Online tests in computer science for vocational education. GIA online tests in computer science. What is a PowerPoint presentation

The 2019 state final certification in computer science for graduates of the 9th grade of general education institutions is carried out to assess the level of general education training of graduates in this discipline. The main content elements tested in testing from the computer science section:

  1. Ability to evaluate quantitative parameters of information objects.
  2. Ability to determine the meaning of a logical expression.
  3. Ability to analyze formal descriptions of real objects and processes.
  4. Knowledge of file system for organizing data.
  5. Ability to present formulaic relationships graphically.
  6. The ability to execute an algorithm for a specific performer with a fixed set of commands.
  7. Ability to encode and decode information.
  8. Ability to execute a linear algorithm written in an algorithmic language.
  9. Ability to execute a simple cyclic algorithm written in an algorithmic language.
  10. Ability to execute a cyclic algorithm for processing an array of numbers, written in an algorithmic language.
  11. Ability to analyze information presented in the form of diagrams.
  12. Ability to search a ready-made database using a formulated condition.
  13. Knowledge of the discrete form of representation of numerical, text, graphic and audio information.
  14. Ability to write a simple linear algorithm for a formal performer.
  15. Ability to determine the speed of information transfer.
  16. Ability to execute an algorithm written in natural language that processes strings of characters or lists.
  17. Ability to use information and communication technologies.
  18. Ability to search for information on the Internet.
  19. Ability to process large amounts of data using spreadsheet or database tools.
  20. Ability to write a short algorithm in a formal executor environment or in a programming language.
Dates for passing the OGE in computer science 2019:
June 4 (Tuesday), June 11 (Tuesday).
There are no changes in the structure and content of the 2019 examination paper compared to 2018.
In this section you will find online tests that will help you prepare to take the OGE (GIA) in computer science. We wish you success!

The standard OGE test (GIA-9) of the 2019 format in computer science and ICT contains two parts. The first part contains 18 tasks with a short answer, the second part contains 2 tasks that must be completed on the computer. In this regard, only the first part (the first 18 tasks) is presented in this test. According to the current exam structure, among these 18 questions, only the first 6 questions offer answer options. However, for the convenience of passing tests, the site administration decided to offer answer options for each task. However, for tasks in which the compilers of real test and measurement materials (CMMs) do not provide answer options, we decided to significantly increase the number of these answer options in order to bring our test as close as possible to what you will have to face at the end of the school year.


The standard OGE test (GIA-9) of the 2019 format in computer science and ICT contains two parts. The first part contains 18 tasks with a short answer, the second part contains 2 tasks that must be completed on the computer. In this regard, only the first part (the first 18 tasks) is presented in this test. According to the current exam structure, among these 18 questions, only the first 6 questions offer answer options. However, for the convenience of passing tests, the site administration decided to offer answer options for each task. However, for tasks in which the compilers of real test and measurement materials (CMMs) do not provide answer options, we decided to significantly increase the number of these answer options in order to bring our test as close as possible to what you will have to face at the end of the school year.


The standard OGE test (GIA-9) of the 2018 format in computer science and ICT contains two parts. The first part contains 18 tasks with a short answer, the second part contains 2 tasks that must be completed on the computer. In this regard, only the first part (the first 18 tasks) is presented in this test. According to the current exam structure, among these 18 questions, only the first 6 questions offer answer options. However, for the convenience of passing tests, the site administration decided to offer answer options for each task. However, for tasks in which the compilers of real test and measurement materials (CMMs) do not provide answer options, we decided to significantly increase the number of these answer options in order to bring our test as close as possible to what you will have to face at the end of the school year.



The standard OGE test (GIA-9) of the 2018 format in computer science and ICT contains two parts. The first part contains 18 tasks with a short answer, the second part contains 2 tasks that must be completed on the computer. In this regard, only the first part (the first 18 tasks) is presented in this test. According to the current exam structure, among these 18 questions, only the first 6 questions offer answer options. However, for the convenience of passing tests, the site administration decided to offer answer options for each task. However, for tasks in which the compilers of real test and measurement materials (CMMs) do not provide answer options, we decided to significantly increase the number of these answer options in order to bring our test as close as possible to what you will have to face at the end of the school year.


