Do the files have the same names. File system (8th grade). The file extension usually characterizes

1. yes, if they have different volumes

2. yes, if they have different creation dates

3. yes, if they are stored in different directories

4. no, they can’t

5. yes, if they are created at different times of the day

QUESTION N 26. An archiver is called:

1. a program for reducing the information volume (compression) of files

2. file backup program

3. a program designed to store rarely used program files

4. a program that expands the capabilities of the OS

5. program for protection against computer viruses

QUESTION N 27. The archive file is:

1. file that has not been used for a long time

2. file protected from copying

3. file compressed using an archiver

4. file protected from unauthorized access

5. file infected with a computer virus

QUESTION N 28. The archive file can be:

2. unpack

3. run for execution

4. edit

QUESTION N 29. The degree of file compression depends on:

1. only depending on the file type

2. only from the archiver program

3. depending on the file type and archiver program

4. on computer performance

5. on the amount of RAM of the personal computer on which the file is archived

QUESTION N 30. The archive file differs from the original file in that:

1. It takes less time to access it

2. Easier to protect against viruses

3. takes up less disk space

4. more convenient for editing

5. Easier to protect against unauthorized access

QUESTION N 31. Computer virus programs:

1. arise as a result of failures in computer hardware

2. are written specifically to harm PC users

3. have a biological origin

4. are a consequence of errors in the operating system

5. are a side effect of software development

QUESTION N 32. The distinctive features of a computer virus are:

1. ease of recognition and destruction

2. significant amount of program code

3. small amount of program code

4. the ability to independently launch and repeatedly copy code, to interfere with the correct

computer work

5. small amount of program code and the ability to run independently and repeatedly

copying code, interfering with the correct operation of the computer

QUESTION N 33. For ease of work and systematization of data, files are grouped into:

1. catalogs

2. clusters

3. sectors

4. tracks

304. Algorithmization

QUESTION N 1. The algorithm is called:

1. a detailed list of rules for performing certain actions

2. directed graph indicating the order of execution of a certain set of commands

3. sequence of commands for the computer

4. description of a sequence of actions in the form of geometric shapes connected by lines and arrows

5. a clear and precise instruction to the performer to perform a sequence of actions aimed at

achieving your goals

QUESTION N 2. The properties of the algorithm are:

1. relevance, usefulness, reliability, understandability, mass appeal

2. novelty, unambiguity, clarity, understandability, effectiveness

3. clarity, unambiguity, mass, discreteness

4. discreteness, effectiveness, understandability, mass distribution, reliability

5. discreteness, effectiveness, determinability (accuracy), mass distribution, understandability

QUESTION N 3. The property of the algorithm “effectiveness” means:

1. with the exact execution of all commands of the algorithm, the process must stop in a finite number of steps,

leading to a certain result

2. the algorithm must have a discrete structure (must be divided into a sequence of individual

3. when writing an algorithm for a specific performer, you can use only those commands that are included in

his command system

4. the algorithm must provide a solution to a certain class of problems of this type for various values

QUESTION N 4. The “discreteness” property of the algorithm means:

1. the algorithm must provide a solution not to one specific problem, but to a certain class of problems of a given

2. with accurate execution of all commands of the algorithm, the process must lead to a certain result

3. the algorithm must consist of a sequence of a finite number of steps

4. the algorithm must be focused on a specific performer and contain commands included in the system

his commands

5. the executor of the algorithm should not make decisions not provided for by the compiler of the algorithm

End of work -

This topic belongs to the section:

Information and information processes

Question n The term informatization of society means.. an increase in the amount of redundant information circulating in society.. the increasing role of the media..

If you need additional material on this topic, or you did not find what you were looking for, we recommend using the search in our database of works:

What will we do with the received material:

If this material was useful to you, you can save it to your page on social networks:

All topics in this section:

Establish a correspondence between a property of information and its definition
1. Information that does not depend on personal opinion or judgment is called 2. Information that reflects the true state of affairs is called 3. Information that is important in the present day

The main reason for the transfer of human information resources to electronic
carriers: 1. policies of governments of the most developed countries 2. objective need to increase the speed of information processing 3. pursuit of excess profits

Third generation computer
1. had semiconductor elements as an elemental base; algorithmic programming languages ​​were used;

2. had electronic tubes as an elemental base; programming
Characters (the number of code characters must be equal to the number of letters of the word)?

1. hood 2. tree 3. field 4. while 5. foot QUESTION N 7. Pixel is: 1. binary code of graphic information 2. binary
Increasing?

