Menu
Is free
registration
home  /  Advice/ File system (grade 8). File system (grade 8) What to do if 2 files have the same name

File system (grade 8). File system (grade 8) What to do if 2 files have the same name

Differentiated credit

by discipline Computer science

Test

a) Russian

b) English

c) sign language

d) programming language

2. The database is:

a) directory

b) directories

c) programs

c) saving computer memory

a) Copy

b) Move

c) Delete

d) Update

a) on the hard drive

b) in the processor

c) in random access memory

How much information does one digit of an octal number contain?

9. The file extension, as a rule, characterizes:

a) the program in which the file can be opened

b) file size

c) the space occupied by the file on disk

d) the type of information contained in the file

10. Information model network structure The DB is:

a) scheme of the Moscow metro

b) computer file system

c) periodic table

d) model computer network Internet

11. Automated processing information:

a) is only possible if there are strict formal rules for its processing

b) possible without strict formal rules for its processing

c) feasible only if the processed information is semantic

d) is only possible if it is representable in analog form

12. The pinnacle of the hierarchical system of graphic folders Windows interface is the folder:

a) My documents

b) My computer

c) Desktop

d) Network Neighborhood

13. All possible combinations of input signal truth values, together with output signal truth values ​​for each of these combinations, form:

a) register

b) logical element

c) truth table

d) trigger

14. Measurement of temperature, pressure, humidity is:

a) information use process

b) process of obtaining information

c) communication process

d) information storage process

15. The smallest display screen element is called:

b) pixel

d) phosphor grain

16. What does not apply to technical means telecommunications:

a) hub

c) router

d) communicator

17. In the process of formatting a paragraph, set:

a) type and size of font

b) headers and footers, hyphens

c) margins, paper orientation

d) alignment, padding, spacing

18. What is not an archiver program:

Which file spec is correct?

c) c: \ kat \ kniga.txt

d) a: \ d: \ kniga.doc

20. The main element base of the fourth generation computers are:

a) vacuum tubes

b) VLSI (microprocessors)

c) electromechanical circuits

d) semiconductors

21. In which elements of the table are the database data stored:

a) in columns

b) in lines

c) in cells

d) in records

22. Archive file differs from the original in that:

a) it takes less time to access it

b) it is easier to defend against viruses

c) it is easier to protect against unauthorized access

d) it takes up less disk space

What pattern describes all files with the com extension?

24. Translation of a text from English into Russian can be called:

a) communication process

b) information storage process

c) process of obtaining information

d) information processing

25. Which of the following characters can be used in the file name:

a) underline " "

b) more, less " < > "

c) asterisk " * "

d) question mark " ? "

26. Information that does not depend on personal opinion or judgment is called:

b) objective

c) relevant

d) reliable

27. The advantage of the binary number system is that:

a) electronic elements with 2 states are the easiest to design

b) electronic components with 2 states consume less electricity

c) binary code allows you to save computer memory

d) binary does not crash the computer

A message has been received with an information volume of 32 bits. What is this size in bytes?

29. The main functions of text editing are:

a) selection of fragments of text

b) previewing text before printing

c) text input, correction, pasting, deleting, copying, moving text fragments

d) setting line spacing

30. For the main unit of measurement of the amount of information in the electronic computer adopted:

31. In the positional number system:

a) the meaning of each sign in the number does not depend on the position that the sign occupies in the number record

b) exactly one character is used to write numbers

c) the meaning of each sign in the number depends on the position that the sign occupies in the number record

d) the quantitative equivalent of the meaning of each character does not depend on its position in the number code

32. A model is:

a) object substitute, reflecting its spatial and temporal characteristics

b) a certain description of the studied object, process, phenomenon by means of fine arts

c) a set of objects and relationships that reflect the essential aspects of the studied object, phenomenon or process

d) a fantastic image of reality

33. The primitives in the graphics editor are:

a) operations performed on files containing images created in a graphical editor

b) simple shapes drawn with special tools
graphic editor

c) modes of operation of the graphical editor

d) graphical editor environment

34. In text editor when setting page parameters, the following are set:

a) style, template

b) typeface, size, style

c) margins, orientation

d) indent, spacing

35. An example of a hierarchical database is:

a) directory of files stored on disk

b) class journal page

c) spreadsheet

d) train schedule

Is a record in the database?

a) table column

b) a set of data of the same type

c) some indicator, which characterizes a numerical, textual or other value

d) table row

37. In the theory of encoding and transmitting messages, a bit is:

a) information volume of any message

b) Latin alphabet character

c) an eight-bit binary code to encode one character

d) binary alphabet character (0 or 1)

