0% found this document useful (0 votes)
4 views96 pages

2022-2023 ICT 300 for Students

Download as xls, pdf, or txt
Download as xls, pdf, or txt
Download as xls, pdf, or txt
You are on page 1/ 96

The computer is:

What device is used by computer to process information?

Processor speed is:

RAM defines:

Specify the most complete list of main devices:

Name the device included in the processor:

Processor handles information:

During the execution of an application program is stored:

Personal computer will not function if you disable:

For long-term storage information is:

Drive is a device for:

Which device is used to enter information:

The manipulator "mouse" is a device:

To connect your computer to the Internet using:

Which one runs on a computer hardware and serves as a platform for other software to run on?

Which of the following Operating System does not implement multitasking truly?
Which is the first program run on a computer when the computer boots up?

Which is the layer of a computer system between the hardware and the user program

Specialized program that allows users to utilize in specific application is classified as

Programs used to control system performance are classified as

Which application software would best be used when you need to print a letter for a legal client?

If Aidar has already saved his file, then what choice can he use to change the file name?

In Windows operating system , an icon or a link that provides access to some original program or
resource is known as ____________ .

Moving an item across the screen with the mouse


A picture that represents a file

Windows 7 Operating System is an upgrade from

Set of programs with full set of documentation is considered as

When sizing a window


What is the key combination to Quit a program through Task Manager that is not responding?

Elements of the dialog box:

The elements of the Windows desktop:


Right-click exercises
Icon is ...

What is the window bar displays the name of the disclosed subject?

The set of tools and rules of user interaction with the computer is called

Double-clicking the left mouse button performs

Markup text, images and other objects on a web page is realized with the help of ...

Browser - a program for ...

What is a shortcut

Pressing the START button will open the


As a context menu?

Which of the following datatypes is used to attach Microsoft Office files, graphics files, sound fil
pdf files to a table in Access?

Which of the following data types is more commonly called Boolean in Access ?
Which of the following data types is used to enter more than 255 characters?

Which of the following programs is used to work with DataBase?

What is an intersection of a row and a column in a Microsoft Access?

Which is the not valid data type in Access?

How many relations may exist between tables in databases?

What the object used for printed on paper the database in a Microsoft Access?

Which data type is better to use for storing phone number in the following format “977-1-123456
Access?

Which criteria return only those addresses beginning with the letter “K” in Access??

Which criteria return only a phone number ending the number "5" in Access??

Which of the following Data Type is used to store picture in MS Access?

What is the maximum length a Text field can be in MS Access?

What is the extension of Access Database files (2007 and later)?

The number of rows in Excel 2007 worksheet is:


What key should be used to edit the content of a cell?

What key should be used to determine the absolute reference?

Which of the following software programs is a powerful spreadsheet program that allows users to
organize data, complete calculations, and graph data?

Which of the following notebook- like features organizes the sheets for use in Excel?

Which of the following would you use to enter, calculate, manipulate, and analyze data such as nu
and text in Excel?

What is immediately visible on screen when you open Excel 2010?

The number of columns in an Excel 2007 worksheet is:

What do you use to navigate and display different portions of a worksheet in the worksheet windo

What is the intersection of a row and a column in a worksheet called?

What symbol should be put in the cell address in the formula to make the Absolute reference?
Which of the following do you use to move one cell to the right in an Excel worksheet?

Which of the following do you use to move down one cell in an Excel worksheet?

What is the name of the small black square in the lower-right corner of the heavy border of an act
cell that repeats a cell's value in adjacent cells?

When copying values in Excel 2010, which feature automatically adjusts cell references for the n
copy location?

Information in computer networks is transmitted via communication channels as separate ones:

Which device allows your computer to talk to other computers over a telephone line as well as ac
the internet?

What is the name of the host computer on the network:

A _______ consists of two or more computers that are linked in order to share resources.

Local computer network it?

Two variations of a WAN are:

What is a LAN confined relatively to?


What is consist of two or more LANs and connected by routers?

What do most networks consist of?

Which of the following is NOT a banefit of a network?

An example of communication hardware:

What is a modem?

What is the most expensive type of cable?

The e-mail address in the Internet is set: user_name@mtu-net.ru. What is the name of the owner
INTERNET is ...

This is a class of programs that searches your hard drive and floppy disks for unknown or potent
viruses.

What is the name of a program or programming code that replicates by being copied or initiating
copying to another program, computer boot sector or document?

Encryption information is…:

Software information protection


Ensuring the accuracy and completeness of information and methods of its processing.

Providing access to information only to authorized users?

The greatest threat to network security pose

What is Information Security?

Measures to protect information from unauthorized access is called

What is the name of intentionally distorted information?

What is the name of the information to which access is limited?

This is a computer system on the Internet that is expressly set up to attract and "trap" intruders.

Which of the following methods does spyware use to install on an end user'smachine?

Which of these is Multimedia TYPE?

Which of these is Multimedia Product?


What is a multimedia device?

Video is good for:


What is media?

What Media types are Included in a Photo?

What is a Multemedia Product?

A video consists of a sequence of

If frames are displayed on screen fast enough, we get an impression of

Which of the following file formats is a piece of film?

Movement created by displaying a series of pictures like cartoons.

Which is the biggest audio file format?

Which image file format can be animated?


A movie contains?

What is a video?

Voice-only connection between three or more locations

An increasing popular combination of online and in-person learning activities

Educational software that delivers course material and instruction via computer

Education designed for delivery where students and instructors not in the same location

Learning that is accomplished over the Internet, a computer network


An information exchange forum where notes about a particular topic are posted and shared.

