Peripheral devices perform the function … a) control the operation of the computer according to a given program b) input-output information

325. Peripheral devices perform the function …
The correct answer is 1.

326. A personal computer connected to a network and providing user access to its resources is called a workstation.

327. A personal computer connected to a network and providing user access to its resources is called … 1) workstation 2) server 3) host 4) domain
The correct answer is 1.

328. Printing devices use the ________ color representation model. CMYK

329. Printing devices use ________ color representation model 1) CMYK 2) JPEG 3) BMP 4) PSD
The correct answer is 1.

330. CCD arrays (charge-coupled devices) designed to convert an optical image into an analog electrical signal are used in peripheral devices such as … a scanner and a digital camera

331. CCD matrices (charge-coupled devices) designed to convert an optical image into an analog electrical signal are used in peripheral devices such as … 1) scanner 2) digital camera 3) optical mouse 4) touch screen
The correct answers are 1, 2.

332. The written or oral representation of an information model by means of spoken language is called a _______________ model.—verbal

333. A written or oral representation of an information model by means of spoken language is called a _______________ model. 1) verbal 2) simple 3) linguistic 4) logical
The correct answer is 1.

334. According to the principles of operation, computer equipment is divided into … digital, analog, combined

335. According to the principles of operation, computer equipment is divided into … digital, analog, combined

336. According to the principles of operation, computer equipment is divided into … 1) digital 2) analog 3) combined 4) electronic 5) tube 6) transistor 7) microprocessor 8) specialized 9) universal
The correct answer is 1, 2, 3.

337. According to the principles of operation, computer equipment is divided into … 1) digital, analog, combined 2) digital, analog, electronic 3) tube, transistor, microprocessor 4) universal and specialized
The correct answer is 1.

338. Compared to other types of cables, fiber optic …
a) has the lowest cost
b) has a high speed of information transfer
c) has no radiation
d) not affected by electromagnetic fields
e) allows wireless data transmission.

Correct answers: b, c, d.

70. 2 friends are talking on the phone. At the same time, the source of information, the receiver of information and the communication channel are, respectively : a person speaking, a person listening, a set of technical devices that provide communication

71. The term “communication channel” in computer science means: a telephone, telegraph, or satellite communication line and hardware used to transmit information

339. The threat of remote administration in a computer network is understood as the threat of … 1) unauthorized control of a remote computer 2) the introduction of aggressive program code within active objects of Web pages 3) the interception or substitution of data along transportation routes 4) interference with personal life 5) invasion of privacy 6) delivery of inappropriate content
The correct answer is 1.

340. Information leakage is understood as … 1) an unauthorized process of transferring information from a source to an attacker 2) the process of destroying information 3) the unintentional loss of an information carrier 4) the process of disclosing secret information
The correct answer is 1.

341. The authenticity of a document can be verified … 1) by the author’s secret key 2) by verifying the image of the handwritten signature 3) by his electronic signature 4) by his secret key
The correct answer is 3.

342. The search for the optimal path from the input data to the result is used in the model – “maze search”

343. The search for the optimal path from input data to the result is used in the model … 1) “maze search” 2) “black box” 3) “material point” 4) “structure of the human brain”
The correct answer is 1.

72. The search for the optimal path from input data to the result is used in the model: ” maze search”

slider (controller)

344. The user, moving from one folder to another, successively visited the ACADEMY, COURSE, GROUP, E:, PROFESSOR, LECTIONS folders. With each move, the user either descended to a level below, or rose to a level above. The full name of the folder the user started moving from will be… 1) E:GROUPCOURSEACADEMY 2) E:PROFESSORLECTIONSACADEMY 3) E:ACADEMYCOURSEGROUP 4) E:ACADEMY
The correct answer is 1.

345. The concept of “class hierarchy” is inherent in the methodology of dynamic / heuristic / object-oriented / structured programming.
Class hierarchy in computer science means the classification of object types, considering objects as implementations of classes (a class is like a blueprint, and an object is something that is built on top of this blueprint) and linking different classes with relationships like “inherits”, “extends”. Correct answer: object-oriented programming.