The standard OGE test (GIA-9) of the 2018 format in computer science and ICT contains two parts. The first part contains 18 tasks with a short answer, the second part contains 2 tasks that must be completed on the computer. In this regard, only the first part (the first 18 tasks) is presented in this test. According to the current exam structure, among these 18 questions, only the first 6 questions offer answer options. However, for the convenience of passing tests, the site administration decided to offer answer options for each task. However, for tasks in which the compilers of real test and measurement materials (CMMs) do not provide answer options, we decided to significantly increase the number of these answer options in order to bring our test as close as possible to what you will have to face at the end of the school year.


The standard OGE test (GIA-9) of the 2018 format in computer science and ICT contains two parts. The first part contains 18 tasks with a short answer, the second part contains 2 tasks that must be completed on the computer. In this regard, only the first part (the first 18 tasks) is presented in this test. According to the current exam structure, among these 18 questions, only the first 6 questions offer answer options. However, for the convenience of passing tests, the site administration decided to offer answer options for each task. However, for tasks in which the compilers of real test and measurement materials (CMMs) do not provide answer options, we decided to significantly increase the number of these answer options in order to bring our test as close as possible to what you will have to face at the end of the school year.


The standard OGE test (GIA-9) of the 2017 format in computer science and ICT contains two parts. The first part contains 18 tasks with a short answer, the second part contains 2 tasks that must be completed on the computer. In this regard, only the first part (the first 18 tasks) is presented in this test. According to the current exam structure, among these 18 questions, only the first 6 questions offer answer options. However, for the convenience of passing tests, the site administration decided to offer answer options for each task. However, for tasks in which the compilers of real test and measurement materials (CMMs) do not provide answer options, we decided to significantly increase the number of these answer options in order to bring our test as close as possible to what you will have to face at the end of the school year.



The standard OGE test (GIA-9) of the 2016 format in computer science and ICT contains two parts. The first part contains 18 tasks with a short answer, the second part contains 2 tasks that must be completed on the computer. In this regard, only the first part (the first 18 tasks) is presented in this test. According to the current exam structure, among these 18 questions, only the first 6 questions offer answer options. However, for the convenience of passing tests, the site administration decided to offer answer options for each task. However, for tasks in which the compilers of real test and measurement materials (CMMs) do not provide answer options, we decided to significantly increase the number of these answer options in order to bring our test as close as possible to what you will have to face at the end of the school year.


The standard OGE test (GIA-9) of the 2016 format in computer science and ICT contains two parts. The first part contains 18 tasks with a short answer, the second part contains 2 tasks that must be completed on the computer. In this regard, only the first part (the first 18 tasks) is presented in this test. According to the current exam structure, among these 18 questions, only the first 6 questions offer answer options. However, for the convenience of passing tests, the site administration decided to offer answer options for each task. However, for tasks in which the compilers of real test and measurement materials (CMMs) do not provide answer options, we decided to significantly increase the number of these answer options in order to bring our test as close as possible to what you will have to face at the end of the school year.


The standard OGE test (GIA-9) of the 2016 format in computer science and ICT contains two parts. The first part contains 18 tasks with a short answer, the second part contains 2 tasks that must be completed on the computer. In this regard, only the first part (the first 18 tasks) is presented in this test. According to the current exam structure, among these 18 questions, only the first 6 questions offer answer options. However, for the convenience of passing tests, the site administration decided to offer answer options for each task. However, for tasks in which the compilers of real test and measurement materials (CMMs) do not provide answer options, we decided to significantly increase the number of these answer options in order to bring our test as close as possible to what you will have to face at the end of the school year.


The standard OGE test (GIA-9) of the 2016 format in computer science and ICT contains two parts. The first part contains 18 tasks with a short answer, the second part contains 2 tasks that must be completed on the computer. In this regard, only the first part (the first 18 tasks) is presented in this test. According to the current exam structure, among these 18 questions, only the first 6 questions offer answer options. However, for the convenience of passing tests, the site administration decided to offer answer options for each task. However, for tasks in which the compilers of real test and measurement materials (CMMs) do not provide answer options, we decided to significantly increase the number of these answer options in order to bring our test as close as possible to what you will have to face at the end of the school year.



