Professional Documents
Culture Documents
The term used to describe the equipment and software elements that allow us to access,
retrieve, store, organize, manipulate and present information by electronic means
A. Information technology
B. Communication technology
C. Radio and TV networks.
D. Computer-integrated manufacturing.
E. Robotics technologies.
2. The term used to describe equipment, infrastructure and software through which
information can be received and accessed
A. Communication technology
B. Information technology
C. Radio and TV networks.
D. Computer-integrated manufacturing.
E. Robotics technologies.
3. This concept involves transfer and use of all kinds of information. ICT is the foundation
of economy and a driving force of social changes in the 21st century
A. Information and Communication Technology.
B. Information technology
C. Communication technology
D. Radio and TV networks.
E. Robotics technologies.
6. The standard that reflects the relationship between technology, politics and society
A. Information and communication technologies for development (ICT4D).
B. Web World Wide (WWW).
C. Internet.
D. E-Learning.
E. Government.
F) Uniform Recourse Locator (URL).
7. The standard (and their corresponding 8 targets) that cover a broad range of concerns,
namely: poverty and hunger; primary education; gender equality; child mortality;
maternal health; HIV/AIDS and etc:
A. Millennium Development Goals (MDG).
B. Information and communication technologies for development (ICT4D).
C. Web World Wide (WWW).
D. Internet.
E. E-Government.
8. Boundary across which two independent systems meet and act on or communicate with
each other
A. Interface.
B. Human-computer interaction (HCI).
C. User interface (UI).
D. Software interface.
E. Hardware interface.
9. Totality (a set of) hardware and software, providing interaction between different
functional units of computing, control and measuring systems
A. Interface.
B. Human-computer interaction (HCI).
C. User interface (UI).
D. Software interface.
E. Hardware interface.
11. The languages and codes that the applications use to communicate with each other and
with the hardware
A. Software interface.
B. Interface.
C. Human-computer interaction (HCI).
D. User interface (UI).
E. Hardware interface.
12. The wires, plugs and sockets that hardware devices use to communicate with each other
A. Hardware interface.
B. Interface.
C. Human-computer interaction (HCI).
D. User interface (UI).
E. Software interface.
13. Term means making products and systems easier to use, and matching them more closely
to user needs and requirements
A. Usability UI.
B. Interface.
C. Human-computer interaction (HCI).
D. User interface (UI).
E. Software interface.
16. Interfaces that to use pictures and graphics instead of just words to represent the input
and output of a program
A. Graphical user interfaces (GUI).
B. Effectiveness.
C. Command line interfaces.
D. Text-based user interfaces.
E. Internet.
18. Stage of development of the user interface on which the Wireframes website is developed
from elements of the screen:
A. Research + Design.
B. Effectiveness.
C. Concision.
D. Familiarity.
E. Development.
30. Match the type of software with the definition: “The full version with all the features”
A. Professional version
B. Trial version
C. Shareware
D. Freeware
E. Home-use version
31. Match the type of software with the definition: “You can try it for a while for free. Then
if you want to keep using it, you are expected to pay a small fee to the writer.”
A. Trial version
B. Shareware
C. Freeware
D. Home-use version
E. Professional version
32. Match the type of software with the definition: “You can use it for free for a while (often
a month). When the trial period finishes, you have to pay, or the program will de-
activate”
A. Shareware
B. Trial version
C. Freeware
D. Home-use version
E. Professional version
34. The program that runs on the computer hardware creating information object such as files
and processes and assures the fair and secure allocation of processor time for processes,
access to files, access to devices, and other resources.
A. operating system
B. programs for image editing
C. Internet browser
D. antivirus programs
E. office programs
36. To restart a computer as if the computer had been powered down even though it was
turned on and possibly running
A. reboot
B. file
C. folder
D. program
E. backup
37. A single block of information allocated by an operating system for retention beyond the
execution time of any program
A. file
B. chip
C. drive
D. memory
E. disk
47. By clicking to which menu you could make your text “Bold/Italic”?
A. Home;
B. File;
C. Insert;
D. Review;
E. Mailings;
48. Which submenu should be used in order to make your document on Landscape view?
A. Page layout;
B. Home;
C. File;
D. Insert;
E. Mailings;
50. Which menu should be used in order to change the existing Hyperlink?
A. Insert;
B. Format;
C. Tools;
D. Table;
E. Font;
68. You can enclose the prompt within square braces in criteria to create
A. Parameter query
B. Select query
C. Action query
D. Crosstab query
E. A request for sorting
69. Which of the following SQL query deletes Product table from Store database?
A. DROP TABLE Product
B. DEL Product FROM Store
C. DROP Product
D. FROM Store DEL Product
E. Product DROP
70. Choose a major database object used to display information in an attractive, easy-to-read
screen format
A. Form
B. Query
C. Report
D. Table
E. Macro
71. To delete records or perform calculations on a table, the best tool to use is a
A. Report
B. Form
C. Filter
D. Query
E. Macro
74. Choose the command to remove all Sorts in a table you can click.
A. Clear All Sorts
B. Delete All Sorts
C. Eliminate All Sorts
D. Remove All Sorts
E. DropAll Sorts
75. Which of the following properties identifies the type of information stored in a field?
A. Data type
B. Field description
C. Field name
D. Field properties
E. Field Size
76. Which of the following views displays the field name, description, and properties of a
table?