73. The concept of “furniture” and “table” can be described by the relationship: general-private

74. The concepts of “calculation” and “number” can be described by the relationship: process-result

346. An Internet service provider is … an Internet Service Provider

347. An Internet service provider is … 1) provider 2) a computer connected to the Internet 3) a browser 4) a modem connected to the Internet
The correct answer is 1.

348. An Internet service provider is … 1) provider 2) a computer connected to the Internet 3) a browser 4) a modem connected to the Internet
The correct answer is 1.

75. The correct order of matching in the simulation table is … 1-B, 2-A, 3-D, 4-C

349. The correct order of the stages of mathematical modeling of the process is as follows: – determination of the goals of modeling – construction of a mathematical model – conducting research – analysis of the result

350. The correct order of the stages of mathematical modeling of the process is as follows: 1) determining the goals of modeling – building a mathematical model – conducting a study – analyzing the result 2) building a mathematical model – determining the goals of modeling – conducting a study – analyzing the result 3) determining the goals of modeling – building a mathematical model – analysis of the result – conducting a study 4) determining the goals of modeling – conducting a study – building a mathematical model – analyzing the result
The correct answer is 1.

76. The correct order of the stages of mathematical modeling of the process is as follows: determining the goals of modeling – building a mathematical model – conducting a study – analyzing the result

77. The pragmatic aspect is the characteristic of information in terms of its usefulness

78. Deliberate distortion of information will affect the property ___ information: reliability

351. The representation of the relational data model in the DBMS is implemented in the form …
…tables. The relational model is focused on organizing data in the form of two-dimensional tables. Each relational table is a two-dimensional array and has the following properties: each table element is one data element, all cells in a table column are homogeneous, that is, all elements in a column have the same type (numeric, character, etc.), each column has unique name, there are no identical rows in the table, the order of rows and columns can be arbitrary.

352. The transformation of the entire program presented in one of the programming languages into machine codes is called … compilation

353. The transformation of an entire program presented in one of the programming languages into machine codes is called … 1) compilation 2) interpretation 3) linking 4) code generation
The correct answer is 1.

79. The transformation of the entire program presented in one of the programming languages into machine codes is called translation (or compilation).

354. The teacher worked in the folder D:Materials for classesGroup 11Laboratory work. Then he moved up a level in the folder tree, went down to the Lectures folder and deleted the Introduction file from it. The full name of the file deleted by the instructor will be… 1) D:Lesson MaterialsGroup 11LecturesIntroduction 2) D:Lesson MaterialsGroup 11Introduction 3) D:Lesson MaterialsLectures Introduction4) D:IntroductionMaterials for classesGroup 11Lectures
The correct answer is 1. Decision. The teacher worked in the Labs folder, which is nested in the Group 11 folder. Therefore, going one level higher, the teacher got into the Group 11 folder, from which he went down to the Lectures folder and deleted the Introduction file from the Lectures folder. Thus, the full name of the deleted Introduction file will be: D:Lesson MaterialsGroup 11LecturesIntroduction

355. When setting an electronic password, a number of precautions must be observed, in particular 1) use jargon words, since they are more difficult for a hacker to guess 2) be sure to write down the password so as not to forget it and keep the record in a safe place 3) change the password if For whatever reason, you shared it with your relatives 4) use the same password for different purposes, for example, to access both the mailbox and the secure drive, so as not to get confused
The correct answer is 3.

356. When the computer’s power is turned off, information is not stored in the memory device … RAM

357. When the computer’s power is turned off, information is not saved in the memory device … 1) RAM 2) HDD 3) ROM 4) Flash USB Drive
The correct answer is 1.

358. When designing software, the following approaches are used: a) from top to bottom, b) from bottom to top, c) from left to right, d) from right to left.
Answers a and b are correct. Honestly, I don’t have a strict justification, but, as I understand it, first you need to reduce the problem to specific tasks (analysis), come up with their solution and implement them from small to large (synthesis).