38. The clock speed of the processor is:

a) the rate of information exchange between the processor and read-only memory (ROM).

b) the number of cycles performed by the processor per unit of time

c) the number of possible processor accesses to the RAM per unit of time

d) speed of information exchange between processor and disk drive

39. A driver is:

a) installation disc

b) antivirus program

c) a program that ensures the operation of a computer device

d) computer input / output device

40. The emergence of an opportunity effective automation information processing is associated with the invention:

a) electronic computers

b) writing

c) typography

d) telephone, telegraph, radio, television

41. The speed of your computer depends on:

a) the amount of information processed

b) external storage space

c) clock frequency of information processing in the processor

d) organizing the operating system interface

What number is superfluous?

a) 377 (8)

b) 11011011 (2)

c) FF (16)

d) 226 (10)

76. The first computer program was written:

a) Adoy Lovelace

b) Howard Aiken

c) Bill Gates

d) Charles Babbage

77. What is the peculiarity of the "counter" field?

a) serves to enter real numbers

b) has the property of automatic build-up

c) serves to enter numerical data

d) is of limited size

78. Select from the following entries an indication of absolute addressing:

79. A group of 4 cells was selected in the spreadsheet. These can be cells:

80. A device that performs arithmetic and logical operations, and controls other PC devices:

a) controller

b) keyboard

c) processor

d) monitor

81. In spreadsheets, you cannot delete:

b) Cell content

c) Column

d) Cell name

What is superfluous here?

a) network databases

b) relational databases

c) distributed databases

d) hierarchical databases

83. The operating system is part of:

a) programming systems

b) applied software

c) system software

d) unique software

84. The input device is intended for:

a) processing input data

b) receiving, transforming and transmitting information to a computer

c) transfer of information from person to computer

d) implementation of algorithms for processing, accumulation and transmission of information

Master in DB - is it?

a) the mode in which the building of the form, reports, requests is carried out

b) a program module for performing any operations

c) a program module for outputting operations

d) the mode in which the table or form is output

91. The START button is located:

a) on the taskbar

b) on the desktop

c) in the Control Panel

d) in System menu

92. Deformation of the image when changing the size of the picture -
flaw:

a) fractal graphics

b) vector graphics

c) bitmap graphics

d) structural graphics

93. A textbook on mathematics contains information of the following types:

a) only text information

b) purely numerical information

c) graphical, textual and numerical

d) graphic, sound and numerical

What is 1 MB equal to?

a) 1024 bytes

b) 1,000,000 bits

c) 1024 Kbytes

d) 1,000,000 bytes

116. During the boot process of the operating system, the following occurs:

b) copy operating system files from CD-ROM to HDD

c) copy operating system files from floppy disk into the processor

d) copying the contents of the RAM to the hard drive

117. Computer simulation of a nuclear explosion is necessary for:

a) carrying out real studies of the processes occurring in nature during and after the explosion

b) obtaining reliable data on the effects of explosion on human health

c) experimental verification of the effect of high temperature and radiation on natural objects

d) reducing the cost of research and ensuring the safety of employees

118. Choose the most correct definition of a DBMS:

a) a set of programs that ensure the operation of all hardware devices of the computer and user access to them

b) a set of programs that support filling and manipulating data in the database

c) application for processing datasets

d) the shell of the operating system, which makes it more comfortable to work with database files

119. The most common in practice are:

a) network databases

b) relational databases

c) distributed databases

d) hierarchical databases

The form in the database is this?

a) user created graphical interface to enter data into the database

b) user-created table

c) created table of data entry into the database

d) the result of working with the database

What is 1 KB equal to?

a) 10 3 bytes

Differentiated credit

by discipline Computer science

training groups 11KB, 12TB, 14PP

Test

1. Formal languages ​​include:

a) Russian

b) English

c) sign language

d) programming language

2. The database is:

a) an interface that supports filling and manipulating data

b) a set of interrelated data about an object, specially organized and stored on an external medium

c) a set of programs for storing and processing large amounts of information

d) a defined set of information

In which case may different files have the same names?

a) if they are stored in different directories

b) if they were created at different times of the day

c) if they have different volumes

d) if they are created on different days

4. Information from the RAM can be saved to an external storage device in the form:

a) directory

b) directories

c) programs

5. The advantages of the binary number system include:

a) the clarity and clarity of recording the number in binary system reckoning

b) the simplicity of the operations performed and the possibility of automatic processing of information using only two states of the computer elements

c) saving computer memory

d) widespread use of the named system in everyday life

a) Copy

b) Move

c) Delete

d) Update

7. During execution, the application is stored:

a) on the hard drive

b) in the processor

c) in RAM

Each storage medium (magnetic and optical disks, flash memory cards) can store a large number of files. The order in which files are stored on disk is determined by the file system used.

