ict
Which of the following is an example of assignment operator in Python?
!=
Which symbol is used to introduce comments in Python? :
#
Which of the following is an example of assignment operator in Python?
+=
What extentsion is used for Java source files :
.java
What extentsion is used for PHP source files :
.php
What extentsion is used for Python source files :
.py
What numerical value has binary representation 0
0
What numerical value has binary representation 01
1
What will be the output after execution of the following code? Please answer based on Python code provided bellow x = 2 y = 3 list = [1,2,3,4,5] print(list[0])
1
From the above: 1) a text editor; 2) a table editor; 3) compiler program; 4) graphic editor; 5) optimizer program - to create a program in the selected programming language, you must have components:
1, 3
What numerical value has binary representation 1010
10
What will be the output of the execution of the following code? Please answer based on Python code provided bellow x = 2 y = 3 list = [1,2,3,4,5] print(x+y+list[-1]) :
10
Which of the following is not the value of 2 bits
12
The number of internet users in Kazakhstan in 2016:
12 million people
Charles Babbage designed first analytical computer in :
1820-1822
Alan Turing proposed first abstract general-purpose computer "Turing machine" in :
1936
First time computer was able to store information on memory in :
1941
First computer chip has been unveiled in :
1958
. When was first e-mail sent?
1972
When was TCP firstly developed?
1974
First IBM Personal Computer named "Acorn" was presented in :
1981
When was DNS system was created?
1983
com was firstly used in
1984
How many main lines of research on artificial intelligence?
2
What numerical value has binary representation 10 :
2
What will be the output after execution of the following code? Please answer based on Python code provided bellow int_1 = 4 int_2 = 5 int_3 = int_1*int_2 print(int_3)
20
YouTube was founded in
2005
Year of first IPhone
2007
The term Big Data appeared in
2008
. How many parameters teleconferences can be classified?
3
What maximum numerical value can be represented with 2 bits? :
3
What numerical value has binary representation 11 :
3
What will be the output after execution of the following code? Please answer based on Python code provided bellow x = 2 y = 3 list = [1,2,3,4,5] print(list[2]) :
3
At what stage the block is broadcasted to all the nodes of the network? :
3 stage
What range does Low Frequency (LF) RFID operate in?
30 KHz to 300 KHz
What range does Ultra-High Frequency (UHF) RFID operate in?
300 MHz to 3 GHz
How many layers in TCP/IP messaging model?
4
What numerical value has binary representation 100 :
4
What will be the output after execution of the following code? Please answer based on Python code provided bellow int_1 = 4 int_2 = 5 int_3 = int_1*int_2 print(int_1)
4
What will be the output of the execution of the following code? Please answer based on Python code provided bellow var = 2 Var = 3 list = [1,2,3,4,5] print(list[0]*2+var) :
4
What will be the output of the execution of the following code? Please answer based on Python code provided bellow var = 2 Var = 3 list = [1,2,3,4,5] print(list[0]+list[-1]-var)
4
Which bit from the right to left refers to value 8?
4th
. What will be the output after execution of the following code? Please answer based on Python code provided bellow int_1 = 4 int_2 = 5 int_3 = int_1*int_2 print(int_2)
5
What numerical value has binary representation 101 :
5
What will be the output after execution of the following code? Please answer based on Python code provided bellow x = 2 y = 3 list = [1,2,3,4,5] print(list[-1]) :
5
What approximated percent of the people nowadays use Internet all over the world?
50
How many steps does block chain work include?
6 stages
Unicode character set is approximately
65000
Which bit from the right to left refers to value 32?:
6th
What numerical value has binary representation 111
7
Find incorrect Normal Form of the relational database
7NF
What approximated amoung of RFC are there nowadays?
8600
What numerical value has binary representation 1001
9
Which of the following is an example of arithmetic operator in Python
: *
Which of the following is an example of arithmetic operator in Python
: +
Format beginning of Internet history, first dot-com domain regirstered in
: 1985
The environmental impact of the ICT sector, namely carbon dioxide emissions? :
: 2 %
What range does High Frequency (HF) RFID operate in
: 3 MHz to 30 MHz
Which of the following is an example of assignment operator in Python?