80. When solving a problem on a computer at the stage of debugging the program is not performed: writing an algorithm in a programming language

359. When solving a problem on a computer, at the stage of debugging a program , it is not performed … writing an algorithm in a programming language

360. When solving a problem on a computer, at the stage of debugging a program, it is not performed … 1) writing an algorithm in a programming language 2) translation of the source code of the program 3) linking the program 4) testing the program
The correct answer is 1.

361. When solving a problem on a computer, at the programming stage, it is not performed … 1) syntactic debugging 2) choice of programming language 3) clarification of data organization methods 4) writing an algorithm in a programming language
The correct answer is 1.

362. When solving a problem on a computer at the programming stage, syntactic debugging is not performed

363. In a structural approach to programming, the following concepts can be used: a) alternative choice, b) cycle, c) subprogram, d) inheritance.
Structured programming is a software development methodology based on the representation of a program in the form of a hierarchical block structure. In accordance with it 1) any program is a structure built from three types of basic structures: sequential execution, branching, loop; 2) repeating fragments are made in the form of subroutines; 3) the development of the program is carried out step by step. Therefore, the correct answers are: a, b, c.

81. A sign or value that characterizes any property of an object and can take on different values is called_models: parameter

364. The use of an expert system is advisable if … 1) it is necessary to solve a problem in an environment hostile to humans 2) the task needs to be solved a limited number of times 3) there are a sufficient number of experts to solve this range of problems 4) solving the problem with the help of a human expert less time consuming and more complete in scope
The correct answer is 1.

365. The use of an expert system is advisable if … 1) it is necessary to solve a problem in an environment hostile to humans 2) the task needs to be solved a limited number of times 3) there are a sufficient number of experts to solve this range of problems 4) solving the problem with the help of a human expert less time consuming and more complete in scope
The correct answer is 1.

evaluates to false when the variable values are set…

366. The principle of “open architecture” in the development of personal computers, the mass production of which was started in the 80s. XX century, implemented by… 1) IBM 2) MicroSoft 3) Intel 4) Pentium
The correct answer is 1.

82. The principle of structured programming “divide and conquer” involves solving a difficult problem by dividing it into many small, easily solved subtasks.

83. Von Neumann’s principles of computer functioning are as follows … data and programs are stored in the same memory in binary form, each memory cell has a unique address

367. The fundamental difference between firewalls (FI) and intrusion detection systems (IDS): 1) FIs were designed for active or passive protection, and IDSs for active or passive detection 2) FIs were designed for active or passive detection, and IDSs – for active or passive protection 3) MEs work only at the network level, and IDSs also work at the physical
The correct answer is 1.

368. Causes of errors in data: 1) measurement error 2) error when recording measurement results in an intermediate document 3) incorrect interpretation of data 4) errors when transferring data from an intermediate document to a computer 5) use of unacceptable methods of data analysis 6) fatal causes of natural character 7) deliberate distortion of data 8) errors in the identification of an object or subject of economic activity
The correct answers are 1,2,4,7,8.

369. Conducting research on a real object with subsequent processing of the results of the experiment is _____________ modeling. Natural

370. Conducting research on a real object with subsequent processing of the results of the experiment is _____________ modeling. 1) natural 2) simulation 3) evolutionary 4) mathematical
The correct answer is 1.

84. Conducting research on a real object with subsequent processing of the results of the experiment is __ modeling: full-scale

371. The Bat program allows you to… download Web pages/download and edit e-mail/archive e-mail/transfer files via FTP.
Correct answer: upload and edit email.

372. Software tools for protecting information in a computer network are: 1) Firewall, 2) Antivirus, 3) Sniffer, 4) Backup.
The correct answer is 1, 2.

85. Programs for initial testing and booting a computer are stored … in ROM (Read Only Memory)

373. Files are sorted by name in ascending order. The last file in the list will be … 1) 6A.doc 2) 2B.doc 3) 10B.doc 4) 11A.doc
The correct answer is 1.

