How to set up smartphones and PCs. Informational portal

File system (grade 8). Can different files have the same name? Whether the files have the same name

1. yes, if they have different volume

2. yes, if they have different creation dates

3. yes, if they are stored in different directories

4. no, they can't

5. yes, if they are created at different times of the day

QUESTION N 26. An archiver is called:

1. a program for reducing the information volume (compression) of files

2. file backup program

3. a program designed to store rarely used program files

4. a program that provides expansion of OS capabilities

5. a program to protect against computer viruses

QUESTION N 27. The archive file is:

1. a file that has not been used for a long time

2. copy protected file

3. file compressed with an archiver

4. tamper-proof file

5. a file infected with a computer virus

QUESTION N 28. An archive file can be:

2. unpack

3. run for execution

4. edit

QUESTION N 29. The degree of file compression depends on:

1. only on file type

2. only from the archiver program

3. on the type of file and archiver program

4. on computer performance

5. from the amount of RAM of the personal computer on which the file is being archived

QUESTION N 30. The archive file differs from the original file in that:

1. access to it takes less time

2. easier to protect against viruses

3. takes up less disk space

4. more convenient for editing

5.Easier to protect against unauthorized access

QUESTION N 31. Computer virus programs:

1. occur as a result of failures in computer hardware

2. written specifically to harm PC users

3. have a biological origin

4. are the result of errors in the operating system

5. are a side effect of software development

QUESTION N 32. Distinctive features of a computer virus are:

1. ease of recognition and destruction

2. a significant amount of program code

3. small amount of program code

4. the ability to independently launch and repeatedly copy the code, to interfere with the correct

computer work

5. small amount of program code and the ability to run independently and repeatedly

copying code, interfering with the correct operation of the computer

QUESTION N 33. For convenience of work and systematization of data, files are grouped into:

1. directories

2. clusters

3. sectors

4. tracks

304. Algorithmization

QUESTION N 1. An algorithm is called:

1. a detailed list of rules for performing certain actions

2. directed graph indicating the order of execution of a certain set of commands

3. sequence of commands for the computer

4. description of the sequence of actions in the form of geometric shapes connected by lines and arrows

5. a clear and precise instruction to the performer to perform a sequence of actions aimed at

achievement of goals

QUESTION N 2. The properties of the algorithm are:

1. relevance, usefulness, reliability, understandability, mass character

2. novelty, unambiguity, clarity, clarity, effectiveness

3. clarity, unambiguity, mass character, discreteness

4. discreteness, effectiveness, understandability, mass character, reliability

5. discreteness, effectiveness, determinability (accuracy), mass character, understandability

QUESTION N 3. The property of the algorithm "effectiveness" means:

1. with the exact execution of all commands of the algorithm, the process must stop in a finite number of steps,

leading to a certain result

2. the algorithm must have a discrete structure (it must be divided into a sequence of separate

3. when writing an algorithm for a specific performer, you can use only those commands that are included in

his command system

4. the algorithm must provide a solution to a certain class of problems of a given type for various values

QUESTION N 4. The property of the algorithm "discreteness" means:

1. the algorithm should provide a solution not to one specific problem, but to a certain class of problems of a given

2. with the exact execution of all the commands of the algorithm, the process should lead to a certain result

3. the algorithm must consist of a sequence of a finite number of steps

4. the algorithm should be focused on a specific performer and contain commands included in the system

his commands

5. The executor of the algorithm should not make decisions that are not provided by the compiler of the algorithm

End of work -

This topic belongs to:

Information and information processes

Question n The term informatization of society means .. an increase in the amount of redundant information circulating in society .. an increase in the role of the media ..

If you need additional material on this topic, or you did not find what you were looking for, we recommend using the search in our database of works:

What will we do with the received material:

If this material turned out to be useful for you, you can save it to your page on social networks:

All topics in this section:

Map a property of information to its definition
1. Information that does not depend on personal opinion or judgment is called 2. Information that reflects the true state of affairs is called 3. Information that is important at present

The main reason for the transfer of human information resources to electronic
carriers: 1. the policy of the governments of the most developed countries 2. the objective need to increase the speed of information processing 3. the pursuit of superprofits

third generation computer
1. had semiconductor elements as an element base; algorithmic programming languages ​​were used; 2. had electron tubes as an element base; programming

Symbols (the number of code symbols must be equal to the number of letters in the word)?
1. hood 2. tree 3. field 4. bye 5. foot QUESTION N 7. Pixel is: 1. binary code of graphic information 2. binary

Ascending?
1. byte, kilobyte, megabyte, bit 2. kilobyte, byte, bit, megabyte 3. byte, megabyte, kilobyte, gigabyte 4. megabyte, kilobyte, gigabyte, byte 5. byte, kilobyte,