The area where students and instructors interact online.

Software for interacting with , accessing, and viewing information on the Internet

An online, real-time interactive communication method using text to send and receive instant mes

Belief that the information you provide online will remain confidential

Government services available online to citizens, employees, and businesses

Software that manages the transmission of e-mail and manages mailboxes

The conversion of data into a form, called a cipher, that cannot be easily understood by unauthori
people

The final link in the customer service request or computer program usage chain

Delivery method used in e-Learning:

Listed below are some of the modes of electronic payments:

___________is a small plastic card with a unique number attached with an account.
What is the card holder?

What is the like credit card, is a small plastic card with a unique number mapped with the bank ac
number?

_________is again similar to a credit card or a debit card in appearance, but it has a small
microprocessor chip embedded in it.

What are the operations with the use of credit cards, debit cards or smart cards, which are exampl
transactions of electronic money?

It is a very popular electronic payment method to transfer money from one bank account to anoth
bank account.

_______-hypothetical devices measuring dozens of nanometers, which can independently manipu


individual atoms.

_____ a quantum computer or a computer with logical elements of the order of several nanomete
which has extremely high performance.

Where the electronic customers of the bank of cash can now download money from their accoun

This may sound very much like shopping by the internet, but in fifty years time will be very diffe
In the next decade we can have miniature computers inside use to monitor, and even regulate, our
pressure, heart rate, and cholesterol.

Which payment has revolutionized the business processing by reducing the paperwork, transactio
costs, and labor cost.

A magnetic disk is:

Which of computing refers to applications and services that run on a distributed network using
virtualized resources.
Cloud ?

Which of the following cloud concept is related to pooling and sharing of resources?

Cloud computing is an abstraction based on the notion of pooling physical resources and presenti
them as a ________ resource.

Which of the following is Cloud Platform by Amazon ?

Which of the following is Cloud Platform by Microsoft?

Which of the following is Cloud Platform by Google?


_________ model consists of the particular types of services that you can access on a cloud comp
platform.

________ refers to the location and management of the cloud’s infrastructure.

How many types of dimensions exists in Cloud Cube Model?

What is the name of the organization helping to foster security standards for cloud computing?

How much space does Google Drive provide for free?

The following are some well-known cloud-based data repositories. Point out the excess

What default services does not Google Drive provide?

Which company recently shut the doors on its cloud storage service?

Shows a list of the websites you have visited recently.

Opens the media bar, accessing internet radio, music, video etc.

Displays the page you were on before.

Shows the latest version of the page.


Opens the search panel.

Displays the page you have set as your home page.


Prints the current page.

Stops a page from downloading.

Displays the web addresses you have chosen as your favourites.


Shows email options.

"The website gets a thousand hits a week" means the website has a thousand _________

The words, images and other material that make up a website are called __________.

Designs and drawings in websites are usually called __________.

Moving pictures in websites are usually called __________.

Websites with sounds and/or video clips and/or animations have __________ content.

In which year Smart Technologies introduced the first interactive Smart Board?

In which year, Smart developed and later patented DViT (Digital Vision Touch) technology?

Smart home?
Smart city?

Smart Board?

Smart card?

Smartphone?

Smart Car?
Mobile robot?

The first real robots

Which one of the following is a term for systems used to store, retrieve, process and transmit data

Which one of the following measures the speed of the CPU?

Which one of the following describes a computers operating system?

Which one of the following types of software would you most likely use to create a letter?

Which one of the following types of computer is most likely to be used by a travelling salesman?

The computers in your office building are connected together so staff can share files and printers.
is this arrangement of computers called?

Which one of the following devices do you need to be able to communicate with other computers
the telephone network
Which one of the following is the best way to protect a computer against computer viruses?

Which one of the following statements describes shareware?

Which one of the following is an example of hardware?

Multimedia information retrieval aims to automatically extract useful information from large coll
of _____________ with other data like text and speech.

Programming - is a section of computer science that studies the _______ and ____ of programmin
computers. In addition, the programming - it is preparing to solve its problems on the computer.

The program - a sequence of commands understood by the ______. The program is written in the
of symbols, which include the Latin and Russian letters, numbers, punctuation marks and operatio

Programming languages ​- the languages ​to write programs for computers. This set of tools and ru
submission of the _____ in a form acceptable to a computer.
The primary precursor network, the _____, initially served as a backbone for interconnection of r

The definition “The importance of ICTs lies less in the technology itself than in its ability to creat
greater access to information and communication in underserved populations...” defined by?

Components of ICT topology

ICTs in Agriculture do not analyze

ICT in education-

ICTs in Healthcare allows

__________ is a document that sets out requirements, specifications, guidelines or characteristics


materials, products, processes and services.

Universal ICT applications and tools in Education-

The brain of the computer is

What is cache memory?

A set of instructions and documentation that tells the computer what to do or how to complete th

Which of the following refers to "internal hardware"


RAM stand for:
Current type of monitor
It is the physical, touchable, materials parts of a computer system
Non-volatile memory
The most common types of expansion cards

A program or a set of instructions and applications used to manage and control various function
device such as a computer
Operating system is an example of

Examples of application software

The major function of the operating system

Cortana is …

What is the main function of “Step Recorder”?

One of Windows 10 features which allows you to manage screenshots?


