboard of a PC unit are linked together by sets of parallel electrical conducting lines. What are these lines called?
A) Conductors
B) Buses*
C) Connectors
D) Consecutive

E) Interpreter

27. A computer program that converts an entire program into machine language is called a/an
A) Interpreter
B) Simulator
C) Compiler*
D) Commander

E) Consecutive

28.  Intel corporation produces chips for which computers?
A) IBM PCs*
B) Apple/Macintosh PCs
C) Both of above
D) None of above

E) MARK I

 

 

 

 

 

 

 

 

 

MS Word

 

29. The ability to combine name and addresses with a standard document is called _________

А) document formatting

B) database management

С) mail merge *

D) form letters

E) mail letters

30. A word processor would most likely be used to do
a. keep an account of money spent
b. do a computer search in media center
c. maintain an inventory
d. type a biography *

e.document formatting

31. Which can be used for quick access to commonly used commands and tools?
a. Status bar
b. Tool bar *
c. Menu bar
d. Title bar

e.Scroll bar

32. Which of the following is not essential component to perform a mail merge operation?
a. Main document
b. Data source
c. Merge fields
d. Word fields *

e.Word source

33. AutoCorrect was originally designed to replace _________ words as you type.
a. short, repetitive
b. grammatically incorrect
c. misspelled *
d. none of the above

e.short misspelled

34. Home Key
a. Moves the cursor beginning of the document
b. Moves the cursor beginning of the paragraph
c. Moves the cursor beginning of the screen
d. Moves the cursor beginning of the line *

е. Moves the cursor end of the document

35. “Ctrl + Right Arrow” is used to
a. Moves the cursor one word right *
b. Moves the cursor end of the line
c. Moves the cursor end of the document
d. Moves the cursor one Paragraph down

e. Moves the cursor beginning of the screen

36. End Key
a. Moves the cursor end of the line *
b. Moves the cursor end of the document.

c. Moves the cursor end of the paragraph
d. Moves the cursor end of the screen

e.Moves the cursor one screen down

 

37. “Ctrl + PageDown” is used to
a. Moves the cursor one Paragraph Down
b. Moves the cursor one Page Down *
c. Moves the cursor one Line Down
d. Moves the cursor one Screen Down

e. Moves the cursor end of the paragraph

38. Page Up Key
a. Moves the cursor one line up
b. Moves the cursor one screen up *
c. Moves the cursor one page up
d. Moves the cursor one paragraph up

e. Moves the cursor one word left

39. Ctrl + N
a. Save Document
b. Open Document
c. New Document *
d. Close Document

e. Word fields

40. click the _____ button in any panel in the Resume Wizard dialog box.
a. Cancel
b. Back
c. Next
d. Finish *

e. Objects

41. What are inserted as cross-reference in Word?
a. Placeholders
b. Bookmarks
c. Objects
d. Word fields *

e. Next Page

42. Which of the following is not valid version of MS Office?
a. Office XP
b. Office Vista *
c. Office 2007
d. None of above

e. Word fields

43. Where can you find the horizontal split bar on MS Word screen?
a. On the left of horizontal scroll bar
b. On the right of horizontal scroll bar
c. On the top of vertical scroll bar *
d. On the bottom of vertical scroll bar

e. Open Goto Dialog box

44. Ctrl + G
a. Open Paragraph Dialog box activating Goto Tab
b. Open Page Setup Dialog box activating Goto Tab
c. Open Find and Replace Dialog box with activating Goto Tab *
d. Open Goto Dialog box

e. Open File Save as Dialog box

45. Ctrl + P
a. Open Paragraph Dialog Box
b. Open Page Format Dialog Box
c. Open Save Dialog Box
d. Open Print Dialog box *

e. Open Insert Hyper Link Dialog box

46. When sharing data in Office, the ________ document is the document in which the data was first entered.
a. source *
b. destination
c. original
d. primary

e. left indent

47. With which view can you see how text and graphics will appear on the printed page?
a. Normal
b. Print Layout *
c. Outline
d. Web Layout

e. All of above

48. Which feature helps you to inserts the contents of the Clipboard as text without any formatting
a. Paste Special *
b. Format Painter
c. Page Setup
d. Styles

e. Standard toolbar

49. switching between portrait and landscape modes involves the:
a. header and footer toolbar *
b. print layout view
c. page setup dialog box
d. none of the above

e. Paragraph dialog box

50. _____ formatting is the process of changing the way letters, numbers, punctuation marks, and symbols appear on the screen and in print.
a. Document *
b. Character
c. Paragraph
d. Object

e. Orientation

51. The Word Count command on the Tools menu displays the number of words as well as the number of _____ in the current document.
a. lines
b. characters *
c. paragraphs
d. all of the above

e. font size

52. Which operation you will perform if you need to move a block of text?
a. Copy and Paste *
b. Cut and Paste
c. Paste and Delete
d. Paste and Culete

e. Font size

53. The _____, or typeface, defines the appearance and shape of letters, numbers, and special characters.
a. font *
b. font size
c. point
d. paragraph formatting

e. all of above

54. You can detect spelling and grammar errors by
a. Press Shift + F7
b. Press Ctrl + F7
c. Press Alt+ F7
d. Press F7 *

e. Press Alt + O + C

55. Which of these toolbars allows changing of Fonts and their sizes?
a. Standard
b. Formatting *
c. Print Preview
d. None of these

e. Normal view

56. Ctrl + C
a. Copy the selected text *
b. Cut the selected text
c. Print the selected text
d. Paste the selected text

e. Print Layout view

 

57. In MS Word, Ctrl+S is for …..
a. Scenarios
b. Size
c. Save *
d. Spelling Check

e. Close Document

58. The key F12 opens a
a. Save As dialog box *
b. Open dialog box
c. Save dialog box
d. Close dialog box

e. Close Document

59… Close dialog box Ctrl + S
a. Save Document with different name
b. Save Document with same name *
c. Save Document and Close Word Application
d. Save Document and Print whole Pages

e. Save True Type Fonts

60. Ctrl + J
a. Align Justify *
b. Insert Hyperlink
c. Search
d. Print

e. Close Document

61. What is a portion of a document in which you set certain page formatting options?
a. Page
b. Document
c. Section *
d. Page Setup

e. Search

MS Excel

62. Which of the following methods cannot be used to enter data in a cell

a. Pressing an arrow key

b. Pressing the Tab key

+c. Pressing the Esc key

d. Clicking on the formula bar

e. Clicking the Enter button on the Formula bar

63. Which of the following will not cut information?

+a. Pressing Ctrl + C*

b. Selecting Edit>Cut from the menu

c. Clicking the Cut button on the standard

d. Pressing Ctrl+X

e. Pressing enter

64. Which of the following is not a way to complete a cell entry?

a. Pressing enter

b. Pressing any arrow key on the keyboard

c. Clicking the Enter button on the Formula bar

+d. Pressing spacebar*

e. Pressing an arrow key

65. Text formulas:

a. Replace cell references

b. Return ASCII values of characters

+c. Concatenate and manipulate text*

d. Show formula error value

e. Enter text and data

66. Which of the following is not a basic step in creating a worksheet?

a. Save workbook

+b. Modifiy the worksheet*

c. Enter text and data

d. Copy the worksheet

e. Show formula error value

67. How do you select an entire column?

a. Select Edit > Select > Column from the menu

+b. Click the column heading letter*

c. Hold down the shift key as you click anywhere in the column.

