Koll2 en
Koll2 en
The BIOS can be overwritten without removing it from the motherboard for
easy upgrades
The CPU.
1. What is a network hub?
- An electronic device that receives the network signal, cleans it from the
noise, regenerates it and forwards it to the further network infrastructure.
or
- A computer network device that connects network segments and
forwards the signal selectively to the network infrastructure.
2. What is a network adapter?
network.
3. A typical Ethernet package size is:
~ 1500 bytes.
4. The IP address consists of:
- 4 bytes.
5. What is the key feature of the transmission medium?
- 255.255.0.1
8. Which of the following network technologies is a star?
2. Data are:
- 123456, WWW, 070, @, €, FINKI
3. What is an information system?
- a set of interconnected pieces that handle data in an organization
4. The use of computer resources and services that are delivered as
services is the primary purpose of
- cloud computing
- Enterprise software
7. The application of social networks, blogs, forums, wikis and
collaborative content creation on the Internet is a feature of:
- Web 2.0
8. Are there self-replicating machines?
- no, but intensive work is being done on their creation
9. Online buying and selling, marketing, shipping and e-payment are a
feature of
- e-commerce
10. What is pervasive calculation?
- all answers are correct
11. What did the word informatics mean when it was first defined?
- a French word that connects information and automation
12. The impact of ICT encourages
- all answers are correct
13. Do all cell phones have artificial intelligence?
- no, because some mobile phones do not have voice dialing
14. Can computers do something they are not programmed to do?
- knowledge
19. What is multimedia?
- to be recycled
26. Are computer systems wrong?
- ењашарпавоеовкак
29. What is metadata?
- data that provide information about the data (or data about the data)
30. When can programs create problems?
- all answers are correct
31. What does computer security do?
- all listed
38. What is artificial intelligence?
- Garbage In Garbage Out - what is the input, such are the results
40. Is there a connection between data and information?
Malicious software
1. The main task of control programs is:
- Hardware testing and control
2. What is the name of Google's online table and document creation
and editing service?
- Google Drive
3. The current version of the Windows operating system is:
- Windows 10
4. Program tools are used for:
- Create, debug, maintain and support other programs and applications
5. The first task of the BIOS is:
- Power-on self-test
6.iCloud is:
- Apple cloud solution that allows access to photos, documents, contacts,
emails from different devices
7. Pakistani Brain virus was created for:
- Copyright protection
8. The operating system provides:
- Software platform on which other applications can operate and run
9. What is a Boot (bootstrap) loader?
- A small program that loads the operating system into memory, which
enables its operation
10. Disadvantages of proprietary application software:
- Long development and significant development resources (expensive), as
well as increased risk in terms of features and performance
11. Cache is:
- Fast memory that is responsible for storing copies of data from the most
used places / locations in the main memory
12. Software package features:
- The data is transferable between the basic applications in the package
13. What is an interpreter?
- A program that translates and executes the source code step by step
(command by command)
14. Swap file is:
- The part of the hard disk used in the virtual memory
15. What types of programs belong to the system software?
- Control, service and operating software
16. The width of the signs is equal to:
- Disproportionate / serial fonts
17. What is a linker?
- A program that connects the parts of a program into a common whole
18. Real-Time Operating System (RTOS) Characteristics.
- Used to control machines, instruments or industrial systems
19. The abbreviation BIOS stands for:
- Basic Input / Output System
20. A characteristic of distributed operating systems is:
- Manages a group of independent computers making the end user view a
single computer
21. EFI - Extensible Firmware Interface is a replacement for:
- BIOS
22. Times New Roman is:
- Serif font
23. A feature of multi-user operating systems is:
- More users can access and use the resources of the computer system.
24. Compiler input is:
- The source code
25. What is a debugger?
- A program that helps in the search for logical errors
26. One of the first operating systems to be loaded from a hard disk
(disk operating system) is:
- CP / M - Control Program / Monitor
27. What happens when starting any program?
- The instructions are copied to RAM and the CPU starts executing the
first instruction
28. Office 365 e:
- Microsoft cloud solution that enables the use of service applications over
the Internet
29. What is system software?
- Programs that control and coordinate computers or enable the creation of
programs
30. Sanserif fonts are:
- Clear and suitable for screen display
31. A feature of single-user, single task operating systems is:
- A user can only do one job at a time
32. Control programs are located in:
- ROM- of
33. Virtual memory is:
- Method by which the hard disk provides additional memory, ie simulates
additional RAM memory
34. What is a program?
- Sequence of simple instructions in machine language
35. How to enter the BIOS?
- By pressing a certain key on the keyboard when starting the computer
36. Arial is:
- Sanserifen font.