86. An event happened – the fox took the trail of the hare. Then the statement is true that: the organ that perceives the information signal is the nose

374. Internet proxy server … provides anonymization of access to various resources

375. Internet proxy server
The correct answer is 4.

376. Internet proxy server … 1) provides anonymization of access to various resources 2) provides the user with a secure communication channel 3) allows you to encrypt electronic information 4) is used to exchange electronic signatures between network subscribers
The correct answer is 1.

377. Internet proxy server … 1) provides anonymization of access to various resources 2) provides the user with a secure communication channel 3) allows you to encrypt electronic information 4) is used to exchange electronic signatures between network subscribers
The correct answer is 1.

378. The FTP protocol is designed to
a) file transfer
b) downloading messages from newsgroups
c) web browsing
d) chatting.

The correct answer is a.

87. POP3 and SMTP protocols are used to organize the service … email

88. The modeling process includes __ , the subject and object of modeling: model

89. The process of step-by-step breaking down an algorithm into smaller parts in order to obtain elements for which specific instructions can be easily written independently is a top-down programming technique.

90. The process of presenting information about the modeling object in any chosen form is called: formalization

91. The development of any science as a whole can be interpreted in a very general, but quite reasonable sense, as __ modeling: theoretical

379. Sections of modern cryptography: 1) symmetric cryptosystems 2) public key cryptosystems 3) cryptosystems with duplication of protection 4) data transfer control
The correct answers are 1, 2.

92. The decomposition of the whole into parts (structural division) in the process of modeling is called __ systems: decomposition

380. Hexadecimal difference 7777 16 -887 16 is… 1) 6EF0 16 2) 6890 16 3) 6458 16 4) 6DB0 16
The correct answer is 1.

93. A pixel-sized bitmap takes up 4 kilobytes of memory. The maximum number of colors used in an image is… 256

381. The extension of the file name created in the graphic editor Paint is …–.bmp

94. The result of the formalization process is __ model: mathematical

382. The result of the formalization process is a ___________ model. 1) mathematical 2) descriptive 3) strategic 4) subject
The correct answer is 1.

383. The result of the formalization process is a ___________ model.—mathematical

95. A decisive contribution to the possibility of formal transformations of logical expressions was made by: bool

96. Solving problems on computers consists of a number of stages. After the stage “problem statement” follows the stage : problem analysis and modeling

97. The most important legal act in the field of information security in Russia is the Constitution of the Russian Federation.

98. The very first instruments used for counting by an ancient person were: fingers

99. The property of discreteness of the algorithm means that: the algorithm is divided into a number of separate complete commands, each of which must be executed before the executor proceeds to the execution of the next

384. The property of the discreteness of the algorithm means that… 1) the algorithm is divided into a number of separate completed commands (steps), each of which must be completed before the performer proceeds to the execution of the next 2) each command of the algorithm must be understood by the performer unambiguously – it should not 3) each command must be included in the executor’s command system 4) in a finite number of steps, the algorithm must either lead to a solution to the problem, or stop due to the impossibility of obtaining a solution
The correct answer is 1.

100. The property of the model displays only the essential aspects of the object: simplification

385. Security services: 1) identification and authentication 2) encryption 3) password inversion 4) integrity control 5) conflict management 6) shielding 7) secure recovery 8) write caching
The correct answers are 1,2,4,6,7.

386. A network information model can be represented by a regional computer network

387. A network information model can be represented by (-o) … 1) a regional computer network 2) a computer file system 3) a periodic table of chemical elements 4) a technical description of a computer
The correct answer is 1.

388. The FTP network service is designed to … move data between different operating systems

389. The FTP network service is designed to … 1) move data between different operating systems 2) conduct video conferences 3) browse web pages 4) “download” messages and attached files
The correct answer is 1.

390. The FTP network service is designed to … 1) move data between different operating systems 2) conduct video conferencing 3) browse the web 4) “download” messages and attached files
The correct answer is 1.

