Optical fiber Ethernet Wireless LAN Home PNA

A) scale

B) the connection method

C) network topology

D) the functional relationship (Network Architectures)

E) the PAN

Correct answer: B

47. What can be defined as β€œthe description scheme of the network arrangement including the nodes, connecting lines, and other devices.

A) network interface

B) connecting lines

C) network nodes

D) scheme

E) network topology

Correct answer: E

48. LAN covers____

A) the immediate town, city, or metropolitan area

B) large physical areas such as states or countries

C) small geographic area, like a home, office, or group of buildings

D) communicating computerizes devices such as telephones and PDAs

E) communicated through wireless network technologies such as Wireless USB, Bluetooth, Z-Wave, and IrDA

Correct answer: C

49. Which of the following TCP/IP protocols is used for transferring electronic mail messages from one machine to another?

A) FTP

B) SNMP

C) SMTP

D)RPC

E) Z-Wave

Correct answer: C

50. Which digits of the DNIC (Data Network Identification Code) identify the country?

A) first three

B) first four

C) first five

D) first six

E) past three

Correct answer: A

51. Which of the following devices is used to connect two systems, especially if the systems use different protocols?

A) hub

B) bridge

C) gateway

D) repeater

E) web

Correct answer: C

52. Which of the following is separated by a subnet mask?

A) DHCP scopes

B) network ID and host ID

C) domains

D) subnets

E) browser

Correct answer: B

53. Messages from one computer terminal can be sent to another by using data networks. The message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or satellite and then converted back again at the receiving end. This system of sending messages is called_______

A) paperless office

B) email

C) global network

D) electronic newspaper

E) local network

Correct answer: B

54. Which protocol is used between E-Mail servers?

A) FTP

B) SMTP

C) SNMP

D) POP3

E) HTTP

Correct answer: B

55. The device that converts computer output into a form that can be transmitted over a telephone line is_____

A) teleport

B)modem

C) multiplexer

D) hub

E) adapter

Correct answer: B

56. Modem transmitting information at the rate of 28800 bits / sec., 1 sec. can transmit two pages of text (3600 bytes) in_________

A) one second

B) one minute

C) an hour

D) a day

E) a week

Correct answer: A

57. Which of the following provides a storage mechanism for incoming mail but does not allow a user to download messages selectively?

A) SMTP

B) DHCP

C) IMAP

D) POP3

E) HTTP

Correct answer πŸ˜€

58. Standard set of protocols used by the Internet, intranets, extranets, and some other networks:

A) TCP/IP

B) protocol

C) open systems

D) internetwork processor

E) operation system

Correct answer: A

59. Business meeting and conferences are held connecting people in distance through the computer network. Participants exchange information and are able to see each other. This type of meeting is called ___

A) telemeeting

B) telemailing

C) teleconferencing

D) teletalking

E) telephone

Correct answer: C

60. Which of the following allows a simple email service and is responsible for moving messages from one mail server to another?

A) IMAP

B) DHCP

C) SMTP

D) FTP

E) POP3

Correct answer: C

61. The model of providing ubiquitous and convenient network of on-demand access to the shared pool of configurable computing resources

A) online technology

B) cloud computing

C) Internet

D) virtual resources

E) local resources

Correct answer: B

62. Types of clouds:

A) shared and private

B) private and public

C) shared and public

D) standard

Correct answer: B

63. User of cloud internet service can:

A) view your own data

B) manage service

C) change the structure of the service

D) change data of other users

E) change data

Correct answer: A

64. What does the database system aim to achieve?

A) a highly organized collection of data

B) constantly self-updating software

C) further growth

D) explaining meanings of life-events

E) explaining meanings

Correct answer: A

65. What is the most popular example of DBMS?

A) hard drive

B) iCloud.

C) Microsoft Access.

D) relational database management system

E) delphi

Correct answer: C

66. What does DBMS stand for?

A) database management system

B) digital browser monitoring shelf

C) duke of boston mike sir

D) driver bites microsoft software

E) derivative binomial mirroring scan

Correct answer: A

67. Outline examples of DB:

A) book shelves, libraries.

B) hard drive, internal memory, etc.

C) Oracle, Microsoft SQL Server, MySQL.