Shortcut Windows + E

Human Computer Interaction

Factors that HCI designers need to consider:


What kind of psychophysical characteristics of a user should be taken into account when designi
(related to the reception, storage and processing of information) ?

User Interface evaluation methods

Interface evaluation type, which is considered as an intermediate stage between the subjective an
objective evaluation methods and also based on expert verification?
_______ is the stages of the interface or software development, the process of creating a prototyp
the program or the layout of the program (project, trial version)

Which of the following is a type of prototyping?

A type of prototyping which consists of three-phases and mostly used to create web applications

What is DBMS

The following are functions of a DBMS except

Which one is an example of DBMS

SQL stands for________

What are the 4 types of database models?

Windows Folder Directory is an example of ______


In ________ all data is stored in simple tables, divided into rows and columns, at the intersection
which information about the data is located.
Text data types (character)

Database Relations Types


_________ makes sure that the table does not have the same entries and Null values. It also provi
logical connection between tables in the same database.

You have learned that there are three types of network topology. Which one is NOT network topo

What are the ADVANTAGE of bus topology and star topology ?

All computer are connected to the single backbones. Which topology is that ?

What is the function of hub and switch ?

Why use a network?


The internet is the worlds biggest
What does LAN stand for?
What term describes the physical layout of a network?
A router can
___________ is designed to connect a group of computers in close proximity to each other such a
office building, a school, or a home.

__________ is a set of rules that governs the communications between computers on a network.

Why Ethernet is one of the most popular LAN technologies?

For a computer to communicate with other computers and Web servers on the Internet, it must ha
unique __________
Which protocol translates network address (such as IP addresses) into terms understood by human
(such as Domain Names) and vice-versa
___________ builds a table of the MAC addresses of all the devices connected to it.
Sources of threats that cause security of information systems

Authentication ...

Requirement for strong password

Firewall

Cryptology is divided into two areas such as

Asymmetric encryption al gorithm

Depending on the habitat, the main types of computer viruses are:

Which of these are antivirus programs

The main signs of a virus on the PC:


One type of Internet fraud, the purpose of which is to gain access to confidential user data - login
passwords.

Internet Services are…

__________ is a way of exchanging information between computers on the Internet, tying them
together into a vast collection of interactive multimedia resources

______ is used to protect confidential data and financial information transmitted over the Internet
example, to protect banking transactions of an online store, registration information on social netw
or information about the accounts of users of online banking systems

_________ starts with "http://" or "https://" followed by "www," then the website name. That ca
be followed by the address of specific pages or directories followed by specific pages.

ICT in education

Universal ICT applications and tools in Education


The brains of the computer is :

A set of instructions and documentation that tells the computer what to do or how to complete the

Which of the following refers to "internal hardware"


This does not apply to physical, touchable, parts of a computer system
Non-volatile memory
A program or a set of instructions and applications used to manage and control various functions
device such as a computer
Operating system is an example of

Examples of application software

Human Computer Interaction

A type of interface that allows users to interact with a computer operating system by entering (typ
commands

A set of programs to operate the computer -

An applied program for solving certain tasks in a particular subject area –


What is DBMS?

What are included in the basic structure of a computer?

A collection of programs and procedures for making a computer perform a specific task is called…

A database table in Access consists of:


Network is :

What is a computer virus?

What key combination copies the object?


Large-capacity permanent storage used to hold information such as programs and documents -

Physical parts that make up a computer system:

Which one of the following devices do you need to be able to communicate with other computers
the telephone network?

Local computer network is ?

What is a shortcut?

What symbol should be put in the cell address in the formula to make the Absolute reference in E
These keys are used to type capital letters
Operating systems developed by Microsoft
Choose audio file extensions

HTTPS …

What you can do with the cloud?


multifunctional electronic device
for information device for working with text

keyboard the manipulator "mouse"


the number of binary operations
speed of information exchange committed per unit of time
between the CPU and ROM processor
how much information can be
processed without the access to how much information can be
your hard drive stored on the hard disk
microprocessor, coprocessors,
the CPU, memory, i/o devices monitor

cache memory, video memory random access memory, printer

binary radix

processor the VRAM

memory drive

RAM external storage


read/write data from external command processing executable
media program

ROM processor
to connect the printer to the
computer modulation and demodulation

modem fax

Operating System Application Software

MS DOS Windows XP
System software System operations

Operating system System environment

database packages relative programs

system programs experimental programs

Google Chrome MS Excel

Use save as Change the template

Shortcut Cursor

Double-click Recycle bin


Icon Start menu

Windows XP or Vista Windows 98

file package database packages


Mouse pointer change into a Mouse pointer change into a
two-headed arrow three-headed arrow
Shift + Enter Alt + Del

control button working field

"Start" button Minimize, maximize, close


hang start
Label drawing

Title bar Status Bar

interface Processor

a context menu Drag and Drop

Tag Team

Web browsing the creation of databases

a copy of the file a pointer to an object

main Menu window


Right-click Start button

Memo Hyperlink

Yes/No Date/Time
Memo Text

MS Power Point MS Word

Cell Form

Picture Number

4 5

Query Table

Text AutoNumber

Address = “K*” Address = “K”

number phone = “*5*” number phone = “5”

OLE Object Picture

255 120

mdb accdc

1048576 256
F2 F1

F4 F9

Calc Office 2010

Workbook Worksheet

Notepad Workbook

A new workbook Create new workbook dialog box

16385 256

Scroll bars Arrow keys

Cell Table

% @
Right arrow key Enter key

Enter key Right arrow key

Copy box Filler

Relative reference Absolute reference

packages messages

CD-ROM drive Hard Drive

host computer terminal

Network Router
the network to which all the
the network to which all computers of the country are
computers are connected connected

Modem and Hub Transmission Media and Client

small area large area


WAN Communications Media
Communication media and
Communication hardware Bridge and Gateway

home entertainment Internet connection sharing

Monitor Internet
Communications hardware Connects on computer to other
device that facilitates the computers and peripheral
transmission of data. devices.