A. Design View
B. Datasheet View
C. Layout View
D. Table View
E. Row View
77. What type of relationship is created when you select a primary key in both related tables?
A. One-To-One
B. Indeterminate
C. One-To-Many
D. Many-To-Many
E. Many to all
83. Which statement is true about the OSI and TCP/IP model
A. The network layer of the OSI comparable to that of the Internet TCP / IP model
B. The lower two TCP / IP model, level form the lower layer OSI model
C. TCP / IP model is a theoretical model, and the OSI model is based on actual protocols
D. TCP / IP model defines protocols for the physical network connection
E. TCP / IP model is based on three levels and OSI model is based on seven levels
84. Characteristics of peer networks:
A. Easy to organization and operation
B. Is difficult to organize and operate
C. In these networks using two network operating systems, which are fundamental
functional differences
D. This large networks with multiple subnets
E. They are called networks with centralized management
88. A _____ is a device that forwards packets between networks by processing the routing
information included in the packet.
A. Router
B. Bridge
C. Firewall
D. Hub
E. Repeater
92. Data communication system spanning states, countries, or the whole world is
A. WAN
B. LAN
C. MAN
D. Protocols
E. Standards
98. Performance management can be broke into what two separate functional categories?
A. Monitoring
B. Analyzing
C. Replacing
D. Configuration
E. Decision
100. Which of the following are the three most common network management
architectures?
A. Centralized
B. Hybrid
C. Ring
D. Bus
E. Star
103. What is the binary equivalent to the dotted decimal number 96?
A. 01100000
B. 01100110
C. 00001100
D. 10000001
E. 11000000
109. According to the classification scheme of computer intruders are divided into
A. hackers, phreakers .
B. hackers
C. hackers, crackers
D. superhero, crackers and phreakers,
E. hackers, crackers, phreakers
114. The term "computer virus" was introduced for the first time
A. Cohen
B. Shannon
C. Hartley
D. Markov
E. Gates
117. The software module, which the simulates an invitation to the user to register in
order to log in, such as a keylogger
A. simulator
B. filter
C. interceptor
D. deputy
E. maska
123. Cryptography –
A. the science of conversion methods (encryption) information in order to protect it from
illegal users (development of codes)
B. element of the cipher
C. a removable element cipher used to encrypt a particular message
D. coding process
E. the process of de coding
124. Кey –
A. conversion process to open the data encrypted data using the cipher
B. an element of the cipher
C. a removable element cipher used to encrypt a particular message
D. element of ciphertext
E. interchangeable element
126. Hurdle – is
A. a physical barrier to access protected information
B. protection by regulating the use of system resources
C. protection from macro viruses
D. Protect the document from being deleted
E. Protection paper copy
129. Masking – is
A. by way of information protection cryptographic closing
B. a physical barrier to access protected information
C. method of protection in which the users and staff have to comply with rules for
processing and storage of information under threat of financial, administrative or criminal
liability
D. Protect the document from being deleted
E. Protection paper copy
133. Passwords –
A. is an access control mechanism
B. protection by regulating the use of system resources
C. a physical barrier to access protected information
D. applying a magnetic mark
E. the protection of the document against copying
135. Global network capable of transmitting information from anywhere in the world
to any other point
A. Internet.
B. Graphics editor.
C. Programming language.
D. Word processor.
E. Branches software.
137. IP address of computer is a unique logical address and exhibits the following
properties:
A. Unique address.
B. 32 bits (5 bytes) long.
C. 8 bits (1 bytes) long.
D. Relative.
E. Absolute.
169. The software used for compression and decompression of multimedia files
A. the codec
B. installation
C. driver
D. scale
E. clip
177. Multimedia is …
A. program to view educational videos, interactive systems, aimed at the unification of text,
sound, images and animations
B. program for listening to music
C. program to work with graphic images
D. system, designed to work with the text and static images
E. Program for working with text and static images
179. Classing tools that let you create and edit text and graphics, static image, to carry
out three-dimensional modeling and animation tools of text and graphics.
A. basic tools.
B. multimedia product
C. multimedia authoring system
D. basic multimedia tools
E. multimedia technology
180. The area in which are mounted and projects in Windows Movie Maker, appears:
A. on the storyboard and timeline
B. on the storyboard in the display window
C. a window display and the timeline
D. in the display window and in the status bar
E. only display window
F. F) only on the storyboard
185. How is the montage the clip? Choose the exact answer.
A. videomontage is to assign the start and end of a clip in the movie playback
B. videomontage is setting the playback point in the movie clip
C. videomontage is setting the start point in the movie clip playback
D. video installation is setting the end point in the movie clip playback
E. videomontage is setting the mid-point of the clip playing in the film