D) books, writings, other kinds of literature.

E) library book fund, the staff of the enterprise, the educational journal in the school, etc.

Correct answer: E

68. What is the basic unit of information (ACCESS)?

A) standard key

B) database table

C) ordinary table

D) sentence

E) ceells

Correct answer: B

69. What must be defined for each database table?

A) primary key

B) database table

C) ordinary table

D) foreign key

E) associate assistant

Correct answer: A

70. A variety of interrelated tables refers to…

A) standard key

B) connective table

C) plural-database

D) multiple-database

E) shapes and charts

Correct answer πŸ˜€

71. What are the structural components of the table?

A) records and fields

B) columns and strokes

C) shapes and charts

D) windows and fields

E) records and columns

Correct answer: A

72. What is the definition of API?

A) apple programming department

B) application parametric interface

C) associative preference interface

D) automatic plague of internet

E) application programming interface

Correct answer: E

73. Since 1980’s what is the most popular language of database systems?

A) SQL language

B) SQCL language

C) Pascal language

D) SQL language

E) Basic language

Correct answer πŸ˜€

74. Which software are we implementing into the database course?

A) Microsoft Access

B) Microsoft Excel

C) Microsoft Outlook

D)Adobe Acrobat

E) Adobe Sync

Correct answer: A

75. The software that is designed to work with databases is called…

A) appraiser

B) records and fields opener

C) table evaluation system

D) Microsoft Access

E) database

Correct answer πŸ˜€

76. What does the term Data Base refer to?

A) organized collection of data

B) reading and writing books

C) monitoring

D) explaining meanings of life-events

E) table evaluation system

Correct answer: A

77. What does DB stand for?

A) data base

B) digital browser

C) Duke of Boston

D) driver bite

E) derivative binomial

Correct answer: A

78. Is there any difference between Database and DBMS?

A) no there is not

B) yes there is

C) partly

D) only by the coverage of network

Correct answer: B

79. The function of the Internet Control Message Protocol (ICMP):

A) to allow gateways to send error control messages to other gateways or hosts

B) provides communication between the Internet Protocol Software on one machine and the Internet Protocol Software on another

C) reports error conditions to the original source, the source must relate errors to individual application programs and take action to correct the problem

D) all the answers are correct

E) controls the communication and transfer of messages

Correct answer πŸ˜€

80. What is the alternative name for relational database?

A) collaborative database

B) discrete database

C) connective database

D) reciprocal database

E) tabular database

Correct answer: E

81. What must be defined for each database table?

A) primary key

B) database table

C) ordinary table

D) foreign key

E) associate assistant

Correct answer: A

82. The main functions of DBMS :

A) description of the database structure

B) data processing

C) data management

D) table formatting

E) edit reports

Correct answer: A, B

83. Convert 1100 binary to decimal:

A) 12

B) 6

C) 24

D) 18

E) 10

Correct answer: A

84. Convert decimal number 15 into binary system

A) 1111

B) 1101

C) 1100

D) 110

E) 1010

Correct answer: A

85. Convert 10 from decimal to binary.

A) 1010

B) 1101

C) 1100

D) 110

E) 1011

Correct answer: A

86. Convert 5 from decimal to binary.

A) 101

B) 110

C) 110

D) 100

E) 1011

Correct answer: A

87. Convert decimal number 255 to an octal numeral system.

A) 377

B) 256

C) 340

D) 355

E) 501

Correct answer: A

88. Convert 12 from decimal to Hexadecimal

A) C

B) B

C) F

D) A

E) E

Correct answer: A

89. Convert 45 from decimal to hexadecimal

A) 2D

B) 2B

C) 1F

D) A2

E) 7E

Correct answer: A

90. Convert 1A from hexadecimal to decimal

A) 26

B) 144

C) 25

D)36

E)A1

Correct answer: A

91. Convert 1010100 from binary to octal

A) 124

B) 125

C) 114

D) 123

E) 101

Correct answer: A

92. Convert 10101111000 from binary to hexadecimal.

A) 578

B) 541

C) 154

D) 123

E) 101

Correct answer: A

93. Which symbols do not enter into hexadecimal notation:

A) V

B) A

C) B

D)C

E) D

Correct answer: A

94. Which of the following is the system used for storing, retrieving, processing and transmitting data?

A) internet & communication technology

B) internet & information technology

C) information & communication technology

D) information & computer technology

E) Internet

Correct answer: C

95. Which of the following does measure the speed of CPU?

A) gigahertz (GHz)