Fibre-optic cable Coaxial cable

user_name mtu-net.ru
global network regional network

antivirus software security identifier

Spyware Virus

The process of its


transformation, in which the
content of the information
becomes incomprehensible to A conversion process in which
non-authorized subjects information is deleted.

cryptography uninterrupted power supply unit


Dr. Web Confidentiality

Privacy integrity

main menu opening standard user account

Measures to protect information


from unauthorized access PC security measures

Information Security PC security

Misinformation Informative stream

Confidential illegal

Trojan horse Exploit

All of the above Social engineering

Video Computer Games

Limits Text
MP3 player Simulation

Scenes where the action is very


Showing Action quick and hard to capture
Anything which conveys a
message Person

Still Image Animation


An object using all sorts of
means to convey a message A still 2D Image

Frames Signals

Bits Signals

AVI PDA

Animation Images

WAV HDD

GIF CPU
Audio Create fields
The recording, broadcasting of
moving visual images. Amusing information

Audio Conferencing Application

Blended Learning Weblog

Knowledge Management E-Learning

Distance Education Discussion Forums

Blended Learning Discussion Forums


Newsgroup Netiquette

Virtual classroom Audio Conferencing

Weblog Application

Chat Browser

cybertrust customer-oriented

e-learning e-commerce

e-mail system e-mail server

encryption encapsulation

end user e-government

Audio Application

Аccording to the method of


payment Direct, Indirect

Credit card Debit Card


a plastic wallet for
keeping credit cards. Money

Smart card Money

Debit card Licensing

Online payments Electronic

Electronic Fund Transfer Smart card

Nanotechnology Quantum computer

Nanocomputer Quantum computer

А smart card reader Сredit limit

Electronic cash Customer


Smart card Wearable computer

Electronic Cash

Device for long-term storage of The device for reading


information information from the CD-ROM

Cloud Distributed
Abstraction Productivity

Virtualization Abstraction

memory real

AWS Azure

Azure AWS

Google Cloud Platform Azure


Service Deployment

Internet Service

4 1

Cloud Security Standards


Cloud Security Alliance Working

15 GB 16 GB

Microsoft Word Dropbox

Adobe Photoshop Documents

Iron Mountain Hitachi Data Systems

Search Stop

Media Back

Back Mail

Refresh / Reload History


Search Mail

Home Back
Print Media

Stop Print

Search Forward
Mail History

visits week

the content the illustrations

web illustrations web pictures

animations cartoons

multimedia many-media

in 1991 in 1981

2003 2001

is an urban development vision


to integrate information and
communication technology
(ICT) and Internet of things
is any pocket-sized card that has (IoT) technology in a secure
embedded integrated circuits fashion to manage a city's assets
is an urban development vision
to integrate information and
communication technology
(ICT) and Internet of things
(IoT) technology in a secure is any pocket-sized card that has
fashion to manage a city's assets embedded integrated circuits

is an interactive whiteboard that


is connected to a computer and
allows you to interact with the
board through touch recognition
to make selections, draw, erase, is any pocket-sized card that has
etc. embedded integrated circuits

home automation is the


residential extension of building
automation and involves the
control and automation of
lighting, heating, ventilation, air
is any pocket-sized card that has conditioning, appliances, and
embedded integrated circuits security

is a mobile phone with an


advanced mobile operating
system that combines features of
a personal computer operating
system with other features useful is any pocket-sized card that has
for mobile or handheld use embedded integrated circuits

is a smart TV platform that, a small car, economical,


offers access to multiple media environmentally friendly and
source, both online and offline easily parked in small rooms
machine capable of independent
operation following a flexible machine capable of
predetermined series of moving and communicating with
behaviours, e.g. a cuckoo clock humans, e.g. a sentry robot

were made possible after the


invention of transistors and
integrated circuits in the 1950s were built by Hephaestus in
and 1960s ancient Greece

Information & Computer Internet & Information


Technology Technology

Gigahertz (GHz) Bits per second (Bps)


Hardware that can scan and
Software that controls the convert photographs into digital
allocation and usage of hardware files

Word processing software Spreadsheet software

A laptop A tablet PC

A Local Area Network The Internet

Speakers CD-ROM
Update antivirus software on a Only virus-check e-mail
regular basis attachments

Totally free software that is Commercial based software that


available only on the Internet must be paid for

A mouse A spreadsheet application

images, videos, and


combinations printers, scanners

methods and techniques computers and laptops

computer people

CPU method
ARPANET APRANET

European Commision TechTarget company

UNDP, Services, Software,


Utility
Connectivity media
Biometric data Crop
Improves teaching and learning
processes, Motivates students for
Reduces the risk of errors in
self-learning, Reduces barriers of
patient data and financial details
place and time, Learning
processes

Automatically alert the treating


physician to potential
issues,Reduces the risk of errors Presentations, Word processors,
in patient data and financial Spreadsheets, MS Office
details, Digitalize health
records,Financial details