391. Network operating systems are a set of programs that … ensure the simultaneous operation of a group of users

392. Network operating systems are a set of programs that … 1) ensure the simultaneous operation of a group of users 2) users transfer networks from one computer to another 3) provide processing, transmission and storage of data on a computer 4) expand the capabilities of multitasking operating systems
The correct answer is 1.

393. Network operating systems are a set of programs that … 1) ensure the simultaneous operation of a group of users 2) users transfer networks from one computer to another 3) provide processing, transmission and storage of data on a computer 4) expand the capabilities of multitasking operating systems
The correct answer is 1.

394. Network worms are … programs that modify files on disks and spread within a computer / program that do not modify files on disks, but spread in a computer network, penetrate the computer operating system, find addresses of other computers or users and send to these addresses copies of themselves/programs distributed only by e-mail/malicious programs whose action is to create failures when the computer is powered from the electrical network.
The category of network worms includes malicious programs whose main goal is to spread as widely as possible. The mechanism of their distribution is generally constructed as follows: 1) a network worm enters a computer (via an email attachment, an Internet link, a file-sharing network, etc.) 2) a copy (s) of the worm is created and launched 3) copies tend to go to the following devices (computers) on the Internet, local network.
The correct answer, as often happens, is the longest – programs that do not change files on disks, but spread over a computer network, penetrate the computer’s operating system, find the addresses of other computers or users, and send copies of themselves to these addresses.

395. Network worms are… 1) Programs that do not change files on disks, but spread in a computer network, penetrate into the computer operating system, find addresses of other computers or users and send their copies to these addresses 2) Malicious programs, the action of which is to create failures when the computer is powered from the mains 3) Programs that are distributed only by e-mail 4) Programs that modify files on disks and are distributed within the computer
The correct answer is 1.

396. The network protocol is …PPP

397. The network protocol is… 1) PPP 2) WWW 3) ECP 4) URL
The correct answer is 1.
Instruction. PPP (Point to Point Protocol) is a link-layer protocol that allows you to use ordinary modem lines to access the Internet. ECP (Enhanced Capability Port) – a port with enhanced capabilities. URL (Uniform Resource Locator – a single resource locator) – a uniform identifier for the location of a resource. This is a standardized way of recording the address of a resource on the Internet. WWW (World Wide Web – World Wide Web) – a distributed system that provides access to interconnected documents located on various computers connected to the Internet.

398. The network protocol is… 1) PPP 2) WWW 3) ECP 4) URL
The correct answer is 1.
Remarks. PPP (Point to Point Protocol) is a link-layer protocol that allows you to use ordinary modem lines to access the Internet. ECP (Enhanced Capability Port) – a port with enhanced capabilities. URL (Uniform Resource Locator – a single resource locator) – a uniform identifier for the location of a resource. This is a standardized way of recording the address of a resource on the Internet. WWW (World Wide Web – World Wide Web) – a distributed system that provides access to interconnected documents located on various computers connected to the Internet.

399. A compressed image of the source text is usually used … 1) as a key for encrypting text 2) to create a digital signature 3) as a public key in symmetric algorithms 4) as a result of encrypting text to send it over an insecure channel
The correct answer is 2.

400. Signals that determine the nature of the exchange of information (input or output) are transmitted over the bus … control

401. Signals that determine the nature of the exchange of information (input or output) are transmitted over the bus … 1) control 2) data 3) address 4) exchange
The correct answer is 1.

101. The system usually consists of: several objects

402. The Internet instant messaging system is called … ICQ

403. The Internet instant messaging system is called … 1) ICQ 2) IRC 3) URL 4) GPS
The correct answer is 1.

404. The Internet instant messaging system is called … 1) ICQ 2) IRC 3) URL 4) GPS
The correct answer is 1.

405. The system recognizes the file format by its …
…extension.

406. The system, as a rule, consists of … several objects

407. The system, as a rule, consists of … 1) several objects 2) one object 3) independent objects 4) an object and a model
The correct answer is 1.