d. Hold down the Ctrl key as you click anywhere in the column

e. Select Insert > Find from the menu

68. When a label is too long to fit within a worksheet cell, you typically must

a. Shorten the label

b. Increase the column width*

c. Decrease the column width

d. Adjust the row height

e. All of above

69. The name box

a. Shows the location of the previously active cell

b. Appears to the left of the formula bar*

c. Appears below the status bar

d. Appears below the menu bar

e. Edit the contents of a cell

70. Comments put in cells are called

a. Smart tip

b. Cell tip*

c. Web tip

d. Soft tip

e. All of above

71. Which area in an excel window allows entering values and formulas

a. Title bar

b. Menu bar

c. Formula bar*

d. Standard toolbar

e. Use the word menu bar and toolbars

72. Status indicators are located on the

a. Vertical scroll bar

b. Horizontal scroll bar

c. Formula bar*

d. Standard toolbar

e. Menu bar

73. An excel workbook is a collection of

a. Workbooks

b. Worksheets

c. Charts

d. Worksheets and charts*

e. Workbooks and charts

74. Excel files have a default extension of

a. Xls*

b. Xlw

c. Wk1

d. 123

e. 456

75. You can use the formula palette to

a. Format cells containing numbers

b. Create and edit formulas containing functions*

c. Enter assumptions data

d. Copy a range of cells

e. Enter data

76. When you insert an excel file into a word document. The data are

a. Hyperlinked placed in a word table

b. Linked*

c. Embedded

d. Use the word menu bar and toolbars

e. All of above

77. Which of the following is not information you can specify using the solver?

a. Input cells*

b. Constraints

c. Target cell

d. Changing cells

e. All of above

78. Excel probably considers the cell entry January 1, 2000 to be a

a. Label

b. Value*

c. Formula

d. Text string

e. All of above

79. You can enter which types of data into worksheet cells?

a. Labels, values, and formulas*

b. Labe3ls and values but not formulas

c. Values and formulas but not labels

d. Formulas only

e. It can be modified

80. All worksheet formula

a. Manipulate values

b. Manipulate labels

c. Return a formula result*

d. Use the addition operator

e. Values and formulas but not labels

81. Excel worksheet cells work very similarly to what common element of the windows graphical user interface

a. Option buttons

b. List boxes

c. Text boxes*

d. Combo boxes

e. Margins

82. Without using the mouse or the arrow keys, what is the fastest way of getting to cell A1 in a spreadsheet?

a. Press Ctrl +Home*

b. Press Home

c. Press Shift + Home

d. Press Alt + Home

e. Press Shift+ Home+ Press Alt

83. Which of the following methods can not be used to edit the contents of a cell?

a. Press the Alt key*

b. Clicking the formula bar

c. Pressing the F2 key

d. Double clicking the cell

e. Click the Currency Style button on the formatting toolbar*

84. If you begin typing an entry into a cell and then realize that you don’t want your entry placed into a cell, you:

a. Press the Erase key

b. Press Esc*

c. Press the Enter button

d. Press the Edit Formula button

e. The Formula button

MS PPoint

85. What’s the easy way to apply varied animations to test on slides

a. apply effects in the custom animation text pane

b. apply an animation scheme*

c. customize bullets with animated clipart

d. all of above

e. Apply the animation scheme fade in one by one.

86. You can create a new presentation by completing all of the following except:

a. Clicking the new button on the standard toolbar

b. Clicking file, new

c. Clicking file open*

d. Pressing Ctrl + N

e. Click the document close button

 

87. Which of the following is not an option when printing handouts?

a. Six slides per page

b. Five slides per page*

c. Three slides per page

d. Two slides per page

e. B and C

 

88. Which of the following toolbars provides different options in various master views?

a. Common tasks toolbar*

b. Drawing toolbar

с, Formatting toolbar

d. Standard toolbar

e. Slides toolbar

 

 

89. You can tell when an object is active because

A) The object is highlighted*

B) Eight small sizing handles appear surrounding the text

C) A box frame appears surrounding the text

D) b and c

E) None of above

 

90. Which of the following is not an option when printing handouts?

a. Six slides per page

b. Five slides per page*

c. Three slides per page

d. Two slides per page

e. B and C

91. Any and every command can be found on the

a. Drawing toolbar

b. Formatting toolbar

c. Standard toolbar

d. Menu bar*

e. Common tasks toolbar

92. The slide that is used to introduce a topic and set the tone for the presentation is called the

a. Table slide

b. Graph slide

c. Bullet slide

d. Title slide*

e. File, add a new slide

93. Which of the following features should you use when typing in the notes text box?

a. Slide shows

b. Insert

c. Slide master

d. Zoom*

e. B and C

94. Which of the following should e used when you want to add a slide to an existing presentation?

a. File, add a new slide

b. Insert, new slide*

c. File, open

d. File, new

e. Graph slide

95. How can you get your photo album slide show to play continuously?

a. Use random slide transition

b. Launch an online broadcast

c. Loop continuously*

d. All of above

e. C and D

96. What are symbols used to identify items in a list?

a. Icons

b. Markers

c. Bullets*

d. Graphics

e. C and D

97. The power point view that displays only text (title and bullets) is:

a. Slide show

b. Slide sorter view

c. Notes page view

d. Outline view*

e. All of the above

98. which of the following should you use if you want all the slides in the presentation to have the same look?

a. The slid layout option

b. The add a slide option

c. Outline view

d. A presentation design template*

e. Templates

99. Line spacing refers to

a. The space between the lines of text*

b. The height of the line

c. The length of the line

d. a and c

e. All of above

100. Which of the following bypasses the print dialog box when printing individual slides or an entire presentation?

a. File, Print Preview

b. The print button*

c. File, print

d. Ctrl + P

e. Ctrl + end

 

102. The handout master contains placeholders for all of the following except

a. Slide number

b. Title*

c. Footer

d. Header

e. Print Preview

103.   Material consisting of text and numbers is best presented as

a. A table slide*

b. A bullet slide

c. A title slide

d. All of abovе 

e. Add clip art only if it relates to your topic

104.   The Microsoft clip gallery allows you to

a. Add word art images to a slide

b. Spell check your presentation

c. Add clip art images to a slide or slides*

d. Add slides to a presentation

e. Add clip art only if it relates to your topic

105.   After moving a clip art image to a particular location on the slide, you can immediately reverse the action using the

a. Click the not do move object command on the edit menu

b. Click on the undo button*

c. Click on redo button

d. All of above

e. Click edit, select all

106.   What is the name of the form used to input chart values?

a. Datasheet*

b. Microsoft Excel

c. Microsoft graph

d. Auto form

e. Embedding

107.   Which of the following you must first complete in order to delete an object?

a. Double click the image

b. Select the image*

c. Resize the image

d. Move the image to a new location

e. Double click

108.   The auto shapes tool provides you with

a. Fancy text to place on your slide

b. Commonly found shapes*

c. Any shape you want to add on a slide

d. Clip art that is related to your presentation

e. Insert, new slide

109. Which of the following should e used when you want to add a slide to an existing presentation?

a. File, add a new slide

b. Insert, new slide*

c. File, open

d. File, new

e. Any shape you want to add on a slide

 