B) bits per second (Bps)

C) gigabytes (GB)

D) megabytes (MB)

E) kilobyte (KB)

Correct answer: A

96. Which of the following is NOT realized through electronic commerce?

A) goods advertisement and comparison of prices

B) physical contact between buyer and seller

C) processing transactions quickly

D) services that are available 24 hours a day

Correct answer: B

97. Which one of the following is a good password policy for the organization?

A) all passwords are changed regularly

B) all passwords are never changed

C) all passwords are made up of less than four characters

D) all passwords are made up of less than four numbers

E) all passwords are made up of less than four characters and numbers

Correct answer: A

98. Which of the following statements about the Internet is TRUE?

A) the internet is a global network that links many computer networks together

B) the internet is a private company network

C) the Internet is a visual representation of linked documents

D) the Internet is a network operating system

E) the Internet is a private company network and visual representation of linked documents

Correct answer: A

99. Which of the following should be carried out to secure files from loss in case the main copy is damaged?

A) backup files to a new location on your computer

B) install password security

C) backup the files regularly and store offsite

D) install a firewall

E) install password security and a firewall

Correct answer: C

100. Which is the MAIN advantage of using a network system in the office?

A) allows sharing of data

B) regular backups

C) costs are reduced

D) office procedures can be automated

E) regular backups and costs are reduced

Correct answer: A

101. Which software is used to access the Internet?

A) interface

B) presentation

C) browser

D) system

E) word

Correct answer: C

102. Which of these is an example of an e-commerce activity?

A) viewing a travel timetable

B) checking theater availability

C) downloading a screen saver

D) booking a flight

E) viewing a travel timetable and checking theater availability

Correct answer πŸ˜€

103. What is the main factor in the growth of the ‘Information Society’?

A) multimedia computers

B) faster processors

C) modes

D) Internet

E) PC

Correct answer πŸ˜€

104. The characters “*” and “?” are sometimes used in search engine criteria as:

A) bookmarks

B) operators

C) wild cards

D) engines

E)button

Correct answer: B

105. A hybrid computer uses _____ to convert digital signals from computer into analog signals.

A) modulator

B) demodulator

C) modem

d) decoder

E) web

Correct answer: C

106. The organization and interconnection of the various components of the computer system is called the_________

A) architecture

B) networks

C) graphics

D) design

E) operation systems

Correct answer: A

107. What kind of file usually refers to ‘.JPG’ extension?

A) system file

B) animation/movie file

C) MS Encarta document

D) image file

E) text file

Correct answer πŸ˜€

108. Which year the “@” symbol was chosen for its use in e-mail addresses?

A) 1976

B) 1972

C) 1980

D) 1984

E) 1988

Correct answer: B

109. ‘CD’ computer abbreviation usually means

A) command description

b) change data

C) density

D) compact disc

E) copy disc

Correct answer πŸ˜€

110. What is the web browser?

A) a kind of spider

B) a computer that stores WWW files

C) a person who likes to look at websites

D) a software program that allows you to access websites on the World Wide Web

E) copy disc

Correct answer πŸ˜€

111. Which of these is a valid e-mail address?

A) professor.at.learnthenet

B) www.learnthenet.com

C) professor@learnthenet.com

D) professor@learnthenet

E) professor. learnthenet.com

Correct answer: C

112. How can you catch a computer virus?

A) sending e-mail messages

B) using a laptop during the winter

C) opening e-mail attachments

D) online shopping

Correct answer: C

113. Which of the following is not a valid domain name?

A) WWW.yahoo.com

B) WWW.yahoo.co.uk

C) WWW.fr.yahoo

D) WWW.yahoo.fr

E) WWW.yahoo.kz

Correct answer: C

114. The “http” that is at the beginning of any site’s address stands for…

A) HTML transfer technology process

B) hyperspace terms and tech protocol

C) hyperspace techniques & tech progress

D) hypertext transfer protocol

E) POP3

Correct answer πŸ˜€

115. What is the URL?

A) a computer software program

B) a type of UFO

C) the address of a document or “page” on the World Wide Web

D) an acronym for Uniform Resources Learning

E) hypertext transfer protocol

Correct answer: C

116. The Provider is:

A) an organization connecting the consumer to the Internet

