2022-2023 ICT 300 for Students
2022-2023 ICT 300 for Students
2022-2023 ICT 300 for Students
RAM defines:
Which one runs on a computer hardware and serves as a platform for other software to run on?
Which of the following Operating System does not implement multitasking truly?
Which is the first program run on a computer when the computer boots up?
Which is the layer of a computer system between the hardware and the user program
Which application software would best be used when you need to print a letter for a legal client?
If Aidar has already saved his file, then what choice can he use to change the file name?
In Windows operating system , an icon or a link that provides access to some original program or
resource is known as ____________ .
What is the window bar displays the name of the disclosed subject?
The set of tools and rules of user interaction with the computer is called
Markup text, images and other objects on a web page is realized with the help of ...
What is a shortcut
Which of the following datatypes is used to attach Microsoft Office files, graphics files, sound fil
pdf files to a table in Access?
Which of the following data types is more commonly called Boolean in Access ?
Which of the following data types is used to enter more than 255 characters?
What the object used for printed on paper the database in a Microsoft Access?
Which data type is better to use for storing phone number in the following format “977-1-123456
Access?
Which criteria return only those addresses beginning with the letter “K” in Access??
Which criteria return only a phone number ending the number "5" in Access??
Which of the following software programs is a powerful spreadsheet program that allows users to
organize data, complete calculations, and graph data?
Which of the following notebook- like features organizes the sheets for use in Excel?
Which of the following would you use to enter, calculate, manipulate, and analyze data such as nu
and text in Excel?
What do you use to navigate and display different portions of a worksheet in the worksheet windo
What symbol should be put in the cell address in the formula to make the Absolute reference?
Which of the following do you use to move one cell to the right in an Excel worksheet?
Which of the following do you use to move down one cell in an Excel worksheet?
What is the name of the small black square in the lower-right corner of the heavy border of an act
cell that repeats a cell's value in adjacent cells?
When copying values in Excel 2010, which feature automatically adjusts cell references for the n
copy location?
Which device allows your computer to talk to other computers over a telephone line as well as ac
the internet?
A _______ consists of two or more computers that are linked in order to share resources.
What is a modem?
The e-mail address in the Internet is set: user_name@mtu-net.ru. What is the name of the owner
INTERNET is ...
This is a class of programs that searches your hard drive and floppy disks for unknown or potent
viruses.
What is the name of a program or programming code that replicates by being copied or initiating
copying to another program, computer boot sector or document?
This is a computer system on the Internet that is expressly set up to attract and "trap" intruders.
Which of the following methods does spyware use to install on an end user'smachine?
What is a video?
Educational software that delivers course material and instruction via computer
Education designed for delivery where students and instructors not in the same location
Software for interacting with , accessing, and viewing information on the Internet
An online, real-time interactive communication method using text to send and receive instant mes
Belief that the information you provide online will remain confidential
The conversion of data into a form, called a cipher, that cannot be easily understood by unauthori
people
The final link in the customer service request or computer program usage chain
___________is a small plastic card with a unique number attached with an account.
What is the card holder?
What is the like credit card, is a small plastic card with a unique number mapped with the bank ac
number?
_________is again similar to a credit card or a debit card in appearance, but it has a small
microprocessor chip embedded in it.
What are the operations with the use of credit cards, debit cards or smart cards, which are exampl
transactions of electronic money?
It is a very popular electronic payment method to transfer money from one bank account to anoth
bank account.
_____ a quantum computer or a computer with logical elements of the order of several nanomete
which has extremely high performance.
Where the electronic customers of the bank of cash can now download money from their accoun
This may sound very much like shopping by the internet, but in fifty years time will be very diffe
In the next decade we can have miniature computers inside use to monitor, and even regulate, our
pressure, heart rate, and cholesterol.
Which payment has revolutionized the business processing by reducing the paperwork, transactio
costs, and labor cost.
Which of computing refers to applications and services that run on a distributed network using
virtualized resources.
Cloud ?
Which of the following cloud concept is related to pooling and sharing of resources?
Cloud computing is an abstraction based on the notion of pooling physical resources and presenti
them as a ________ resource.
What is the name of the organization helping to foster security standards for cloud computing?
The following are some well-known cloud-based data repositories. Point out the excess
Which company recently shut the doors on its cloud storage service?