MS Dbase Access

110. This data type allows alphanumeric characters and special symbols.

a. text*
b. memo
c. auto number
d. None of the above

е. record

111. Query design window has two parts. The upper part shows

a. Name of fields, field type and size
b. Tables with fields and relationships between tables
*
c. Criteria
d. Sorting check boxes

е. Edit relationship dialog box appears

112. In a database table, the category of information is called ____________

a. tuple
b. field
*
c. record
d. All of above

е. memo

113. To create a new table, in which method you don’t need to specify the field type and size?

a. Create table in Design View
b. Create Table using wizard
c. Create Table by Entering data
*
d. All of above

e. Create table in Entering data

114. Which of the following is not a database object?

a. Tables
b. Queries
c. Relationships
*
d. Reports

е. All of above

115. The third stage in designing a database is when we analyze our tables more closely and create a ___________ between tables

a. relationship*
b. Join
c. Query
d. None of these

e. Queries

116. Two tables can be linked with relationship so that the data integrity can be enforced. Where can you find Relationship Command?

a. Home Tab
b. Create Tab
c. External Data Tab
d. Database Tab
*

e. Between Tab

117. This is the stage in database design where one gathers and lists all the necessary fields for the database project.

a. data definition*
b. data refinement
c. establishing relationship
d. none of the above

e. none of above

118. The two form layout types will display multiple records at one time are tabular and___

a. columnar
b. justified
*
c. date sheet
d. pivot table

e. field name

119. The size of a field with Number data type can not be

a. 2
b. 4
c. 8
d. 16
*

e. 12

120. A small button with three dots usually displayed at the right of field properties box

a. Make button
b. Expression button
c. Build button
*
d. None of above

e. None the of above

121. The size of Yes No field is always

a. 1 bit*
b. 1 byte
c. 1 character
d. 1 GB

e. 1MB

122. This key uniquely identifies each record

a. primary key*
b. key record
c. unique key
d. field name

e. build button

123. The command center of  access file that appears when you create or open the MS Access database file.

a. Database Window*
b. Query Window
c. Design View Window
d. Switchboard

e. Relationships

124. To duplicate a controls formatting you can use___

a. Manager
b. Wizard
c. Painter
*
d. Control

e. Currency

125. Which field type will you select when creating a new table if you require to enter long text in that field?

a. Text
b. Memo
*
c. Currency
d. Hyperlink

e. Manager

126. This option allows you to build a new table by entering data directly into the datasheet.

a. datasheet view*
b. design view
c. link table
d. None of the above

e. None of above

127. In table design view, which key can be used to switch between the field names and properties panels?

a. F3
b. F4
c. F5
d. F6
*

e. F7

128. Which of the following is NOT a type of Microsoft Access database object?

a. Table
b. Form
c. Worksheets
*
d. Modules

e. Hyperlink

129. Which of the field has width 8 bytes?

a. Memo
b. Number
c. Date/Time
*
d. Hyperlink

e. Worksheets

130. Which of the following database object hold data?

a. Forms
b. Reports
c. Queries
d. Tables
*

e. Number

131. The__ button on the tool box display data from a related table

a. Sub form sub report*
b. Relationships
c. Select objects
d. More controls

e. Worksheets

132. The expression builder is an access tool that controls an expression___ for entering an expression

a. Table
b. Box
*
c. Cell
d. Palette

e. Memo

133. A __________ enables you to view data from a table based on a specific criterion

a. Form
b. Query
*
c. Macro
d. Report

e. Table

134. Which of the following database object produces the final result to present?

a. Forms
b. Reports
*
c. Queries
d. Tables

e. Macros

135. A __ name must be unique within a database

a. Table*
b. Field
c. Record
d. Character

e. Query

136. It is an association established between common fields of two tables.

a. line
b. relationship
*
c. primary key
d. records

e. Character

137. When entering field name, how many characters you can type in maximum?

a. 60
b. 64
*
c. 68

d. 62
e. Any number of character

138. It is a database object to view, change, and analyze data in different ways

a. query*
b. form
c. report
d. None of the above

e. Hyperlink

139. To achieve AND effect when you are entering criteria in a query design window

a. write criteria values vertically one in a row
b. write criteria values horizontally
*
c. Write criteria values in same field separated with AND
d. Write criteria values in same field separated with &

e. Huge collection of MCQ questions

140. What are the columns in a Microsoft Access table called?

a. Rows
b. Records
c. Fields
*
d. Columns

e. Hyperlinks

141. Unlike text data type, this can store up to maximum of 65 535 characters.

a. memo*
b. data/time
c. number
d. All of above

e. Both of above

142. Which field type can store photos?

a. Hyperlink
b. OLE
*
c. Both of these can be used
d. Access tables can’t store photos

e. Number

143. It is most common type of query. It retrieves records from one or more tables and then displays the

a. Parameter
b. Select
*
c. Crosstab
d. All of above

e. None of the above

144. It is a query that when run displays its own dialog box prompting you for information, such as

a. Select
b. Crosstab
c. Parameter
*
d. Append

e. All of above

145. What is the maximum length a text field can be?

a. 120
b. 255
*
c. 265
d. 75

e. 155

146. Microsoft Access is a

a. RDBMS*
b. OODBMS
c. ORDBMS
d. Network database model

e. Pivot Chart View

147. Which of the following store command to retrieve data from database?

a. Forms
b. Reports
c. Queries
*
d. Tables

e. Parameter

148. If you write criteria values vertically (one in a row) it will mean

a. OR conditions*
b. AND conditions
c. NOT condition
d. None of above

e. Both of above

149. The key uniquely identifies each record in a table.

a. primary key*
b. key word
c. filed name
d. All of above

e. Both of above

150. What do you mean by one to many relationship between Student and Class table?

a. One student can have many classes*
b. One class may have many student
c. Many classes may have many students
d. Many students may have many classes

e. Create Table using wizard

151. A part of database that stores only one type of data is

a. Report

b. Field*

c. Query

d. Record

e. Table

 

152. A database can be best described as

a. Organized collection of data*

b. Useful presentation of data

с. Graphical representation of data

d. All of above

е. Both of above

 

153. Which of the following term is least related to database?

А) Attributes

B) Tuples

С) Relationship

D) Columns*

Е) File

 

154. Collection of related records in a database is known as

a.       File

b.      Bench

c.       Table*

d.      Relationship

e.       Attributes

 

HTML

 

155. In HTML, Uniform Resource Identifier (URI) is used to

a. To create a frame document .

b. To create a image map in the webpage.

c. To customize the image in the webpage.

d. To identify a name or a resource on the internet. *

e. To the most authentic answers for your subjective

156. CSS is an acronym for

a. Cascading Style Sheet *

b. Costume Style Sheet

c. Cascading System Style

d. None of the Above

e. Costume Sheet Style

 

157. Who invented World Wide Web (WWW)?

a. Blaise Pascal

b. Charles Babbage

c. Herman Hollerith

d. Tim Berners-Lee *

e. Web Pages

 

158. What is the use of Forms in HTML?

a. to display contents of email.

b. to display animation effect.

c. to collect user’s input. *

d. None of the Above.

e. All of the Above.

