Файл: Уровень 1 Необходимо выбрать один правильный вариант ответа Вопрос 1.docx

ВУЗ: Не указан

Категория: Не указан

Дисциплина: Не указана

Добавлен: 10.11.2023

Просмотров: 119

Скачиваний: 1

ВНИМАНИЕ! Если данный файл нарушает Ваши авторские права, то обязательно сообщите нам.


Вопрос №48

In order to access the full functionality of the Google search engine and flexibly configure the search for information, users need to go to the ___ tab or use ____.

Search operators in search field

Relative search

Advanced search

Enchased

Enhanced user search

Search tools panel (under the search field)


Вопрос №49

A Google Drive user can share a document with ___ at a time.

Only one colleague

Random number colleagues

Only to those users with whom he corresponded in gmail

Only to those users, who is on his contact list

Several colleagues

More than one

Ten


Вопрос №50

What happens to your file on Google drive if your computer turns off suddenly

All data will be saved in the state in which it was before turning off the computer

The file will be saved on a local disk

Nothing, since all changes on your drive are saved automatically

The file will be damaged, but through special, third-party services it can be restored

Information will be lost

Information is saved in Google documents automatically - it will not be lost


Вопрос №51

When creating file sharing, the user indicated public access and opened it through a link to the Google Drive file. In this case, ___ will have access to the file.

Users of Google services, as well as third-party services who has a link (shared access) to a file

Only Google service users

Only users who get a link to the file

All cloud service users

Only Google management department

Users who has a link (shared access) to a file and actual Gmail account

Only user neighborhoods


Вопрос №52

What do you need to download before using Google Docs?

Modern operating systems include Internet browsers as part of the software - nothing else needs to be downloaded

My computer should have Microsoft Word and Excel.

There's nothing to download. Just go online.

User must buy and download Google service application in Play Market

Nothing, you only need access to internet

User need to download the Google Docs application.



Вопрос №53

The user moved the shared file for from the «Shared with me» folder to the «Documents» user folder on Google Drive, in this case user ___.

Will retain the ability to work with the file in shared mode with colleagues

Will no longer be able to work with the file in shared mode with colleagues

To continue working together, user will need to re-request permission to access file from its author

To continue working in shared mode, the author will have to resend the file to user

Should rename file to have the ability to work with it

Will retain the ability to work with the shared file immediately after copying is finished

Will retain the ability to view shared file and leave comments with colleagues (who has access to the same file)


Вопрос №54

What does the term HTML stand for and what is its purpose?

Hyperlinks and Text Markup Language

Hyper Text Mail Language

Home Tool Markup Language

Hyper Text Markup Language

Language for creating markup for Internet resources

Language for creating hyper-speed internet applications


Вопрос №55

What does the term CSS stand for and what is its purpose?

Case style system

Cascading style sheets

Cascading style system

Comand style sheets

Creating control scripts for web pages

Creating style sheets for web pages

Adding Design to HTML web pages elements

Creating command style for web pages




Вопрос №56

Choose the correct HTML element for insert heading on page:







name of the site


name of the site

name of the site

name of the site <br>


Вопрос №58

The first tag in html file, that notifies your system of the beginning of html code









Includes all other page tags (all other page markup tags are inside it)

Is an abbreviation for Hyper Text Markup Language within < > signs

Is an abbreviation for World Wide Web file within < > signs


Вопрос №59

In order to use any image as the background image of your web page, you will add the code:















Вопрос №60

What is the correct HTML syntax for inserting a line break (single) inside text?

Paragraph text
string on web page

Paragraph text
string on web page

Paragraph
text string on web page

Paragraph text string on web page

Paragraph text string on web page

Paragraph text string on web
page


Вопрос №61

In order to place a horizontal line, which always (in case of changing window size) is half the width of the screen, you will add the code:


























Вопрос №62

What is the correct HTML for adding a background color?

< body bgcolor="black" text="#008000">



yellow





< body bgcolor="white">


Вопрос №63

In order to define a font family, you must specify it in the ___ attribute of the ____ tag

Face attribute

tag

tag

Font family attribute

tag

Face attribute and tag

Neither of above


Вопрос №64

In order to align the paragraph text in width, you have to add following code to the html file _____ .







center">





left">


left">





center">


Вопрос №65

What is the correct HTML code for creating a hyperlink

www.kaznu.kz

W3Schools.com

W3Schools.com

http://www.kaznu.kz

W3Schools

Link to a site

Link to a site


Вопрос №66

Most common types of html page links (anchor tags) are:

Within single web page (between different page elements)

Within system (web pages on a local computer)

Between remote servers

Within data base

In cloud (on a cloud service server)

External (on a different sites over network)


Вопрос №67

Which of these html elements are relate to element?















