Menu
Is free
check in
the main  /  Advice / Can various files have the same names? File system (8th grade) Can several files have the same.

Can various files have the same names? File system (8th grade) Can several files have the same.

1. Yes, if they have different volumes

2. Yes, if they have different creation dates

3. Yes, if they are stored in different directories

4. No, can not

5. Yes, if they are created at different times of the day

Question N 26. The archiver is called:

1. Program to reduce information (compression) files

2. File Backup Program

3. A program designed to store rarely used software files

4. A program that ensures the expansion of OS capabilities

5. Program for protection against computer viruses

Question N 27. Archive file is:

1. The file that has not been used for a long time

2. Copy protected file

3. File compressed using archiver

4. File protected from unauthorized access

5. File infected with a computer virus

Question N 28. Archive file can be:

2. Unpack

3. Run to execution

4. Edit

Question N 29. The degree of compression of the file depends:

1. Only from the file type

2. Only from the archiver program

3. From the type of file and program-archiver

4. From computer performance

5. From the scope of the RAM of the personal computer on which the file is archived

Question n 30. The archive file is different from the source file by the fact that:

1. Access to it takes less time

2. It is easier to protect against viruses

3. It takes less space on the disk

4. More convenient for editing

5. It is easier to protect against unauthorized access.

Question N 31. Computer viruses:

1. A result of failures in computer hardware

2. They are written specifically for damage to PC users

3. have biological origin

4. Causes of errors in the operating system

5. are a side effect when developing software

Question N 32. The distinguishing features of the computer virus are:

1. Easy recognition and destruction

2. Significant software code

3. Small scope

4. The ability to independently launch and multiple code copying to the creation of interference

computer work

5. Small software code and ability to independently launch and multiple

copying code, to creating interference to the correct operation of the computer

Question N 33. For ease of operation and systematization, files are grouped in:

1. Catalogs

2. Clusters

3. Sectors

4. Tracks

304. Algorithmization

Question n 1. The algorithm is called:

1. A detailed list of rules for performing certain actions

2. Oriented graph indicating the order of execution of some set of commands

3. Command command sequence

4. Description of the sequence of actions in the form of geometric shapes connected by lines and arrows

5. Clear and accurate prescription to the performer to make a sequence of actions aimed at

achievement of goals

Question N 2. The properties of the algorithm are:

1. Relevance, utility, accuracy, understandability, mass

2. Novelty, definitiveness, clarity, clearer, performance

3. Clarity, unambiguity, mass, discreteness

4. Discretion, performance, clearer, massibility, accuracy

5. Discreteness, performance, determinism (accuracy), mass, clearer

Question N 3. The property of the "Performance" algorithm means:

1. With the exact execution of all the commands of the algorithm, the process must stop behind the final number of steps,

low to a certain result

2. The algorithm must have a discrete structure (should be divided into sequence of individual

3. Recalling the algorithm for a particular artist, you can only use those commands that are included in

the system of his commands

4. The algorithm must ensure the solution of a certain class of tasks of this type for various values.

Question N 4. The property of the "Discreteness" algorithm means:

1. The algorithm must provide a solution not to one specific task, and some class of tasks of this

2. With the exact execution of all commands of the algorithm, the process should lead to a certain result.

3. The algorithm should consist of a sequence of a finite number of steps

4. The algorithm must be focused on a specific performer and contain teams included in the system.

his teams

5. The algorithm performer should not make decisions not provided for by the compiler of the algorithm

End of work -

This topic belongs to the section:

Information and information processes

Question n The term informatization of society means an increase in the amount of redundant information circulating in society .. The increase in the role of the media ..

If you need additional material on this topic, or you did not find what they were looking for, we recommend using searching for our work base:

What we will do with the material obtained:

If this material turned out to be useful for you, you can save it to your social networking page:

All the themes of this section:

Install the correspondence between the property and its definition.
1. Information that does not depend on personal opinions or judgment is called 2. Information that reflects the true state of affairs is called 3. Information that is important in

The main reason for the translation of humanity information resources to electronic
Media: 1. The policy of governments of the most developed countries 2. An objective need to increase the rate of processing of information 3. The pursuit of super profits

Emm of the third generation
1. They had semiconductive elements as an element base; Algorithmic programming languages \u200b\u200bwere used; 2. They had electronic lamps as an element base; Programmer

Characters (the number of code characters must be equal to the number of words)?
1. Hood 2. Christmas tree 3. Field 4. While 5. Pad question N 7. Pixel is: 1. Binary code of graphic information 2. Two

Ascending?
1. Byte, kilobyte, megabyte, bit 2. kilobyte, bytes, bit, megabyte 3. byte, megabyte, kilobyte, gigabyte 4. Megabyte, kilobyte, gigabyte, byte 5. byte, kilobyte,