 

159. What is the use of iframe in HTML?

a. to display a web page within a web page. *

b. to display a web page with animation effect.

c. to display a web page without browser.

d. All of the Above.

e. File Transfer Protocol

 

160. FTP is an acronym for

a. File Transaction Protocol

b. File Transmission Protocol

c. File Translation Protocol

d. File Transfer Protocol *

e. File  Transes Protocol

 

161. Which HTML Tag will use to scroll a text in web page?

a. <marquee> … </marquee> *

b. <scroll> … </scroll>

c. <round> … </round>

d. <go> … </go>

e. <round>…</go>

 

162. Which organization defines the Web Standards?

a. Microsoft Corporation

b. IBM Corporation

c. World Wide Web Consortium *

d. Apple Inc.

e. Web Consortium

 

163. Which of following HTML Tag will inserting a line break?

a. <p />

b. <lb />

c. <br /> *

d. <break />

e. <s />

 

164. Which of the following tags are related to Table in HTML ?

a. <table><row><column>

b. <table><tr><td> *

c. <table><head><body>                                                                           

d. <table><header><footer>

e. <table><the><body>

 

165. Which of the following is correct to align H1 tag to Right Alignment

a. A. <h1 align = “right”> … *

b. B. <h1 alignment = “right”> …

c. C. <h1 tag align = “right”> … </h1>

d. D. H1 cannot make Right Alignment

e. E. <font name = “font name”> … </font>

 

166. Which tag is used to display Preformatted texts?

a. A. <pre> … </ pre> *

b. B. <prefor> … </ prefor>

c. c. <pre text> … </ pre text>

d. D. <pre format> … </ pre format>

e. E.<pre>…</pre format>

167. Which of the following is used to create web pages?

a. HTML *

b. C

c. JVM

d. DTD

e. H

 

168. HTML is considered as ___ language

a. Programming Langauge

b. OOP Language

c. High Level Language

d. Markup Language *

e. Attributes

 

169. HTML language is a set of markup ___

a. Attributes

b. Tags *

c. Sets

d. Groups

e. Content

 

170. HTML tags are used to describe document ____

a. Definition

b. Language

c. Content *

e. Attributes

d. None of these

 

 

 

171. Page designed in HTML is called a

a. Yellow Page

b. Web Page *

c. Server Page

d. Front Page

e. Read Page

 

172. HTML document is saved using ____ extension.

a.  a.htl

b. a.html *

c. a.hml

d. a.htnl

e. a.htrl

 

173. The software that can read and render HTML documents is

a. Server

b. Compiler

c. Interpreter

d. Browser *

e.  Menu

 

174. HTML was first proposed in year ___.

a. 1980

b. 1990 *

c. 1995

d. 2000

e.1994

 

175. HTML tags are surrounded by ___ brackets

a. Angle *

b. Square

c. Round

d. Curly

e. Closed

 

176. Opening tag of HTML is called

a. Ending tag

b. Starting tag *

c. Closed tag

d. Pair tags

e. Curly tag

 

177. HTML document contain one root tag called ____

a. HEAD

b. Title

c. Body

d. HTML *

e. HEADL

 

178. Basic fundamental block is called as ___

a. HTML tag *

b. HTML body

c. HTML Attribute

d. HTML Element

e. HTML quiz

 

179. Pick the odd out

a. Table *

b. TR

c. TD

d. Form

e. HTML

 

180. The first page of a website is called

a. Design

b. Home page *

c. First page

d. Main page

e. Attribute

 

181. Which is the largest heading tag?

a. H1 *

b. H3

c. H4

d. H6

e. H2

 

network

 

182. The network layer concerns with
a) bits
b) frames
c) packets*
d) none of the mentioned
e) segments

183. The network layer protocol of internet is
a) ethernet
b) internet protocol*
c) hypertext transfer protocol
d) none of the mentioned
e) application

184. Transport layer aggregates data from different applications into a single stream before passing it to
a) network layer*
b) data link layer
c) application layer
d) physical layer
e) data link layer

185. Which one of the following is a transport layer protocol used in internet?
a) TCP
b) UDP
c) TCP and UDP*
d) none of the mentioned
e) POP

186. An endpoint of an inter-process communication flow across a computer network is called
a) socket*
b) pipe
c) port
d) none of the mentioned
e) frame

187. Which one of the following is a version of UDP with congestion control?
a) datagram congestion control protocol*
b) stream control transmission protocol
c) structured stream transport
d) none of the mentioned
e) application to application communication

188. A _____ is a TCP name for a transport service access point.
a) port*
b) pipe
c) node
d) none of the mentioned
e) post

189. Transport layer protocols deals with
a) application to application communication
b) process to process communication*
c) node to node communication
d) none of the mentioned
e) neighbor discovery protocol
190. Which one of the following is a transport layer protocol?
a) stream control transmission protocol*
b) internet control message protocol
c) neighbor discovery protocol
d) dynamic host configuration protocol
e) process to process communication

191. The ____ translates internet domain and host names to IP address.
a) domain name system*
b) routing information protocol
c) network time protocol
d) internet relay chat
e) types of messages exchanged

192. Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?
a) HTTP
b) FTP
c) telnet*
d) none of the mentioned
e) types of messages exchanged

193. Which one of the following protocol delivers/stores mail to reciever server?
a) simple mail transfer protocol*
b) post office protocol
c) internet mail access protocol
d) hypertext transfer protocol
e) simple newtwork management protocol

194. The ASCII encoding of binary data is called
a) base 64 encoding*
b) base 32 encoding
c) base 16 encoding
d) base 8 encoding
e) base 4 encoding

195. Which one of the following is not an application layer protocol?
a) media gateway protocol
b) dynamic host configuration protocol
c) resource reservation protocol*
d) session initiation protocol
e) session maintenance protocol

196. When displaying a web page, the application layer uses the
a) HTTP protocol*
b) FTP protocol
c) SMTP protocol
d) none of the mentioned
e) TCP protocol

197. This is not a application layer protocol
a) HTTP
b) SMTP
c) FTP
d) TCP*
e) CCTV

198. The packet of information at the application layer is called
a) Packet
b) Message*
c) Segment
d) Frame
e)  Data

199. E-mail is
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application*
d) None of the mentioned
e) Application layer

200.  Pick the odd one out
a) File transfer
b) File download
c) E-mail
d) Interactive games*
e) Massage

*******************************

ICT

201.  ICT is…

a)      information on objects and phenomena of the environment, their parameters, properties and state.

b)      organized sets of instructions for controlling the computer.

c)      information and communication technologies, which include a variety of digital technologies, with which you can create, save, distribute, transmit certain information or provide services.

d)      responsible for interpreting and executing most of the commands from the computer's hardware and software.

e)      the collection of techniques, skills, methods and processes used in the production of goods or services or in the accomplishment of objectives, such as scientific investigation.