The standard OGE test (GIA-9) of the 2015 format in computer science and ICT contains two parts. The first part contains 18 tasks with a short answer, the second part contains 2 tasks that must be completed on the computer. In this regard, only the first part (the first 18 tasks) is presented in this test. According to the current exam structure, among these 18 questions, only the first 6 questions offer answer options. However, for the convenience of passing tests, the site administration decided to offer answer options for each task. However, for tasks in which the compilers of real test and measurement materials (CMMs) do not provide answer options, we decided to significantly increase the number of these answer options in order to bring our test as close as possible to what you will have to face at the end of the school year.


The standard OGE test (GIA-9) of the 2015 format in computer science and ICT contains two parts. The first part contains 18 tasks with a short answer, the second part contains 2 tasks that must be completed on the computer. In this regard, only the first part (the first 18 tasks) is presented in this test. According to the current exam structure, among these 18 questions, only the first 6 questions offer answer options. However, for the convenience of passing tests, the site administration decided to offer answer options for each task. However, for tasks in which the compilers of real test and measurement materials (CMMs) do not provide answer options, we decided to significantly increase the number of these answer options in order to bring our test as close as possible to what you will have to face at the end of the school year.


The standard OGE test (GIA-9) of the 2015 format in computer science and ICT contains two parts. The first part contains 18 tasks with a short answer, the second part contains 2 tasks that must be completed on the computer. In this regard, only the first part (the first 18 tasks) is presented in this test. According to the current exam structure, among these 18 questions, only the first 6 questions offer answer options. However, for the convenience of passing tests, the site administration decided to offer answer options for each task. However, for tasks in which the compilers of real test and measurement materials (CMMs) do not provide answer options, we decided to significantly increase the number of these answer options in order to bring our test as close as possible to what you will have to face at the end of the school year.


When completing task 1-18, choose only one correct answer.


When completing task 1-8, choose only one correct answer.

30 answers to test questions on "Information and communication technologies"

1. Which approach to information attempts to answer the question: “What value does information have?”

a. Semantic
b. Pragmatic
c. Selective

Answer: b

2. The set of rules, principles, dependencies of the behavior of objects in the subject area is:

a. Business logic
b. Business logistics
c. Business strategy
d. Business idea

Answer: a

3. The rapid accumulation of information in modern society has required a person to

a. develop special means of storing information
b. develop tools that provide a selective approach to information
c. provide yourself with the means to accumulate information

Answer: b

4. Using SQL you cannot:

a. write an executable program that will interact with the database
b. set access rights to data in databases
c. add, delete or change data in the database

Answer: a

5. Did the invention of printing make it possible?

a. for the first time made it possible to transmit complex information in the form of drawings
b. quickly transmit information to any corner of the earth
c. disseminate large amounts of information

Answer: c

6. What, according to some experts, is not part of an information system?

a. technical means
b. ideology of working with information
c. methods and technologies for working with information
d. staff

Answer: d

7. What opportunities do information systems open up for analysts?

a. focus on the needs and desires of consumers
b. model business relationship options
c. consciously choose an enterprise strategy

Answer: b

8. What was the first information revolution?

a. the advent of the computer
b. the emergence of printing
c. appearance of language
d. the emergence of writing

Answer: c

9. Modern society is trying to answer the question:

a. how to accumulate more information
b. where to get information
c. what is the meaning of the information

Answer: c

10. In relational databases, single column data:

a. may have different data types
b. the data type has no effect on the data placed in the columns
c. must have one type
d. must always be of string type
e. must always be of numeric type

Answer: c

11. If we write a query in SQL to a relational database, what will we get in response?

a. file
b. we won’t get anything because you can’t write queries in SQL
c. table

Answer: s

12. Description of objects, data and properties of these objects, as well as relationships between them is

a. subject area
b. field of knowledge
c. subject region

Answer: a

13. If parts of a DBMS are located on different computers, then such a DBMS is called:

a. distributed
b. hierarchical
c. objective-oriented
d. network
e. local

Answer: a

14. Where does the software development process begin?

a. with formalization and specification of subtasks
b. from drawing up the algorithm
c. from the problem statement
d. with coding

