0% found this document useful (0 votes)
56 views30 pages

Koll2 en

The document defines various computer and technology related terms. It covers topics like operating systems, software, hardware, networks, cloud computing and more. Definitions are provided for terms such as BIOS, compiler, cache, virtual memory, control programs and others.

Uploaded by

Era
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views30 pages

Koll2 en

The document defines various computer and technology related terms. It covers topics like operating systems, software, hardware, networks, cloud computing and more. Definitions are provided for terms such as BIOS, compiler, cache, virtual memory, control programs and others.

Uploaded by

Era
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
You are on page 1/ 30

1.

The main task of control programs is: 


- Hardware testing and control. 
2. What is the name of Google's online table and document creation and
editing service?  
- Google Drive
3. The current version of the Windows operating system is:  
- Windows 8 
4. Program tools are used for: 
- Create, debug, maintain and support other programs and applications 
5. The first task of BIOS is:
- Power-on self-test. 
6. iCloud is: 
- Apple cloud solution that allows access to photos, documents, contacts,
emails from various devices. 
7. What is a compiler? 
- A computer program (or set of multiple programs) that transforms /
translates the source code written in a programming language into another
computer language that usually has a binary form called object code. 
8. The operating system provides: 
- Software platform on which other applications can operate and run. 
9. What is a Boot (bootstrap) loader? 
- A small program that loads the operating system into memory, which
enables its operation.  
10. Disadvantages of proprietary application software: 
- Long development and significant development resources (expensive), as
well as increased risk in terms of features and performance.  
11. Cache is: 
- Quick memory that is responsible for storing copies of data from the
most frequently used places / locations in the main memory 
12. Software package features: 
- The data is transferable between the basic applications in the package.  
13. What is an interpreter? 
- A program that translates and executes the source code step by step
(command by command). 
14. Swap file is:  
- The part of the hard disk used in the virtual memory.  
15. What types of programs belong to the system software? 
- control, service and operating software 
16. The width of the signs is equal to: 
- Disproportionate fonts. 
17. What is a linker? 
- A program that connects the parts of a program into a common whole.  
18. Real-Time Operating System (RTOS) Characteristics.  
- Used to control machines, instruments or industrial systems. 
19. The abbreviation BIOS stands for: 
- Basic Input / Output System 
20. A characteristic of distributed operating systems is: 
- Manages a group of independent computers making the end user view a
single computer. 
21. EFI - Extensible Firmware Interface is a replacement for: 
- BIOS. 
22. Times New Roman is: 
- Serif font. 
23. A feature of multi-user operating systems is:  
- More users can access and use the resources of the computer system.  
24. Compiler input is: 
- The source code. 
26. What is a debugger? 
- A program that helps in the search for logical errors. 
27. One of the first operating systems to be loaded from a hard disk (disk
operating system) is:  
- CP / M - Control Program / Monitor. 
28. What happens when starting any program? 
- The instructions are copied to RAM and the CPU starts executing the
first instruction.  
29. Office 365 is: 
- Microsoft cloud solution that enables the use of service applications over
the Internet. 
30. What is system software? 
- Programs that control and coordinate computers or allow programs to be
created (not sure)    
31. Sanserif fonts are: 
- Clear and suitable for screen display. 
32. A feature of single-user, single task operating systems is:  
- A user can only do one job at a time. 
33. Control programs are located in: 
- ROM . 
34. Virtual memory is: 
- Method by which the hard disk provides additional memory, ie simulates
additional RAM memory. 
35. What is a program? 
- Sequence of simple instructions in machine language 
36. How to enter the BIOS? 
- By pressing a certain key on the keyboard when starting the computer. 
37. Arial is: 
- Sanserifen font. 
38. What is Multitasking? 
- Simultaneous execution of more than one program. 
39. The most important function of service software is: 
- To configure the operation of the computer.  
40. What is open source software? 
- In open source software, the source code is available to everyone, along
with the privilege of making changes to it. 
41. From which company was the first cloud computing created?  
- Salesforce. 
42. The Linux kernel was developed by:  
- Linus Torvalds. 
43. Disadvantages of off-the-shelf application software: 
- May not correspond to the current work processes in the company. 
44. What types of programs belong to the system software?

control, service and operating software

45. Advantages of off-the-shelf application software:

Higher quality usually error free and well tested.