Information Technology

Presentations, Word processors,


Technology
Spreadsheets, MS Office

Processor Motherboard

a small storage device for information backbone connects


temporary storage of information all computer devices

Hard drive Processor (CPU)

CPU, RAM, Hard Drive Mouse, printer, monitor


Only Memory Read Only Memory
LCD LDD
Hardware Software
RAM Hard disk
Network cards,Audio cards,
Software
Video cards

Software Hardware

System software Execution program


Google Chrome, Microsoft Debuggers, utilities, Microsoft
Excel, Skype Office

Configures and manages internal


and peripheral devices, Produce
error messages and
Debuggers, utilities, Microsoft
troubleshooting options, They
Office
provide the interface between the
user and hardware through GUI,
Peripheral devices

personal assistant in recommended troubleshooting


Windows 10 tool that runs in the background

to record all the steps that you go


through and share that or use it to reset Windows
for documentation
Snip and Sketch Windows Switch
minimizes all windows opens File Explorer
studies the design and use of
computer technology, focused on studies proper operations of
the interfaces between users and computer programs
computers

development of systems and


programs that are pleasant and
attractive to people, how
information processing systems studies the design and use of
work, their accessabilities and computer technology, focused on
availabilities, technical the interfaces between users and
characteristics and limitations of computers
computer hardware and
software, limitations of computer
hardware and software
User’s sound perception, User’s
color perception, User’s Graphical user interface
subjective perception of time

Subjective and objective


evaluation, Expert based
Graphical user interface
evaluation, Experimental
evaluation, objective evaluation

Expert based evaluation Objective evaluation

Prototyping Command line interface

Extreme prototyping,
Evolutionary prototyping, Rapid
Command line interface
prototyping, Extreme and
Evolutionary prototyping
Extreme prototyping, Rapid
Defense Business Management
prototyping, Evolutionary
System
prototyping

Database and Media Systems Data Manipulation Software

creating databases processing data

IBM DB2, My SQL, Oracle,


processing data
DB2

Structured Query Language Structures Question Language

hierarchical, network, object hierarchical, network, logical,


oriented, relational physical
Object oriented Relational

Object oriented data model Hierarchical data model

CHAR, VARCHAR INTEGER


Many-to-many, One-to-many,
INTEGER
One-to-one, Many-to-one
Primary key Foreign key

WAN BUS

If the backbone is failed. It will If the central host is down the


affect the whole system entire system will down

Bus Tree

act as a processor of the data act as the centralized nod

To easily share documents Share viruses


WAN LAN
Local Area Network Local Art Network
Topology topping
Forward data packets Repeat signals

WAN LAN

Protocol Network topology

Is easy to implement, manage,


and maintain, Provides extensive
flexibility for network
technogenic sources leading to
installation, Allows low-cost
failures of hardware and
network implementations,
software or software errors
Guarantees interoperability of
standards-compliant products,
regardless of manufacturer.

NIC Protocols

DNS DHCP

Router Bridge
spontaneous sources caused by
natural disasters or force
majeure, technogenic sources is the checking authority or
leading to failures of hardware checking the user's right to
and software or software errors, access specific resources and
anthropogenic sources caused by perform certain operations on
accidental or deliberate actions them
of subjects, deliberate actions of
subjects

is the checking authority or


checking the user's right to
access specific resources and is the user's address information
perform certain operations on
them

contain at least 8-9 characters,


studies the design and use of
inclusion of at least one special
computer technology, focused on
character, a mixture of both
the interfaces between users and
uppercase and lowercase letters,a
computers
mixture of letters and numbers

is a protective screen between


the global Internet (WAN) and leads the failures of hardware
the local area network (LAN) of and software
an organization

cryptanalysis and cryptobank cryptography and cryptocurrency

RSA Blowfish

leads the failures of hardware


cryptography and cryptanalysis
and software

Kaspersky, Bitdefender, AVG


RSA, AES, Blowfish
AntiVirus

slow computer work, a


significant increase in the
number of files on disk,
leads the failures of hardware
disappearance of files and
and software
directories or distortion of their
contents, directories or distortion
of their contents
Trojan horses logic bombs

Communication services,
Information retrieval services, a significant increase in the
World wide web (WWW) and number of files on disk
Web services, Web services

HTML WWW

HTTP IP

URL Browser

Reduces barriers of place and


All the mentioned
time
All of these Presentations
CPU RAM

Hardware Hard drive

CPU, RAM, Hard Drive keyboard, mouse, the printer


Software CPU
RM Motherboard

Software Hardware

System software Application software

Paint, Microsoft Excel, Skype Utilities, Microsoft Office

studies the design and use of


computer technology, focused on studies proper operations of
the interfaces between users and computer programs
computers

Command line interface Graphical user interface

System software Service Software

Application software Service Software


Database management system Data Manipulation Software

The monitor, keyboard, system The printer, system unit,


unit monitor, mouse

software floppy disc

Fields and records Forms and Reports


a system of linked PC making a net
A specially written program of
small size, which can distort and Programs that do not allow to
destroy information on your open the data with a password
computer
Ctrl + C Ctrl + D
Hard disc Sound card

hardware software

Modem CD-ROM

the network to which all the


Sound card computers of the country are
connected
a graphical representation of the
a command
object

$ @
Caps Lock Space Bar
MS-DOS Mac
.mp3 .docx

stands for “Hyper Text Transfer stands for “Hyper Text Transfer
Protocol Secure” Protocol Safety”