: =
The term "big data" pertains to a combination of
: All listed
Specify one of the data mining methods
: Linear Regression
Ada Lovelace is considered as first
: Programmer
Smart technology means
: Self-Monitoring Analysys and Reporting Technology
What value will hold the variable y, after execution of the following code? Please answer based on Python code provided bellow x = 10 y = '10' message ='Hello World!' print(message)
: String value "10"
. What is the basic principle of building a block chain? :
: all answers are correct
What is a teleconference?
: thematic exchange of messages between network users
WSN stands for
: wireless sensor network
The second stage of Block chain work
A block representing the transition is created
What is a feature of the key field in the relational database :
A field containing unique data
What is the main feature of a primary key field
A field with no duplicated (repeated) data
A database is
A set of related data
Show the examples of Sensor Based HCI device in list: 1) mouse; 2) keyboard; 3) graphical tablet; 4) VR trackers
A) All listed
2 main objects of HCI
A) Human and computer
Which of these persons is considered as first programmer:
A. Lovelace
What of the following is Application to play audio not for video
AIMP
What of the following is not text editing application
AIMP
What is the name of Corporation that have invented first version of Internet?:
ARPA
Which of the following organizations are not related to RFCs?
ARPA
What was the title of precursor of Internet?
ARPANET
Which of the following is not advantage of Command Line Interface (CLI) :
Ability to give audio commands
Which person made influence to computer development? :
Ada Lovelace
What of the following is software to work with raster graphics :
Adobe Photoshop
Which person made influence to computer development? :
Alan Turing
What of the following is not programming language
Algorithm
Which statement is true?
Algorithm is the part of programming
What individual WSNs are limited to?
All answers are correct
Which of the following issues are considered in IoT?
All issues
The relationships between relational database tables may be of types
All listed
This interface uses windows, icons, menus and pointers (WIMP) which can be manipulated by a mouse :
All listed
Which of the following is advantages of Natural Language Interface: 1)quicker than keyboard; 2) Hands-free; 3)Can be used by the disabled; 4) No training required :
All listed
What refers to ASCII
American Standard Code for Information Interchange
The chief aim of analysis is to distinguish between
An event occurring as either reflecting a true effect versus a one occurring by chance
What was the name of Victorian-era computer constructed by Charles Babbage
Analytical Engine
What of the following Applications are open source:
Apache Open Office
Which of the following Companies releases macOS
Apple
. It is separate program that helps users to solve particular problems:
Application
API is:
Application Programming Interface
We recognize the order of processing the blocks in flowchart of algorithm from:
Arrows
Which of the following is example of multimodal HCI architecture :
Audio and Visual Based HCI
What of the following is not office software:
Autodesk Scetchbook
What IS part of CIA Triad?
Availability
What factor was not preserved in the following example? Attacker blocks the communication channels so sender could not successfuly send message to the recipient.
Availability
What IS NOT one of the challenges in computer security?
Average salaries of information security specialist are low, that is why no one wants to work as such specialist
An algorithm in which the order of actions depends on certain conditions is called
B) branching
Algorithms in the execution of which individual commands or series of commands are executed repeatedly are called
B) cyclic
What can be used for providing companies with valuable insights into their customers?
Big Data
Unit measurement of information equivalent to the result of a choice between only 2 possible alternatives in the binary number system:
Bit
Which of the following applications are an example of peer-to-peer?:
BitTorrent
What of the following is Application to work with 3D
Blender
What of the following is not programming language
Blender
A technology of distributed storage of information, which concerns any vital questions:
Block chain
Which one of the following examples is for ICT use in Banking:
Businessman can save his time by using online services offered by banks.
An example of high level programming language that is using compiler as a translator is :
C
The most common algorithm that implements Decision Tree:
CART
In wich organization was firstly developed World Wide Web? :
CERN
System that eases creation and modification of digital content of web sites :
CMS
One of the basic hardware device:
CPU ( Microprocessor)
Language used to create styles for HTML documents
CSS
Which person made influence to computer development?
Charles Babbage
How we call the devices connected to server to make querries and requests?:
Client
Model of network with one main computer that is connected by many devices to work with
Client-Server
A field or attribute in the relational database is in fact a table
Column
Which of following tools is used to convert code into executable file :
Compiler
At which stage of database creation all data is collected
Conceptual
What factor is maintained in the following example? There are specified settings on computer files, when authorized users are able to access it, while unauthorized persons are blocked from accessing it :
Confidentiality
What factor was not preserved in the following example? Attacker intercepts message, reads contents, and forwards message to the recipient, without any modification :
Confidentiality
Which of the following is not disadvantage of Command Line Interface (CLI) :
Consumes big amount of resources
CMS is ...