 

202. Information is …

a)      information and communication technologies, which include a variety of digital technologies, with which you can create, save, distribute, transmit certain information or provide services.

b)     information on objects and phenomena of the environment, their parameters, properties and state.

c)      organized sets of instructions for controlling the computer.

d)      responsible for interpreting and executing most of the commands from the computer's hardware and software.

e)      the collection of techniques, skills, methods and processes used in the production of goods or services.

 

 

203.Technology is…

a)      information and communication technologies, which include a variety of digital technologies, with which you can create, save, distribute, transmit certain information or provide services.

b)      information on objects and phenomena of the environment, their parameters, properties and state.

c)      organized sets of instructions for controlling the computer.

d)      responsible for interpreting and executing most of the commands from the computer's hardware and software.

e)      the collection of techniques, skills, methods and processes used in the production of goods or services 

 

 

INTRODUCTION TO COMPUTER SYSTEMS.

ARCHITECTURE OF COMPUTER SYSTEMS.

204. First Generation of computer:

a)      integrated circuit

b)     vacuum tube

c)      transistor

d)      Instruction Register

e)      microprocessor

 

205.Second Generation of computer:

a)      integrated circuit

b)      vacuum tube

c)      transistor

d)      Instruction Register

e)      microprocessor

 

206.Third Generation of computer:

a)      integrated circuit

b)      vacuum tube

c)      transistor

d)      Instruction Register

e)      microprocessor

 

207. Fourth Generation of computer:

a)      integrated circuit

b)      vacuum tube

c)      transistor

d)      Instruction Register

e)      microprocessor

 

 

208. A computer is...

a)      electronic devices; the parts you can see and touch.

b)      organized sets of instructions for controlling the computer.

c)      raw facts, which the computer can manipulate and process into information that is useful to people.

d)     an electronic device used to process data.

e)      responsible for interpreting and executing most of the commands from the computer's hardware and software.

 

209.Hardware consists of...

a)      electronic devices; the parts you can see and touch.

b)      organized sets of instructions for controlling the computer.

c)      raw facts, which the computer can manipulate and process into information that is useful to people.

d)      an electronic device used to process data.

e)      responsible for interpreting and executing most of the commands from the computer's hardware and software.

 

210.         Software consists of...

a)      electronic devices; the parts you can see and touch.

b)     organized sets of instructions for controlling the computer.

c)      raw facts, which the computer can manipulate and process into information that is useful to people.

d)      an electronic device used to process data.

e)      responsible for interpreting and executing most of the commands from the computer's hardware and software.

 

211.         Data consists of...

a)      electronic devices; the parts you can see and touch.

b)      organized sets of instructions for controlling the computer.

c)      raw facts, which the computer can manipulate and process into information that is useful to people.

d)      an electronic device used to process data.

e)      responsible for interpreting and executing most of the commands from the computer's hardware and software.

 

212.         Printer is a/an

a)      Output device             

b)      Storage device 

c)      Input device

d)      Processing device  

e)      Printing device.

 

213.         Microphone is a ___

a)      Output device             

b)      Storage device 

c)      Input device

d)      Processing device  

e)      Printing device.

 

214.                            Which one of the following can be called as a peripheral?

a)      Control unit   

b)      Arithmetic unit 

c)      Speaker        

d)      Logic unit   

e)      Main memory.

 

 

215.                            Which one of the following can be called as a peripheral?

a)      Control unit   

b)     Flash drive        

c)       Printer

d)      Plotter

e)      Monitor.

 

216.         The Central Processing Unit (CPU) is

a)      responsible for interpreting and executing most of the commands from the computer's hardware and software.

b)      performs arithmetic and logical operations.

c)      a sub-unit of CPU that controls and directs the flow of information throughout the computer system.

d)      serves as a single platform to connect all of the parts of a computer together.

e)      is a data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.

 

217.         The arithmetic logic unit (ALU) is

a)      responsible for interpreting and executing most of the commands from the computer's hardware and software.

b)     performs arithmetic and logical operations.

c)      a sub-unit of CPU that controls and directs the flow of information throughout the computer system.

d)      serves as a single platform to connect all of the parts of a computer together.

e)      is a data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.

 

218.         Control Unit is

a)      responsible for interpreting and executing most of the commands from the computer's hardware and software.

b)      performs arithmetic and logical operations.

c)      a sub-unit of CPU that controls and directs the flow of information throughout the computer system.

d)      serves as a single platform to connect all of the parts of a computer together.

e)      is a data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.

 

219.         The motherboard is

a)      responsible for interpreting and executing most of the commands from the computer's hardware and software.

b)      performs arithmetic and logical operations.

c)      a sub-unit of CPU that controls and directs the flow of information throughout the computer system.

d)     serves as a single platform to connect all of the parts of a computer together.

e)      is a data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.

 

220.         A hard disk drive (HDD) is

a)      responsible for interpreting and executing most of the commands from the computer's hardware and software.

b)      performs arithmetic and logical operations.

c)      a sub-unit of CPU that controls and directs the flow of information throughout the computer system.

d)      serves as a single platform to connect all of the parts of a computer together.

e)      is a data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.

 

221.         A key that is used to remove a letter/space which is behind the cursor on the screen, is called the 

a)      Backspace Key

b)     Delete Key

c)      Caps Lock Key

d)      Shift Key

e)      Control Key

 

222.         A key that is used to remove a letter/space which is in front of the cursor on the screen, is called the   

a)      Backspace Key

b)      Delete Key

c)      Caps Lock Key

d)      Shift Key

e)      Control Key

 

223.         The long key on a keyboard which is used when you want to separate one word from another when writing, is called the   

a)      Backspace Key

b)      Delete Key

c)      Space Bar

d)      Shift Key

e)      Control Key

 

operating system

 

 

224.         An operating system (OS) is

a)      a software program that manages the hardware and software resources of a computer.

b)      a set of methods of interaction of a computer program and the user of this program.

c)      a set of methods for communication between programs.

d)      a way of interaction of physical devices.

e)      a set of instructions, stored digitally within the computer's memory

 

225.         User interface

a)      a software program that manages the hardware and software resources of a computer.

b)     a set of methods of interaction of a computer program and the user of this program.

c)      a set of methods for communication between programs.

d)      a way of interaction of physical devices.

e)      a set of instructions, stored digitally within the computer's memory

 