37. What is Multitasking?
- Simultaneous execution of more than one program
38. The most important function of service software is:
- Configure the operation of the computer
39. What is open source software?
- In open source software, the source code is available to everyone, along
with the privilege of making changes to it
40. From which company was the first cloud computing created?
- Salesforce
41. The Linux kernel was developed by:
- Linus Torvalds
42. Disadvantages of off-the-shelf application software:
- May not correspond to the current work processes in the company
43. Advantages of off-the-shelf application software:
- Higher quality usually error free and well tested
44. Advantage proprietary application software?
- Provides flexibility in making changes
45. What is a network hub?
- Computer network device that connects network segments and forwards
the signal selectively to the network infrastructure
46. What is a network adapter?
- Hardware component that connects the computer to the computer
network
47. A typical Ethernet package size is:
- ~ 1500 bytes
48. The IP address consists of:
- 4 bytes
49. What is the key feature of a transmission medium?
- The width of the band
50. HAN is:
- A computer network used to communicate between digital devices
usually deployed within the home.
51. Which IP address is valid:
- 255.255.0.1
52. Which of the following network technologies is a star?
73. What is a communication system?
- system for data transfer from one place to another
74. Data are:
- 123456, WWW, 070, @, €, FINKI
75. What is an information system?
- a set of interconnected pieces that handle data in an organization
76. The use of computer resources and services that are delivered as
services is the primary purpose of
- cloud computing
77. Computer science deals with:
- theoretical aspects of information manipulation
- Theoretical bases for the calculation of information
- practical techniques for applying the theory in computer systems
- all listed
78. Software for companies, enterprises and governments is
- Enterprise software
79. The application of social networks, blogs, forums, wikis and
collaborative content creation on the Internet is a feature of:
- Web 2.0
80. Are there self-replicating machines?
- no, but intensive work is being done on their creation
81. Online buying and selling, marketing, shipping and e-payment are
a feature of
- e-commerce
82. What is pervasive calculation?
- all answers are correct
- unification of small computer devices
- unification of computer devices and mechanisms for feeling the location
- wireless communication on small computer devices with a wide range
83. What did the word informatics mean when it was first defined?
- a French word that connects information and automation
84. The impact of ICT encourages:
- all answers are correct
transformation of the industrial economy
connecting companies and their operation on a common market
global economy
85. Do all cell phones have artificial intelligence?
- no, because some mobile phones do not have voice dialing
86. Can computers do something they are not programmed to do?
- No, this is still just science fiction
Or:
- Yes, because they have artificial intelligence
87. The latest trends in informatics are:
- pervasive computing, grid computing and cloud computing
88. What is a data warehouse?
- database intended for creating reports and analyzing data
89. What is grid calculation?
- weakly interconnected computers scattered in different places that jointly
perform one or more complex tasks simultaneously
90. A fact or state of information gained through experience or
learning is:
- knowledge
91. What is multimedia?
- interactive use of text, graphics, sound and video
92. Therac-25 caused:
- death of patients
93. The preparation of huge amounts of texts is made possible by
- personal publishing programs
94. What is an online / offline dichotomy?
- dividing the world into those who are online and those who are offline
95. Information is:
- FINKI telephone number, FINKI address, melting point
96. What is the connection between informatics and medicine?
- medicine uses computerized instruments and expert systems
97. What is the best thing to do with unusable computers so as not to
disturb the ecological balance of the environment?
- to be recycled
98. Are Computer Systems Wrong?
- no, they do what they are programmed to do
99. The growth of the economy in the 21st century is a result of:
- the new knowledge and values they create
100. What is a global economy?
- economy with global marketing
101. What is metadata?
- data that provide information about the data (or data about the data)
102. When can programs create problems?
- all answers are correct
- if the results are misinterpreted
if the order of execution is incorrect
- if the problem is set incorrectly
103. What does computer security do?
- determining the potential vulnerability of the data, detecting the risks of
malware and applying techniques to prevent them
104. What is e-learning?
- computer or network assisted transfer of skills and knowledge
105. What is the most significant mechanical invention that enabled
the dissemination of information?
- Gutenberg's printing press from the middle of the XV century
106. What has humanity grown into as a result of the transformation
of the economy:
- in the knowledge society
107. Medical diagnostics is based on
- expert systems (Expert systems)
108. Information is:
- the meaning that accompanies the data
109. What is the connection between informatics and trade?
- all listed
110. What is artificial intelligence?
- the science that creates systems that perform mental tasks
111. What does the abbreviation GIGO mean?
- Garbage In Garbage Out - what is the input, such are the results
112. Is there a connection between data and information?
- yes, inbound data -> information, and vice versa
113. In which of the following movies is computer support the least?
- The Social Network ( Social Network)
114. Expert system is:
- a system written by experts
115. The data is:
- an infinite series of signs and symbols
116. What is a Database?
- structured collection of interconnected data
117. Text, speech, images and multimedia presentations are:
- forms through which the information is presented
118. Wireless mobile communications and services enable:
- long - term communication with high mobility and high reliability
119. What are accessible technologies?
- specialized computer systems intended for people with special needs
120. Informatics deals with:
- the creation, accommodation, exchange and use of information
121. What did Wiener say about the ICT challenge?
- all listed
- The new industrial revolution is a double-edged sword
- The industrial revolution can be used for the benefit of humanity
- The industrial revolution can destroy humanity
122. Assistive technologies are intended for individuals
- all listed
- with impaired vision
- with movement problems
- with impaired vision
123. A logical bomb is:
- Code inserted in a legitimate program.
