151-300 Flashcards
абоба
DBMS MS Access. The fields for entering dates or times are of type
DATA TYPE OR NUMERICAL DATA
Transmission and presentation of text and graphics is called
VIDEO TEXT
Which of the following is a machine for reading documents that are encoded in a way that is readable by person and machine
DOCUMENT READER
Arranging data in a specific order is called
SORTING
An acronym for the organization that publishes programming language standard is
ANSI
The computers are connected together using copper phones wires, radio waves
FIBER OPTIC CABLES
The Internet is many networks around the world that are all connected together to make
1 HUGE NETWORK
Two or more computers or communications devices connected by transmission media and channels and guided by a set of rules for communication purposes that allow users to communicate with each other and share applications and data
COMPUTER NETWORK
How many components of a Computer Network you know?
4 (HARDWARE, MEDIA, SOFTWARE, NETWORK DESIGN)
Network design consist of
LOGICAL AND PHYSICAL LAYOUT
Components of a Computer Network. Media consist of
CABLE, WIRE, MICROWAVE
Network Essentials. Models include
CLIENT/SERVER, PEER-TO-PEER
A computer that provides services to other networked computers
SERVER
Covers a wide geographical area, such as a state or country
WIDE AREA NETWORK (WAN)
A computer in a client/server relationship, e.g. Web browser
CLIENT
The way to connect computers on a network
MEDIA
Serves users within a confined geographical area(usually within a mile)
LOCAL AREA METWORK (LAN)
Covers a geographic area the size of a city or suburb
METROPOLITAN AREA NETWORK (MAN)
The rules and encoding specifications for sending data
PROTOCOLS
The geometric arrangement of devices on the network
TOPOLOGY
This arrangement connects all the network’s devices to a central host computer, through which all communications must pass
NETWORK TYPOLOGIES: STAR (SERVER)
This arrangement connects the network’s devices in a closed loop
NETWORK TYPOLOGIES: RING
A single channels all communications devices
NETWORK TYPOLOGIES: BUS
Design, installation, and support of a network and its hardware and software
NETWORK MANAGEMENT
The study of telephones and the systems that transmit telephone signals
TELECOMMUNICATIONS
ARPA –
ADVANCED RESEARCH PROCUREMENT AGENCY
Founder of the Internet
LARRY ROBERTS (ARPANET)
Microprocessor expanded computing capabilities and security
threats
1970
How many principles of Information Security Management Your Know?
6 (PLANNING, POLICY, PROGRAMS, PROTECTION, PEOPLE, PROJECT MANAGEMENT)
The root of the word encryption - crypt- comes from
FROM THE GREEK WORD KRYPTOS, MEANING HIDDEN OR SECRET
Is the process of converting messages, on formation, or data into a form unreadable by anyone except the intended recipient:
Encryption
Encryption algorithms use a single key for both encryption and decryption:
Symmetric, or secret key encryption
The most gayest person
Eralkhan
The whore of the group
Nurtugan
How many Modern Encryption Algorithms Your know?
5
Which of the following operating system does not implement multitasking?
MS DOS
Electro-mechanical device: Which are powered by an electric motor and use switches and relays
Card reader and card stored
This type of program allows communication between a peripheral device, such as a mouse or printer, and the rest of the computer system
device driver
Card reader and card stored
BYTE is the smallest addressable unit of memory.
The process of writing computer instructions in a programming language is known as
coding
It is performs basic tasks, such us recognizing input from keyboard, sending output from the monitor, keeping track of files and directories on the disk
Operating systems
The term “memory” applies to which one of the following
storage
The crybaby of the group
chel kotoryi obidelsya na devushku blya
The primary memory of a personal computer consists of
both RAM and ROM
Communication that involves computers, establishing a link through the telephone system is called
Telecommunications
aboba or abiba
aboba
Dot-matrix is a type of
Ответ:
Printer
Which of the following is a secondary memory device?
Disk
Multitasking
Multitasking is a logical extension of multiprogramming system that supports multiple programs to run concurrently. In multitasking more than one task are executed at the same time.
A query formulated in human language as opposed to an artificially constructed language such as machine language
natural language query
The term which means the interaction between people and computers
Human-Computer Interaction
A term meaning the main screen of the graphical user interface that can hold objects such as folders and widgets:
Desktop
Utility software that alters a device’s user interface to create an accessible environment for individuals with disabilities
Adaptive Utilities
An element of the graphical user interfaces that appears in a window and requests information, such as command parameters from a user:
Dialog box
A set of rules that ensures the orderly and accurate transmission and reception of data.