226.         Software interface

a)      a software program that manages the hardware and software resources of a computer.

b)      a set of methods of interaction of a computer program and the user of this program.

c)      a set of methods for communication between programs.

d)      a way of interaction of physical devices.

e)      a set of instructions, stored digitally within the computer's memory

 

227.         Physical interface

a)      a software program that manages the hardware and software resources of a computer.

b)      a set of methods of interaction of a computer program and the user of this program.

c)      a set of methods for communication between programs.

d)     a way of interaction of physical devices.

e)      a set of instructions, stored digitally within the computer's memory

 

 

 

Database

 

228.         Database model:

a)      Hierarchical

b)      textual

c)      numeric

d)      indexed

e)      cyclic

 

229.         Database model:

a)      textual

b)      numeric

c)      Network

d)      indexed

e)      cyclic

 

 

230.         Database model:

a)      textual

b)      numeric

c)      indexed

d)     Relational

e)      cyclic

 

231. Here the focus is on describing the stages in data processing: data collection

A)    gathering raw data to process+

B)    arranging and systematizing data

C)    double-checking and cleaning data

D)    entering data into a system

E)     arranging data into table format for analysis

 

232.Here the focus is on describing the stages in data processing: data coding

A)    gathering raw data to process,

B)    arranging and systematizing+

C)    double-checking and cleaning data

D)    entering data into a system

E)     creating categories in order to organise data into groups

 

233.Here the focus is on describing the stages in data processing: data validation

A)    double-checking and cleaning data+

B)    entering data into a system

C)    arranging data into table format for analysis

D)    creating categories in order to organise data into groups

E)     gathering raw data to process

 

234.Here the focus is on describing the stages in data processing: data entry

A)    gathering raw data to process

B)    arranging and systematizing

C)    double-checking and cleaning data

D)    entering data into a system+

E)     creating categories in order to organise data into groups

 

235.Here the focus is on describing the stages in data processing: data tabulation  

A)    double-checking and cleaning data

B)    entering data into a system

C)    arranging data into table format for analysis +

D)    creating categories in order to organise data into groups

E)     gathering raw data to process

 

236.Here the focus is on describing the stages in data processing: data sorting

A)    double-checking and cleaning data

B)    entering data into a system

C)    arranging data into table format for analysis

D)    creating categories in order to organise data into groups+

E)     gathering raw data to process

 

Cyber security

 

237. Cyber attacks  is

A)    attacks on acomputer from the internet +

B)    use ativirus softwars

C)    insert firewalls

D)    uninstall  unnecessary software

E)     check secutity settings

 

238.A network perimeter is

A)    the topologes as a  star,  a bus, a circle

B)    the network boundary between a private user network and the internet+

C)    improving the security of a computer system

D)    a web application protection firewall (WAF)

E)     the measure types of networks

 

239.Which means encryption

A)    Encoding +

B)    Secure Socket Layer (SSL)

C)    Coding

D)    factor authentication

E)     method of Hackers

 

240. What is Secure Socket Layer (SSL)?

A)    two-factor authentication

B)    illegal access to a computer system

C)    malicious software

D)    a method of encryption+

E)     antivirus software

 

241. Two-factor authentication include next independent forms of identification as

A)    your name and  an email  adress

B)    your name and a password or PIN number+

C)    your login and a password

D)    your account and ip adress

E)     your sername and fullname

 

242. Who is Hackers?

A)    are people who serves your computer system

B)    are people who protects your computer system

C)    are people who is troubleshooing in your computer system

D)    are people who try to gain illegal access to a computer system+

E)     a branch of computer security  specifically related  to the internet

243. Cyber security is

A)    a method of encryption information in computer system

B)    illegal access to a computer system

C)    a branch of computer security  specifically related  to the internet +

D)    method of Hackers, which hack codes in a computer system

E)     the type of  services a computer system

 

244. Hacking, denial of service attack, virus dissemination, computer vandalism are types of

A)    Cyber Terrorism

B)    Software Piracy

C)    Cyber Crime +

D)    Antivirus softwares

E)     Cyber security

 

245. A cyber criminal is a

A)    are people who protects your computer system

B)    are people who is troubleshooing in your computer system

C)    are people who try to gain illegal access to a computer system

D)    a branch of computer security  specifically related  to the internet

E)     person who uses computers and the Internet to commit crimes+

246. Cyber Sapiens is

A) A prefix that indicates relevance to, or involvement with, computers, computer systems, and electronic control systems

B) The study of control system theory in terms of the relationship between animal and machine behavior

C) An expression for a computer or robot with artificial intelligence (AI) on the forefront of current technology+

D) The usage of computers and the Internet in conducting warfare in the cyberspace

E)A kind of cyber attack which results in unavailability of service.

 

247. The usage of computers and the Internet in conducting warfare in the cyberspace is

A)    Cyber vandalism

B)    Cyber war+

C)    Hacktivism

D)    Denial of Service

E)     Cybernetics

 

248. Cyber vandalism is

A)    Combination of words: “hack(er)” and “activism”

B)    A kind of cyber attack which results in unavailability of service

C)    Cyber attacks that deface web pages+

D)    Denial of Service

E)     Alternative expression for information super highway

 

249. What is Identity Theft?

A) software  false negative, false positive, rootkit, security software,  capabilities sweep, virus removal software, web page analysis

B) anti-virus software, backup, block, cyber criminal, detect

C) attack, audit log, authenticated, backdoor, bug, firewall,  Checking Measures  intruder, keylogger, popup, protocol, security  certainty

D) card scanning, cyber, fraud, harming, identity theft,  Discussing malware, phishing, pretexting, scanner, spyware,  suspicions Trojan horse, worm+

E) overwriting virus, piggybacking, replicate, resident  possible

 

250. Preventative  Email is virus which

A) software  false negative, false positive, rootkit, security software,  capabilities sweep, virus removal software, web page analysis

B) anti-virus software, backup, block, cyber criminal, detect

C) attack, audit log, authenticated, backdoor, bug, firewall,  Checking Measures  intruder, keylogger, popup, protocol, security  certainty+

D) card scanning, cyber, fraud, harming, identity theft,  Discussing malware, phishing, pretexting, scanner, spyware,  suspicions Trojan horse, worm

E) overwriting virus, piggybacking, replicate, resident  possible

 

Cloud computing

 

251. _________ model consists of the particular types of services that you can access on a cloud computing platform.
a) Service*
b) Deployment
c) Application

d) Depatment

e) None of the mentioned

252. Point out the correct statement :
a) The use of the word “cloud” makes reference to the two essential concepts
b) Cloud computing abstracts systems by pooling and sharing resources*
c) Cloud computing is nothing more than the Internet

d) Model consists of the particular types of services that you can access on a cloud computing platform
e) All of the mentioned

