Студопедия

Главная страница Случайная страница

КАТЕГОРИИ:

АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатикаИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханикаОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторикаСоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансыХимияЧерчениеЭкологияЭкономикаЭлектроника






Select the slide in slide sorter view, right click and choose preset animations from the shortcut menu






17. Which types of fonts are best suitable for titles and headlines sans serif fonts

18. Which type of font is best suitable for large amount of text? Serif fonts

19. Which of the following is not one of PowerPoint’s views? Presentation view

20. Which of the following will not advance the slides in a slide show view? The esc key

21. In Ms-Dos what command you will use to display system date? Date command

22. While working with Ms-Dos which command transfers a specific file from one disk to another? Copy

23. If you don’t know the current time, which command will you use to display Time

24. Which command divides the surface of the blank disk into sectors and assign a unique address to each one Format

25. If you need to duplicate the entire disk, which command will you use? Diskcopy

26. Which command lists the contents of current directory of a disk Dir

27. In which year the first operating system was developed 1950

28. MS-DOS developed in 1984

29. Multiprogramming system execute more jobs in the same time period

30. ________________interface consists of things like program counter, registers, interrupts and terminals Hardware

31. The operating system creates ____________from the physical computer Virtual computers

32. Which of the following operating does not implement multitasking truly? MS DOS

33. What is the name of the latest server operating system developed by Microsoft? Windows 2003

34. MS Excel provides the default value for step in Fill Series dialog box 1

35. Ctrl + D shortcut key in Excel will shortcut for fill down

36. Excel. What is the short cut key to replace a data with another in sheet? Ctrl+H

37. Which of the following describes how to select all the cells in a single column? Left click on the gray column title button

38. Which of the following is not a basic step in creating a worksheet? Copy the worksheet

39. To insert three columns between columns D and E you would Select column E

40. To drag a selected range of data to another worksheet in the same workbook, use the Ctrl key

1. How long is an IPv6 address? 128 bits

2. Which protocol does DHCP use at the Transport layer? UDP

3. Where is a hub specified in the OSI model? Physical layer

4. Which protocol is used to send a destination network unknown message back to originating hosts? ICMP

5. What PPP protocol provides dynamic addressing, authentication, and multilink? LCP

 

6. What is a stub network? A network that has only one entry and exit point

7. What is the main reason the OSI model was created? So different networks could communicate

8. What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? Host-to-host

 

 

9. Which of the following is private IP address? 192.168.24.43

10. If you use either Telnet or FTP, which is the highest layer you are using to transmit data? application

11. Which layer 4 protocol is used for a Telnet connection? TCP

12. Which topology is shown: a star network

13. Which layer 1 devices can be used to enlarge the area covered by a single LAN segment? Hub and repeater

14. Which network topology offers the highest reliability and availability? mesh

15. Segmentation of a data stream happens at which layer of the OSI model? transport

16. How to implement a network medium that is not susceptible to EMI. Which type of cabling should you use? Fiber –optic cable

17. When data is encapsulated, which is the correct order? Data, segment, packet, frame, bit

18. Which topology is shown:

19. When John Murphy created ARCNET? 1976

20. Which topology is shown:

A tree network

21. Which of the following refers to a series of characters used to verify a user’s identity? password

22. Which of the following is the least important information to record when logging a

security violation? User’s name

23. The three primary methods for authenticating users to a system or network are…? Passwords, tokens, and biometrics

24. What role does biometrics have in logical access control? authentication

25. Which of the following is NOT a good property of a firewall? Traffic must only be allowed to pass from inside to outside the firewall

26. What can a firewall protect against? Unauthenticated interactive logins from the “outside” world

27. What is Internet security? Is a branch of computer security related to the internet

28. What is Cybercrime? Also called computer crime, is any illegal activity that involves a computer or network –connected device, such as a mobile phone

29. What is a vulnerability? In computer security, a vulnerability is a weakness which allows an attacker to reduce a system’s information assurance

30. What is Trojan horse? Is any malicious computer program

31. What is a computer virus? Is a type malicious software program

32. What is a computer worm? Is a standalone malware computer program

33. Indicate in information security standard: ISO / IEC 17799-2005

34. The acts of the Republic of Kazakhstan governing legal relations in the sphere of information security: the law of the republic of Kazakhstan “on informatization”

35. What is Antivirus? Is computer software used to prevent, detect and remove malicious software

36. What is Password manager? Is a software application that helps as user store and organize passwords

37. When was released the the Orange Book? 1985

38. What is a character encoding? Is used to represent a repertoire of characters by some kind of an encoding system

39. What is Identification? Is an assertion of who someone is or what something is

40. What is Malware? Is any software used to disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising

1. ____________ refers to any type of application or presentation that involves more than one type of media, such as text, graphics, video, animation, and sound. Multimedia

2. One of the disadvantages of multimedia is: cost

3. The text color in a presentation should contrast with the ________ color. background

4. Images included in many software titles are called _________. Clipart

5. A smaller version of an image is called a: thumbnail

6. The process of planning your multimedia presentation is known as a: storyboard

7. In Real Time Interactive Audio Video, Jitter is introduced in real-time data by delay between packets

8. The slide ________ controls text characteristics, background color and special effects, such as shadowing and bullet style. master

9. Designed to create a particular look, a __________ contains color schemes, slide and title masters with custom formatting and fonts styles. template

10. Adding _________ to objects on your slides not only controls the flow of information, but adds interest to your presentation. transition

11. The ________ master controls the format and placement of the titles and text you type on slides, as well as, background items and graphics you want to appear on every slide. Slide

12. The first slide in a presentation is usually reserved for the _________. Title

13. ______________ is the special effect used to introduce each slide in a slide presentation. Transition

14. Notes that include the slide as well as key comments and points you may want to emphasis while you present your slide show are know as: speaker notes


Поделиться с друзьями:

mylektsii.su - Мои Лекции - 2015-2026 год. (0.033 сек.)Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав Пожаловаться на материал