Вопрос №68
tag (to indicate an empty cell value) must contain symbol:
tags

In order to create an empty cell of the table, in html, the

*

Space

#

For an empty cell, adding the td tag is not required

For adding an empty cell user should enter alt+enter command within

Remains empty, but user should enter “Space” (without quotes) symbol in it

Non-printing “Space” (without quotes) symbol


Вопрос №69

To set the text size, you can specify parameters in the “size” attribute of the tag as follows:

=“12pt”

=“+1”

=“5”

=“10points”

=“!10”

=“*10”


Вопрос №70

It is necessary that in the absence of a picture on the server, instead of it at the same place on the web page, the inscription "Error" should be displayed. To do this, html code should be used:
















Вопрос №71

What is the correct HTML for inserting an image?

image.gif





MyImage






Вопрос №72

What kind of information can be stored in the table cell of the html page?

Text data

Numeric data

Neither of above

Symbols

Cannot be said


Вопрос №73

Which of the following is the best definition for cybersecurity?

The process by which an organization manages cyber security risk to an acceptable level

The protection of information from unauthorized access or disclosure

Protection of paper documents and intellectual property in form of verbal or visual data

Protecting information assets by addressing threats to information that is processed, stored or transported by interworked information systems

Developing of application software for automatic management of Internet services



Вопрос №74

In order to organize reliable protection of the digital information from various cyber attacks and to prevent cyber violations within some Company, it is necessary to provide

Installation of a reliable antivirus and firewall

Regular software updates

Neither of the above

Differentiation of rights to physical access for employees to company equipment

Daily check of employee workplaces

Checking the skill level of company employees (can they work with 3d applications or not)


Вопрос №75

To gain access to data stored on a secure server, users need to go through the procedure

Malware сhecks

Registration

Authentication

Server source redirect

Authorization

Administrator rights checking

Drive defragmentation



Вопрос №76

Choose statements that is not a cyber crime

Remote checking for updates available for shareware application software

Cracking down the computer security in order to improve the weaknesses

Stealing PINS at the ATM

Spoofing and stealing information

Buying credit card information and extracting the money

Creating reliable system protection against malwares


Вопрос №77

The main sources of malware infection are

Malware-infected files transmitted over a network (e.g. over mail services)

Mail services

News Portals

Secure data servers

Remote computers

Fake Internet resource

Anti-malware application softwares


Вопрос №78

The main type of software used to prevent data loss and malware infection on a computer system (including real-time network protection software):

Firewalls

Brand - maureas

Anti - viruses

Anti - encoders

Anti - decoders

Anti – malwares


Вопрос №79

When using this type of software, there is an increased likelihood of data loss due to cybercrime

Malware

Protected

Pirated

Freeware

Shareware

Not licensed

Licensed


1   ...   4   5   6   7   8   9   10   11   12


Вопрос №80

What is the generic term for computer programs that can wreak havoc on your devices?

Malware

Damagedroids

Rudebots

Dangerware

Viruses

Pirated


Вопрос №81

From this type of cyber threats, 100% protection with anti-malware software is NOT possible:

License updeates

Viruses

All of the above

Spyware

Network worms


Вопрос №82

This technologies (methodology) allows users to restore data in case of accidentally deleting it from the local computer

Data licensing

Storing files on cloud technologies

Regular data backup

Data archiving technologies

Data defragmentation technologies

Storing a copy of data on secure removable devices


Вопрос №83

The threats to information security of some Company may come from (commonly):

Hackers

Users

Malwares

The kind of architecture style in which the company building is built

Servers

RFID sensors

Licensed firewall software

WSN sensors


Вопрос №84

Using the «ipconfig command» in command line (without additional attributes) the user can find out ___ of host

Subnet Mask only

IP Address only

DNS suffix

Local Network provider company name

Subnet Mask

Neither of the above

Default Gateway

Local Network provider company ip address


Вопрос №85

What type of hardware is usually used in a local networks?

IP subnet devices

Modems

Hub

Router

Software interconnectors



Вопрос №
86

Which of the following network topologies will allow an Internet connection?

Car

Fast-internet

Plane

Bus

Star

Ring

Neither of the above


Вопрос №87

Unified identifier defining the location of the host address in the network

IPv4 or IPv6 adresses

Subnet mask

IP address

Network Topology Id

Network gateway

Combination of system network and host addresseses

WWW address


Вопрос №88

What the term LAN stands for?

Network connection of systems located relatively close to each other

Network connection of interacting devices within a building/company (relatively small distance between devices)

Local addressing netspace

Line area network

Local area network

Low addressing network


Вопрос №89

As a result of the response to the ping command, you received a message about a large number of lost packets (for example, 100%). It means that ___

The requested node has already received all packets earlier

User entered the command syntax incorrectly

The ping successfully completed its work and provided the required information

The requested node is unavailable

User entered the command syntax within a wrong time period for a current local system

There were problems during establishing a connection (requested system is not responding)

Computer which user are pinging is not responding


Вопрос №90

To send messages to all nodes of the network x.167.4.76 (where x – random number from 1 to 255), subnet mask - 255.0.0.0, the following address can be is used (broadcast):

192.0.255.0

0.167.255.255

192.167.255.255

192.255.255.255

148. 255.15.255

148. 255.255.255

12. 255.255.11

12. 255.255.255