Communications protocol
A collection of computers and related devices connected in a way that allows them to share data, hardware, and software:
Computer network
A large database of unique IP addresses that correspond with domain names.
Domain Name System (DNS)
Software that is designed to manage a large number of records and perform many simultaneous transactions.
database management system (BDSM)
ICT are mainly important in:
capability to broaden access to information and communications
The brains of the computer is the:
CPU
The first program which run on a computer when the computer boots up
Operating System
The smallest component of an image that can be transmitted or received in a videodisplay system
Pixel
Multimedia applications that allow users to directly respond to and control all of the media elements
Interactive multimedia
Using a custom animation effect, how do you make text appear on a slide letter by letter
Apply an entrance effect, and then set it to by letter in the effect option dialog box
Use of cryptographic algorithms allows preventing the information leakage by
Security
Choose from the following which can be identified as cloud
Hadoop
The technology of permanent data stores on a disc, the data can’t be subsequently added or changed
Read-only
To connect to a LAN, a computer requires network circuitry
Network Interface card
Type of software is designed to run from removable storage, such as a CD or USB flash drive
Portable software
The Virtual Machine technology allows
VM technology allows you to distribute functions between machines, dividing software purchasing decisions and operating systems on the one hand and hardware on the other
A code that represents characters as a series of 1s and 0s. Most computers use this code to represent text, making it possible to transfer data between computers
ASCII (Ameerican standart Code for Information Interchange)
MS Excel. What will be your formula if you are going to get the average? If cells: A1=90, A2=85, A3=80, A4=75, A5=75
=average( A1:A5) 101,25
An electronic document consisting of slides
Power point
A format of multi-color photos with a high degree of compression is
JPEG
Virtual reality represents
an interactive 3d-video stream
“Smart city” uses the main factors such as
safety,environmental friendliness and economy
E-government infrastructure allows Kazakhstanis to receive through e-gov portal is:
- Kazakhstan 0.4813
Information Security is
А service that refers to online servise
The process of verifying the identity of a user in an IT system is
authentication
A complete the elements URL might look like this
Uniform Resorce Locator
Choose MS Excel function of calculating the average value
AVERAGE(B2:O2)
MS Excel. Value of logical expression = 18>-9
Value
One byte consists of
8 bits
The final goal of human-computer interaction is to bring it to the state like
The goal of HCI “is to develop or improve the safety, utility, effectiveness, efficiency and usability of system that include computers.”
The abbreviation SMART first introduced
November 1981
Data mining is
a process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.
MS Access. Maximum number of characters in a text box
4000
The specific purpose for video editors application software
iMovie, Easy Video Maker, Adobe Premier Pro
Transfer a decimal number 172 to binary
10101100
Transfer a decimal number 172 to octal system
254
Transfer a decimal number 172 to hexdecimal system
172➡️10101100
What is Multimedia?
a combination of text graphics,sound,animations and video that is delivered interactively to the user by electronic or digitally manipulated means
Find extensions for video files
pdf,doc,rtfv
Transfer a hexdecimal number 2D3 to decimal system
2D3➡️1011010011
Тransfer an octal number 745 to decimal system
745➡️1011101001
Telecommunications
The study of telephones and the system that transmit telephone signals
The values 10, 9 and 2 have been entered into cells A2, A3 and A4 respectively. When the formula =SUM(A2:A4) is keyed into cell A5, the program automatically displays the result. The value of the cell A5 will be.
21
Add binary numbers 111010101+11111110
1111010010
Add binary numbers 11011011+10101010
110000101
Transfer a binary number 10001000 to decimal system
88
Why we need a program Excel
This is to create grids of formulas that represent texts, numbers, and calculations.
Why we need a program Excel?
calculations, data analysis, forecasting, drawing up repayment schedules, tables and diagrams,formulas.
The system unit consist of
motherboard, CPU, RAM
.What temporarily stores information internally on a computer?
RAM
Symbols of binary number system
typically “0” (zero) and “1” (one)
What extension is used in Microsoft Excel?
Here are some of the extensions that have been associated with the program, which is to say “the file extension”
What are the ways of creating queries?
Simple Query.Creates select query.Crosstab query. Find Duplicates Query. Find Unmatched Query.
258Microsoft Access: Type of data: text, field size=20. What does it mean:
Person’s last name., City name.