Content Management System.
. Restoration of a database from a backup, after main database damage, is an example of which kind of control?
Corrective
Which of the following is not about Interface
D) A point where humans meet
3 types of algorithms do not contain:
D) Coding algorithm
. Which of the following occured in 1983
DNS was created
Which of the following occured in 1983
DNS was created
The main definition of data
Data is a collection of independent and unorganized facts
The term «big data» refers to a combination of what data?
Data security infrastructure
Which of the following is encoded in binary format:
Digital data
Which of the following is not advantage of Menu Driven Interface :
Does not physical input other than keyboard, doesn't work with cursor
Which of the following is not advantage of Natural Language Interface:
Does not process homonyms
What is DNS?
Domain Name System
Software provided by hardware vendors to properly recognize signals of the device:
Driver
A foreign key field may contain
Duplicates
Internet application for sending and receiving messages with "at" to domain name
Who invented Relational database
Edgar Codd
Vulnerabilities are reducing the risk to the assets. Is the statement above true or false?
FALSE
What is FTP?
File Transfer Protocol
Portable programs contains:
Files
. Computing systems are:
Finite machines processing digital data
Which of the following occured in 1988
First internet worm
The structural diagram of the algorithm is called:
Flowchart
Which generation of computers lays in period of 1971-2010
Fourth
This interface uses windows, icons, menus and pointers (WIMP) which can be manipulated by a mouse :
Graphical User Interface
Which of the following is correct type of interface? :
Graphical User Interface
What is the transcript of GUI:
Graphics User Interface
Where is the application mostly installed
Hard disc
. The general term that is used to describe physical artifacts of a technology:
Hardware
. The tangible part of a computer system:
Hardware
What will be the output after execution of the following code? Please answer based on Python code provided bellow x = 10 y = "10" message ="Hello World!" print(message) :
Hello World!
. HTML is ...
Hypertext Markup Language
Standard markup language to be displayed in web browsers
Hypertext Markup Language (HTML)
Application Protocol for hypermedia information systems
Hypertext Transfer Protocol (HTTP)
What will be the output after execution of the following code? Please answer based on Python code provided bellow str_1 = "I have an " str_2 = "apple" str_3 = str_1 + str_2 print(str_1)
I have an
What will be the output after execution of the following code? Please answer based on Python code provided bellow str_1 = "I have an " str_2 = "apple" str_3 = str_1 + str_2 print(str_3)
I have an apple
Component of basic Internet data sending protocol, that is used to transport data that is prepared by TCP?:
IP
What is a FIRST step, in risk management process, regarding information security?
Identify information and related assets, and potential threats, vulnerabilities and impacts
Transcript of ICT:
Information and communication technology
What value will hold the variable x, after execution of the following code? Please answer based on Python code provided bellow x = 10 y = '10' message ='Hello World!' print(message)
Integer value 10
What factor was not preserved in the following example? Attacker intercepts message, reads contents, changes contents and forwards message to the recipient
Integrity
What type of human activity concerns the problems that are posed and solved in the framework of Artificial Intelligence?
Intellectual
What IS NOT part of CIA Triad? :
Intelligence
What is IP?:
Internet Protocol
What of the following is not programming language
J++
Who constructed Electronic Numerical Integrator and Calculator (ENIAC)? :
J. Mauchly and J.P. Eckert
The way to launch large and heavy applications, like games, in the web page
Java Applet
Most used programming language in Web application programming :
JavaScript
The Relational database tables may be connected to each other via :
Key fields
What is needed to regulate purchasing and paying for application software
Licenses
Which of the following IS NOT a vulnerability category?
Loss of agency
Which of the following IS a vulenrability category?
