Which of the following is the best example of a database?
1) The programming language Java
2) A list of temperatures; for example 10 degrees, 20 degrees, -5 degrees
3) A list of people, including their names and addresses
4) The text of a book
Which of the following is the best example of a database?
1) The programming language Java
2) A list of temperatures; for example 10 degrees, 20 degrees, -5 degrees
3) A list of people, including their names and addresses
4) The text of a book
A ____________ sends the digital signal further on in the network?
A ____________ sends the digital signal further on in the network?
Choose the correct meaning for the programming language:
1) Language spoken by computers.
2) Language spoken by programmers.
3) A set of instructions which are necessary for exchanging data between computers.
4) Creates programs that can control the behavior of a machine.
Choose the correct meaning for the programming language:
1) Language spoken by computers.
2) Language spoken by programmers.
3) A set of instructions which are necessary for exchanging data between computers.
4) Creates programs that can control the behavior of a machine.
What is right for Windows Registry?
1) The Windows Registry is a static folder that stores configuration settings and options on Microsoft Windows operating systems
2) The Windows Registry is a hierarchical database that stores configuration settings and options on Microsoft Windows operating systems
3) The Windows Registry is a DBMS that stores hierarchical database with configuration settings and options on Microsoft Windows operating systems
What is right for Windows Registry?
1) The Windows Registry is a static folder that stores configuration settings and options on Microsoft Windows operating systems
2) The Windows Registry is a hierarchical database that stores configuration settings and options on Microsoft Windows operating systems
3) The Windows Registry is a DBMS that stores hierarchical database with configuration settings and options on Microsoft Windows operating systems
I ____________ my computer off yesterday and today I can’t turn it on again.
I ____________ my computer off yesterday and today I can’t turn it on again.
Abnormal end of program is?
Abnormal end of program is?
Read the text - Systems and network security. Which paragraph (A–E) says:
you can’t use personal email software?
Systems and network security:
-A- Only install and use software that the management has approved. Install the latest antivirus and antispyware tools. Keep current with security software updates and patches. Follow office health and safety standards.
-B- Choose a password that is difficult to guess: use between six and eight characters, have letters in upper and lower case and intermix letters, numbers and punctuation marks. Keep your password private. Change your password every nine weeks.
-C- Configure your email software to use secure protocols. Use company official email software only. Always double check that you are sending your message to the right recipient. Do not send sensitive data over the network. Use mail encryption to send sensitive data. Do not download unknown files or files for private use, such as movies and music.
-D- Transfer files via secure connection. Back up files regularly on the server in your home folder. Do not use external drives.
-E- Employees must tell their supervisor or IT help desk about any damage, misuse, irregularities or security breaches
Read the text - Systems and network security. Which paragraph (A–E) says:
you can’t use personal email software?
Systems and network security:
-A- Only install and use software that the management has approved. Install the latest antivirus and antispyware tools. Keep current with security software updates and patches. Follow office health and safety standards.
-B- Choose a password that is difficult to guess: use between six and eight characters, have letters in upper and lower case and intermix letters, numbers and punctuation marks. Keep your password private. Change your password every nine weeks.
-C- Configure your email software to use secure protocols. Use company official email software only. Always double check that you are sending your message to the right recipient. Do not send sensitive data over the network. Use mail encryption to send sensitive data. Do not download unknown files or files for private use, such as movies and music.
-D- Transfer files via secure connection. Back up files regularly on the server in your home folder. Do not use external drives.
-E- Employees must tell their supervisor or IT help desk about any damage, misuse, irregularities or security breaches
Read the text - Systems and network security. Which paragraph (A–E) says:
films mustn’t be downloaded?
Systems and network security:
-A- Only install and use software that the management has approved. Install the latest antivirus and antispyware tools. Keep current with security software updates and patches. Follow office health and safety standards.
-B- Choose a password that is difficult to guess: use between six and eight characters, have letters in upper and lower case and intermix letters, numbers and punctuation marks. Keep your password private. Change your password every nine weeks.
-C- Configure your email software to use secure protocols. Use company official email software only. Always double check that you are sending your message to the right recipient. Do not send sensitive data over the network. Use mail encryption to send sensitive data. Do not download unknown files or files for private use, such as movies and music.
-D- Transfer files via secure connection. Back up files regularly on the server in your home folder. Do not use external drives.
-E- Employees must tell their supervisor or IT help desk about any damage, misuse, irregularities or security breaches
Read the text - Systems and network security. Which paragraph (A–E) says:
films mustn’t be downloaded?
Systems and network security:
-A- Only install and use software that the management has approved. Install the latest antivirus and antispyware tools. Keep current with security software updates and patches. Follow office health and safety standards.