B) electronic help system

C) a mistake of a programmer

D) server

E) the device for connection to the Internet

Correct answer: A

117. Telecommunication network is the __________ network

A) global

B) regional

C) local

D) industry

E) PAN

Correct answer: A

118. Which tag of the HTML sets a running text?

A) behavior

B) run

C) marquee

D) string

E) TR

Correct answer: C

119. Which tag of the HTML sets the top index?

A) SUB

B) U.P.

C) SUP

D) DOWN

E) TR

Correct answer: C

120. Which tag of the HTML inserts the picture?

A) SUB

B)JPEG

C)IMG

D) A

E) PICTURE

Correct answer: C

121. The network that connects computers within one room is called ___ network

A) global

B) regional

C) local

D) administrative

E) room

Correct answer: C

122. Which of the following is not the characteristic of the local network?

A) exchange of information on big distances

B) high speed information transfer

C) existence of the high-speed channel of information transfer binding in the digital form

D) existence of channel for information transfer for graphics

E) possibility of exchange of information in small distances

Correct answer: A

123. The network which computers have equal rights are called______

A) peer network

B) on the basis of the server

C) local

D) global

Correct answer: A

124. The Modem is ____

A) the device of transformation of digital signals into analog domain, and back

B) transport basis of a network

C) information storage

D) the device which operates information transfer process

E) network card

Correct answer: A

125. What does the letter “e” stands for in the word e-learning

A) educational events held by electronic means

B) the training takes place in the classroom

C) training takes place individually with a student

D) economic training

E) accelerated learning

Correct answer: A

126. What methods of knowledge transfer does not apply to e-learning

A) Internet

B) satellite TV

C) audio

D) video material

E) conventional teaching

Correct answer: E

127. Types of e-Learning

A) non-traditional eLearning, traditional training

B) Traditional eLearning, Rapid eLearning

C) effective eLearning

D) traditional training

E) rapid eLearning, effective eLearning

Correct answer: B

128. E-government is ________

A) information system “Electronic government procurement”

B) the use of new multimedia technologies and the Internet to improve the quality of education by improving access to resources and services as well as remote exchange of knowledge and collaboration

C) software and provision of information, used to represent the educational materials in the form required for computer-based training systems

D) a set of IT services that are used during the distance learning

E) the electronic document management system of governance, based on the total automation of management processes across the country and targets significantly increase the efficiency of public administration and reduce the costs of social communications for each member of society

Correct answer: E

129. e-Learning tools are ____

A) information system “Electronic government procurement”

B) the use of new multimedia technologies and the Internet to improve the quality of education by improving access to resources and services as well as remote exchange of knowledge and collaboration

C) software and provision of information, used to represent the educational materials in the form required for computer-based training systems

D) a set of IT services that are used during the distance learning

E) the electronic document management system of governance, based on the total automation of management processes across the country and targets significantly increase the efficiency of public administration and reduce the costs of social communications for each member of society

Correct answer: C

130. The idea of ​​developing e-government in Kazakhstan was announced in the annual Message of the President of the Republic of Kazakhstan on___

A) March 1, 2004

B) March 19, 2004

C) March 19, 2007

D) March 19, 2005

E) March 17, 2004

Correct answer: B

131. When was the infrastructure of Kazakhstani e-government formed?

A) 2007-2009

B) 2004-2007

C) 2007-2010

D) 2000-2002

E) 2002-2005

Correct answer: A

132. Which of these can be classified as personal information?

A) date of birth

B) online nickname

C) gender

D) IP address

E) your OS

Correct answer: A

133. What should be done to filter spam?

A) change your email address every six months.

B) always tick the ‘don’t pass on my details’ box when filling forms in.

C) never give your email address to anyone.