Opens the media bar, accessing internet radio, music, video etc.
"The website gets a thousand hits a week" means the website has a thousand _________
The words, images and other material that make up a website are called __________.
Websites with sounds and/or video clips and/or animations have __________ content.
In which year Smart Technologies introduced the first interactive Smart Board?
In which year, Smart developed and later patented DViT (Digital Vision Touch) technology?
Smart home?
Smart city?
Smart Board?
Smart card?
Smartphone?
Smart Car?
Mobile robot?
Which one of the following is a term for systems used to store, retrieve, process and transmit data
Which one of the following types of software would you most likely use to create a letter?
Which one of the following types of computer is most likely to be used by a travelling salesman?
The computers in your office building are connected together so staff can share files and printers.
is this arrangement of computers called?
Which one of the following devices do you need to be able to communicate with other computers
the telephone network
Which one of the following is the best way to protect a computer against computer viruses?
Multimedia information retrieval aims to automatically extract useful information from large coll
of _____________ with other data like text and speech.
Programming - is a section of computer science that studies the _______ and ____ of programmin
computers. In addition, the programming - it is preparing to solve its problems on the computer.
The program - a sequence of commands understood by the ______. The program is written in the
of symbols, which include the Latin and Russian letters, numbers, punctuation marks and operatio
Programming languages - the languages to write programs for computers. This set of tools and ru
submission of the _____ in a form acceptable to a computer.
The primary precursor network, the _____, initially served as a backbone for interconnection of r
The definition “The importance of ICTs lies less in the technology itself than in its ability to creat
greater access to information and communication in underserved populations...” defined by?
ICT in education-
A set of instructions and documentation that tells the computer what to do or how to complete th
A program or a set of instructions and applications used to manage and control various function
device such as a computer
Operating system is an example of
Cortana is …
Interface evaluation type, which is considered as an intermediate stage between the subjective an
objective evaluation methods and also based on expert verification?
_______ is the stages of the interface or software development, the process of creating a prototyp
the program or the layout of the program (project, trial version)
A type of prototyping which consists of three-phases and mostly used to create web applications
What is DBMS
You have learned that there are three types of network topology. Which one is NOT network topo
All computer are connected to the single backbones. Which topology is that ?
__________ is a set of rules that governs the communications between computers on a network.
For a computer to communicate with other computers and Web servers on the Internet, it must ha
unique __________
Which protocol translates network address (such as IP addresses) into terms understood by human
(such as Domain Names) and vice-versa
___________ builds a table of the MAC addresses of all the devices connected to it.
Sources of threats that cause security of information systems
Authentication ...
Firewall
__________ is a way of exchanging information between computers on the Internet, tying them
together into a vast collection of interactive multimedia resources
______ is used to protect confidential data and financial information transmitted over the Internet
example, to protect banking transactions of an online store, registration information on social netw
or information about the accounts of users of online banking systems
_________ starts with "http://" or "https://" followed by "www," then the website name. That ca
be followed by the address of specific pages or directories followed by specific pages.
ICT in education
A set of instructions and documentation that tells the computer what to do or how to complete the
A type of interface that allows users to interact with a computer operating system by entering (typ
commands
A collection of programs and procedures for making a computer perform a specific task is called…
Which one of the following devices do you need to be able to communicate with other computers
the telephone network?
What is a shortcut?
What symbol should be put in the cell address in the formula to make the Absolute reference in E
These keys are used to type capital letters
Operating systems developed by Microsoft
Choose audio file extensions
HTTPS …
binary radix
memory drive
ROM processor
to connect the printer to the
computer modulation and demodulation
modem fax
MS DOS Windows XP
System software System operations
Shortcut Cursor
interface Processor
Tag Team
Memo Hyperlink
Yes/No Date/Time
Memo Text
Cell Form
Picture Number
4 5
Query Table
Text AutoNumber
255 120
mdb accdc
1048576 256
F2 F1
F4 F9
Workbook Worksheet
Notepad Workbook
16385 256
Cell Table
% @
Right arrow key Enter key
packages messages
Network Router
the network to which all the
the network to which all computers of the country are
computers are connected connected
Monitor Internet
Communications hardware Connects on computer to other
device that facilitates the computers and peripheral
transmission of data. devices.
