Computer science tests MFPU Synergy

Affiliates: 0,39 $how to earn
Pay with:
i agree with "Terms for Customers"
Sold: 0
Uploaded: 28.08.2019
Content: Ответы5.doc 42,5 kB


Rating excellent
The data type, which should be used for recording data in the Full-size field, - ...
Check the correct answer:

A student on information is a source ...
Check the correct answer:
of information
formal knowledge
informal knowledge

It is not false that in the system of managing data bases (DBMS), MS Access is…
Check the correct answer:
sample requests
queries with parameter
cross queries
related queries

The main functions of the table process are ...
Check the correct answer:
creating tables and performing calculations on them, editing and formatting text, printing text, and developing graphic applications
editing text, formatting text and printing text
developing graphical applications and creating tables
creating tables and performing calculations on them

Information technology is ...
Check the correct answer:
technical devices used in solving typical information problems
processes, methods for searching, collecting, storing, processing, providing, disseminating information and methods for implementing such processes and methods
a set of methods and techniques for solving typical problems of information processing

To put a picture in the slide, you need to select on Lente: ...
Check the correct answer:
Insert / Picture
Insert / Drawings
Home / Paste
Insert / SmartArt

Protecting information from leaks - this is prevention activity ...
Check the correct answer:
the impact on the protected information of user information errors, the failure of hardware and software of information systems, as well as natural
impact with violation of established rights and / or rules on changing information leading to distortion, destruction, copying, blocking
access to information, as well as the loss, destruction or malfunction of the information carrier
receipt of protected information by the interested entity in violation of the legal documents or by the owner, owner
information rights or rules for access to protected information
uncontrolled distribution of protected information from its disclosure, unauthorized access
unauthorized bringing protected information to an uncontrolled number of recipients of information

Hard disk - this is ... memory
Check the correct answer:

An active cell is a cell ...
Check the correct answer:
a formula that contains links to the contents of the dependent cell
in which data is entered
for recording commands
containing a formula that includes the name of the cell in which data is entered

Highlight the following types of topological networks: ...
Check the correct answer:
Lattice; Ring; Spiral
Tire; Lattice; Diagonal
Tire; Star; Ring

In order to replace the slides, I have to automatically, should be selected on the tape: ...
Check the correct answer:
Demo setup / slide show / automatic
Slide show / slide change
Animation / View
Slide Show / Custom Show

The computer network is ...
Check the correct answer:
Group of computers connected to the Internet
The set of computers connected through communication channels for the purpose of sharing network resources
Several computers located in one or in neighboring rooms

A nonpositive counting system is ...
Check the correct answer:
binary number system
Roman numerals
hexadecimal notation
octal number system

The page on the Internet (web page) is…
Check the correct answer:
information technology
Information system
information resource

Network service Internet in accordance with the function of transferring files through the network - ...
Check the correct answer:

The information systems are designed for ...
Check the correct answer:
receipt, storage ...


No feedback yet.
In order to counter copyright infringement and property rights, we ask you to immediately inform us at the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)