124. How are viruses most often transmitted?
- via the Internet
125. Malware can be:
- independent or require a host program
126. Trapdoors ( Back Doors) is:
- Secret entry point in the program
127. A Trojan horse is:
- Code used to propagate virus / worm or trapdoor installation
128. Zombie is:
- A program that secretly downloads a network computer
129. What is a computer virus?
- a small program code that is copied and embedded in another program
130. What are the most common malicious programs?
- Trojan horses
131. The Ethernet is:
- LAN
132. Advantages of Peer-to-Peer networking:
- Easy installation and configuration
133. The server is:
- A computer that shares network resources and services other computer
systems
134. The client is:
- A computer that uses the services and resources provided by another
computer system
135. UDP e
- Non - connection oriented protocol
136. What is an RJ-45?
Connector type.
137. What is the well-known manufacturing software?
- Microsoft.
138. How are viruses?
- special programs that detect and prevent viruses
139. What is aa@aa.edu.mk?
- e-mail address of the beneficiary educational institution
140. Does the operating system communicate the input-output
devices?
- all input-output devices
141. What about Microsoft Office?
- Lotus 123
142. Is CD daimavirus possible?
- yes, I've only been to a nest file
143. What is www.xx.edu.mk?
-URL address of the educational institution in Macedonia
144. Cash use:
- The CPU
145. What about Microsoft Office?
-Access and Front Page
146. How many stages does a virus go through?
- 4 phases
147. What is a programming language?
- language that allows the user to demonstrate the calculator
148. Is there a software package for business operation?
- Yes, several software companies have such packages
149. The viruses that change with each infection are
- polymorphic viruses
150. What is editorial texts?
- programmed to write texts
151. What is true?
- BIOS - can be used to delete the removable disk that allows easy
upgrades
152. Which Web Pages Have a Search Engine?
-www.google.com and www.yahoo.com
153. What do control programs do?
- manage the hardware
154. What are the functions of system software?
- control and coordination of the work of the calculator
155. What is a compiler?
- translation software that can make an executable version
156. What is a personalizer?
- programmed for preparing books, magazines and newspapers
157. How do viruses spread?
- with the help of antivirus programs
158. What is an operating system?
- connection between hardware and application programs
159. What is an editor?
- a program that writes an original program code
160. What are the most popular computer graphics programs?
- CorelDraw and 3DStudio
161. Where are the control programs located?
- in the ROM
162. What software is used to communicate with RAM?
- through the operating system
163. What is interactivity?
- an activity that has an effect on the flow of future activities
164. Which sciences does modern informatics rely on the most?
- microelectronics and telecommunications
Or:
- Arithmetic and logic
165. What is software?
- Organized collection of computer programs and data
provides instructions / instructions to any computer, no matter what
do
166. Why should computers be connected to networks?
- all numbered
to facilitate and speed up communication between computers
to enable the use of a shared printer
to enable the use of shared resources
1. TCP / IP is:
Connection oriented protocol
2. What is a network switch?
A computer network device that connects network segments and
forwards the signal selectively to the network infrastructure.
3. The Ethernet is:
LAN
4. In what is the width of the band measured?
b / s.
5. Advantages of Peer-to-Peer networking:
Easy installation and configuration
6. FTP enabled
Connect to a remote computer for the sole purpose of
downloading or leaving a file
7. Server is:
A computer that shares network resources and services other
computer systems.
8. Telnet enables
Direct connection and operation of remote computers
9. The client is:
A computer that uses the services and resources provided by
another computer system.
10. The IP address consists of:
4 bytes
11. What is the advantage of optical cables?
Noise resistant.
12. What is true about Peer-to-Peer networking:
There is no centralized control of shared resources
13. WAN is
computer network covering a large area (a network whose
communication links cross city, regional or national borders).
14. Which IP address is invalid?
194.345.12.2
15. What is a MAC address
A unique identifier that comes with every computer device.
16. Server based networks are:
Easy to spread (magnify, scale).
17. What is the key feature of the transmission medium?
The width of the band.
18. CAN e
Computer network composed of interconnection of local area
networks in a limited geographical area.
19. What is a network hub
A computer network device that connects network segments and
forwards the signal selectively to the network infrastructure.
20. What is the maximum supported distance when connecting to
Ethernet?
0-100 meters.
21. What protocol do the computers connected in the Ethernet
network follow to prevent collision of the sent packets?
" wait / re-transmit" protocol.
22. Which IP address is valid:
255.255.0.1
23. What is a network router?
A device that connects two or more computer networks, and
selectively directs - sends data packets between networks
24. HAN is:
A computer network used to communicate between digital
devices usually deployed within the home.
25. UDP e
Non-connection oriented protocol
26. A typical Ethernet package size is:
1500 bytes.
27. What is an RJ-45?
Connector type.
28. MAN is:
A computer network that covers an entire city or a large
complex.
29. WAN e
computer network covering a large area (a network whose
communication links cross city, regional or national borders).
30. A typical Ethernet package size is:
1500 bytes.
31. Server based networks are:
Easy to spread (magnify, scale).
32. What is a network adapter?
Hardware component that connects the computer to the
computer network