46. What is true?

The BIOS can be overwritten without removing it from the motherboard for

easy upgrades

47. Advantages of proprietary application software:

Provides flexibility in making changes.

48. The cache is used by:

The CPU.

 
1. What is a network hub? 
- An electronic device that receives the network signal, cleans it from the
noise, regenerates it and forwards it to the further network infrastructure. 
or
- A computer network device that connects network segments and
forwards the signal selectively to the network infrastructure.
 2. What is a network adapter?  

- Hardware component that connects the computer to the computer

network. 
3. A typical Ethernet package size is: 

 ~ 1500 bytes. 
4. The IP address consists of: 

- 4 bytes. 
5. What is the key feature of the transmission medium? 

- The width of the band. 


6. HAN is: 

- A computer network used to communicate between digital devices

usually deployed with in the home.  


7. Which IP address is valid: 

- 255.255.0.1 
8. Which of the following network technologies is a star? 

29. The Ethernet is: 


- LAN
 
30 . Server is :
- A computer that shares network resources and services other computer
systems.
 
31. UDP e 
- Non - connection oriented protocol 
 
32. Benefits of Peer-to-Peer Networking?   
- Easy installation and configuration.
 
33. He is a customer 
- a computer that uses the services and resources provided by another
computer system.
 
34. What is an RJ-45? 
- Connector type. 
 
35. Why should computers connect to networks? 
- for all the listed reasons
 
About informatics
 

1. What is a communication system?

2. Data are: 
- 123456, WWW, 070, @, €, FINKI 
3. What is an information system? 
- a set of interconnected pieces that handle data in an organization
4. The use of computer resources and services that are delivered as
services is the primary purpose of 

- cloud computing 

5. Computer science deals with:


- all answers are correct
6. Software for companies, enterprises and governments is 

- Enterprise software 
7. The application of social networks, blogs, forums, wikis and
collaborative content creation on the Internet is a feature of: 
- Web 2.0
8. Are there self-replicating machines? 
- no, but intensive work is being done on their creation 
9. Online buying and selling, marketing, shipping and e-payment are a
feature of 

- e-commerce 
10. What is pervasive calculation? 
- all answers are correct
11. What did the word informatics mean when it was first defined? 
- a French word that connects information and automation
12. The impact of ICT encourages 
- all answers are correct
13. Do all cell phones have artificial intelligence? 
- no, because some mobile phones do not have voice dialing
14. Can computers do something they are not programmed to do? 

- No, this is still just science fiction 


15. The latest trends in informatics are: 

- pervasive computing, grid computing and cloud computing 


16. What is a data warehouse? 

- database intended for creating reports and analyzing data 


17. What is grid calculation? 

- weakly interconnected computers scattered in different places that jointly

perform one or more complex tasks simultaneously 


18. The fact or state of information gained through experience or learning 

- knowledge 
19. What is multimedia? 

- interactive use of text, graphics, sound and video 


20. Therac-25 caused 
- death of patients 
21. The preparation of huge amounts of texts is made possible by 

- personal publishing programs 


22. What is an online / offline dichotomy? 

- all answers are correct 


23. Information is: 

- FINKI telephone number, FINKI address, melting point 


24. What is the connection between informatics and medicine? 

- medicine uses computerized instruments and expert systems 


 
25. What is the best thing to do with unusable computers so as not to upset
the ecological balance of the environment? 

- to be recycled 
26. Are computer systems wrong? 

- no, they do what they are programmed to do  


27. The growth of the economy in the 21st century is a result of 

- the new knowledge and values they create (I'm not sure) 


28. What is a global economy? 

- ењашарпавоеовкак

29. What is metadata? 

- data that provide information about the data (or data about the data) 
30. When can programs create problems? 
- all answers are correct
31. What does computer security do? 

- determining the potential vulnerability of the data, detecting the risks of


malware and applying techniques to prevent them  
32. What is e-learning? 
- computer or network assisted transfer of skills and knowledge
33. What is the most significant mechanical invention that enabled the
dissemination of information? 