Multi-wire line for information exchange between computer devices
is called: 1. plotter 2. controller 3. trunk 4. modem 5. provider QUESTION N 4. The laser printer has

The backbone-modular principle of the architecture of modern personal
computer implies such a logical organization of its hardware components, in which: 1. each device communicates directly with others 2. each device

For long-term storage of information
1. random access memory 2. processor 3. external media 4. disk drive 5. power supply QUESTION N 15. When the computer is disconnected from the network, information disappears

A set of interrelated programs that provides the user with a convenient way
communication with programs is called: 1. utility 2. interface 3. translator 4. driver 5. interpreter QUESTION N

Algorithmic construction that assumes the implementation of either one or the other
action depending on the truth or falsity of a certain condition is called: 1. linear 2. branching 3. cyclic 4. recursive

An object, process or phenomenon that has a unique name and represents
a single whole is called: 1. model 2. object 3. algorithm 4. value 5. identifier QUESTION N 2. Modeling

Representation of essential properties and features of an object in the selected form
is called: 1. modeling 2. systematization 3. coding 4. formalization 5. presentation QUESTION N 4. Model -

To information models that describe the organization of the educational process in
college, include: 1. class magazine 2. list of visual teaching aids 3. list of college students 4. list of textbooks

The file system of a personal computer can most adequately be described
in the form of: 1. tabular model 2. graphical model 3. hierarchical model 4. natural model 5. mathematical model

To the negative consequences of the development of modern information and
communication technologies include: 1. formation of a single information space 2. work with information becomes the main content of the profession

Software in the following areas
1. protection against equipment failures 2. protection against accidental loss of information 3. protection against deliberate distortion 4. development of a legal framework for combating crime

Choose a phrase whose spelling follows the typing rules for
computer: 1. A man walks quietly through the snow. Snow is falling, falling, falling 2. A man walks quietly through the snow. Falling, falling, falling snow 3. People are in a hurry, no to them

1. yes, if they have different volume

2. yes, if they have different creation dates

3. yes, if they are stored in different directories

4. no, they can't

5. yes, if they are created at different times of the day

QUESTION N 26. An archiver is called:

1. a program for reducing the information volume (compression) of files

2. file backup program

3. a program designed to store rarely used program files

4. a program that provides expansion of OS capabilities

5. a program to protect against computer viruses

QUESTION N 27. The archive file is:

1. a file that has not been used for a long time

2. copy protected file

3. file compressed with an archiver

4. tamper-proof file

5. a file infected with a computer virus

QUESTION N 28. An archive file can be:

2. unpack

3. run for execution

4. edit

QUESTION N 29. The degree of file compression depends on:

1. only on file type

2. only from the archiver program

3. on the type of file and archiver program

4. on computer performance

5. from the amount of RAM of the personal computer on which the file is being archived

QUESTION N 30. The archive file differs from the original file in that:

1. access to it takes less time

2. easier to protect against viruses

3. takes up less disk space

4. more convenient for editing

5.Easier to protect against unauthorized access

QUESTION N 31. Computer virus programs:

1. occur as a result of failures in computer hardware

2. written specifically to harm PC users

3. have a biological origin

4. are the result of errors in the operating system

5. are a side effect of software development

QUESTION N 32. Distinctive features of a computer virus are:

1. ease of recognition and destruction

2. a significant amount of program code

3. small amount of program code

4. the ability to independently launch and repeatedly copy the code, to interfere with the correct

computer work

5. small amount of program code and the ability to run independently and repeatedly

copying code, interfering with the correct operation of the computer

QUESTION N 33. For convenience of work and systematization of data, files are grouped into:

1. directories

2. clusters

3. sectors

4. tracks

304. Algorithmization

QUESTION N 1. An algorithm is called:

1. a detailed list of rules for performing certain actions

2. directed graph indicating the order of execution of a certain set of commands

3. sequence of commands for the computer

4. description of the sequence of actions in the form of geometric shapes connected by lines and arrows

5. a clear and precise instruction to the performer to perform a sequence of actions aimed at

achievement of goals

QUESTION N 2. The properties of the algorithm are:

1. relevance, usefulness, reliability, understandability, mass character

2. novelty, unambiguity, clarity, clarity, effectiveness

3. clarity, unambiguity, mass character, discreteness

4. discreteness, effectiveness, understandability, mass character, reliability

5. discreteness, effectiveness, determinability (accuracy), mass character, understandability

QUESTION N 3. The property of the algorithm "effectiveness" means:

1. with the exact execution of all commands of the algorithm, the process must stop in a finite number of steps,

leading to a certain result

2. the algorithm must have a discrete structure (it must be divided into a sequence of separate

3. when writing an algorithm for a specific performer, you can use only those commands that are included in

his command system

4. the algorithm must provide a solution to a certain class of problems of a given type for various values