1. byte, kilobyte, megabyte, bit 2. kilobyte, byte, bit, megabyte 3. byte, megabyte, kilobyte, gigabyte 4. megabyte, kilobyte, gigabyte, byte 5. byte, kilobyte,
Multiwire line for information exchange between computer devices

called: 1. plotter 2. controller 3. bus 4. modem 5. provider QUESTION N 4. A laser printer has
The backbone-modular principle of the architecture of modern personal

computers implies such a logical organization of its hardware components in which: 1. each device communicates directly with others 2. each device
For long-term storage of information it is used

1. RAM 2. processor 3. external media 4. disk drive 5. power supply QUESTION N 15. When the computer is disconnected from the network, the information is lost
A set of interconnected programs that provides the user with a convenient way

communication with programs is called: 1. utility 2. interface 3. translator 4. driver 5. interpreter QUESTION N
An algorithmic design that assumes the execution of either one or the other

actions depending on the truth or falsity of some condition is called: 1. linear 2. branching 3. cyclic 4. recursive
An object, process or phenomenon that has a unique name and represents

Presentation of essential properties and characteristics of an object in the selected form
called: 1. modeling 2. systematization 3. coding 4. formalization 5. presentation QUESTION N 4. Model -

To information models describing the organization of the educational process in
technical school, can be attributed to: 1. class magazine 2. list of visual teaching aids 3. list of technical school students 4. list of textbooks

The file system of a personal computer can most adequately be described
in the form of: 1. tabular model 2. graphical model 3. hierarchical model 4. full-scale model 5. mathematical model

To the negative consequences of the development of modern information and
communication technologies include: 1. the formation of a unified information space 2. working with information becomes the main content of a professional

Software in the following areas
1. protection against equipment failures 2. protection against accidental loss of information 3. protection against intentional distortion 4. development of a legal framework to combat crime

Select a phrase whose spelling corresponds to the typing rules on
computer: 1. A man walks quietly through the snow. Snow is falling, falling, falling 2. A man walks quietly through the snow. The snow is falling, falling, falling 3. People are in a hurry, no to them

1. yes, if they have different volumes

2. yes, if they have different creation dates

3. yes, if they are stored in different directories

4. no, they can’t

5. yes, if they are created at different times of the day

QUESTION N 26. An archiver is called:

1. a program for reducing the information volume (compression) of files

2. file backup program

3. a program designed to store rarely used program files

4. a program that expands the capabilities of the OS

5. program for protection against computer viruses

QUESTION N 27. The archive file is:

1. file that has not been used for a long time

2. file protected from copying

3. file compressed using an archiver

4. file protected from unauthorized access

5. file infected with a computer virus

QUESTION N 28. The archive file can be:

2. unpack

3. run for execution

4. edit

QUESTION N 29. The degree of file compression depends on:

1. only depending on the file type

2. only from the archiver program

3. depending on the file type and archiver program

4. on computer performance

5. on the amount of RAM of the personal computer on which the file is archived

QUESTION N 30. The archive file differs from the original file in that:

1. It takes less time to access it

2. Easier to protect against viruses

3. takes up less disk space

4. more convenient for editing

5. Easier to protect against unauthorized access

QUESTION N 31. Computer virus programs:

1. arise as a result of failures in computer hardware

2. are written specifically to harm PC users

3. have a biological origin

4. are a consequence of errors in the operating system

5. are a side effect of software development

QUESTION N 32. The distinctive features of a computer virus are:

1. ease of recognition and destruction

2. significant amount of program code

3. small amount of program code

4. the ability to independently launch and repeatedly copy code, to interfere with the correct

computer work

5. small amount of program code and the ability to run independently and repeatedly

copying code, interfering with the correct operation of the computer

QUESTION N 33. For ease of work and systematization of data, files are grouped into:

1. catalogs

2. clusters

3. sectors

4. tracks

304. Algorithmization

QUESTION N 1. The algorithm is called:

1. a detailed list of rules for performing certain actions

2. directed graph indicating the order of execution of a certain set of commands

3. sequence of commands for the computer

4. description of a sequence of actions in the form of geometric shapes connected by lines and arrows

5. a clear and precise instruction to the performer to perform a sequence of actions aimed at

achieving your goals

QUESTION N 2. The properties of the algorithm are:

1. relevance, usefulness, reliability, understandability, mass appeal

2. novelty, unambiguity, clarity, understandability, effectiveness

3. clarity, unambiguity, mass, discreteness

4. discreteness, effectiveness, understandability, mass distribution, reliability

5. discreteness, effectiveness, determinability (accuracy), mass distribution, understandability

QUESTION N 3. The “effectiveness” property of the algorithm means:

1. with the exact execution of all commands of the algorithm, the process must stop in a finite number of steps,

leading to a certain result

2. the algorithm must have a discrete structure (must be divided into a sequence of individual

3. when writing an algorithm for a specific performer, you can use only those commands that are included in

his command system

4. the algorithm must provide a solution to a certain class of problems of this type for various values

QUESTION N 4. The “discreteness” property of the algorithm means:

1. the algorithm must provide a solution not to one specific problem, but to a certain class of problems of a given

2. with accurate execution of all commands of the algorithm, the process must lead to a certain result

3. the algorithm must consist of a sequence of a finite number of steps

4. the algorithm must be focused on a specific performer and contain commands included in the system

his commands

5. the executor of the algorithm should not make decisions not provided for by the compiler of the algorithm

Each storage medium (magnetic and optical disks, flash memory cards) can store a large number of files. The order in which files are stored on disk is determined by the file system used.

Single-level file system.
For disks with a small number of files (up to several dozen) can be used single-level file system, when the disk directory (disk table of contents) is a linear sequence of file names and corresponding starting sector numbers. Such a catalog can be compared to the table of contents of a children's book, which contains the titles of individual stories and page numbers.

Multi-level file system.
If thousands and tens of thousands of files are stored on the media, then for ease of searching the files are stored in multi-level file system, which is a system of nested folders. Each folder can contain other folders as well as files.

The Windows operating system uses a multi-level hierarchical file system, where a folder or file can only be included in one top-level folder.

The Linux operating system uses a multi-level, but not hierarchical file system, where a folder or file can be included in several folders at once.

Names of disks and logical disk partitions in the Windows operating system.
In the Windows operating system, each disk or logical disk partition has a logical name, denoted by Latin letters followed by a colon. C:, D:, E:, etc. - names of hard drives and their logical partitions. Devices with removable media: A: - name of the floppy disk, then the names of optical disks, then USB flash drives.

The top level folder for the disk is The root folder, which is indicated by adding a forward slash “\” to the disk name, for example, the designation of the root folder of a floppy disk looks like this: A:\

Names of disks and logical disk partitions in the Linux operating system.
In the Linux operating system, each disk or logical disk partition also has logical name. Hard drives and their logical partitions are designated in Latin letters with serial partition numbers:

  • hda1, hda2, etc. (these logical partitions belong to the first hard drive);
  • hdb1, hdb2, etc. (these logical partitions belong to the second hard drive), etc.

An important difference between the Linux operating system and the Windows operating system is that folders on disks and their logical partitions do not belong to the top level of the file system. These folders are “mounted” into the mnt folder, which in turn is included in the top-level Root folder.

In the Linux operating system, optical CDs and DVDs, USB flash drives, and a floppy disk drive are “mounted” in the media folder, which is also included in the top-level Root folder.

The path to the file.
How to find files in a multi-level file system? To do this, you need to specify the path to the file. The file path begins with the logical drive name in the Windows operating system or the top-level root folder in the Linux operating system. Then a sequence of names of folders nested within each other is recorded, the last of which contains the desired file.

Let's look at a specific example of a hierarchical file system in the Windows operating system. Let the root folder of drive A: have two first-level subfolders (Documents and Pictures), and the Pictures folder have one second-level subfolder (Photos). At the same time, in the Documents folder there is a file Essay.doc, and in the Photos folder there is a Class.bmp file.

Disk and folder names are written using the “\” separator. The paths to the files Composition.doc and Class.bmp can be written as follows:
A:\Documents
A:\Images\Photos\

The path to the file along with the file name is sometimes called full file name, For example:
A:\Documents\Essay.doc
A:\Images\Photo\Class.bmp

In Linux and Mac OS operating systems, full file names use the “/” (forward slash) character as a delimiter.

Control questions:

  1. What parts does a file path consist of? Full file name?
  2. What is the difference between flat and hierarchical file systems?
  3. Explain the difference between the concepts of "directory" and "folder".
  4. Can multiple files have the same name?