D) online nickname

E) gender

Correct answer: B

134. What term describes the act of winding up someone online?

A) trolling

B) spam

C) posting

D) malware

E) phishing

Correct answer: A

135. What software should be used to avoid getting viruses?

A) disk cleanup software

B) browser software

C) firewall software

D) anti-virus software

E) WinRar

Correct answer πŸ˜€

136. The email attachment that may harm your computer is called ___

A) phishing

B) trolling

C) malware

D) posting

E) spam

Correct answer: C

137. A ____________ can be added to your presentation and then used to go to the variety of locations for example, a web address, an e-mail address, a custom show or document, just to name a few.

A) menu link

B) hyperlink

C) toolink

D) sidelink

e) TP link

Correct answer: B

138. Notes that include the slide as well as key comments and points you may want to emphasize while you present your slide show are know as:

A) speaker handouts

B) speaker notes

C) student notes

D) cheat sheet

E) student sheet

Correct answer: B

139. The process of planning your multimedia presentation is known as the:

A) design

B) story board

C) development

D) layout

E) timeline

Correct answer: B

140. ____________ refers to any type of application or presentation that involves more than one type of media, such as text, graphics, video, animation, and sound.

A) an executable file

B) desktop publishing

C) multimedia

D) hypertext

E) graphic

Correct answer: C

141. Images included in many software titles are called____

A)cliparts

B) popups

c) .jpg files

D) .tiff files

E) bitmap

Correct answer: A

142. What is a vector graphic?

A) an image comprised of a series of colored pixels

B) an image drawn or printed on paper

C) an image represented with the use of polygons

D) an image where all lines are curved

E) an image formed of a series of colored pixels

Correct answer: C

143. Color printing is done in _____ color format:

A) RGB

B) RYB

C) CMYK

D) CMBK

E) RBG

Correct answer: C

144. Which of the following file formats is not a piece of video?

A) AVI

b) mov

C) MPEG

D) PNG

E)MP4

Correct answer πŸ˜€

145. When items (graphics, audio and video) are imported to Movie Maker, they appear in _______section of the interface:

A) collections

B) library

C) story board

D) timeline

E) bank

Correct answer: A

146. In the storyboard mode of Windows Movie Maker, you can insert _________ effects that smoothly move the film from one graphic or film clip to another.

A) sound

B) title

C) transition

D) enhancement

E) presentation

Correct answer: C

147. To use an Illustrator file in another application, you must save it in another format not AI, but another file type. To accomplish this, you must do this function

A) export

B) save as

C) save to file

D) place

E) finish

Correct answer: A

148. What are some examples of multimedia?

A) video games, movies, and television

B) television series

C) computer-generated graphics

D) digital pictures

E)clipart pictures

Correct answer: A

149. What is multimedia?

A) moving images and text

B) images and audio

C) integration of still and moving images, text and sounds by means of computer technology

D) programs that combine text and images on a television screen

E) computer-generated graphics

Correct answer: C

150. The slide ________ controls text characteristics, background color and special effects, such as shadowing and bullet style.

A) presentation

B) master

C) show

D) sorter

E) view

Correct answer: B

151. The text color in the presentation should contrast with the color of the ________

A) CPU

B) frame

C) stack

D) background

E) RGB

Correct answer πŸ˜€

152. One of the disadvantages of multimedia is its:

A) cost

B) adaptability

C) usability

D) relativity

E) activity

Correct answer: A

153. When you copy a formula

A) excel erases the original copy of the formula

B) excel edits cell references in the newly copied formula

C) excel adjusts absolute cell references

D) excel doesn’t adjust relative cell references

Correct answer: B

154. Which of the following is an absolute cell reference?

A) !A!1

B) $A$1

C) #a#1

D) A1

E) %A%1

Correct answer: B

155. Which symbol is used before a number to make it a label (MS Excel)?

A)quote

B) = equal

C) underscore

D) apostrophe

E) == double equal

Correct answer πŸ˜€

156. Which symbol should be used to start the formula (MS Excel)?

A) =

B) +

C)(

D) @

E) #

Correct answer: A

157. Which of the following formulas is not written correctly (MS Excel)?

A)=10+50

B)=B7*B1

C)=B7+14

D) 10+50

E)=B7/B1

Correct answer πŸ˜€

158. Which of the following formulas Excel will not be able to calculate (MS Excel)?

A)=SUM(sales)-A3

B)=SUM(A1:A5)*5

C) =SUM(A1:A5)/(10/10)