QUESTION N 4. The property of the algorithm "discreteness" means:

1. the algorithm should provide a solution not to one specific problem, but to a certain class of problems of a given

2. with the exact execution of all the commands of the algorithm, the process should lead to a certain result

3. the algorithm must consist of a sequence of a finite number of steps

4. the algorithm should be focused on a specific performer and contain commands included in the system

his commands

5. The executor of the algorithm should not make decisions that are not provided by the compiler of the algorithm

Differentiated offset

by discipline Informatics

Test

a) Russian language

b) English

c) sign language

d) programming language

2. Database is:

a) directory

b) directories

c) programs

c) saving computer memory

a) Copy

b) Move

c) Delete

d) Refresh

a) on the hard drive

b) in the processor

c) in RAM

How much information does one digit of an octal number contain?

9. The file extension, as a rule, characterizes:

a) a program in which the file can be opened

b) file size

c) the space occupied by the file on the disk

d) the type of information contained in the file

10. The information model of the network structure of the database is:

a) Moscow metro map

b) computer file system

c) periodic table

d) Internet computer network model

11. Automated information processing:

a) is possible only if there are strict formal rules for its processing

b) possible without strict formal rules for its processing

c) is feasible only if the semantic significance of the information being processed

d) only possible if it can be represented in analog form

12. The top of the hierarchical folder system of the Windows GUI is the folder:

a) My documents

b) My computer

c) Desktop

d) Network environment

13. All possible combinations of input truth values, together with the output truth values ​​for each of these combinations, form:

a) register

b) logic element

c) truth table

d) trigger

14. Measurement of temperature, pressure, humidity is:

a) information use process

b) information acquisition process

c) communication process

d) information storage process

15. The minimum element of the display screen is called:

b) pixel

d) phosphor grain

16. What does not apply to the technical means of telecommunications:

a) concentrator

c) router

d) communicator

17. In the process of formatting a paragraph, the following are set:

a) type and size of font

b) headers, hyphens

c) margins, paper orientation

d) alignment, padding, spacing

18. What is not an archiver program:

Which of the file specifications is correct?

c) c:\kat\book.txt

d) a:\d:\book.doc

20. The main element base of the fourth generation computers are:

a) vacuum tubes

b) VLSI (microprocessors)

c) electromechanical circuits

d) semiconductors

21. Which elements of the table store the database data:

a) in columns

b) in lines

c) in cells

d) in records

22. The archive file differs from the original one in that:

a) access to it takes less time

b) it is easier to defend against viruses

c) it is easier to protect against unauthorized access

d) it takes up less disk space

Which pattern describes all files that have a .com extension?

24. Translation of the text from English into Russian can be called:

a) communication process

b) information storage process

c) information acquisition process

d) information processing

25. Which of the following characters can be used in a file name:

a) underscore " "

b) more, less" < > "

c) asterisk " * "

d) question mark " ? "

26. Information that does not depend on personal opinion or judgment is called:

b) objective

c) up to date

d) credible

27. The advantage of the binary number system is that:

a) electronic elements with 2 states are the easiest to implement

b) 2-state electronics consume less electricity

c) binary code saves computer memory

d) binary code does not cause computer crashes

A message has been received with a data size of 32 bits. What is this amount in bytes?

29. The main functions of text editing are:

a) selection of text fragments

b) preview text before printing

c) text input, correction, insertion, deletion, copying, moving text fragments

d) setting line spacing

30. The main unit of measurement of the amount of information in the EWT is:

31. In the positional number system:

a) the meaning of each sign in a number does not depend on the position that the sign occupies in the notation of the number

b) exactly one character is used to write numbers

c) the meaning of each sign in the number depends on the position that the sign occupies in the notation of the number

d) the quantitative equivalent of the meaning of each symbol does not depend on its position in the number code

32. Model is:

a) an object substitute reflecting its spatial and temporal characteristics

b) a certain description of the studied object, process, phenomenon by means of fine arts

c) a set of objects and relationships that reflect the essential aspects of the object, phenomenon or process under study

d) a fantastic image of reality

33. Primitives in the graphics editor are:

a) operations performed on files containing images created in a graphics editor

b) the simplest figures drawn with special tools
graphic editor

c) graphics editor operating modes

d) graphics editor environment

34. In a text editor, when setting page parameters, the following are set:

a) style, pattern

b) typeface, size, style

c) margins, orientation

d) indent, spacing

35. An example of a hierarchical database is:

a) directory of files stored on disk

b) class magazine page

c) spreadsheet

d) train schedule

Is it a database entry?

a) table column

b) set of the same type of data

c) some indicator that characterizes by numerical, textual or other value

d) table row

37. In the theory of coding and message transmission, a bit is:

a) the information content of any message

b) latin character

c) eight-bit binary code to encode one character

d) binary alphabet character (0 or 1)