user_name mtu-net.ru
global network regional network
Spyware Virus
Privacy integrity
Confidential illegal
Limits Text
MP3 player Simulation
Frames Signals
Bits Signals
AVI PDA
Animation Images
WAV HDD
GIF CPU
Audio Create fields
The recording, broadcasting of
moving visual images. Amusing information
Weblog Application
Chat Browser
cybertrust customer-oriented
e-learning e-commerce
encryption encapsulation
Audio Application
Electronic Cash
Cloud Distributed
Abstraction Productivity
Virtualization Abstraction
memory real
AWS Azure
Azure AWS
Internet Service
4 1
15 GB 16 GB
Search Stop
Media Back
Back Mail
Home Back
Print Media
Stop Print
Search Forward
Mail History
visits week
animations cartoons
multimedia many-media
in 1991 in 1981
2003 2001
A laptop A tablet PC
Speakers CD-ROM
Update antivirus software on a Only virus-check e-mail
regular basis attachments
computer people
CPU method
ARPANET APRANET
Information Technology
Processor Motherboard
Software Hardware
Extreme prototyping,
Evolutionary prototyping, Rapid
Command line interface
prototyping, Extreme and
Evolutionary prototyping
Extreme prototyping, Rapid
Defense Business Management
prototyping, Evolutionary
System
prototyping
WAN BUS
Bus Tree
WAN LAN
NIC Protocols
DNS DHCP
Router Bridge
spontaneous sources caused by
natural disasters or force
majeure, technogenic sources is the checking authority or
leading to failures of hardware checking the user's right to
and software or software errors, access specific resources and
anthropogenic sources caused by perform certain operations on
accidental or deliberate actions them
of subjects, deliberate actions of
subjects
RSA Blowfish
Communication services,
Information retrieval services, a significant increase in the
World wide web (WWW) and number of files on disk
Web services, Web services
HTML WWW
HTTP IP
URL Browser
Software Hardware
hardware software
Modem CD-ROM
$ @
Caps Lock Space Bar
MS-DOS Mac
.mp3 .docx
stands for “Hyper Text Transfer stands for “Hyper Text Transfer
Protocol Secure” Protocol Safety”
processor monitor
the number of possible speed of information exchange
references to the operating between the processor and i/o
memory in unit of time devices
how much information you can how much information you can
print copy
mouse printer
processor drive
store commands executable
program long-term storage information
printer keyboard
scanner printer
Linux Unix
Operating system System file
MS Publisher MS Access
Panel Desktop
selection start
document application
key F1 the left mouse button
Hyperlink Attachment
Date/Time OLE object
MS Excel MS Access
Cursor Record
Text Currency
2 3
Form Report
Number Currency
256 265
accbd accdb
64536 65536
F3 F4
F7 F3
Notepad Folder
Worksheet Folder
64536 65536
Cube Block
! $
Page Up key Home key
data messages
RAM Modem
modem browser.
Microwaves Satellites
mtu-net ru
local network branch network
Firewall Norton
Availability Feasibility
Video Simulation
Packets Slots
Packets Motions
USB TFT
Sound Character
NIC LAN
DVD RAM
Add and alter records Search
Portal Browser
Portal Communication
e-business e-government
enterprise encryption
Card Licensing
Soft Parallel
Reliability Polymorphism
cloud disk
AWS Cloudera
Application Internet
Application Deployment
2 3
5 GB 10 GB
Tables Presentation
Savvis Symantec
Print Home
Forward Stop
Stop Forward
Home Stop
Back Stop
Forward Stop
Stop Back
Forward Mail
mixed-media a hyper
in 1891 in 1881
2002 2005
Printer Modem
Always make sure that the Only download files from the
operating system is up to date Internet during business hours
Software available for free on a Copyright free software that
trial basis after which payment allows unlimited copies and
will be required distribution
motherboard programmer
way game
APRNAET APRANTE
Soil Infrastructures
Data Standards
Data Standards
ROM RAM
commands and memory cells
performs all mathematical and located inside the processor that
logical operations store information processed in