Loss of availability
What is a output device:
Loudspeaker
Which of the following Operating systems contains only the Command Line to interact with user
MS-DOS
Which of this lists is Website :
Mail.ru
Edgar Codd invented relational database tables relationships based on :
Mathematical theory of sets
In this interface the user has a list of items to choose from, and can make selections by highlighting one :
Menu Driven Interface
Which of the following is correct type of interface? :
Menu Driven Interface
Software that is only used in programming applications as its parts and modules:
Middleware
Which IS NOT a mean to deal with security attacks?
Minimize
Component of Output Device:
Monitor
One of the basic hardware device:
Monitor
One of the basic hardware device:
Motherboard
. Which of the following is correct type of interface? :
Natural Language Interface
Which of the following is not disadvantage of Command Line Interface (CLI) :
Needs natural language processing of commands
Application uses following tool to interact with other application on other computer
Networking API
Scripting programming language to automatically create HTML web pages
PERL
Scripting programming language to automatically create HTML web pages
PHP
Which of the following IS NOT an example of translator?
Parameter
Model of network when all computers connected to each other with similar rights:
Peer-to-peer
What IS one of the challenges in computer security?
People mostly, tend to not see the benefits of security until failure occurs
Application that can be moved via flash drives or storage discs are called:
Portable
What of following is not system software
Portable Application
Classification Data Mining Models
Predicts the class of an object
Component of Output Device:
Printer
Which of the Following is Communication
Process where information is exchanged between individuals using symbols, signs or verbal interactions
What of the following is open source program
Program with source available in internet
What IS one of the challenges in computer security?
Protector should find all potential weaknesses and cover them, while attacker only need to find one and exploit it
The system of rules that allow several units of communication system to transmit information?
Protocol
Internet stadards created by...
RFC
A method in which data stored by transponders are read or recorded using radio signals :
RFID
This technology is well suited for tracking the movement of certain objects and receiving a small amount of information from them
RFID
the technology of automatic identification of objects is? :
RFID
The concept of "internet of things" is associated of development of two technologies. What are they? :
RFID and WSN
The way of encoding data sent by Internet by public-key cryptosystem
RSA
Description of RFID :
Radio Frequency Identification
What is RAM?
Random access memory (RAM) is a type of data storage used in computers.
What is ROM?:
Read-only memory is a class of storage media used in computers.
Which of the following IS NOT a type of active attack? :
Release of message contents
Which of the following was first created in 2016 :
Reprogrammable quantum computer
RFC means
Request for Comments
A record in the relational database is in fact a table
Row
Find incorrect database creation stage :
Schematic
What of the following is not the core function of OS
Screen saver
Which generation of computers is in period of 1956 - 1963:
Second
What is the meaning of the word SMART?
Self-Monitoring Analysis And Reporting Technology
How we call Main computer, to which we connect using clients? :
Server
Which is not MS Access object
Sheet
Which term contains all other terms :
Software
What value will hold the variable message, after execution of the following code? Please answer based on Python code provided bellow x = 10 y = '10' message ='Hello World!' print(message)
String value "Hello World!"
What is part of cryptography?
Symmetric ciphers
. What are 2 basic types of software:
System and Applications software
Component of basic Internet data sending protocol, that is used to encript information that is to be sent by IP?
TCP
Which one of the following examples is for ICT use in Education:
Teacher uses computers to study teaching materials.
Find incorrect database logical type
Technical
The use of scientific knowledge, experience and resources to create process and product of that fulfill human needs:
Technology
Management method - moderated and non-moderated refers to
Teleconferences
Tools for interaction with Command line:
Text commands
Which of the Following is Information
The knowledge obtained from reading, investigation, study or research
What is a cybersecurity? :
The protection afforded to an automated information system or network in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources
Which of the Following is Technology
The use of scientific knowledge, experience and resources to create process and product of that fulfill human needs
What is name of the variable, that holds the value "print"? Please answer based on Python code snippet provided bellow message ="Hello World!" print(message)
There is not enough information given to answer this question
What will be the output after execution of the following code? Please answer based on Python code provided bellow str_1 = "I have an " str_2 = "apple" str_3 = str_1 + str_2 print(str_4)
There will be an error in the output
What will be the output after execution of the following code? Please answer based on Python code provided bellow x = 10 y = "10" message ="Hello World!" print(msg) :
There will be an error in the output
Which generation of computers lays in period of 1964 - 1971
Third
Which one of the following examples is for ICT use in E-Commerce:
To connect online customers with suppliers to purchase products.