253. ________ refers to the location and management of the cloud’s infrastructure.
a) Service
b) Deployment*
c) Application

d) Depatment

e) None of the mentioned

254. Which of the following is deployment model ?
a) public
b) private
c) hybrid

d) statement
e) a), b), c) *

255. Point out the wrong statement :
a) Cloud Computing has two distinct sets of models
b) Amazon has built a worldwide network of datacenters to service its search engine*
c) Azure enables .NET Framework applications to run over the Internet

d) Cloud computing is nothing more than the Internet

e) None of the mentioned


256. Which of the following is best known service model ?
a) SaaS
b) IaaS
c) PaaS

d) a-c*
e) All of the mentioned

257. The __________ model originally did not require a cloud to use virtualization to pool resources.
a) NEFT
b) NIST*
c) NIT

d) NIS

e) All of the mentioned

258. _______ model attempts to categorize a cloud network based on four dimensional factors.
a) Cloud Square
b) Cloud Service
c) Cloud Cube*
d) All of the mentioned
e) Cloud Owner

259. Which of the following dimension is related to organization’s boundaries ?
a) Physical location of data*
b) Ownership
c) Security boundary

d) Topologya
e) All of the mentioned

 

260. Telecommunication is

A) A form of free software; however, the author of shareware hopes you will make a voluntary

contribution for using the product

B) Software that searches, gathers, and identifies information from a database based on an index,

keywords or titles

C) Provides the tools for working with numbers and allows you to create and edit electronic

spreadsheets in managing and analyzing information

D) The act of sending and receiving information, such as data, text, pictures, voice, and video

electronically+

E)Protection of a computer, its files, or a computer network from use without permission of the

owner or owners

 

**************************

261. What are presentations?

A. A sequence of slides that usually incorporate text, sound, graphics, and animation

B. A speech

C. Information presented using more text than graphics and animation

D. A television interview or news report

E. Set of slides

 

262. What is multimedia?

A. Moving images and text

B. Images and audio

C. Integration of still and moving images, text, and sounds by means of computer technology

D. Programs that combine text and images on a television screen

E. Integration of still and moving images, text, and sounds

 

263. What does SSL stand for?

A. Saving Sharing and Limits

B. Safe Secured and Locked

C. Secure Socket Limbs

D. Secure Socket Layers

E. Secure Sets for Layers

 

264. What advances in multimedia were made in the early 1970's

A. Advances in the ability to fit more text in a presentation

B. Advances in making supercomputers

C. Advances in integrating computers with CDs

D. Advances in graphics, movies, and audio

E. Advances in presentations

 

265. What is computer-based training?

A. A video game

B. A method of training a computer to reject viruses

C. A method of education that allows people to learn at their own pace, using specifically designed interactive software

D. A method of training the computer to perform routine tasks

E. A method of training with computer

 

266. Every web page has its own

A. Database connection

B. Personal search engine

C. Animation scheme

D. URL

E. IP-address

 

267. The website that offers a service that let users search a specific content on the internet is __________.

A. Search Engine

B. Social Network

C. Online Storage

 

268. Which of the following is an example of search engines?

A. command.com

B. Yahoo.com

C. vk.com

D. Facebook.com

E. gmail.com

 

269. ______ is a type of website that offers free creation of websites.

A. Prezi.com

B. Wix.com

C. MS Power Point

D. Google.com

E. Powtoon.com

 

270. What is a forum?

A. A type of website that allows users to create a social network

B. A type of website where users can create, reply and discuss on topics

C. A website that offers free online storage.

D. Open on-line Internet Conference

E. A type of dialogue

 

271. Which domains are the most reiable?

A. .gov and .edu

B. .net and .gov

C. .com and .net

D. .org and .uk

E. .kz

 

272. The .com domain web sites are _______?

A. Commercial enterprises and other mixed sites.

B. Government institutions

C. Educational institutions

D. Non-profit organizations

E. Personal web sites

 

273. The .org domains

A. Are always non-profit organizations that are reputable.

B. Contain reputable non-profit organizations with reliable information always.

C. Contain only advocacy group web sites with political agendas

D. Must be evaluated well because this domain contains both very reputable non-profit organization web sites and advocacy groups with hidden agendas

E. contain databases of world-wide organizations

 

274. If the web site has an author and looks professional

A. You should expect good research

B. You should research the author only

C. You should look at the domain

D. You should research the author, look at the domain, check the links, check for errors, look for bias, etc.

E. You can be sure that it’s a popular site

 

275. What is Cloud Computing replacing?

A. Corporate data centers

B. Expensive personal computer hardware

C. Expensive software upgrades

D. All of the above

E. Your personal computer

 

276. "Cloud" in cloud computing represents what?

A. Wireless

B. Hard drives

C. People

D. Internet

E. Software

 

277. Cloud Computing has below layers

A. User, Software, Platform, Infrastructure, Server

B. Client, Application, Platform, Infrastructure, Server

C. Software, Application, Platform, Infrastructure, Server

D. Software, Hardware, Operating System, Server

E. Platform, Infrastructure, Server

 

278. Deployment Models are

A. Public Cloud, Protected Cloud, Default Cloud and Private Cloud

B. Community Cloud, Hybrid Cloud, Protected Cloud and Default Cloud

C. Public Cloud, Community Cloud, Hybrid Cloud and Private Cloud

D. Default Cloud, Community Cloud, Protected Cloud

E. All of the above

 

279. Which of these should a company consider before implementing cloud computing technology?

A. Employee satisfaction

B. Potential cost reduction

C. Information sensitivity

D. All of the above

E. All answers are incorrect

 

280. What is the number one concern about cloud computing?

A. Too expensive

B. Security concerns

C. Too many platforms

D. Accessability

E. All of the above

 

281. 1) The term "Cloud" in cloud computing represents what

A. People

B. Computer

C. Wireless Device

D. Internet

E. All of the above

 

282. What is Cloud Computing replacing?

A. Corporate data centers

B. Expensive personal computer hardware

C. Expensive software upgrades

D. All of the above

 

283. E-commerce is:

A. Business-to-Business transactions and Business-to-Consumer transactions

B. Getting money from your computer online

C. Selling your home on the Internet

D. A revolution in business practices

E. All of the above

 

284. What is telemedicine?

A. Something that gives people access to the expertise of specialties in urban hospitals through the use of multimedia and computer networks

B. A computer game that allows people to pretend to be doctors

C. A database that lists and explains all known medicines

D. An advertisement for the local grocery store's pharmacy

E. All of the above

 

285. What are the benefits of groupware?

A. Member of the group can feel like they can belong

B. Members of the group can share programs, computer files, and other resources

C. Members of the group can read e-mails sent to other group members

D. Members of the group can rely on the other people in the group to do their work

E. All of the above

 

286. How does multimedia help school-age children?

A. It replaces direct textbook reading

B. It helps students learn in new and stimulating ways and allows them to apply their knowledge creatively

C. It allows students to control all their learning

D. It replaces teacher lectures

E. All of the above

 

287. What did ARPA do?

A. Developed facsimile equipment

B. Linked several computers into a network called ARPANET

C. Laid the first transatlantic communication cables

D. Created the first server-based email

E. All of the above

 

288. What are some examples of multimedia?

A. Video games, movies, and television

B. Television series

C. Computer-generated graphics

D. Digital pictures

E. All of the above

 

289. To protect your privacy online fill out forms only when the website displays

A. Http://

B. Ftps://

C. Ftp://

D. Https:

E. All of the above

 

290. An individual's ability to restrict or eliminate the collection, use, and sale of his/her confidential personal information

A. Protection

B. Privacy

C. Ethics

D. Anonymity

E. All of the above

 

291. _______ activities committed using the Internet  that violate state, federal, or international laws.