Store, back up and recover data Create a new computer


electronic computing device for device to store information of
handling numbers any kind

processor monitor
the number of possible speed of information exchange
references to the operating between the processor and i/o
memory in unit of time devices

how much information you can how much information you can
print copy

monitor, Winchester, printer ALD, DD, coprocessor

arithmetic logic unit, control unit scanner, ROM

Basic language as text

RAM hard disk space

mouse printer

processor drive
store commands executable
program long-term storage information

printer keyboard

read long-term storage information

scanner printer

Malicious Software System Software

Linux Unix
Operating system System file

Drivers Operating environment

replicate programs utilities

specialized program organized programs

MS Publisher MS Access

Change page setup Double-click

Panel Desktop

Web browser Drag and drop


Desktop Folder

Windows Millennium Windows 2000

software packages software


Mouse pointer has one-headed
arrow Mouse pointer does not change
Ctrl + Del Shift + Alt + Del

scrollbar Menu bar

scrollbar text box


a context menu selection
Taskbar selection

Menu bar Toolbox

user interface the object of control

selection start

Operators the operands


creation of multimedia
creating web pages presentations
a graphical representation of the
the active control object

document application
key F1 the left mouse button

Text OLE object

Hyperlink Attachment
Date/Time OLE object

MS Excel MS Access

Cursor Record

Text Currency

2 3

Form Report

Number Currency

Address = “K?” Address = “K#”

number phone = “5?” number phone = “*5”

Picture cannot be stored in MS


Memo Access

256 265

accbd accdb

64536 65536
F3 F4

F7 F3

Windows Excel 2010

Notepad Folder

Worksheet Folder

Open a workbook dialog box The File panel

64536 65536

Page Up or Page Down key Slider bars

Cube Block

! $
Page Up key Home key

Page Up key Home key

Copy handle Fill handle

Certain reference Variable reference

data messages

RAM Modem

modem browser.

Client/server Communications Channel


the network to which all the network to which all
computers of one settlement are computers in the same building
connected are connected

NICs and Router Intranet and Extranet

no area huge area


Satellite Transmission Microwaves
Computer clients and Network
server Cable modem and modem

file sharing expensive to install

Keyboard Microsoft Word

To transfer data from one A computer that uses the


computer to another. services of another program.

Microwaves Satellites

mtu-net ru
local network branch network

antigen intrusion detection

Firewall Norton

The process of its


transformation, in which the
content of information is The process of converting
changed to a false information into machine code

backup data duplication


Availability Feasibility

Availability Feasibility

copying files that have been


opening of the standard account changed during the day, without
administrator group a backup mark

the security of personal


information Identification protocol

Private security security admin group

Reliable information Stop being information

Open not available

Demilitarized zone Honeypot

Bundling with free peer-to-peer


Search toolbars programs

Photo Published Book

Still Image Movies


Text Motion capture

Scenes where there is little or no


movement Audio Only
Anything which conveys a
Antivirus programs message electronically

Video Simulation

file format A cartoon

Packets Slots

Packets Motions

USB TFT

Sound Character

NIC LAN

DVD RAM
Add and alter records Search

Credibility of information Sophisticated navigation

Blended Learning Listening

Audio Conferencing Certification

Distance Education Courseware

Instructional Designer Knowledge Management

Digital Knowledge Management


Portal Digital

Communication Discussion Forums

Portal Browser

Portal Communication

cyberspace data cleansing

e-business e-government

e-mail gateways e-mail front end

enterprise end user

enterprise encryption

Instructional Designer data communication

Credit Card, Debit Card, Smart


Card, E-Money, Electronic Fund
Federal, regional, local Transfer (EFT).

Annuity payment E-Money


Card Licensing

Card Licensing

Rates Smart card

Offline Credit card

Debit Card Issuer bank

Gesture interface DNA computer

Gesture interface DNA computer

Electronic passports Card

The merchant Computer shopping


Body chips Card

Visa Fund Transfer

Device for outputting


Device for information output information on paper

Soft Parallel
Reliability Polymorphism

Polymorphism None of the mentioned

cloud disk

Cloudera Google Cloud Platform

Cloudera Google Cloud Platform

AWS Cloudera
Application Internet

Application Deployment

2 3

Cloud Security WatchDog Security in the Cloud Alliance

5 GB 10 GB

Google Drive Yandex.Disk

Tables Presentation

Savvis Symantec

Print Home

Forward Stop

Stop Forward

Home Stop
Back Stop

Forward Stop
Stop Back

Forward Mail

Mail Favourites / Bookmarks


Forward Stop

sales search engine matches

the filling the keywords

web graphics animations

movies search engine matches

mixed-media a hyper

in 1891 in 1881

2002 2005

home automation is the


is an interactive whiteboard that residential extension of building
is connected to a computer and automation and involves the
allows you to interact with the control and automation of
board through touch recognition lighting, heating, ventilation, air
to make selections, draw, erase, conditioning, appliances, and
etc. security
home automation is the
residential extension of building
automation and involves the
control and automation of technology of integration of the
lighting, heating, ventilation, air Internet and digital interactive
conditioning, appliances, and services in modern TVs and
security receivers of digital television

home automation is the


is an urban development vision residential extension of building
to integrate information and automation and involves the
communication technology control and automation of
(ICT) and Internet of things lighting, heating, ventilation, air
(IoT) technology in a secure conditioning, appliances, and
fashion to manage a city's assets security

is an urban development vision is an interactive whiteboard that


to integrate information and is connected to a computer and
communication technology allows you to interact with the
(ICT) and Internet of things board through touch recognition
(IoT) technology in a secure to make selections, draw, erase,
fashion to manage a city's assets etc.