-B- Choose a password that is difficult to guess: use between six and eight characters, have letters in upper and lower case and intermix letters, numbers and punctuation marks. Keep your password private. Change your password every nine weeks.
-C- Configure your email software to use secure protocols. Use company official email software only. Always double check that you are sending your message to the right recipient. Do not send sensitive data over the network. Use mail encryption to send sensitive data. Do not download unknown files or files for private use, such as movies and music.
-D- Transfer files via secure connection. Back up files regularly on the server in your home folder. Do not use external drives.
-E- Employees must tell their supervisor or IT help desk about any damage, misuse, irregularities or security breaches
The computer system _____ this morning and nobody knows why.
The computer system _____ this morning and nobody knows why.
Read these texts.
Bandwith and latency are the measures of computer network speed, or data transfer rate. Bandwidth is the maximum throughput of date in bits per second. Some modems support 100 Gbit/s but speed depends on the hardware and software used. Latency is the delay that network creates during the transfer of data. Users have no or very little control over bandwidth and latency.
Chose the sentences that are False?
1) Data transfer rate is measured in bandwidth and latency.
2) The minimum throughput of data in bits per second is the latency.
3) Speed depends only on the hardware used.
4) Users can control the latency.
Read these texts.
Bandwith and latency are the measures of computer network speed, or data transfer rate. Bandwidth is the maximum throughput of date in bits per second. Some modems support 100 Gbit/s but speed depends on the hardware and software used. Latency is the delay that network creates during the transfer of data. Users have no or very little control over bandwidth and latency.
Chose the sentences that are False?
1) Data transfer rate is measured in bandwidth and latency.
2) The minimum throughput of data in bits per second is the latency.
3) Speed depends only on the hardware used.
4) Users can control the latency.
The operating system lets you ____________ software onto your computer.
The operating system lets you ____________ software onto your computer.
Select the best definition of the word “end user”:
1) A person who uses a product or service on a computer.
2) A person who writes computer programs.
3) A person who modifies computer programs.
4) A person who writes or modifies computer programs or applications.
Select the best definition of the word “end user”:
1) A person who uses a product or service on a computer.
2) A person who writes computer programs.
3) A person who modifies computer programs.
4) A person who writes or modifies computer programs or applications.
A software program that performs calculations on rows and columns of numbers is called a __________.
A software program that performs calculations on rows and columns of numbers is called a __________.
Read the text - Systems and network security. Which paragraph (A–E) says:
you should check addresses before you send emails?
Systems and network security:
-A- Only install and use software that the management has approved. Install the latest antivirus and antispyware tools. Keep current with security software updates and patches. Follow office health and safety standards.
-B- Choose a password that is difficult to guess: use between six and eight characters, have letters in upper and lower case and intermix letters, numbers and punctuation marks. Keep your password private. Change your password every nine weeks.
-C- Configure your email software to use secure protocols. Use company official email software only. Always double check that you are sending your message to the right recipient. Do not send sensitive data over the network. Use mail encryption to send sensitive data. Do not download unknown files or files for private use, such as movies and music.
-D- Transfer files via secure connection. Back up files regularly on the server in your home folder. Do not use external drives.
-E- Employees must tell their supervisor or IT help desk about any damage, misuse, irregularities or security breaches
Read the text - Systems and network security. Which paragraph (A–E) says:
you should check addresses before you send emails?
Systems and network security:
-A- Only install and use software that the management has approved. Install the latest antivirus and antispyware tools. Keep current with security software updates and patches. Follow office health and safety standards.
-B- Choose a password that is difficult to guess: use between six and eight characters, have letters in upper and lower case and intermix letters, numbers and punctuation marks. Keep your password private. Change your password every nine weeks.
-C- Configure your email software to use secure protocols. Use company official email software only. Always double check that you are sending your message to the right recipient. Do not send sensitive data over the network. Use mail encryption to send sensitive data. Do not download unknown files or files for private use, such as movies and music.
-D- Transfer files via secure connection. Back up files regularly on the server in your home folder. Do not use external drives.
-E- Employees must tell their supervisor or IT help desk about any damage, misuse, irregularities or security breaches
If you use your computer to write an essay and now want to edit a picture, you need to __________.
If you use your computer to write an essay and now want to edit a picture, you need to __________.
_______ you help me with the new database, please?
_______ you help me with the new database, please?
Do you want to know what the database is used for / to?
Do you want to know what the database is used for / to?
What sort of information does information technology help us work with? (Choose all correct answers.)
What sort of information does information technology help us work with? (Choose all correct answers.)
John designs networks. He’s a network ____________ .
John designs networks. He’s a network ____________ .
I’m a data _____ – I process data.
I’m a data _____ – I process data.