Answer: b

15. Cybernetics is

a. management science
b. computer science
c. art science
d. robot science

Answer: d

16. Which statement is not true?

a. The value of information can be negative
b. The amount of information can be negative
c. The value of information can be positive
d. The amount of information can be a positive value

Answer: b

17. When it is necessary to provide an array of thematic, highly targeted information aimed at users of one working group, then, as a rule, I use:

a. data mart
b. data store
c. database

Answer: a

18. When we analyze judgments and try to estimate how much information they contain, do we use?

a. pragmatic approach
b. semantic approach
c. selective approach
d. neither semantic nor pragmatic

Answer: b

19. What type of communication is computer-human communication?

a. to non-verbal
b. to verbal
c. neither verbal nor non-verbal

Answer: a

20. Information systems cannot be classified:

a. by scale
b. in architecture
c. by degree of automation
d. by the nature of data processing
e. by area of ​​application
f. according to the degree of return from their use

Answer: f

21. Which statement is not true?

a. In a relational database, tables are made up of rows and columns
b. In a relational database, the relationship between tables is carried out using key fields
c. In a relational database, one column can contain data of different types.
d. A relational database can have multiple tables

Answer: c

22. Maintaining history in a data warehouse means:

Answer: b

23. In the process of transmitting information from person to person via a computer, it is critically important:

a. to ensure the required transmission speed
b. so that the meaning of the transmitted information is preserved
c. so that the transmitted information is encoded
d. so that information is transmitted via the shortest route

Answer: b

24. Data entering the data warehouse is available:

a. for writing and reading
b. only for reading
c. for recording only

Answer: b

25. Information isolated and contained on an information carrier is

a. data
b. knowledge
c. signals

Answer: a

26. If you haphazardly fill a database with information, then the time required to search for the necessary information:

a. will increase
b. Will not change
c. will decrease

Answer: a

27 . What element was missing from the architecture of Charles Babbage's machine?

a. Memory device
b. imaging device
c. control device
d. input device
e. arithmetic device
f. output device

Answer: b

28. Modern information systems are developing and becoming more complex, but what about their interface part?

a. simplified
b. does not change
c. becomes more complicated

Answer: a

29. Which level of structural change has the highest risk?

a. business process reengineering
b. automation
c. rationalization

Answer: a

30. Which statement is not true?

a. the value of information depends on the individual user
b. the value of information depends on the information medium
c. the value of information depends on a specific time period
d. the value of information depends on the specific situation

Computer science tests with answers

Option 1

1) The unit of measurement for the amount of information is taken...

1. 1 baud 2. 1 bit 3. 1 byte 4. 1 KB

2) Computer performance (speed of operations) depends on...

1.Display screen size 2. CPU frequencies

3) Which device can have a harmful effect on human health?

1. printer 2. monitor 3. system unit 4. modem

4) The file is...

1. unit of measurement of information 2. program in operational

3. text printed on a printer 4. program or data on

disk

5) A model is the replacement of the object under study with another object that reflects...

1. all sides of a given object 2. some sides of a given object

3. essential aspects 4. non-essential parties

of this object of this object

6) The minimum object used in a text editor is...

1. word 2. screen point (pixel) 3. paragraph 4. symbol (familiarity)

7) The number of different encodings of letters of the Russian alphabet is...

1. one 2. two (MS-DOS, Windows)

3. three (MS-DOS, Windows, 4. five (MS-DOS, Windows,

Macintosh) Macintosh,KOI-8,ISO)

8) The tools in the graphic editor are...

1. line, circle, rectangle 2. selection, copy, paste

3. pencil, brush, eraser 4. sets of colors (palettes)

9) A multimedia computer must include...

1. projection panel 2. CD-ROMdisk drive and sound card

3. modem 4. plotter

10) In spreadsheets, the group of cells A1:B3 is highlighted. How many cells are in this group?

