What is wrong?
What is wrong?
What is UML?
What is UML?
Select the best definition of the word "adware":
1) software designed to secretly access a computer system
2) software that automatically plays advertisements on a computer
3) computer software that secretly records information about which websites you visit and sends information about the use of your computer
4) software that replaces the user’s search engine with its own
Select the best definition of the word "adware":
1) software designed to secretly access a computer system
2) software that automatically plays advertisements on a computer
3) computer software that secretly records information about which websites you visit and sends information about the use of your computer
4) software that replaces the user’s search engine with its own
Select the best definition of the word “liveware”:
1) the physical equipment and components in а computer system
2) all people engaged in production of the computer and maintenance of its work
3) а program built into the circuitry of а RОМ that controls the operation of the computer
4) such term does not exists
Select the best definition of the word “liveware”:
1) the physical equipment and components in а computer system
2) all people engaged in production of the computer and maintenance of its work
3) а program built into the circuitry of а RОМ that controls the operation of the computer
4) such term does not exists
External drives, disks and magnetic tapes _____ .
1) protect the user in case of a disaster
2) are very popular data storage solutions
3) backs up files, folders or the entire contents of a hard drive
4) eliminates the risk of data loss as a result of fire, flood or theft
External drives, disks and magnetic tapes _____ .
1) protect the user in case of a disaster
2) are very popular data storage solutions
3) backs up files, folders or the entire contents of a hard drive
4) eliminates the risk of data loss as a result of fire, flood or theft
Select the best definition of the word "gateway":
1) an entrance to another computer network
2) the main computer on a network, which controls all the others
3) an organisation where you can keep your money safely until you need it
4) something telling you that something is definitely true or will definitely happen
Select the best definition of the word "gateway":
1) an entrance to another computer network
2) the main computer on a network, which controls all the others
3) an organisation where you can keep your money safely until you need it
4) something telling you that something is definitely true or will definitely happen
‘How _____ do they defrag their computers?’ ‘Every Monday morning.’
‘How _____ do they defrag their computers?’ ‘Every Monday morning.’
‘Why _____ we run the system check now?’ ‘That’s a good idea.’
‘Why _____ we run the system check now?’ ‘That’s a good idea.’
Is the software compatible ____________ our computers?
Is the software compatible ____________ our computers?
Select the best definition of the word "gateway":
1) an entrance to another computer network
2) the main computer on a network, which controls all the others
3) an organisation where you can keep your money safely until you need it
4) something telling you that something is definitely true or will definitely happen
Select the best definition of the word "gateway":
1) an entrance to another computer network
2) the main computer on a network, which controls all the others
3) an organisation where you can keep your money safely until you need it
4) something telling you that something is definitely true or will definitely happen
I don’t know how to access the information I need. _____ isn’t anything on the screen at the moment.
I don’t know how to access the information I need. _____ isn’t anything on the screen at the moment.
A program which is usually free but contains a virus is called a(n) ____________?
A program which is usually free but contains a virus is called a(n) ____________?
A software program that changes source code to machine code is a(n) __________.
A software program that changes source code to machine code is a(n) __________.
Please choose the correct spelling for:
The programmer that / who works with me is intelligent.
1) The programmer who works with me is intelligent
2) The programmer that works with me is intelligent
3) Both are incorrect
4) Both are correct
Please choose the correct spelling for:
The programmer that / who works with me is intelligent.
1) The programmer who works with me is intelligent
2) The programmer that works with me is intelligent
3) Both are incorrect
4) Both are correct
Select the best definition of the word "wireless access point":
1) a device that allows wireless devices to connect to a wireless network
2) a device that channels incoming data but maintains the bandwidth speed
3) a device that receives and delivers signals; it sends the digital signals further on in the network
4) a device that modulates or demodulates data into a digital or analog signal
Select the best definition of the word "wireless access point":
1) a device that allows wireless devices to connect to a wireless network
2) a device that channels incoming data but maintains the bandwidth speed
3) a device that receives and delivers signals; it sends the digital signals further on in the network
4) a device that modulates or demodulates data into a digital or analog signal
I’m a data _____ – I process data.