- Gutenberg's printing press from the middle of the XV century 


34. What has humanity grown into as a result of the transformation of the
economy 

- in the society of knowledge   


35. Medical diagnostics is based on 

- expert systems (Expert systems) 


36. Information is: 

- the meaning that accompanies the data 


37. What is the connection between informatics and trade? 

- all listed 
 
38. What is artificial intelligence? 

- the science that creates systems that perform mental tasks 


39. What does the abbreviation GIGO mean? 

- Garbage In Garbage Out - what is the input, such are the results 
40. Is there a connection between data and information? 

41. In which of the following movies is computer support the least?

- The Social Network ( Social Network) 

42. Expert system is:


- a system written by experts
43 . The data is : 
infinite array of signs and symbols
44. What is a Database?
- structured collection of interconnected data      
45 . Text, speech, pictures and multimedia presentations are 
- forms through which the information is presented
46. Wireless mobile communications and services enable  
- long - term communication with high mobility and high reliability      
 

47. What are accessible technologies? 


specialized computer systems for people with disabilities
48. Informatics deals with: 
the creation, accommodation, exchange and use of information
49. What did Wiener say about the ICT challenge? 
all listed
50. Assistive technologies are intended for individuals 
all listed
51. What is grid calculation?
A mechanism through which we use processing power and memory space
regardless of location.
 
 52 . What is computer science? 
- science of creation, accommodation, exchange and use of information

Malicious software
 

1. A logical bomb is: 


Code embedded in a legitimate program.
2. How are viruses most often transmitted? 
 via the Internet
3. Malicious software can be 
 independent or require a host program
4. Trapdoors ( Back Doors) is: 
Secret entry point into the program.
5. A Trojan horse is: 
 Code used to propagate virus / worm or trapdoor installation.
6. Zombie is: 
A program that secretly downloads a network computer.
7. What is a computer virus? 
 a small program code that is copied and embedded in another program

8. What are the most common malicious programs? 


Trojan horses

9. The viruses that change with each infection are 


 polymorphic viruses
10. How many stages does a virus go through? 
Four

11. The Pakistani Brain virus was created 


for copyright protection
 
 

 
1. The main task of control programs is: 
- Hardware testing and control
 
2. What is the name of Google's online table and document creation
and editing service? 
- Google Drive
 
3. The current version of the Windows operating system is:  
- Windows 10 
 
4. Program tools are used for:
- Create, debug, maintain and support other programs and applications 
 
5. The first task of the BIOS is: 
- Power-on self-test
 
6.iCloud is:
- Apple cloud solution that allows access to photos, documents, contacts,
emails from different devices
 
7. Pakistani Brain virus was created for:
- Copyright protection
 
8. The operating system provides:
- Software platform on which other applications can operate and run
 
9. What is a Boot (bootstrap) loader?
- A small program that loads the operating system into memory, which
enables its operation
 
10. Disadvantages of proprietary application software: 
- Long development and significant development resources (expensive), as
well as increased risk in terms of features and performance
 
11. Cache is: 
- Fast memory that is responsible for storing copies of data from the most
used places / locations in the main memory
 
12. Software package features:
- The data is transferable between the basic applications in the package 
 
13. What is an interpreter? 
- A program that translates and executes the source code step by step
(command by command)
 
14. Swap file is: 
- The part of the hard disk used in the virtual memory 
 
15. What types of programs belong to the system software? 
- Control, service and operating software
 
16. The width of the signs is equal to:
- Disproportionate / serial fonts
 
17. What is a linker?
- A program that connects the parts of a program into a common whole
 
18. Real-Time Operating System (RTOS) Characteristics.  
- Used to control machines, instruments or industrial systems 
 
19. The abbreviation BIOS stands for:
- Basic Input / Output System
 
20. A characteristic of distributed operating systems is: 
- Manages a group of independent computers making the end user view a
single computer 
 
21. EFI - Extensible Firmware Interface is a replacement for:
- BIOS
 
22. Times New Roman is:
- Serif font
 
23. A feature of multi-user operating systems is: 
- More users can access and use the resources of the computer system. 
 
24. Compiler input is: 
- The source code
 
25. What is a debugger? 
- A program that helps in the search for logical errors
 
26. One of the first operating systems to be loaded from a hard disk
(disk operating system) is: 
- CP / M - Control Program / Monitor 
 