Single-level file system.
For discs with a small number of files (up to several dozen) can be used single-level file system when the disk directory (disk table of contents) is a linear sequence of file names and corresponding starting sector numbers. Such a catalog can be compared to the table of contents for a children's book, which contains the titles of individual stories and page numbers.

Multilevel file system.
If the medium stores thousands and tens of thousands of files, then for the convenience of searching, the files are stored in layered file system which is a system of subfolders. Each folder can contain other folders as well as files.

In the operating room Windows system a multi-level hierarchical file system is used, when a folder or file can be included in only one folder top level.

V operating system Linux uses a multilevel, but not hierarchical file system, when a folder or file can be included in several folders at once.

The names of disks and logical disk partitions in the Windows operating system.
In the Windows operating system, each disk or logical disk partition has a logical name denoted by Latin letters with a colon sign. C :, D :, E: etc. - names hard drives and their logical partitions. Devices with removable media: A: - floppy disk name, then names optical discs, then USB flash drives.

The top-level folder for the disk is The root folder, which is denoted by adding a slash "\" to the drive name, for example, the designation of the root folder of a floppy disk looks like this: A: \

The names of disks and logical disk partitions in the Linux operating system.
In the Linux operating system, each disk or logical disk partition also has logical name. Hard drives and their logical partitions are denoted by Latin letters with the serial numbers of the partitions:

  • hda1, hda2, etc. (these logical partitions belong to the first hard disk);
  • hdb1, hdb2, etc. (these logical partitions belong to the second hard drive), etc.

An important difference between the Linux operating system and the Windows operating system is that the folders of disks and their logical partitions do not belong to the upper level of the file system. These folders are "mounted" in the mnt folder, which in turn is included in Root folder top level.

On Linux operating system optical discs CD and DVD, USB flash drives and floppy drive magnetic disk Are “mounted” in the media folder, which is also included in the top-level Root folder.

The path to the file.
How do I find files on a layered filesystem? To do this, you need to specify the path to the file. The file path begins with a logical drive name in Windows operating systems or the top-level root folder in Linux operating systems. Then a sequence of names of nested folders is recorded, the last of which contains the required file.

Consider specific example hierarchical file system in the Windows operating system. Suppose that in the root folder of drive A: there are two first-level subfolders (Documents and Pictures), and in the Pictures folder there is one second-level subfolder (Photos). In this case, the Documents folder contains the Composition.doc file, and the Photos folder contains the Class.bmp file.

Disk and folder names are written with the "\" separator. The paths to the files Essay.doc and Class.bmp can be written as follows:
А: \ Documents
А: \ Images \ Photos \

The file path along with the file name is sometimes called full filename, for example:
А: \ Documents \ Composition.dos
A: \ Images \ Photo \ Class.Lmp

In operating rooms Linux systems and Mac OS, full file names are separated by "/" (forward slash).

Control questions:

  1. What are the parts of the file path? Full name of the file?
  2. What is the difference between single-level and hierarchical file systems?
  3. Explain the difference between a directory and a folder.
  4. Can multiple files have the same name?

Tasks:

1.yes, if they have different volumes

2.yes, if they have different creation dates

3.yes, if they are stored in different directories

4.no, they cannot

5.yes, if they were created at different times of the day

QUESTION N 26. The archiver is called:

1.program for reducing the information volume (compression) of files

2.program Reserve copy files

3.a program designed to store rarely used program files

4.a program that provides the expansion of the capabilities of the OS

5.program to protect against computer viruses

QUESTION N 27. The archive file is:

1.file that hasn't been used for a long time

2.file protected from copying

3.file compressed using archiver

4.file protected from unauthorized access

5.file infected with a computer virus

QUESTION N 28. The archive file can be:

2.unpack

3.start for execution

4.edit

QUESTION N 29. The compression ratio of the file depends:

1.only from file type

2.only from the archiver program

3.from the file type and archiver program

4.from computer performance

5.from the amount of RAM personal computer where the file is archived

QUESTION No. 30. The archive file differs from source file by the fact that:

1.accessing it takes less time

2.easy to defend against viruses

3.Takes up less disk space

4.more convenient for editing

5.Easy to protect against unauthorized access

QUESTION N 31. Computer virus programs:

1.Created as a result of failures in computer hardware

2.written specifically to harm PC users

3.have a biological origin

4.are the result of errors in the operating system

5.are a side effect of software development

QUESTION N 32. Distinctive features computer virus are:

1.ease of recognition and destruction

2.significant volume program code

3.small amount of program code

4.the ability to independently launch and copy the code multiple times, to interfere with the correct

computer work

5.small amount of program code and the ability to run independently and repeatedly

copying the code, interfering with the correct operation of the computer

QUESTION N 33. For the convenience of work and systematization of data, files are grouped into:

1.directories

2.clusters

3.sectors

4.tracks

304. Algorithmization

QUESTION N 1. An algorithm is called:

1.a detailed list of rules for performing certain actions

2.directed graph indicating the order of execution of a certain set of commands

3.sequence of commands for the computer

4.description of the sequence of actions in the form of geometric figures connected by lines and arrows

5.a clear and precise instruction to the performer to perform a sequence of actions aimed at

achievement of the set goals

QUESTION N 2. The properties of the algorithm are:

1.relevance, usefulness, reliability, comprehensibility, mass character

2.novelty, unambiguity, clarity, comprehensibility, effectiveness

3.clarity, uniqueness, mass character, discreteness

4.discreteness, effectiveness, comprehensibility, mass character, reliability

5.discreteness, efficiency, determinability (accuracy), mass character, comprehensibility

QUESTION N 3. The "performance" property of the algorithm means:

1.with the exact execution of all commands of the algorithm, the process must terminate in a finite number of steps,

leading to a definite result

2.the algorithm must have a discrete structure (must be split into a sequence of separate

3.recording an algorithm for a specific performer, you can use only those commands that are included in

his command system

4.the algorithm should provide the solution of a certain class of problems of this type for different meanings

QUESTION N 4. The "discreteness" property of the algorithm means:

1.the algorithm must provide a solution to more than one specific task, and a certain class of problems of a given

2.with the exact execution of all commands of the algorithm, the process should lead to a certain result

3.the algorithm should consist of a sequence of a finite number of steps

4.the algorithm should be focused on a specific performer and contain the commands included in the system

his teams

5.the executor of the algorithm should not make decisions that are not provided for by the creator of the algorithm

End of work -

This topic belongs to the section:

Information and information processes

Question n the term informatization of society means .. an increase in the amount of redundant information circulating in society .. an increase in the role of the media ..

If you need additional material on this topic, or you did not find what you were looking for, we recommend using the search in our base of works:

What will we do with the received material:

If this material turned out to be useful for you, you can save it to your page on social networks:

All topics in this section:

Establish a correspondence between information property and its definition
1. Information that does not depend on personal opinion or judgment is called 2. Information that reflects the true state of affairs is called 3. Information that is important at present

The main reason for the transfer of information resources of mankind to electronic
carriers: 1.the policy of the governments of the most developed countries 2.the objective need to increase the speed of information processing 3.the pursuit of superprofits

Third generation computer
1. had semiconductor elements as an element base; algorithmic programming languages ​​were used; 2. had electronic tubes as an element base; programming

Characters (the number of characters in the code must be equal to the number of letters in the word)?
1. hood 2. tree 3. field 4. while 5. foot QUESTION N 7. A pixel is: 1. binary code graphic information 2.binary

Ascending?
1.byte, kilobyte, megabyte, bit 2.kilobyte, byte, bit, megabyte 3.byte, megabyte, kilobyte, gigabyte 4. megabyte, kilobyte, gigabyte, byte 5.byte, kilobyte,

Multi-wire line for information exchange between computer devices
called: 1. plotter 2. controller 3. trunk 4. modem 5. provider QUESTION N 4. U laser printer on

The main-modular principle of the architecture of modern personal
computers implies such a logical organization of its hardware components, in which: 1. each device communicates with others directly 2. each device

For long-term storage of information
1. RAM 2. processor 3. external media 4. floppy drive 5. power supply QUESTION N 15. When the computer is disconnected from the network, the information is exhausted

A set of interconnected programs that provide the user with a convenient way
communication with programs is called: 1. utility 2. interface 3. translator 4. driver 5. interpreter QUESTION N

Algorithmic construction assuming the execution of either one or the other
actions depending on the truth or falsity of some condition is called: 1. linear 2. branching 3. cyclic 4. recursive