Multi-Wiring Line for Information Exchange Between Computer Devices
Called: 1. Plotter 2. Controller 3. Mainer 4. Modem 5. Provider Question N 4. At the laser printer

Mascinal and modular principle of modern personal architecture
Computers implies such a logical organization of its hardware component, at which: 1. Each device is associated with others directly 2. Each device

For long-term storage of information serves
1. RAM 2. Processor 3. External medium 4. Drive 5. Power supply Power supply N 15. When the computer is disconnected from the network information

Complex interconnected software providing user convenient way
Communication with programs, called: 1. Utility 2. Interface 3. Translator 4. Driver 5. Interpreter Question N

Algorithmic design suggesting or one or other
Actions depending on the belief or falsity of some condition, called: 1. Linear 2. Branch 3. Cyclic 4. Recursive

Object, process or phenomenon having a unique name and is
One whole, called: 1. Model 2. Object 3. Algorithm 4. Value 5. Identifier Question N 2. Modeling

Presentation of essential properties and features of the object in the selected form
Called: 1. Modeling 2. Systematization 3. Coding 4. Formalization 5. Presentation Question N 4. Model -

Information models describing the organization of the educational process in
Technical school, can be attributed: 1. Class Magazine 2. List of visual textbooks 3. List of technical school students 4. List of textbooks

The personal computer file system can most adequately be described.
In the form: 1. Table model 2. Graphic model 3. Hierarchical model 4. Fativity model 5. Mathematical model

The negative consequences of the development of modern information and
Communication technologies can be attributed: 1. Formation of a single information space 2. Working with information becomes the main content of the profession

Software in the following directions
1. Protection against equipment failures 2. Protection against accidental loss of information 3. Protection against deliberate distortion 4. Development of a legal framework for combating crime

Select the phrase whose writing corresponds to the text set rules on
Computer: 1. A man is quietly in the snow. Falls, falls, snow drops 2. The man goes in the snow. Falls, falls, snow drops 3. people hurry, no

1. Yes, if they have different volumes

2. Yes, if they have different creation dates

3. Yes, if they are stored in different directories

4. No, can not

5. Yes, if they are created at different times of the day

Question N 26. The archiver is called:

1. Program to reduce information (compression) files

2. File Backup Program

3. A program designed to store rarely used software files

4. A program that ensures the expansion of OS capabilities

5. Program for protection against computer viruses

Question N 27. Archive file is:

1. The file that has not been used for a long time

2. Copy protected file

3. File compressed using archiver

4. File protected from unauthorized access

5. File infected with a computer virus

Question N 28. Archive file can be:

2. Unpack

3. Run to execution

4. Edit

Question N 29. The degree of compression of the file depends:

1. Only from the file type

2. Only from the archiver program

3. From the type of file and program-archiver

4. From computer performance

5. From the scope of the RAM of the personal computer on which the file is archived

Question n 30. The archive file is different from the source file by the fact that:

1. Access to it takes less time

2. It is easier to protect against viruses

3. It takes less space on the disk

4. More convenient for editing

5. It is easier to protect against unauthorized access.

Question N 31. Computer viruses:

1. A result of failures in computer hardware

2. They are written specifically for damage to PC users

3. have biological origin

4. Causes of errors in the operating system

5. are a side effect when developing software

Question N 32. The distinguishing features of the computer virus are:

1. Easy recognition and destruction

2. Significant software code

3. Small scope

4. The ability to independently launch and multiple code copying to the creation of interference

computer work

5. Small software code and ability to independently launch and multiple

copying code, to creating interference to the correct operation of the computer

Question N 33. For ease of operation and systematization, files are grouped in:

1. Catalogs

2. Clusters

3. Sectors

4. Tracks

304. Algorithmization

Question n 1. The algorithm is called:

1. A detailed list of rules for performing certain actions

2. Oriented graph indicating the order of execution of some set of commands

3. Command command sequence

4. Description of the sequence of actions in the form of geometric shapes connected by lines and arrows

5. Clear and accurate prescription to the performer to make a sequence of actions aimed at

achievement of goals

Question N 2. The properties of the algorithm are:

1. Relevance, utility, accuracy, understandability, mass

2. Novelty, definitiveness, clarity, clearer, performance

3. Clarity, unambiguity, mass, discreteness

4. Discretion, performance, clearer, massibility, accuracy

5. Discreteness, performance, determinism (accuracy), mass, clearer

Question N 3. The property of the "Performance" algorithm means:

1. With the exact execution of all the commands of the algorithm, the process must stop behind the final number of steps,

low to a certain result

2. The algorithm must have a discrete structure (should be divided into sequence of individual

3. Recalling the algorithm for a particular artist, you can only use those commands that are included in

the system of his commands

4. The algorithm must ensure the solution of a certain class of tasks of this type for various values.

Question N 4. The property of the "Discreteness" algorithm means:

1. The algorithm must provide a solution not to one specific task, and some class of tasks of this

2. With the exact execution of all commands of the algorithm, the process should lead to a certain result.

3. The algorithm should consist of a sequence of a finite number of steps

4. The algorithm must be focused on a specific performer and contain teams included in the system.

his teams

5. The algorithm performer should not make decisions not provided for by the compiler of the algorithm

Differentiated test

by discipline Computer science

Test

a) Russian language

b) English

c) Language of gestures

d) programming language

2. Database is:

a) Catalog

b) directories

c) programs

c) computer memory savings

a) Copy

b) Move

c) Delete

d) update

a) on the hard disk

b) in the processor

c) in RAM

What amount of information contains one digit of the octal number?

9. Expansion of the file, as a rule, characterizes:

a) a program in which a file can be opened

b) file size

c) location occupied by a disk file

d) the type of information contained in the file

10. The information model of the database network structure is:

a) the scheme of the Moscow Metro

b) file system computer

c) Mendeleev Table

d) computer network model

11. Automated information processing:

a) only if there is strict formal rules for its processing

b) possible without the presence of strict formal rules for its processing

c) is realized only under the condition of the semantic significance of the information being processed

d) is possible only if it is present in analog form

12. The vertex of the hierarchical system of the Windows graphical interface folders is a folder:

a) My documents

b) my computer

c) desktop

d) network environment

13. All possible combinations of the values \u200b\u200bof the truth of the input signals, along with the values \u200b\u200bof the truth of the output signal for each of these combinations, form:

a) Register

b) logical element

c) Tank of truth

d) trigger

14. Measurement of temperature, pressure, humidity is:

a) the process of using information

b) the process of obtaining information

c) information transfer process

d) information storage process

15. The minimum display element of the display is called:

b) pixel

d) grain phosphor

16. What does not apply to technical means of telecommunications:

a) Hub

c) Martyrutyrutizer

d) Communicator

17. In the formatting process, the paragraph is set:

a) type and size of the font

b) Cookers, Transfer

c) paper orientation

d) alignment, indents, intervals

18. What is not a program-archiver:

Which of the file specifications is correct?

c) C: \\ Kat \\ Kniga.txt

d) A: \\ D: \\ Kniga.doc

20. The main elemental database of the fourth generation is:

a) Electrovacuum lamps

b) SBI (microprocessors)

c) electromechanical circuits

d) semiconductors

21. In which items of the table stored databases:

a) in columns

b) in rows

c) in cells

d) in the records

22. The archive file differs from the original the fact that:

a) Access to it takes less time

b) it is easier to protect against viruses

c) it is easier protecting against unauthorized access

d) it takes less space on the disk

What template describes all files having a COM extension?

24. Text translation from English to Russian can be called:

a) information transfer process

b) information storage process

c) the process of obtaining information

d) information processing process

25. Which of the above characters can be used in the file name:

a) underscore " "

b) more, less " < > "

c) asterisk " * "

d) question mark " ? "

26. Information independent of personal opinion or judgment is called:

b) Objective

c) relevant

d) reliable

27. The advantage of the binary number system is that:

a) Electronic elements with 2 states are the most simple performed

b) Electronic elements with 2 states consume less electricity

c) binary code saves computer memory

d) binary code does not cause computer failures

A message was received, the information volume of which is 32 bits. What is this volume in bytes?

29. The main functions of editing text are:

a) Selection of text fragments

b) Looking for text before printing

c) Entering text, correction, insert, deletion, copying, movement of text fragments

d) Installation interval installation

30. For the main unit of measurement of the number of information in the ECT adopted:

31. In the positioning system of the number:

a) the value of each sign in the number does not depend on the position that the sign occupies in the number of numbers

b) for recording numbers used exactly one symbol

c) the value of each sign solved on the position that the sign is in the recording of the number

d) quantitative equivalent value of each symbol does not depend on its position in the number code

32. The model is:

a) object substitute reflecting its spatio-temporal characteristics

b) a specific description of the object being studied, the process, phenomena by means of visual art

c) a set of objects and relations reflecting the essential aspects of the object being studied, phenomenon or process

d) fantastic image of real reality

33. Primients in the graphics editor are:

a) Operations performed on files containing images created in a graphic editor

b) the simplest figures drawn using special tools
Graphic Editor

c) graphic editor modes

d) Wednesday Graphic Editor

34. In a text editor, when specifying the page parameters set:

a) style, pattern

b) headset, size, inscription

c) Fields, orientation

d) indent, interval

35. An example of a hierarchical database is:

a) Catalog of files stored on disk

b) Class magazine page

c) spreadsheet

(d) Train timetable

Writing in the database - is it?