27. What happens when starting any program?
- The instructions are copied to RAM and the CPU starts executing the
first instruction
 
28. Office 365 e: 
- Microsoft cloud solution that enables the use of service applications over
the Internet
 
29. What is system software?
- Programs that control and coordinate computers or enable the creation of
programs
 
30. Sanserif fonts are:
- Clear and suitable for screen display
 
31. A feature of single-user, single task operating systems is: 
- A user can only do one job at a time 
 
32. Control programs are located in:
- ROM- of
 
33. Virtual memory is:
- Method by which the hard disk provides additional memory, ie simulates
additional RAM memory
 
34. What is a program?
- Sequence of simple instructions in machine language
 
35. How to enter the BIOS?
- By pressing a certain key on the keyboard when starting the computer
 
36. Arial is:
- Sanserifen font.
 
37. What is Multitasking?
- Simultaneous execution of more than one program
 
38. The most important function of service software is:
- Configure the operation of the computer
 
39. What is open source software? 
- In open source software, the source code is available to everyone, along
with the privilege of making changes to it
 
40. From which company was the first cloud computing created? 
- Salesforce 
 
41. The Linux kernel was developed by: 
- Linus Torvalds 
 
42. Disadvantages of off-the-shelf application software:
- May not correspond to the current work processes in the company
 
43. Advantages of off-the-shelf application software: 
- Higher quality usually error free and well tested
 
44. Advantage proprietary application software?
- Provides flexibility in making changes
 
45. What is a network hub?
- Computer network device that connects network segments and forwards
the signal selectively to the network infrastructure 
 
46. What is a network adapter?  
- Hardware component that connects the computer to the computer
network 
 
47. A typical Ethernet package size is:
- ~ 1500 bytes
 
48. The IP address consists of:
- 4 bytes
 
49. What is the key feature of a transmission medium?
- The width of the band
 
50. HAN is:
- A computer network used to communicate between digital devices
usually deployed within the home.
 
51. Which IP address is valid: 
- 255.255.0.1
 
52. Which of the following network technologies is a star?

 
73. What is a communication system?
- system for data transfer from one place to another 
 
74. Data are: 
- 123456, WWW, 070, @, €, FINKI 
 
75. What is an information system?
- a set of interconnected pieces that handle data in an organization
 
76. The use of computer resources and services that are delivered as
services is the primary purpose of 
- cloud computing 
 
77. Computer science deals with:
- theoretical aspects of information manipulation
- Theoretical bases for the calculation of information
- practical techniques for applying the theory in computer systems
- all listed
 
78. Software for companies, enterprises and governments is
- Enterprise software
 
79. The application of social networks, blogs, forums, wikis and
collaborative content creation on the Internet is a feature of:
- Web 2.0
 
80. Are there self-replicating machines?
- no, but intensive work is being done on their creation
 
81. Online buying and selling, marketing, shipping and e-payment are
a feature of
- e-commerce
 
82. What is pervasive calculation?
- all answers are correct
- unification of small computer devices
- unification of computer devices and mechanisms for feeling the location
- wireless communication on small computer devices with a wide range
 
83. What did the word informatics mean when it was first defined?
- a French word that connects information and automation
 
84. The impact of ICT encourages:
- all answers are correct
transformation of the industrial economy
connecting companies and their operation on a common market
global economy
 
85. Do all cell phones have artificial intelligence?
- no, because some mobile phones do not have voice dialing
 
86. Can computers do something they are not programmed to do?
- No, this is still just science fiction
Or:
- Yes, because they have artificial intelligence
 
87. The latest trends in informatics are:
- pervasive computing, grid computing and cloud computing
 
88. What is a data warehouse?
- database intended for creating reports and analyzing data
 
89. What is grid calculation?
- weakly interconnected computers scattered in different places that jointly
perform one or more complex tasks simultaneously
 