1. 6 2. 5 3. 4 4. 3

11) The result of calculations in cell C1 will be.

1. What is the name of a group of files that is stored in a separate group and has its own name?

Catalog

Diskette

2. What is the name of the data or program on a magnetic disk?

Diskette

3. What characters are allowed in a file name or directory name in Windows?

Numbers and only Latin letters

Latin, Russian letters and numbers

Russian and Latin letters

4. Select the file name anketa with the extension txt.

5. Specify an incorrect directory name.

6. What is the largest number of characters in a file or directory name in Windows?

7. What is the largest number of characters in a file name extension?

8. What is the extension of executable files?

9. What does a computer need to function properly?

Various applications

operating system

Floppy disk in drive

10. How many windows can be open at the same time?

11. What character replaces any number of any characters?

12. Which character replaces only one character in a file name?

13. How to write: “All files without exception”?

14. Specify an incorrect directory name.

15. The SSS subdirectory is part of the YYY directory. What is the name of the YYY directory relative to the SSS directory?

Root

Subsidiary

Parental

16. What does the computer do immediately after turning on POWER?

Device check and memory testing

Downloading the program

17. What needs to be done to perform a warm start OC?

Insert the system floppy disk into the drive

Press the RESET button

Type the program name and press ENTER.

18. Can several windows be active at the same time?

19. Which window is considered active?

First open

The one we work in.

20. Can a directory and the files in it have the same name?

21. Can there be two files with the same names in the same directory?

22. Can there be two files with the same names in different directories?

23. How many programs can be executed simultaneously?

As much as you like

How long will a PC last?

24. What is not an operating system?

Norton Commander

25. Is it possible to recover erased information on a floppy disk?

It's always possible

Possibly, but not always

26. What are disks used for?

To process information

For printing texts

To save information

27. What should you do with a new floppy disk before using it?

Optimize

Defragment

Format

28. When formatting a floppy disk, it is shown that several sectors are damaged. Is this floppy disk suitable for use?

Not good at all

Suitable except for damaged sectors

Fully suitable

29. What size floppy disks in inches are used in computers?

26. Which program is not a disk utility?

27. What is a cluster on a magnetic disk?

Disc sleeve

Unit of disk space

Virtual disk

28. What is the starting track number?

29. What does track 0 of each floppy disk contain?

Root directory

FAT - table

30. Where is information about the floppy disk format recorded?

In boot sector

To the root directory

31. The floppy disk has bad sectors. What does the system do to prevent their use?

Doing nothing

Marks them as damaged

Uses it, but carefully

32. What happens if the information in FAT gets corrupted?

Disk information disappears

The floppy disk will have to be thrown away

33. System programs for working with disks are…

OS

Drivers

Disk Utilities

34. What is not included in the logical formatting of a disk?

Writing system files

Breakdown of sectors and tracks

Creating a FAT table

35. The main programs for working with disks in Windows are located in the folder...

Service

Standard

36. Which program is designed for disc diagnostics and correction?

36. Writing files on a disk in the form of scattered areas over the entire surface of the disk is called...

Disk optimization

Disk fragmentation

Disk formatting

37. Which statement is incorrect? Defragmentation is carried out for the purpose of...

Disk space optimization

Speed ​​up the process of reading and writing files

Information compression

38. Which program is designed to defragment a disk?

39. What does the operating system do when deleting a file from disk?

Shuffles its clusters into FAT

Destroys the first character of a file name in a directory

Demagnetizes the areas of the disk where the file was located

40. How can you remove a computer virus from a disk?

Reboot system

Special program

It is impossible to remove the virus

41. Archiving files is...

Merging multiple files

Partitioning disks into sectors and tracks

File compression

42. Which program is an archiver?

43. Which program is an antivirus program?

44. What is a computer virus?

Small program

A myth that doesn't exist

Name of a popular computer game

45. What will not help remove a computer virus from a disk?

Disk Defragmenter

Checking with an antivirus program

Disk formatting

46. ​​Compression of information during archiving is essentially...