is an interactive whiteboard that


is connected to a computer and
allows you to interact with the
a small car, economical, board through touch recognition
environmentally friendly and to make selections, draw, erase,
easily parked in small rooms etc.

home automation is the


residential extension of building is an urban development vision
automation and involves the to integrate information and
control and automation of communication technology
lighting, heating, ventilation, air (ICT) and Internet of things
conditioning, appliances, and (IoT) technology in a secure
security fashion to manage a city's assets
humanoid having both organic
and inorganic structures, with
some physiological similarity to mobile robot of human
humans proportions

were invented by the Czech


were designed by Leonardo da writer Karel Čapek to help him
Vinci in 1495 by performing simple tasks

Internet & Communication Information & Communication


Technology Technology

Gigabytes (GB) Megabytes (MB)

Software that can retrieve Hardware that can record and


information from a database send images across the Internet

Accounting software Web browsing software

A server A desktop computer

The World Wide Web A network port

Printer Modem
Always make sure that the Only download files from the
operating system is up to date Internet during business hours
Software available for free on a Copyright free software that
trial basis after which payment allows unlimited copies and
will be required distribution

An antivirus program The World Wide Web

monitors and screens mouse and keyboard

algorithms and programs students and teachers

motherboard programmer

way game
APRNAET APRANTE

Software Connectivity media

Vulnerability Connectivity media

Soil Infrastructures

a small storage device for


Digitalize health records
temporary storage of information

Improves teaching and learning


processes, Motivates students for
a small storage device for
self-learning, Reduces barriers of
temporary storage of information
place and time, Learning
processes

Data Standards

Data Standards

ROM RAM
commands and memory cells
performs all mathematical and located inside the processor that
logical operations store information processed in
the processor

Software Hardware

scanner, monitor, CPU keyboard, mouse, the printer


Random Arithmetic Memory Real Access Memory
CRT CRL
Motherboard CPU
ROM Motherboard
Hardware Application software

Motherboard Processor

Application software Hardware


Operating systems, compilers, Internet Explorer, Windows,
utilities Mac OS

Google Chrome, Microsoft Internet Explorer, Windows,


Excel, Skype Mac OS

ability to create multiple virtual quick shortcut to open up


desktops windows from your taskbar

to create multiple virtual to search images taking


desktops screenshots

Visual Search Snap Assist


opens up a new window desktop

studies internal and external


studies how to set up a computer
components of the computer

studies internal and external


studies how to set up a computer
components of the computer
Command line interface Gesture based interface

Command line interface Gesture based interface

Experimental evaluation Subjective evaluation

Graphical user interface Human computer interaction

Prototyping Human computer interaction

Database and Media Systems Database management system

Database Management System Database management system

administrating databases creating and processing forms

administrating databases creating and processing forms

Sequential Question Language Sequential Query Language

historical, network, physical, hierarchical, logical, object


relational object oriented, conceptual
Hierarchical Network

Relational data model Network data model

LOGICAL FLOAT

LOGICAL FLOAT
DB models DBMS

RING STAR

If one computer is down . It will It will not affect the whole


not affect the whole system system

Star Ring

act as a storage of the data ast as the forward data packets

To lose data To install cables


DSN WWW
Localise Aerial Network Local Area News
toppology WAN
absorb data packets Absorb signals

SAN MAN

Network architecture Network media

anthropogenic sources caused by


accidental or deliberate actions deliberate actions of subjects
of subjects

IP addresses Interface

FTP TCP

Hub Switch
leads the failures of hardware prevents viruses from appearing
and software on computer

is the process of recognizing a is the process that proof the user


user by his identifier is who he claims to be

studies internal and external


studies how to set up a computer
components of the computer

prevents viruses from appearing software of the information


on computer systems

cryptography and cryptanalysis cryptanalysis and cryptoaction

Grasshopper AES
software viruses,network
software of the information
viruses, boot viruses, macro
systems
viruses
Grasshopper, Camellia,
Panda, Avira , Avast
Twofish

prevents viruses from appearing


cryptanalysis and cryptoaction
on computer
Phishing Worms

disappearance of files and


directories or distortion of their
directories or distortion of their
contents
contents

URL HTTP

HTTPS FTP

Web server DNS

Motivates students for self- Improves teaching and learning


learning processes
Spreadsheets Word processors
ROM Motherboard

Software
Processor (CPU)
scanner, monitor, CPU mouse, printer, monitor
Motherboard Hardware
Hard disk RAM

Motherboard
Processor
Execution program Hardware

Windows, Mac OS Operating systems, compilers,


utilities

studies internal and external


components of the computer
studies how to set up a computer

Gesture based interface


Voice user interface

Application software
Hardware
System software Operating System
Defense Business Management
System Database and Media Systems
The monitor, keyboard, system The monitor, keyboard, mouse,
unit, modem system unit

execution program
hardware
Fields and columns Table and queries
fishing hardware

The program reduces the file


size by compression Do not read data that is stored on
a hard drive or on floppy disk
Ctrl + V Ctrl + N
Motherboard CPU

peripherals
Database Systems

Printer
Speakers
the network to which all the network to which all the
computers of one settlement are computers of the city are
connected connected

a pointer to an object
the active control

%
&
Windows ESC
Linux Unix
.pdf .mp4
Secure means that the data Secure means that the data
transferred electronically is transferred electronically is
descripted encrypted