90. A fact or state of information gained through experience or
learning is:
- knowledge
 
91. What is multimedia?
- interactive use of text, graphics, sound and video
 
92. Therac-25 caused:
- death of patients
 
93. The preparation of huge amounts of texts is made possible by
- personal publishing programs
 
94. What is an online / offline dichotomy?
- dividing the world into those who are online and those who are offline
 
95. Information is:
- FINKI telephone number, FINKI address, melting point
 
96. What is the connection between informatics and medicine?
- medicine uses computerized instruments and expert systems
 
97. What is the best thing to do with unusable computers so as not to
disturb the ecological balance of the environment?
- to be recycled
 
98. Are Computer Systems Wrong?
- no, they do what they are programmed to do 
 
99. The growth of the economy in the 21st century is a result of: 
- the new knowledge and values they create
 
100. What is a global economy? 
- economy with global marketing
 
101. What is metadata? 
- data that provide information about the data (or data about the data)
 
102. When can programs create problems?
- all answers are correct
- if the results are misinterpreted
if the order of execution is incorrect
- if the problem is set incorrectly
 
103. What does computer security do?
- determining the potential vulnerability of the data, detecting the risks of
malware and applying techniques to prevent them 
104. What is e-learning? 
- computer or network assisted transfer of skills and knowledge
 
105. What is the most significant mechanical invention that enabled
the dissemination of information?
- Gutenberg's printing press from the middle of the XV century
 
106. What has humanity grown into as a result of the transformation
of the economy:
- in the knowledge society  
 
107. Medical diagnostics is based on
- expert systems (Expert systems)
 
108. Information is:
- the meaning that accompanies the data
 
109. What is the connection between informatics and trade?
- all listed
 
110. What is artificial intelligence?
- the science that creates systems that perform mental tasks
 
111. What does the abbreviation GIGO mean?
- Garbage In Garbage Out - what is the input, such are the results
 
112. Is there a connection between data and information?
- yes, inbound data -> information, and vice versa 
 
113. In which of the following movies is computer support the least?
- The Social Network ( Social Network)
 
114. Expert system is:
- a system written by experts
 
115. The data is:
- an infinite series of signs and symbols
 
116. What is a Database?
- structured collection of interconnected data
 
117. Text, speech, images and multimedia presentations are:
- forms through which the information is presented
 
118. Wireless mobile communications and services enable:
- long - term communication with high mobility and high reliability
 
119. What are accessible technologies? 
- specialized computer systems intended for people with special needs
 
120. Informatics deals with:
- the creation, accommodation, exchange and use of information
 
121. What did Wiener say about the ICT challenge?
- all listed
- The new industrial revolution is a double-edged sword 
- The industrial revolution can be used for the benefit of humanity
- The industrial revolution can destroy humanity
 
122. Assistive technologies are intended for individuals
- all listed
- with impaired vision
- with movement problems
- with impaired vision
 
