Главная страница Случайная страница КАТЕГОРИИ: АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатикаИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханикаОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторикаСоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансыХимияЧерчениеЭкологияЭкономикаЭлектроника |
Select the slide in slide sorter view, right click and choose preset animations from the shortcut menu
17. Which types of fonts are best suitable for titles and headlines sans serif fonts 18. Which type of font is best suitable for large amount of text? Serif fonts 19. Which of the following is not one of PowerPoint’s views? Presentation view 20. Which of the following will not advance the slides in a slide show view? The esc key 21. In Ms-Dos what command you will use to display system date? Date command 22. While working with Ms-Dos which command transfers a specific file from one disk to another? Copy 23. If you don’t know the current time, which command will you use to display Time 24. Which command divides the surface of the blank disk into sectors and assign a unique address to each one Format 25. If you need to duplicate the entire disk, which command will you use? Diskcopy 26. Which command lists the contents of current directory of a disk Dir 27. In which year the first operating system was developed 1950 28. MS-DOS developed in 1984 29. Multiprogramming system execute more jobs in the same time period 30. ________________interface consists of things like program counter, registers, interrupts and terminals Hardware 31. The operating system creates ____________from the physical computer Virtual computers 32. Which of the following operating does not implement multitasking truly? MS DOS 33. What is the name of the latest server operating system developed by Microsoft? Windows 2003 34. MS Excel provides the default value for step in Fill Series dialog box 1 35. Ctrl + D shortcut key in Excel will shortcut for fill down 36. Excel. What is the short cut key to replace a data with another in sheet? Ctrl+H 37. Which of the following describes how to select all the cells in a single column? Left click on the gray column title button 38. Which of the following is not a basic step in creating a worksheet? Copy the worksheet 39. To insert three columns between columns D and E you would Select column E 40. To drag a selected range of data to another worksheet in the same workbook, use the Ctrl key 1. How long is an IPv6 address? 128 bits 2. Which protocol does DHCP use at the Transport layer? UDP 3. Where is a hub specified in the OSI model? Physical layer 4. Which protocol is used to send a destination network unknown message back to originating hosts? ICMP 5. What PPP protocol provides dynamic addressing, authentication, and multilink? LCP
6. What is a stub network? A network that has only one entry and exit point 7. What is the main reason the OSI model was created? So different networks could communicate 8. What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? Host-to-host
9. Which of the following is private IP address? 192.168.24.43 10. If you use either Telnet or FTP, which is the highest layer you are using to transmit data? application 11. Which layer 4 protocol is used for a Telnet connection? TCP 12. Which topology is shown: a star network
13. Which layer 1 devices can be used to enlarge the area covered by a single LAN segment? Hub and repeater 14. Which network topology offers the highest reliability and availability? mesh 15. Segmentation of a data stream happens at which layer of the OSI model? transport 16. How to implement a network medium that is not susceptible to EMI. Which type of cabling should you use? Fiber –optic cable 17. When data is encapsulated, which is the correct order? Data, segment, packet, frame, bit 18. Which topology is shown: 19. When John Murphy created ARCNET? 1976 20. Which topology is shown:
A tree network 21. Which of the following refers to a series of characters used to verify a user’s identity? password 22. Which of the following is the least important information to record when logging a security violation? User’s name 23. The three primary methods for authenticating users to a system or network are…? Passwords, tokens, and biometrics 24. What role does biometrics have in logical access control? authentication 25. Which of the following is NOT a good property of a firewall? Traffic must only be allowed to pass from inside to outside the firewall 26. What can a firewall protect against? Unauthenticated interactive logins from the “outside” world 27. What is Internet security? Is a branch of computer security related to the internet 28. What is Cybercrime? Also called computer crime, is any illegal activity that involves a computer or network –connected device, such as a mobile phone 29. What is a vulnerability? In computer security, a vulnerability is a weakness which allows an attacker to reduce a system’s information assurance 30. What is Trojan horse? Is any malicious computer program 31. What is a computer virus? Is a type malicious software program 32. What is a computer worm? Is a standalone malware computer program 33. Indicate in information security standard: ISO / IEC 17799-2005 34. The acts of the Republic of Kazakhstan governing legal relations in the sphere of information security: the law of the republic of Kazakhstan “on informatization” 35. What is Antivirus? Is computer software used to prevent, detect and remove malicious software 36. What is Password manager? Is a software application that helps as user store and organize passwords 37. When was released the the Orange Book? 1985 38. What is a character encoding? Is used to represent a repertoire of characters by some kind of an encoding system 39. What is Identification? Is an assertion of who someone is or what something is 40. What is Malware? Is any software used to disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising 1. ____________ refers to any type of application or presentation that involves more than one type of media, such as text, graphics, video, animation, and sound. Multimedia 2. One of the disadvantages of multimedia is: cost 3. The text color in a presentation should contrast with the ________ color. background 4. Images included in many software titles are called _________. Clipart 5. A smaller version of an image is called a: thumbnail 6. The process of planning your multimedia presentation is known as a: storyboard 7. In Real Time Interactive Audio Video, Jitter is introduced in real-time data by delay between packets 8. The slide ________ controls text characteristics, background color and special effects, such as shadowing and bullet style. master 9. Designed to create a particular look, a __________ contains color schemes, slide and title masters with custom formatting and fonts styles. template 10. Adding _________ to objects on your slides not only controls the flow of information, but adds interest to your presentation. transition 11. The ________ master controls the format and placement of the titles and text you type on slides, as well as, background items and graphics you want to appear on every slide. Slide 12. The first slide in a presentation is usually reserved for the _________. Title 13. ______________ is the special effect used to introduce each slide in a slide presentation. Transition 14. Notes that include the slide as well as key comments and points you may want to emphasis while you present your slide show are know as: speaker notes
|