The processor has an instruction set

408. A set of formulas that reflect certain properties of an object/original or its behavior is called a physical/statistical/mathematical/dynamic model.
This is a mathematical model.

409. An information model is created that describes the Olympiad in physics. The model provides the following information:
– the name of the participant who scored the maximum number of points in the theoretical round;
– the name of the physics teacher and the number of the school where the participant who scored the maximum number of points in the practical round is studying;
– the age of the participant who scored the maximum amount of points in two rounds.
The constructed model should not contain redundant information. The features of the object that should be reflected in the information model are … the participant’s surname, year of birth, school number, teacher’s surname, theoretical tour, practical tour

102. Creating computer viruses is a criminal offence .

410. A 50-character message was written in 8-bit Windows-1251 encoding. After pasting into a text editor, the message was recoded into 16-bit Unicode code. The amount of memory occupied by the message has increased by …50 bytes

411. A 50-character message was written in 8-bit Windows-1251 encoding. After pasting into a text editor, the message was recoded into 16-bit Unicode code. The amount of memory occupied by the message has increased by …50 bytes

412. A 50-character message was written in 8-bit Windows-1251 encoding. After pasting into a text editor, the message was recoded into 16-bit Unicode code. The amount of memory occupied by the message has increased by… 1) 50 bytes 2) 100 bits 3) 400 bytes 4) 50 bits
The correct answer is 1.

413. A 50-character message was written in 8-bit Windows-1251 encoding. After pasting into a text editor, the message was recoded into 16-bit Unicode code. The amount of memory occupied by the message has increased by… 1) 50 bytes 2) 100 bits 3) 400 bytes 4) 50 bits
The correct answer is 1.

414. A 50-character message was written in 8-bit Windows-1251 encoding. After pasting into a text editor, the message was recoded into 16-bit Unicode code. The amount of memory occupied by the message has increased by… 1) 50 bytes 2) 100 bits 3) 400 bytes 4) 50 bits
The correct answer is 1.

415. Message volume bit contains ______ gigabyte(s) of information—1

416. A message of 2 33 bits contains ______ gigabyte(s) of information. 1) 1 2) 4 3) 3 4) 33
The correct answer is 1.

417. Among computer architectures, there are … uniprocessor, multiprocessor, superscalar

418. Among the architectures of computers, there are … 1) single-processor, multiprocessor, superscalar 2) digital, analog, electronic 3) star, bus, ring 4) tube, transistor, microprocessor
The correct answer is 1.

103. Among the logos of software products, the logo of an antivirus program is (drawn in the form of an insect)

419. Means of protecting file system objects are based on … 1) defining user rights for operations with files and directories 2) setting attributes of files and directories that are independent of user rights
The correct answer is 1.

420. Algorithm writing tools are NOT: block diagrams, programming languages, translators, pseudocodes.
Translators. They only translate the program from one language to another. For example, from a programming language to machine code.

421. The standard code for the exchange of information is …ASCII

422. The standard code for the exchange of information is the code … 1) ASCII 2) ACCESS 3) ANSI 4) BIOS
The correct answer is 1.

423. The standard code for information exchange is… 1) ASCII 2) ACCESS 3) ANSI 4) BIOS
The correct answer is 1.

424. The degree of conformity of the model to the real phenomenon (object, process), for the description of which it is built, is called ___________ of the model.–adequacy

425. The degree of conformity of the model to the real phenomenon (object, process), for the description of which it is built, is called ___________ of the model. 1) adequacy 2) stability 3) flexibility 4) identity
The correct answer is 1.

streamer

104. The structural programming language is BASIC .

426. The essence of compromising information 1) making changes to the database, as a result of which the user is deprived of access to information 2) unauthorized access to transmitted information through communication channels and the destruction of the content of transmitted messages 3) making unauthorized changes to the database, as a result of which the consumer is forced either abandon it, or make additional efforts to detect changes and restore the true information
The correct answer is 3.