An object, process or phenomenon that has a unique name and is
a single whole, called: 1. model 2. object 3. algorithm 4. value 5. identifier QUESTION N 2. Modeling

Representation of essential properties and features of an object in a selected form
called: 1. modeling 2. systematization 3. coding 4. formalization 5. presentation QUESTION N 4. Model -

To information models describing the organization of the educational process in
technical school, include: 1. class magazine 2. list of visual teaching aids 3.List of college students 4.List of textbooks

The file system of a personal computer can be most adequately described
in the form of: 1. tabular model 2. graphic model 3. hierarchical model 4. full-scale model 5. mathematical model

To the negative consequences of the development of modern information and
communication technologies include: 1.the formation of a single information space 2.working with information becomes the main content of the profession

Software in the following areas
1.protection against equipment malfunctions 2.protection against accidental loss of information 3.protection against deliberate distortion 4.development of a legal framework to combat crime

Select a phrase whose spelling follows the rules for typing on
computer: 1. A man is walking quietly in the snow. Falling, falling, falling snow 2. A man is walking quietly in the snow. Falling, falling, falling snow 3. People are in a hurry, no

1.yes, if they have different volumes

2.yes, if they have different creation dates

3.yes, if they are stored in different directories

4.no, they cannot

5.yes, if they were created at different times of the day

QUESTION N 26. The archiver is called:

1.program for reducing the information volume (compression) of files

2.file backup program

3.a program designed to store rarely used program files

4.a program that provides the expansion of the capabilities of the OS

5.program to protect against computer viruses

QUESTION N 27. The archive file is:

1.file that hasn't been used for a long time

2.file protected from copying

3.file compressed using archiver

4.file protected from unauthorized access

5.file infected with a computer virus

QUESTION N 28. The archive file can be:

2.unpack

3.start for execution

4.edit

QUESTION N 29. The compression ratio of the file depends:

1.only from file type

2.only from the archiver program

3.from the file type and archiver program

4.from computer performance

5.from the amount of RAM of the personal computer on which the file is archived

QUESTION No. 30. An archive file differs from the original file in that:

1.accessing it takes less time

2.easy to defend against viruses

3.Takes up less disk space

4.more convenient for editing

5.Easy to protect against unauthorized access

QUESTION N 31. Computer virus programs:

1.Created as a result of failures in computer hardware

2.written specifically to harm PC users

3.have a biological origin

4.are the result of errors in the operating system

5.are a side effect of software development

QUESTION N 32. Distinctive features of a computer virus are:

1.ease of recognition and destruction

2.significant amount of program code

3.small amount of program code

4.the ability to independently launch and copy the code multiple times, to interfere with the correct

computer work

5.small amount of program code and the ability to run independently and repeatedly

copying the code, interfering with the correct operation of the computer

QUESTION N 33. For the convenience of work and systematization of data, files are grouped into:

1.directories

2.clusters

3.sectors

4.tracks

304. Algorithmization

QUESTION N 1. An algorithm is called:

1.a detailed list of rules for performing certain actions

2.directed graph indicating the order of execution of a certain set of commands

3.sequence of commands for the computer

4.description of the sequence of actions in the form of geometric figures connected by lines and arrows

5.a clear and precise instruction to the performer to perform a sequence of actions aimed at

achievement of the set goals

QUESTION N 2. The properties of the algorithm are:

1.relevance, usefulness, reliability, comprehensibility, mass character

2.novelty, unambiguity, clarity, comprehensibility, effectiveness

3.clarity, uniqueness, mass character, discreteness

4.discreteness, effectiveness, comprehensibility, mass character, reliability

5.discreteness, efficiency, determinability (accuracy), mass character, comprehensibility

QUESTION N 3. The "performance" property of the algorithm means:

1.with the exact execution of all commands of the algorithm, the process must terminate in a finite number of steps,

leading to a definite result

2.the algorithm must have a discrete structure (must be split into a sequence of separate

3.recording an algorithm for a specific performer, you can use only those commands that are included in

his command system

4.the algorithm should provide the solution of a certain class of problems of this type for various values

QUESTION N 4. The "discreteness" property of the algorithm means:

1.the algorithm should provide a solution not to one specific problem, but to a certain class of problems of a given

2.with the exact execution of all commands of the algorithm, the process should lead to a certain result

3.the algorithm should consist of a sequence of a finite number of steps

4.the algorithm should be focused on a specific performer and contain the commands included in the system

his teams

5.the executor of the algorithm should not make decisions that are not provided for by the creator of the algorithm