Tasks:

Differentiated credit

by discipline Computer science

Test

a) Russian language

b) English

c) sign language

d) programming language

2. Database is:

a) catalog

b) directories

c) programs

c) saving computer memory

a) Copy

b) Move

c) Delete

d) Update

a) on the hard drive

b) in the processor

c) in RAM

How much information does one digit of an octal number contain?

9. The file extension, as a rule, characterizes:

a) a program in which the file can be opened

b) file size

c) space occupied by the file on disk

d) type of information contained in the file

10. The information model of the database network structure is:

a) Moscow metro map

b) computer file system

c) periodic table

d) Internet computer network model

11. Automated information processing:

a) is possible only if there are strict formal rules for its processing

b) is possible without strict formal rules for its processing

c) feasible only if the information being processed has semantic significance

d) is only possible if it is representable in analog form

12. The top of the Windows GUI folder hierarchy is the folder:

a) My documents

b) My computer

c) Desktop

d) Network environment

13. All possible combinations of truth values ​​of input signals, together with truth values ​​of the output signal for each of these combinations, form:

a) register

b) logic element

c) truth table

d) trigger

14. Measurement of temperature, pressure, humidity is:

a) process of using information

b) process of obtaining information

c) information transfer process

d) information storage process

15. The minimum element of a display screen is called:

b) pixel

d) phosphor grain

16. What does not apply to technical means of telecommunications:

a) hub

c) router

d) communicator

17. In the process of formatting a paragraph, the following are specified:

a) type and size of font

b) headers and footers, hyphens

c) margins, paper orientation

d) alignment, indentation, spacing

18. What is not an archiver program:

Which file specification is correct?

c) c:\kat\kniga.txt

d) a:\d:\kniga.doc

20. The main element base of fourth generation computers are:

a) vacuum tubes

b) VLSI (microprocessors)

c) electromechanical circuits

d) semiconductors

21. In which table elements are database data stored:

a) in columns

b) in lines

c) in cells

d) in records

22. The archive file differs from the original one in that:

a) accessing it takes less time

b) it is easier to protect against viruses

c) it is easier to protect against unauthorized access

d) it takes up less disk space

Which pattern describes all files with the extension com?

24. Translation of text from English into Russian can be called:

a) information transfer process

b) information storage process

c) process of obtaining information

d) information processing process

25. Which of the following characters can be used in a file name:

a) underscore " "

b) more, less" < > "

c) asterisk " * "

d) question mark " ? "

26. Information that does not depend on personal opinion or judgment is called:

b) objective

c) current

d) reliable

27. The advantage of the binary number system is that:

a) electronic elements with 2 states are the simplest to implement

b) electronic elements with 2 states consume less electricity

c) binary code saves computer memory

d) binary code does not cause computer crashes

A message has been received with an information volume of 32 bits. What is this volume in bytes?

29. The main functions of text editing are:

a) highlighting text fragments

b) review the text before printing

c) text entry, correction, insertion, deletion, copying, moving text fragments

d) setting line spacing

30. The following is accepted as the basic unit of measurement of the amount of information in EVT:

31. In the positional number system:

a) the meaning of each sign in a number does not depend on the position occupied by the sign in the number record

b) exactly one symbol is used to write numbers

c) the meaning of each sign in a number depends on the position occupied by the sign in the number record

d) the quantitative equivalent of the value of each symbol does not depend on its position in the number code

32. Model is:

a) a substitute for an object, reflecting its spatiotemporal characteristics

b) a specific description of the studied object, process, phenomenon using the means of fine art

c) a set of objects and relationships that reflect the essential aspects of the object, phenomenon or process being studied

d) a fantastic image of reality

33. The primitives in the graphic editor are:

a) operations performed on files containing images created in a graphics editor

b) simple figures drawn using special tools
graphic editor

c) operating modes of the graphic editor

d) graphic editor environment

34. In a text editor, when setting page parameters, the following are set:

a) style, pattern

b) typeface, size, style

c) margins, orientation

d) indentation, spacing

35. An example of a hierarchical database is:

a) directory of files stored on disk

b) class magazine page

c) spreadsheet

d) train schedule

What is a database entry?

a) table column

b) a set of similar data

c) some indicator that characterizes with a numerical, text or other value

d) table row

37. In the theory of coding and message transmission, a bit is:

a) the information volume of any message

b) symbol of the Latin alphabet

c) eight-bit binary code for encoding one character

d) binary alphabet character (0 or 1)

38. Processor clock speed is:

a) the speed of information exchange between the processor and read-only memory (ROM).