. Which one of the following examples is for ICT use in Industry
To help administrators to oversee and control entire operations in the factory.
Graphics API is used:
To interact with applications visually
Which of the following IS NOT a type of active attack? :
Traffic analysis
Companies KazakhstanTemirZholy, AirAstana, BekkAir, Skat have their own informational system which is:
Traffic control system
What is TCP?:
Transmission Control Protocol
Python stops executing when it comes to the input() function, and continues when the user has given some input. True or false?
True
Which of the following is an example of keyword in Python? :
True
What responses may be the answer for rhombic decision
True or false
What name had first commercial computer for business and government applications?:
UNIVAC
What is URL?
Uniform Resource Locator
the ease of use and learnability of a user interface :
Usability
Which of the following is not advantage of Command Line Interface (CLI):
Usable buttons alligned into scrolls
Which of the following is advantage of Command Line Interface (CLI) :
Uses the fewest system resources
What IS one of the challenges in computer security?
Usually security is an afterthought to be incorporated to a system, after system design was complete
The process of Data management consists of...
Validating
What is the 2 basic types of representing graphical images
Vector and Raster
What of the following is not the trait of Internet?
Very big amount of wires
Which of the following is not advantage of Menu Driven Interface :
Very clearly interacts with audio input
Which of the following is a type of symmetric algorithm/cipher?:
Vigener's cipher
The Application software that acts as another Computer on your Operating System
Virtual Machine
Which standard is not for representing letters and numbers
WAV
What environmental conditions such as temperature, sound, vibration, pressure, movement or pollutants can be determined?
WSN
Which of the following is not an Internet Application?
Web browser
What problems do artificial intelligence systems include
Which have the following function: the algorithmic solution to the problem is unknown
Which of variants is Website
Wikipedia.com
Which of the following operating systems are not based on Linux
Windows
how does the word WSN stand for?
Wireless Sensor Networks
An algorithm is
a description of the sequence of actions, the strict execution of which leads to the solution of the problem in a finite number of steps
Replay is a type of attack. Which one?
active
Repudiation is a type of attack. Which one? :
active
RFID types are?
all answers are correct
User Experience UX term contains :
all listed
Ways to obtain information
all listed
Which of the following is an example of logical operator in Python?
and
What will be the output after execution of the following code? Please answer based on Python code provided bellow str_1 = "I have an " str_2 = "apple" str_3 = str_1 + str_2 print(str_2) :
apple
Section of computer science, in which the problems of hardware and software modeling are posed and solved?
artificial intelligence
An example of low level programming language is :
assembly
What IS NOT one of the challenges in computer security? :
average salaries of information security specialist are low, that is why no one wants to work as such specialist
The area where we consider ways to analyze, systematically extract information from data sets is?
big data
extraction of information from other data sets or processing them in other ways that are too large or complex to be solved using traditional application software for data processing are considered? ::A field in which methods of analysis, systematic extraction of information from other data sets or processing them in other ways that are too large or complex to be solved using traditional application software for data processing are considered?::A field in which methods of analysis, systematic extraction of information from other data sets or processing them in other ways that are too large or complex to be solved using traditional application software for data processing are considered? :
big data
What deals with the problems of artificial reproduction of those structures and processes that are characteristic of the brain of a living person and underlie the solution of human problems? :
bionic
Within the framework of what approach to the problem of artificial intelligence was a new science of neuroinformatics formed? :
bionic
Technology for distributed storage of information that concerns any pressing issues?
block chain
distributed information storage technology that addresses any vital issues is it?:distributed information storage technology that addresses any vital issues is it? :
blockchain
Which of the following is Top level domain?
com
Which of the following IS NOT a category of an attack?
corrupted
Construction of block chain is based on three main principles. What are they? :
distribution, openness and protection.