Store, back up and recover data


only on your computer’s HDD Read information on illegal sites
analog signal processing device

RAM
the number of generated pulses
per second, clock work computer
nodes

how much information can use


the Internet

scanner, mouse, monitor, printer

the display processor, video card

in ternary code

ROM

scanner

power supply

paper output

monitor

input information

monitor

Database System

Windows 7
Operating Shell

Utilities

application programs

utilities

MS Word

Open file properties

Icon

Clipboard
Shortcut

Windows 8

operating system

Mouse pointer turns into a cross


Ctrl + Alt + Del

roll

check box
Cascade
start

drawing

Menu bar

the title

Binary

Programming Language

Window

command
F5 key

Currency

OLE object
Hyperlink

Calculator

field

Memo

Macros

Memo

Address = “*K”

number phone = “5*”

Image

75

mbd

1024
F5

F6

Word 2010

File

File

A new workcell

1024

Arrow bars

Sheet

^
Down arrow key

Insert key

Insert box

Insert reference

local network

Intranet

topology

Peer-to-peer
the network to which all the
computers of the town are
connected

Bridge and Gateway

medium area
Communication Hardware
Wireless media and Physical
media

printer sharing

Modem
A special computer that
connects on local area network
to another.

Twisted-pair cable

@mtu
topology

archive file

intrusion detection

Identification protocol

Desepticons invasion
Integrity

Dr. Web

unauthorized access, electronic


eavesdropping and intentional or
unintentional damage

Software update

Desepticons invasion

Short circuit

Messages

Dr. Web

Main menu

Internet Search Program

Table
Shockwave

Developed facsimile equipment


Analyze results

Engine

Antivirus programs

Person

Slots

IT

Premier

RAM

NIC
Sort

A number of fixed parts

Communication

Communication

Application

E-Learning

E-Learning
Weblog

Application

Certification

E-Learning

data communication

browser

e-learning

e-government

information

E-Learning

Сommon, Еspecially celavie

Smart Card
Payment

Payment

Card

Visa

E-payments

Nanorobots

Nanorobots

Rates

The card brand


Visa

Credit

Device for inputting an image


from a sheet to a computer

Math
Model

Model

virtual

IBM Cloud

IBM Cloud

IBM Cloud
Softwares

Softwares

AVAST

24 GB

Amazon Simple Storage Service


(Amazon S3)

Forms

Azure

History

Refresh / Reload2

Home

Back
Forward

Refresh / Reload
Forward

Home

Stop
Back

click

the returns

cartoons

click

an HL

in 1992

2013

technology of integration of the


Internet and digital interactive
services in modern TVs and
receivers of digital television
is a smart TV platform that,
offers access to multiple media
source, both online and offline

technology of integration of the


Internet and digital interactive
services in modern TVs and
receivers of digital television

technology of integration of the


Internet and digital interactive
services in modern TVs and
receivers of digital television

technology of integration of the


Internet and digital interactive
services in modern TVs and
receivers of digital television

technology of integration of the


Internet and digital interactive
services in modern TVs and
receivers of digital television
versatile, programmable
automaton, e.g. an assembly
robot

they are on the move

Communication&InformationTe
chnology

Megabit (MBit)

Hardware that connects the


computer to the Internet

Software for watching videos

A bracelet

Virtual network

Network Card
Do not work on the Internet at
lunchtime

Software that will not work

USB flash

mouse and headphone

programming and languages

students

algorithm
ARPANTE

UNDP

Climate

Climate

commands and memory cells


located inside the processor that
store information processed in
the processor

commands and memory cells


located inside the processor that
store information processed in
the processor

Health records

Health records

Hard disk

logical operations

Disk

monitor
Random Access Memory
LLL
scanner, monitor, CPU
Floppy disk
Microsoft Office

Operating systems

Software

Microsoft Office

Microsoft Office

to reset Windows

virtual desktops

opens File Explorer


hides the desktop

external components of the


computer

external components of the


computer
User interface

User interface

Interface evaluation type

project, trial version

project, trial version

Database Management System

Defense Business Management


System

processing forms and databases

processing forms and databases

Structured QueryLanguage

historical, network, physical,


relational object, oriented
Folder Directory

oriented and data model

CHAR

CHAR
DB key

NOT network

Down the entire system will


down

Connect

ast as the share viruses

Absorb signals
BBS
Local Area Nils
LAN
To install cables

FTP

Hybrid

is the checking authority or


checking the user's right to
access specific resources and
perform certain operations on
them

DNS

Switch

such as Domain Names


the local area network (LAN) of
an organization

user is who he claims to be

external components of the


computer

the local area network (LAN) of


an organization

software of the information


systems
cryptocurrency
software viruses,network
viruses, boot viruses, macro
viruses

network viruses

software of the information


systems
Twofish

network viruses

IP

IFED

IFED

Application software

Browser
Sound card

Spreadsheets

Sound card

ROM

Application software

Spreadsheets

Browser

Browser

Sound card

Grasshopper, Camellia,
Twofish
Spreadsheets
Browser

Application software

Sound card

Sound card

Application software

Spreadsheets
Browser
Grasshopper, Camellia,
Twofish

Browser

the network to which all


computers in the same building
are connected
Grasshopper, Camellia,
Twofish

Ctrl + D
Tab
iOS
.avi
Secure means that the data
transferred electronically is
unpacked

Create resources for organization

You might also like