b) the number of clock cycles performed by the processor per unit time

c) the number of possible processor accesses to RAM per unit time

d) speed of information exchange between the processor and the disk drive

39. A driver is:

a) installation disk

b) antivirus program

c) a program that ensures the operation of a computer device

d) computer input/output device

40. The emergence of the possibility of effective automation of information processing is associated with the invention:

a) electronic computers

b) writing

c) printing

d) telephone, telegraph, radio, television

41. The speed of a computer depends on:

a) the volume of information processed

b) external storage capacity

c) clock frequency of information processing in the processor

d) organization of the operating system interface

Which number is the odd one out?

a) 377 (8)

b) 11011011 (2)

c) FF (16)

d) 226 (10)

76. The first computer program was written:

a) Ada Lovelace

b) Howard Aiken

c) Bill Gates

d) Charles Babbage

77. What is special about the “counter” field?

a) is used to enter real numbers

b) has the property of automatic growth

c) serves to enter numeric data

d) has a limited size

78. Select from the given entries an indication of absolute addressing:

79. A group of 4 cells has been selected in a spreadsheet. These can be cells:

80. A device that performs arithmetic and logical operations and controls other PC devices:

a) controller

b) keyboard

c) processor

d) monitor

81. In spreadsheets you cannot delete:

b) Cell contents

c) Column

d) Cell name

What's missing here?

a) network databases

b) relational databases

c) distributed databases

d) hierarchical databases

83. The operating system includes:

a) programming systems

b) application software

c) system software

d) unique software

84. The input device is intended for:

a) processing of input data

b) receiving, converting and transmitting information to a computer

c) transfer of information from person to computer

d) implementation of algorithms for processing, accumulation and transmission of information

Is this a master in the database?

a) the mode in which the form, reports, queries are built

b) a software module for performing any operations

c) software module for outputting operations

d) the mode in which the table or form is output

91. The “START” button is located:

a) on the taskbar

b) on the desktop

c) in the Control Panel

d) in the System Menu

92. Deformation of the image when changing the size of the picture –
flaw:

a) fractal graphics

b) vector graphics

c) raster graphics

d) structure graphics

93. A mathematics textbook contains the following types of information:

a) text information only

b) purely numerical information

c) graphic, text and numeric

d) graphic, sound and numerical

What is 1 MB equal to?

a) 1024 bytes

b) 1000000 bits

c) 1024 KB

d) 1000000 bytes

116. During the loading process of the operating system, the following occurs:

b) copying operating system files from CD-ROM to hard drive

c) copying operating system files from the floppy disk to the processor

d) copying the contents of RAM to the hard drive

117. Computer simulation of a nuclear explosion is necessary for:

a) conducting real studies of processes occurring in nature during and after an explosion

b) obtaining reliable data on the impact of the explosion on human health

c) experimental verification of the influence of high temperature and radiation on natural objects

d) reducing the cost of research and ensuring employee safety

118. Choose the most correct definition of DBMS:

a) a set of programs that ensures the operation of all computer hardware devices and user access to them

b) a set of programs that support filling and manipulating data in the database

c) application program for processing data sets

d) an operating system shell that allows you to work more comfortably with database files

119. The most common in practice are:

a) network databases

b) relational databases

c) distributed databases

d) hierarchical databases

What is a form in the database?

a) a user-created graphical interface for entering data into the database

b) user created table

c) created table for data entry into the database

d) the result of working with the database

What is 1 KB equal to?

a) 10 3 bytes

Differentiated credit

by discipline Computer science

training groups 11KB, 12TB, 14PP

Test

1. Formal languages ​​include:

a) Russian language

b) English

c) sign language

d) programming language

2. Database is:

a) an interface that supports data filling and manipulation

b) a set of interrelated data about a certain object, specially organized and stored on external media

c) a set of programs for storing and processing large amounts of information

d) a certain set of information

In what case can different files have the same name?

a) if they are stored in different directories

b) if they are created at different times of the day

c) if they have different volumes

d) if they are created on different days

4. Information from RAM can be saved on an external storage device in the form of:

a) catalog

b) directories

c) programs

5. The advantages of the binary number system include:

a) clarity and clarity of writing a number in the binary number system

b) simplicity of operations and the ability to automatically process information using only two states of computer elements

c) saving computer memory

d) widespread use of the said system in everyday life

a) Copy

b) Move

c) Delete

d) Update

7. During execution, the application program is stored:

a) on the hard drive

b) in the processor

c) in RAM