D)=SUM(A1:A5)-10

E)=SUM(A1:A5)

Correct answer: A

159. Which of the following is not an example of a value? (MS Excel)

A) 350

B) May 10, 2016

C) 0.57

D)=Serial Number 50771

E) 1024

Correct answer πŸ˜€

160. Data series in the chart wizard refers to_____. (MS Excel)

A) the chart legend

B) the collection of chart data markers

C) the set of values ​​you plot in a chart

D) the data label

E) the symbol

Correct answer πŸ˜€

161. A worksheet range is :

A) a command used for data modeling

B) a range of values ​​such as from 23 to 234

C) a group of cells

D) a group of worksheets

E) different sheets

Correct answer: C

162. Getting data from a cell located in the different sheet is called…

A) accessing

B) referencing

C) updating

D) function

E) formatting

Correct answer: B

163. Excel usually identifies cells within a worksheet with a

A) cell names

B) column numbers and row letters

C) column letter and row number

D) cell locator coordinates

Correct answer: C

164. The Term “Informatics” occurs from two words:

A) information and cybernetics

B) information and equipment

C) science and automatic

D) information and automatic

Correct answer πŸ˜€

165. Information is:

A) messages transferred between objects of a material world

B) data transferred between objects of a material world

C) the general scientific concept including an exchange of signals between objects of a material world

D) the general scientific concept including storage of data on objects of a material world

E) the scientific concept including an exchange of data between objects of a material world

Correct answer: B

166. The message is:

A) data transferred between objects of a material world

B) information

C) material data carrier

D) set of codes or the signs displaying this or that information

E) the set of symbols or signals conveying some information

Correct answer: E

167. What does the informatics aim to study?

A) forms of movement of matter

B) ways of collecting, storing, processing and information transfer by means of the computer

C) programming languages

D) business games, technical characteristics of peripherals

E) computer device

Correct answer: B

168. 1 Kilobyte is equal to____

A) 1 bit

B) 1000 bytes

C) 8 bits

D) 24 bits

E) 1024 bytes

Correct answer: E

169. One gigabyte of information is:

A) 100mbytes

B) 1 million bytes

C) 1024 MBytes

D) 10th billion bytes

E) 1024 kilobytes

Correct answer: C

170. The Signal will be discrete if:

A) the parameter of a signal accepts consecutive in time final number of values

B) information is transferred consistently

C) the source develops the continuous message

D) information is transferred by means of a wave

E) the source sends only one bps

Correct answer: A

171. The Signal will be continuous if

A) the signal accepts any value from the set range

B) the parameter of a signal accepts consecutive in time final number of values

C) the source of information sends only one bps

D) information is transferred by means of a wave

E) the source develops discretely the message

Correct answer: A

172. The registered signals are:

A) data

B) information

C) information on the computer

D) message

Correct answer: A

173. Which of the system sof coding is used in computer facilities:

A) the Roman

B) binary

C) decimal

D) the Arab

E) the alphanumeric

Correct answer: B

174. Who invented the first operating summarizing car:

A) Pascal

B) Newton

C)Virt

D) Neumann

E) Kant

Correct answer: A

175. the First operating computer was called ______

A) Mark-1

B) IBM

C) Ural

D) ENIAC

E)Minsk

Correct answer: A

176. Which year was the first PC created?

A) 1949

B) 1941

C) 1946

D) 1951

E) 1972

Correct answer: A

177. Which element was the primary element of the first generation computers?

A) lamps

B) transistors

C) chips

d) microprocessor

E) mechanical devices

Correct answer: A

178. Which element was the primary element of the second generation computers?

A) lamps

B) transistors

C) integrated chips

D) microprocessors

E) mechanical devices

Correct answer: B

179. Which of the following is the basic components of the personal computer:

A) keyboard, system block, display, mouse

B) display, monitor, joystick

C) display, scanner, digitizer, system block

D) modem, CDROM, keyboard, printer

E) network payment, keyboard, system block

Correct answer: A

180. Which is the input device of the computer:

A) keyboard

B) musical columns

c) printer

D) plotter

E) system block

Correct answer: A

Be First to Comment

Leave a Reply

Your email address will not be published.