123. A logical bomb is:
- Code inserted in a legitimate program.
 
124. How are viruses most often transmitted?
- via the Internet 
 
125. Malware can be:
- independent or require a host program 
 
126. Trapdoors ( Back Doors) is:
- Secret entry point in the program
 
127. A Trojan horse is:
- Code used to propagate virus / worm or trapdoor installation
 
128. Zombie is:
- A program that secretly downloads a network computer
 
129. What is a computer virus?
- a small program code that is copied and embedded in another program 
 
130. What are the most common malicious programs?
- Trojan horses
 
131. The Ethernet is:
- LAN
 
132. Advantages of Peer-to-Peer networking: 
- Easy installation and configuration 
 
133. The server is: 
- A computer that shares network resources and services other computer
systems
 
134. The client is:
- A computer that uses the services and resources provided by another
computer system
 
135. UDP e
- Non - connection oriented protocol
 
136. What is an RJ-45?
Connector type.
 
137. What is the well-known manufacturing software? 
- Microsoft.
 
138. How are viruses?
- special programs that detect and prevent viruses 
 
139. What is aa@aa.edu.mk?
- e-mail address of the beneficiary educational institution 
 
140. Does the operating system communicate the input-output
devices?
- all input-output devices 
 
141. What about Microsoft Office?
- Lotus 123 
 
142. Is CD daimavirus possible?
- yes, I've only been to a nest file 
 
143. What is www.xx.edu.mk?
-URL address of the educational institution in Macedonia
 
144. Cash use:
- The CPU
 
145. What about Microsoft Office? 
-Access and Front Page
 
146. How many stages does a virus go through?
- 4 phases
 
147. What is a programming language?
- language that allows the user to demonstrate the calculator 
 
148. Is there a software package for business operation? 
- Yes, several software companies have such packages 
 
149. The viruses that change with each infection are
- polymorphic viruses 
 
150. What is editorial texts?
- programmed to write texts 
 
151. What is true? 
- BIOS - can be used to delete the removable disk that allows easy
upgrades
 
152. Which Web Pages Have a Search Engine?
-www.google.com and www.yahoo.com
 
153. What do control programs do? 
- manage the hardware
 
154. What are the functions of system software? 
- control and coordination of the work of the calculator 
 
155. What is a compiler? 
- translation software that can make an executable version 
 
156. What is a personalizer? 
- programmed for preparing books, magazines and newspapers
 
157. How do viruses spread? 
- with the help of antivirus programs
 
158. What is an operating system?
- connection between hardware and application programs
 
159. What is an editor? 
- a program that writes an original program code
 
160. What are the most popular computer graphics programs? 
- CorelDraw and 3DStudio 
 
161. Where are the control programs located? 
- in the ROM 
 
162. What software is used to communicate with RAM?
- through the operating system 
 
163. What is interactivity?
- an activity that has an effect on the flow of future activities
 
164. Which sciences does modern informatics rely on the most?
- microelectronics and telecommunications
Or:
- Arithmetic and logic
 
165. What is software?
- Organized collection of computer programs and data
provides instructions / instructions to any computer, no matter what
do
 
166. Why should computers be connected to networks? 
- all numbered
 
to facilitate and speed up communication between computers
to enable the use of a shared printer
to enable the use of shared resources
 
1. TCP / IP is:   
Connection oriented protocol
2. What is a network switch?   
A computer network device that connects network segments and
forwards the signal selectively to the network infrastructure.
3. The Ethernet is:   
LAN
4. In what is the width of the band measured?   
b / s.
5. Advantages of Peer-to-Peer networking:   
Easy installation and configuration
6. FTP enabled   
Connect to a remote computer for the sole purpose of
downloading or leaving a file
7. Server is:   
A computer that shares network resources and services other
computer systems.
 
8. Telnet enables   
Direct connection and operation of remote computers
9. The client is:   
A computer that uses the services and resources provided by
another computer system.
10. The IP address consists of:              
4 bytes
11. What is the advantage of optical cables?              
Noise resistant.
12. What is true about Peer-to-Peer networking:              
There is no centralized control of shared resources
13. WAN is       
computer network covering a large area (a network whose
communication links cross city, regional or national borders).
14. Which IP address is invalid?              
194.345.12.2
15. What is a MAC address              
A unique identifier that comes with every computer device.
 
16. Server based networks are:              
Easy to spread (magnify, scale). 
17. What is the key feature of the transmission medium?              
The width of the band.
18. CAN e              
Computer network composed of interconnection of local area
networks in a limited geographical area.
19. What is a network hub              
A computer network device that connects network segments and
forwards the signal selectively to the network infrastructure.
20. What is the maximum supported distance when connecting to
Ethernet?               
0-100 meters.
21. What protocol do the computers connected in the Ethernet
network follow to prevent collision of the sent packets?                
" wait / re-transmit" protocol.
22. Which IP address is valid:              
255.255.0.1
 
23. What is a network router?              
A device that connects two or more computer networks, and
selectively directs - sends data packets between networks
 
24. HAN is:              
A computer network used to communicate between digital
devices usually deployed within the home. 
25. UDP e              
Non-connection oriented protocol
 
26. A typical Ethernet package size is:              
1500 bytes.
27. What is an RJ-45?              
Connector type.
28. MAN is:              
A computer network that covers an entire city or a large
complex.
29. WAN e              
computer network covering a large area (a network whose
communication links cross city, regional or national borders).
30. A typical Ethernet package size is:              
1500 bytes.
31. Server based networks are:              
Easy to spread (magnify, scale). 
32. What is a network adapter?               
Hardware component that connects the computer to the
computer network

You might also like