Blockchain principles :
distribution, openness, protection
. Which top level domain is not especially for country?:
edu
What is the key of development of green technologies? :
energy
The source text is converted into such file using a compiler program :
executable
Identifier in Python could start with the digit. Is statement above true or false?
false
Which of the following is an example of keyword in Python? :
false
Which of the following domains are not connected to ROOT? :
An algorithm is called linear if:
his commands are executed in the order of their natural succession one after another, regardless of any conditions
For what purposes do companies use big data? :
improving marketing, and increasing profits
Modern intelligent information technologies are
information processing and problem solving using computers
Which of the Following is Information and Communication Technologies:
information processing, in particular, the use of electronics, computers, communication devices, and application software to convert, store, protect, process, transmit and retrieve information from anywhere to anytime
Components of computer hardware system:
input devices, output devices, processor and storage devices
. Function that returns the value that user inputs in command line is called
input()
What will be the output after execution of the following code? Please answer based on Python code provided bellow int_1 = 4 int_2 = 5 int_3 = int_1*int_2 print("int_3")
int_3
. IoT stands for?
internet of things
What IS NOT one of the challenges in computer security? :
is impossible to completly prevent the attack to the information systems
. An algorithm is called cyclic if
it is designed so that its implementation involves repeated repetition of the same actions
Which of the following IS NOT a category of an attack?
leaky
An algorithm in which the order of actions is fixed and each action is performed only once is called
linear
What will be the output after execution of the following code? Please answer based on Python code provided bellow x = 2 y = 3 list = [1,2,3,4,5] print("list[0]") :
list[0]
The main Definition of Hardware:
mechanism that transforms information in the external world for consumption by a computer
. What is name of the variable, that holds the value "Hello World!"? Please answer based on Python code snippet provided bellow message ="Hello World!" print(message)
message
What will be the output after execution of the following code? Please answer based on Python code provided bellow str_1 = "I have an " str_2 = "apple" str_3 = str_1 + str_2 print("message")
message
What will be the output after execution of the following code? Please answer based on Python code provided bellow x = 10 y = "10" message ="Hello World!" print("message")
message
Which top level domain is for millitary organizations?
mill
. How call sixth generation of computers? :
neurocomputer
Which of the following is an example of logical operator in Python?
or
Which top level domain is for non-profit organizations?:
org
The start and stop blocks in the algorithm are depicted :
oval
Input and output in the flowchart of the algorithm is depicted
parallelogram
Traffic analysis is a type of attack. Which one?
passive
Function that outputs the variable that is passed to it as an argument is called
print()
. What should be added after the last line of code, in order to get 3 in the output? Please answer based on Python code provided bellow x = 2 y = 3 list = [1,2,3,4,5] :
print(list[2])
An algorithm written in a computer-understandable programming language is called:
program
At run time, the application program is stored in:
random access memory
Which of the following is an example of keyword in Python? :
return
The operation "conditional transition" in the flowchart of the algorithm is depicted as :
rhombic
Another definition of Software
set of instructions that tells the hardware what to do
. Which of the following IS NOT an example of basic data type?
sets
Operating system is:
software environment that defines the user interface
intellectual problems on existing computer models: ::This direction is ...::intellectual problems on existing computer models: ::This direction is focused on the search for algorithms for solving intellectual problems on existing computer models:: This direction is focused on the search for algorithms for solving intellectual problems on existing computer models
software-pragmatic
. Сhoose 2 main directions of artificial intelligence :
software-pragmatic and bionic
Function transforms the numeric argument that is passed into the function, to the text type is called :
str()
What will be the output after execution of the following code? Please answer based on Python code provided bellow str_1 = "I have an " str_2 = "apple" str_3 = str_1 + str_2 print("str_3")
str_3
Organized thematic messaging between network users?
teleconference
What are the main directions of telemedicine?
telemedicine consultation, tele education, remote bio monitoring
Command line interface in Ubuntu Linux is called :
terminal
What IS NOT one of the challenges in computer security? :
the information security is very boring
The algorithm includes branching if
the progress of its implementation depends on the truth of certain conditions
Telemedicine is based on?
the use of modern communication technologies
What is the purpose of green technology in ICT?
to reduce the negative impact on the environment
Artificial intelligence systems are focused on :
to solve a large and important class of problems
Commented line will be ignored by interpretor. True or false? :
true
Python IS case sensitive programming language. Is statement above true or false?
true
Unassigned literals would be ignored by Python interpretor, that is why putting lines into triple quotes in order to make a multi-line string, could be a way to comment block of code. Is above true or false? :
true
Vulnerabilites could be reduced by implemented countermeasures. Is the statement above true or false? :
true
What of the following is programming language
С
Which of the following is an example of assignment operator in Python?
нет