105. The electrical circuit diagram is __ information model: graphic

427. The electrical circuit diagram is a _____________ information model.—graphic

428. The electrical circuit diagram is a _____________ information model. 1) graphic 2) tabular 3) hierarchical 4) verbal
The correct answer is 1.

429. The similarity of expert systems with other application programs lies in the fact that they … 1) are designed to solve a certain range of problems 2) use heuristic methods as the main methods for solving a problem 3) at the stage of solving a problem they form certain facts and conclusions 4) model human thinking, not the specific nature of the subject area
The correct answer is 1.

430. The similarity of expert systems with other application programs lies in the fact that they … 1) are designed to solve a certain range of problems 2) use heuristic methods as the main methods for solving the problem 3) at the stage of solving the problem they form certain facts and conclusions 4) model human thinking, not the specific nature of the subject area
The correct answer is 1.

FAT or NTFS table

431. Parameters such as pixel response time and viewing angle are specific to the following devices: LCD monitor and TFT monitor

432. Parameters such as pixel response time and viewing angle are typical for the following devices: a) LCD monitor b) TFT monitor c) plotter d) scanner.
Correct answer: a, b.

433. Parameters such as pixel response time and viewing angle are typical for the following devices: 1) LCD monitor 2) TFT monitor 3) plotter 4) scanner
The correct answers are 1, 2.

434. Parameters such as resolution and performance are typical for … flatbed scanners and laser printers

435. Parameters such as resolution and performance are typical for … 1) flatbed scanners 2) laser printers 3) touch screens 4) TFT monitors
The correct answers are 1, 2.

436. Text in an MS Word document between two ¶.
Paragraph.

437. Topologies of local computer networks are … star, bus, ring

438. Topologies of local area networks are… 1) star, bus, ring 2) chamomile, sphere, star 3) server, domain, terminal 4) corporate, administrative, mixed
The correct answer is 1.

439. The topologies of local area networks are… 1) star, bus, ring 2) chamomile, sphere, star 3) server, domain, terminal 4) corporate, administrative, mixed
The correct answer is 1.

106. The trading agent receives a bonus depending on the volume of the concluded transaction according to the following scheme: if the volume of the transaction is up to 3000, then in the amount of 5%; if the volume is more than 3000, but less than 10000 – 7%; over 10,000 – 10%. The formula in cell C2 should look like… =IF(B2<3000;B2*5%;IF(B2<10000;B2*7%;B2*10%))

440. It is required to transport 30 chairs and 10 tables. They can be loaded into a truck in three ways. The first way is 5 tables and 5 chairs. The second way – only 7 tables. The third way is 2 tables and 10 chairs. The minimum number of car trips for transporting furniture will be … 1) 4 2) 3 3) 2 4) 5
The correct answer is 1.

441. A Trojan is… 1) a program whose malicious action is expressed in deleting and/or modifying computer system files 2) a program that infects a computer regardless of the user’s actions 3) a program that penetrates a user’s computer via the Internet 4) a malicious program that which does not reproduce itself, but pretends to be something useful, thereby trying to encourage the user to rewrite and install the program on his computer on his own
The correct answer is 4.

442. The tourist was at 10:20 at the station of the city D. The minimum time in minutes after which he can get to the station B is … 1) 528 2) 554 3) 451 4) 472
The correct answer is 1.

443. Indicate true statements.
1. The emergence of the second generation of computers was due to the transition from vacuum tubes to transistors.
2. There was no control device in the first generation computers.
3. There was no RAM in the first generation computers.
4. Machines of the third generation are a family of machines with a single architecture, that is, software compatible.
5. A computer with an Intel Pentium III processor belongs to the fourth generation of computers.

True statements: 1, 4, 5. For those interested, I recommend a wonderful blog dedicated to computer literacy.

107. The ordering of information on a certain basis is called: systematization

444. Arrange logical operations – disjunction, inversion, conjunction – by priority.
Inversion (logical negation), conjunction (logical multiplication), disjunction (logical addition).

445. A simplified representation of a real object is called a -model

Be First to Comment

Leave a Reply

Your email address will not be published.