Which of the following is spreadsheet program:
MS.EXCEL
MS Excel used for creating
Spreadsheets
The combination of row and column is called
The intersection of rows and columns is called cell. Cell is identified with Combination of column header and row number.
Ctrl+P shortcut key used for
print a document or page. On Apple computers, the shortcut to print may also be the Command key+P keys. … Ctrl+P in Word and other word processors.
Ms Access extension is
The .mdb extension has been used for a series of proprietary file format versions, developed and used by Microsoft as a native format for its Microsoft Access desktop database management system
Find the right variant of writing the formula
Cinnabon+coffee=happy zhasya
no cinnabon+ no coffee= dead shamil
Ms Excel is a
spreadsheet, It features calculation, graphing tools, pivot tables,
and a macro programming language called Visual Basic for Applications
To confirm the entry in the cell, you need
press the ENTER key или press the TAB key.
What is the wrong cell reference in MS Excel
An #REF error (the “ref” stands for reference) is the message Excel displays when a formula references a cell that no longer exists, usually caused by deleting cells that a formula is referring to.
With what sing in MS EXCEL can you fix the value of the cell the formula
F4
How many cells does the rang of A1:B4 contain
8
What is Multimedia Product
a product where software allows for interaction between the user and various media technologies such as the reproduction of sound and image
What is multimedia device
A multimedia device is a tool or piece of equipment that allows a user to experience several types of digital media at once. Common types of multimedia players include MP3 players, smartphones and handheld game systems. Computers are one of the most common types of multimedia devices.
in MS access macros are created in;
In this section we will learn to create macros in Access which opens up a form automatically whenever a database is opened
list the elements of the Access database The Microsoft Access Database is made up of 7 major components:
Tables;
Relationships;
Queries;
Forms;
Reports;
Macros;
Modules
What is a key
Each of several buttons on a panel for operating a computer, typewriter, or telephone
In the table design mode in DBMS, you can perform the following actions
Table (File) : a collection of related records. If you put all the employee records together you have a table employee.
The MS Access DBMS wizard is used
used mainly by home users and small businesses with one or two system users. The DBMS can run on a personal computer or server and provides an easy-to-use interface for designing simple databases, reports and data entry forms.
Who is the developer of MS Access
by Microsoft Corporation
What is the difference between MS Access from MS Word
Access - Relational Database
What language is used to communicate with a database
A database is a set of data stored in a computer. This data is usually structured in a way that makes the data easily accessible
FTP
FileTransferProtocol
TCP
TransmissionControlProtocol
NFS
Network File System
URL
Uniform Resource Locator
It is protocol provides electronic mail service?
SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail. … SMTP usually is implemented to operate over Internet port 25. Many mail servers now support Extended Simple Mail Transfer Protocol (ESMTP), which allows multimedia files to be delivered as e-mail.
An IP number has ___‘digits’, with each digit represented by a number from 0 to 255
4
It is extension about the commercial or company sires
com
URI
Universal resource identifier
It is extension about the educational institutions , typically universities
University extension
A collection of information that might be stored in more than one file or in more than one record type
Database
There are filed types to store character in ACCESS MS
Access consists of individual component sused todis playand store information. These are:tables,forms,reports,queries,data access pages,macros,and modules.
There are objects in ACCESS which relates with Visual Basic programming language
Tools that complement operations that cannot be performed with commands and macros in Microsoft Access are event handling procedures or allowing you to use calculations written in VBA.
An important network devices acts as a central distribution point to transfer data to its destination
router
The application layer is the higher-level protocol
Internet Protocol Suite (TCP/IP) and the OSI model
Categories of computer architecture
Types of Computer Architecture
Von-Neumann Architecture,
Harvard Architecture,
Instruction Set Architecture,
Microarchitecture,
System Design.
File extension for archive files
Filename extensions used to distinguish different types of archives include zip, rar, 7z, and tar
File extensions for animation/video files: Windows Media Player: Video for Windows (AVI)*, MPEG, Windows Media (WMV)
Apple Quicktime: Video for Windows (AVI)*, MPEG, Quicktime Video (MOV)
The terms are NOT used in quantifying the data
Working as part of an HIV research interdisciplinary team, I’ve become increasingly aware of how some types of data and approaches are valued more than others. When it comes to working with data, quantitative data is often assumed to carry more scientific value and, in many cases, is thought of as more rigorous, objective and relevant to the world of public health than its qualitative counterpart.
Correctly written formula
Sum(A3:B2)*A1
Select examples of input devices
microphone, сamera, keyboard, mouse.