the processor
Software Hardware
Motherboard Processor
LOGICAL FLOAT
LOGICAL FLOAT
DB models DBMS
RING STAR
Star Ring
SAN MAN
IP addresses Interface
FTP TCP
Hub Switch
leads the failures of hardware prevents viruses from appearing
and software on computer
Grasshopper AES
software viruses,network
software of the information
viruses, boot viruses, macro
systems
viruses
Grasshopper, Camellia,
Panda, Avira , Avast
Twofish
URL HTTP
HTTPS FTP
Software
Processor (CPU)
scanner, monitor, CPU mouse, printer, monitor
Motherboard Hardware
Hard disk RAM
Motherboard
Processor
Execution program Hardware
Application software
Hardware
System software Operating System
Defense Business Management
System Database and Media Systems
The monitor, keyboard, system The monitor, keyboard, mouse,
unit, modem system unit
execution program
hardware
Fields and columns Table and queries
fishing hardware
peripherals
Database Systems
Printer
Speakers
the network to which all the network to which all the
computers of one settlement are computers of the city are
connected connected
a pointer to an object
the active control
%
&
Windows ESC
Linux Unix
.pdf .mp4
Secure means that the data Secure means that the data
transferred electronically is transferred electronically is
descripted encrypted
RAM
the number of generated pulses
per second, clock work computer
nodes
in ternary code
ROM
scanner
power supply
paper output
monitor
input information
monitor
Database System
Windows 7
Operating Shell
Utilities
application programs
utilities
MS Word
Icon
Clipboard
Shortcut
Windows 8
operating system
roll
check box
Cascade
start
drawing
Menu bar
the title
Binary
Programming Language
Window
command
F5 key
Currency
OLE object
Hyperlink
Calculator
field
Memo
Macros
Memo
Address = “*K”
Image
75
mbd
1024
F5
F6
Word 2010
File
File
A new workcell
1024
Arrow bars
Sheet
^
Down arrow key
Insert key
Insert box
Insert reference
local network
Intranet
topology
Peer-to-peer
the network to which all the
computers of the town are
connected
medium area
Communication Hardware
Wireless media and Physical
media
printer sharing
Modem
A special computer that
connects on local area network
to another.
Twisted-pair cable
@mtu
topology
archive file
intrusion detection
Identification protocol
Desepticons invasion
Integrity
Dr. Web
Software update
Desepticons invasion
Short circuit
Messages
Dr. Web
Main menu
Table
Shockwave
Engine
Antivirus programs
Person
Slots
IT
Premier
RAM
NIC
Sort
Communication
Communication
Application
E-Learning
E-Learning
Weblog
Application
Certification
E-Learning
data communication
browser
e-learning
e-government
information
E-Learning
Smart Card
Payment
Payment
Card
Visa
E-payments
Nanorobots
Nanorobots
Rates
Credit
Math
Model
Model
virtual
IBM Cloud
IBM Cloud
IBM Cloud
Softwares
Softwares
AVAST
24 GB
Forms
Azure
History
Refresh / Reload2
Home
Back
Forward
Refresh / Reload
Forward
Home
Stop
Back
click
the returns
cartoons
click
an HL
in 1992
2013
Communication&InformationTe
chnology
Megabit (MBit)
A bracelet
Virtual network
Network Card
Do not work on the Internet at
lunchtime
USB flash
students
algorithm
ARPANTE
UNDP
Climate
Climate
Health records
Health records
Hard disk
logical operations
Disk
monitor
Random Access Memory
LLL
scanner, monitor, CPU
Floppy disk
Microsoft Office
Operating systems
Software
Microsoft Office
Microsoft Office
to reset Windows
virtual desktops
User interface
Structured QueryLanguage
CHAR
CHAR
DB key
NOT network
Connect
Absorb signals
BBS
Local Area Nils
LAN
To install cables
FTP
Hybrid
DNS
Switch
network viruses
network viruses
IP
IFED
IFED
Application software
Browser
Sound card
Spreadsheets
Sound card
ROM
Application software
Spreadsheets
Browser
Browser
Sound card
Grasshopper, Camellia,
Twofish
Spreadsheets
Browser
Application software
Sound card
Sound card
Application software
Spreadsheets
Browser
Grasshopper, Camellia,
Twofish
Browser
Ctrl + D
Tab
iOS
.avi
Secure means that the data
transferred electronically is
unpacked