a) column table

b) the set of one-type data

c) some indicator that characterizes a numeric, textual or other value

d) Table String

37. In the theory of encoding and transferring messages, the bit is:

a) information volume of any message

b) Latin alphabet symbol

c) eight-bit binary code for encoding one symbol

d) binary alphabet sign (0 or 1)

38. Processor clock frequency is:

a) The rate of exchanging information between the processor and constant memory (ROM).

b) the number of clocks performed by the processor per unit of time

c) the number of possible processor appeals to RAM per unit of time

d) information exchange rate between the processor and drive

39. Driver is:

a) installation disk

b) antivirus program

c) Program providing computer device

d) computer I / O device

40. The appearance of the ability to effectively automate the processing of information is associated with the invention:

a) electronic computing machines

b) writing

c) typography

d) phone, telegraph, radio, television

41. The speed of the computer depends on:

a) the volume of processed information

b) the volume of the external storage device

c) clock information processing frequency in the processor

d) operating system interface organization

What number is superfluous?

a) 377. (8)

b) 11011011 (2)

c) FF. (16)

d) 226. (10)

76. The first program for the computer was written:

a) Hell Lovelace

b) Howard Aiken

c) Bill Gates

d) Charles Babbird

77. What is the feature of the "counter" field?

a) serves to enter valid numbers

b) has an automatic extension property

c) serves to enter numeric data

d) has a limited size

78. Select the instructions to the absolute addressing from the records:

79. A group of 4 cells was allocated in the spreadsheet. These can be cells:

80. A device that performs arithmetic and logical operations and controlling other PC devices:

a) Controller

b) keyboard

c) processor

d) monitor

81. In the spreadsheets, you cannot delete:

b) cell content

c) column

d) cell name

What is excess here?

a) network databases

b) relational databases

c) distributed databases

d) hierarchical databases

83. The operating system is part of:

a) programming systems

b) Application software

c) system software

d) unique software

84. Input device is intended for:

a) processing entered data

b) reception, transformation and transmission of information to the computer

c) information transfer from person to computer

(d) Implementing the processing, accumulation and information transfer algorithms

Master in the database - is it?

a) The mode in which the formation of form, reports, requests is being built

b) software module for execution of any operations

c) software module for output operations

d) the mode in which the table or form is displayed.

91. The "Start" button is:

a) on the taskbar

b) on the desktop

c) in the control panel

d) in the system menu

92. Image deformation when changing the size of the drawing -
Failure:

a) fractal graphics

b) vector graphics

c) raster graphics

d) structural graphics

93. The textbook on mathematics contains the information of the following types:

a) Only text information

b) exclusively numeric information

c) graphic, textual and numeric

d) graphic, sound and numeric

What is 1 MB?

a) 1024 bytes

b) 1000000 bits

c) 1024 KB

d) 1000000 bytes

116. In the process of loading the operating system occurs:

b) Copy operating system files with CD-ROM on hard disk

c) Copying the operating system files from a flexible disk to the processor

d) copying the contents of RAM on the hard drive

117. Computer imitation modeling of the nuclear explosion is necessary for:

a) carrying out real studies of processes occurring in nature in the process and after the explosion

b) obtain reliable data on the effect of explosion on people's health

c) experimental checking the effect of high temperature and irradiation on natural objects

(d) Reducing the cost of research and security of employees

118. Select the most correct definition of the DBMS:

a) a set of programs that ensures all the computer hardware devices and the user's access to them

b) a set of programs supporting and manipulating data in the database

c) Application program for processing data sets

d) the shell of the operating system, which allows you to more comfortably work with database files

119. The most common in practice are:

a) network databases

b) relational databases

c) distributed databases

d) hierarchical databases

The form in the database is it?

a) user-created graphical interface for data entry into the database

b) User Created Table

c) Created data entry table to database

d) the result of working with the database

What is 1 kbyt?

a) 10 3 bytes

Differentiated test

by discipline Computer science

training groups 11KB, 12TB, 14PP

Test

1. To formal languages \u200b\u200bcan be attributed:

a) Russian language

b) English

c) Language of gestures

d) programming language

2. Database is:

a) Interface that supports filling and manipulation data

b) A combination of interrelated data on some object is specially organized and stored on the outer carrier.

c) set of programs for storing and processing large arrays of information

d) a certain set of information

In which case different files may have the same names?

a) If they are stored in different directories

b) if they are created at different times of the day

c) if they have different volumes

d) if they are created on different days

4. Information from RAM can be saved on an external storage device as:

a) Catalog

b) directories

c) programs

5. The advantages of the binary number system include:

a) Visuality and clearness of the number of numbers in a binary number system

b) ease of operations and the ability to automatically process information using only two states of computer elements

c) computer memory savings

d) widespread use of the named system in everyday life

a) Copy

b) Move

c) Delete

d) update

7. During execution, the application is kept:

a) on the hard disk

b) in the processor

c) in RAM