I’m a data _____ – I process data.
How many people can access the information ____________ the same time?
How many people can access the information ____________ the same time?
We’ve got _____ customers who shop for our products online.
We’ve got _____ customers who shop for our products online.
Read the text - Systems and network security. Which paragraph (A–E) says:
you cannot use external drives for backing up?
Systems and network security:
-A- Only install and use software that the management has approved. Install the latest antivirus and antispyware tools. Keep current with security software updates and patches. Follow office health and safety standards.
-B- Choose a password that is difficult to guess: use between six and eight characters, have letters in upper and lower case and intermix letters, numbers and punctuation marks. Keep your password private. Change your password every nine weeks.
-C- Configure your email software to use secure protocols. Use company official email software only. Always double check that you are sending your message to the right recipient. Do not send sensitive data over the network. Use mail encryption to send sensitive data. Do not download unknown files or files for private use, such as movies and music.
-D- Transfer files via secure connection. Back up files regularly on the server in your home folder. Do not use external drives.
-E- Employees must tell their supervisor or IT help desk about any damage, misuse, irregularities or security breaches.
Read the text - Systems and network security. Which paragraph (A–E) says:
you cannot use external drives for backing up?
Systems and network security:
-A- Only install and use software that the management has approved. Install the latest antivirus and antispyware tools. Keep current with security software updates and patches. Follow office health and safety standards.
-B- Choose a password that is difficult to guess: use between six and eight characters, have letters in upper and lower case and intermix letters, numbers and punctuation marks. Keep your password private. Change your password every nine weeks.
-C- Configure your email software to use secure protocols. Use company official email software only. Always double check that you are sending your message to the right recipient. Do not send sensitive data over the network. Use mail encryption to send sensitive data. Do not download unknown files or files for private use, such as movies and music.
-D- Transfer files via secure connection. Back up files regularly on the server in your home folder. Do not use external drives.
-E- Employees must tell their supervisor or IT help desk about any damage, misuse, irregularities or security breaches.
Read the text - Systems and network security. Which paragraph (A–E) says:
you can’t use personal email software?
Systems and network security:
-A- Only install and use software that the management has approved. Install the latest antivirus and antispyware tools. Keep current with security software updates and patches. Follow office health and safety standards.
-B- Choose a password that is difficult to guess: use between six and eight characters, have letters in upper and lower case and intermix letters, numbers and punctuation marks. Keep your password private. Change your password every nine weeks.
-C- Configure your email software to use secure protocols. Use company official email software only. Always double check that you are sending your message to the right recipient. Do not send sensitive data over the network. Use mail encryption to send sensitive data. Do not download unknown files or files for private use, such as movies and music.
-D- Transfer files via secure connection. Back up files regularly on the server in your home folder. Do not use external drives.
-E- Employees must tell their supervisor or IT help desk about any damage, misuse, irregularities or security breaches.
Read the text - Systems and network security. Which paragraph (A–E) says:
you can’t use personal email software?
Systems and network security:
-A- Only install and use software that the management has approved. Install the latest antivirus and antispyware tools. Keep current with security software updates and patches. Follow office health and safety standards.
-B- Choose a password that is difficult to guess: use between six and eight characters, have letters in upper and lower case and intermix letters, numbers and punctuation marks. Keep your password private. Change your password every nine weeks.
-C- Configure your email software to use secure protocols. Use company official email software only. Always double check that you are sending your message to the right recipient. Do not send sensitive data over the network. Use mail encryption to send sensitive data. Do not download unknown files or files for private use, such as movies and music.
-D- Transfer files via secure connection. Back up files regularly on the server in your home folder. Do not use external drives.
-E- Employees must tell their supervisor or IT help desk about any damage, misuse, irregularities or security breaches.