38. Processor clock speed is:

a) the rate at which information is exchanged between the processor and read-only memory (ROM).

b) the number of cycles performed by the processor per unit of time

c) the number of possible processor accesses to RAM per unit of time

d) the speed of information exchange between the processor and the drive

39. Driver is:

a) installation disk

b) antivirus program

c) a program that ensures the operation of a computer device

d) computer input/output device

40. The emergence of the possibility of effective automation of information processing is associated with the invention:

a) electronic computers

b) writing

c) typography

d) telephone, telegraph, radio, television

41. Computer speed depends on:

a) the amount of information processed

b) external storage capacity

c) the clock frequency of information processing in the processor

d) organization of the operating system interface

What is the excess number?

a) 377 (8)

b) 11011011 (2)

c) FF (16)

d) 226 (10)

76. The first computer program was written by:

a) Ada Lovelace

b) Howard Aiken

c) Bill Gates

d) Charles Babbage

77. What is the peculiarity of the "counter" field?

a) is used to enter real numbers

b) has the property of auto-growing

c) is used to enter numerical data

d) has a limited size

78. Select from the given entries an indication of absolute addressing:

79. A group of 4 cells has been selected in the spreadsheet. These can be cells:

80. A device that performs arithmetic and logical operations and controls other PC devices:

a) controller

b) keyboard

c) processor

d) monitor

81. In spreadsheets, you cannot delete:

b) Cell content

c) Column

d) Cell name

What is redundant here?

a) network databases

b) relational databases

c) distributed databases

d) hierarchical databases

83. The operating system is part of:

a) programming systems

b) application software

c) system software

d) unique software

84. The input device is intended for:

a) input processing

b) receiving, converting and transmitting information to a computer

c) transferring information from a person to a computer

d) implementation of algorithms for processing, accumulation and transmission of information

The master in a DB is?

a) the mode in which the construction of the form, reports, queries is carried out

b) a software module for performing any operations

c) software module for the output of transactions

d) the mode in which the table or form is displayed

91. The "START" button is located:

a) on the taskbar

b) on the desktop

c) in the Control Panel

d) in the System menu

92. Deformation of the image when changing the size of the picture -
flaw:

a) fractal graphics

b) vector graphics

c) bitmap graphics

d) structural graphics

93. A mathematics textbook contains information of the following types:

a) text information only

b) purely numerical information

c) graphic, textual and numerical

d) graphic, sound and numerical

What is 1 MB equal to?

a) 1024 bytes

b) 1000000 bits

c) 1024 KB

d) 1000000 bytes

116. During the loading of the operating system, the following occurs:

b) copy operating system files from CD-ROM to hard drive

c) copy operating system files from floppy disk to processor

d) copying the contents of RAM to the hard drive

117. Computer simulation of a nuclear explosion is necessary for:

a) conducting real research on the processes occurring in nature during and after the explosion

b) obtaining reliable data on the impact of the explosion on human health

c) experimental verification of the effect of high temperature and irradiation on natural objects

d) reduce the cost of research and ensure the safety of employees

118. Choose the most correct definition of a DBMS:

a) a set of programs that ensures the operation of all hardware devices of a computer and user access to them

b) a set of programs that support filling and manipulating data in the database

c) application program for processing data sets

d) an operating system shell that allows you to work more comfortably with database files

119. The most common in practice are:

a) network databases

b) relational databases

c) distributed databases

d) hierarchical databases

The form in a DB is?

a) a user-created graphical interface for entering data into the database

b) user-created table

c) the created data entry table in the database

d) the result of working with the database

What is 1 KB equal to?

a) 10 3 bytes

Differentiated offset

by discipline Informatics

study groups 11KB, 12TB, 14PP

Test

1. Formal languages ​​include:

a) Russian language

b) English

c) sign language

d) programming language

2. Database is:

a) an interface that supports populating and manipulating data

b) a set of interconnected data about some object organized and stored on an external medium in a special way

c) a set of programs for storing and processing large amounts of information

d) a certain amount of information

In what case can different files have the same name?

a) if they are stored in different directories

b) if they are created at different times of the day

c) if they have different volume

d) if they are created on different days

4. Information from RAM can be stored on an external storage device in the form:

a) directory

b) directories

c) programs

5. The advantages of the binary number system include:

a) clarity and comprehensibility of writing a number in the binary system

b) the simplicity of the operations performed and the possibility of automatic processing of information using only two states of computer elements

c) saving computer memory

d) widespread use of the named system in everyday life

a) Copy

b) Move

c) Delete

d) Refresh

7. During execution, the application program is stored:

a) on the hard drive

b) in the processor

c) in RAM

Top Related Articles