A. Hacker

B. Spector

C. Computer crime

D. Cybercime

E. Criminal

 

292. An area of law dedicated to computer crime

A. Cyberlaw

B. Cyberstalking

C. Cybercrime

D. Cyberbulling

E. Cyberdealer

 

293. Passwords should consist of _______

A. Numbers

B. Lowercase letters

C. Special characters

D. Uppercase letters

E. All of the above

 

294. Which of the following is FALSE about teachers using email and instant messaging with their students?

A. It is a way to communicate with your students, their families, and professional colleagues.

B. Children and adolescents are the largest users of email and instant messaging technologies.

C. Teachers who use email and instant message to communicate with students and their families are lazy.

D. Fewer teachers use instant messaging because the kind of informal language found in IM can often be misunderstood or misused.

E. All of the above

 

295. What is a Wiki?

A. Electronic forums where teachers and students discuss educational topics.

B. A publicaly accessible online journal written by an individual for others to read and comment on.

C. A website or blogspace that is collaboratively edited and maintained by a group of people, in our case teachers and students.

D. Learning resource

E. All of the above

 

296. In schools, wikis allow students and teachers to which of the following?

A. Use technology in meaningful ways in the classroom

B. Collaborate with peers and colleagues

C. Publish their writing and other creative or scientific work

D. Receive feedback about their learning both inside and outside the classroom

E. All of the above

 

297. Streaming multimedia is a(n) _______ method that facilitates the transmission of audio and video files from computer to computer in a stream.

A. Intranet data transfer

B. Internet data transfer

C. Primer

D. Media server application

E. All of the above

 

298. _______ and _______ provide an inexpensive way to up-to-the-minute news and information to a classroom.

A. Pull technology and client pull

B. Web feeds and RSS

C. Push technologies and data channels

D. RSS and data channels

E. All of the above

 

299. _______ differs from ordinary e-mail in the immediacy of the message exchange and also makes a continued exchange simpler than sending e-mail back and forth.

A. Media transfer

B. Web whiteboarding

C. Streaming video

D. Instant messaging

E. All of the above

 

300. _______ allows users, regardless of location or connection speed, to share practically any kind of file with a limitless population of Internet users (i.e. Napster).  As for educational purposes, this model will work great as an exchange for learning objects or units of learning.

A. Peer-to-peer file sharing

B Push technologies

C. Internet telephony

D. Streaming audio

E. All of the above

 

****************************


 

Скачано с www.znanio.ru

Can you tell what passes into and out from the computer via its ports?

Can you tell what passes into and out from the computer via its ports?

B) Symbolic code* C) Gray codes

B) Symbolic code* C) Gray codes

E) 1408 16. Which of the following terms is the most closely related to main memory?

E) 1408 16. Which of the following terms is the most closely related to main memory?

EBCDIC can code up to how many different characters?

EBCDIC can code up to how many different characters?

MS Word 29. The ability to combine name and addresses with a standard document is called _________

MS Word 29. The ability to combine name and addresses with a standard document is called _________

End Key a. Moves the cursor end of the line * b

End Key a. Moves the cursor end of the line * b

Where can you find the horizontal split bar on

Where can you find the horizontal split bar on

Document * b. Character c.

Document * b. Character c.

In MS Word, Ctrl+S is for ….. a

In MS Word, Ctrl+S is for ….. a

Which of the following is not a way to complete a cell entry? a

Which of the following is not a way to complete a cell entry? a

Status indicators are located on the a

Status indicators are located on the a

All worksheet formula a. Manipulate values b

All worksheet formula a. Manipulate values b

Which of the following is not an option when printing handouts? a

Which of the following is not an option when printing handouts? a

Slide master d. Zoom* e. B and

Slide master d. Zoom* e. B and

Which of the following bypasses the print dialog box when printing individual slides or an entire presentation? a

Which of the following bypasses the print dialog box when printing individual slides or an entire presentation? a

Resize the image d. Move the image to a new location e

Resize the image d. Move the image to a new location e

Which of the following is not a database object? a

Which of the following is not a database object? a

The size of Yes No field is always a

The size of Yes No field is always a

Which of the following is NOT a type of

Which of the following is NOT a type of

Table * b. Field c. Record d

Table * b. Field c. Record d

Both of these can be used d.

Both of these can be used d.

All of above e. Both of above 150

All of above e. Both of above 150

Costume Style Sheet c. Cascading

Costume Style Sheet c. Cascading

Which of the following tags are related to

Which of the following tags are related to

Page designed in HTML is called a a

Page designed in HTML is called a a

HTML Attribute d. HTML Element e

HTML Attribute d. HTML Element e

Which one of the following is a transport layer protocol used in internet? a)

Which one of the following is a transport layer protocol used in internet? a)

Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host…

Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host…

The packet of information at the application layer is called a)

The packet of information at the application layer is called a)

INTRODUCTION TO COMPUTER SYSTEMS

INTRODUCTION TO COMPUTER SYSTEMS

Hardware consists of .. . a) electronic devices; the parts you can see and touch

Hardware consists of .. . a) electronic devices; the parts you can see and touch

Which one of the following can be called as a peripheral? a)

Which one of the following can be called as a peripheral? a)

CPU that controls and directs the flow of information throughout the computer system

CPU that controls and directs the flow of information throughout the computer system

Software interface a) a software program that manages the hardware and software resources of a computer

Software interface a) a software program that manages the hardware and software resources of a computer

A) entering data into a system

A) entering data into a system

A) the measure types of networks 23 9

A) the measure types of networks 23 9

A) a branch of computer security specifically related to the internet

A) a branch of computer security specifically related to the internet

D) card scanning, cyber, fraud, harming, identity theft,

D) card scanning, cyber, fraud, harming, identity theft,

The __________ model originally did not require a cloud to use virtualization to pool resources

The __________ model originally did not require a cloud to use virtualization to pool resources

E. Integration of still and moving images, text, and sounds 263

E. Integration of still and moving images, text, and sounds 263

A. A type of website that allows users to create a social network

A. A type of website that allows users to create a social network

B. Client, Application, Platform,

B. Client, Application, Platform,

D. An advertisement for the local grocery store's pharmacy

D. An advertisement for the local grocery store's pharmacy

D. Cybercime E. Criminal 292

D. Cybercime E. Criminal 292

A. Pull technology and client pull

A. Pull technology and client pull
Материалы на данной страницы взяты из открытых истончиков либо размещены пользователем в соответствии с договором-офертой сайта. Вы можете сообщить о нарушении.
28.02.2021