A special type of information encoding

Removing unnecessary information

Backup coding of information

47. When should archiving not be used?

To save disk space

To destroy viruses

To create backup copies of files

48. Which statement is true?

All files are compressed equally during archiving

Raster graphics files are best compressed

Different types of files are compressed differently when archived

49. Archivers are characterized by...

The extent and speed of archiving

Method of distribution

Compression method and speed

50. Which antiviruses do not work with the virus database?

The doctors

Filters

Auditors

51. Which antiviruses work resident?

The doctors

Filters

Auditors

52. Mutants, invisible people, worms-

Utility programs

Types of antivirus programs

Types of computer viruses

53. What is not a channel for the spread of viruses?

Visual information display devices

Computer networks

External storage media.

54. The founder of domestic computer technology is:

Zolotarev Lev Viktorovich

Popov Alexander Glebovich

Lebedev Sergey Alekseevich

55. A subsystem is:

A predefined work environment through which the system coordinates resource allocation and distributes tasks

A set of elements that are in relationships and connections with each other, which form a certain integrity

Part of the information system allocated when designing the system architecture.

56. The file extension, as a rule, characterizes:

Memory

Path to the folder where the data is stored

Type of data stored in the file

57. Computer performance depends on:

From system unit components

From installed software

From the speed of the Internet connection

58. RAM is the memory that stores:

File system information

Executable machine code

Cached CPU Data

59. The first computer was called:

60. To access the search server you must:

Go to browser

Enter your query in the search menu

Enter the address of the search service in the browser address bar

61. A disk drive is a device for:

Reading information from removable media

Recording information to a storage device

LAN connections

62. The processor processes information:

In text format

In binary code

In Pascal

63. When turning off the computer information:

Removed from HDD

Stored in GPU cache

Deleted from RAM memory

64. The IP routing protocol provides:

Transferring information over computer networks

Possibility of connecting several computers and their data into one common network

Data encoding and decryption

65. During execution, the application program is stored

In the kernel cache

In RAM memory

In the memory of the hard drive (hard drive)

66. The minimum unit of measurement of the amount of information is considered to be:

Kilobit

67. When you turn off the computer, all information is erased:

In memory of the random access memory device

Does not erase

From HDD memory

68. The first computer in our country was called:

69. A computer connected to the Internet must have:

Communication with a remote server

Domain name

70. Application software is:

A general purpose program designed to perform tasks

Catalog of programs for computer operation

Database for storing information

71. The first computers were created in:

72. The ftp service on the Internet is intended:

For data dissemination

To connect to the Internet

To save data to the cloud

73. Mass production of personal computers began:

Mid 80's

60-70 years

Early 2000

74. Email allows you to send:

Text messages and attached files

Text messages only

Attached files only

75. The database is:

A model in which data is stored in an orderly manner

Program for collecting and storing information

Table with data in Excel format

76. Among the computer architectures there are:

Stationary, portable, autonomous

Massively parallel, symmetric multiprocessor, distributed

Dedicated, split, parallel-branched

77. Non-volatile memory devices of a personal computer are:

HDD

RAM

streamer

78. The programming system provides the programmer with the opportunity to:

Analyze existing thematic modules and submodules

Automatically assemble developed modules into a single project

Automate mathematical models of certain phenomena

79. A compressed file is a file:

Which hasn't been opened for a long time

Infected with a malicious virus

Packaged using an archiver program

80. What function do peripheral devices perform?

Input and output of information

Long-term storage of information

Processing of newly received information and translating it into machine language

81. What is not typical for a local network?

High message transmission speed

Exchange of information and data over long distances

The presence of a connecting link between network subscribers

82. A system floppy disk is required for:

Primary saving of files important to the user

Removing malicious software from your computer

Initial boot of the operating system

83. Electronic circuits for controlling external devices are:

Controllers

Keyboard and mouse

Transistors and system switches

84. A floppy drive is a device for:

Connections between a computer and removable storage media

Processing data input/output commands from a computer to paper

Reading and/or writing data from external media

test 85. Addressability of RAM means:

Availability of a number for each RAM cell

Discrete representation of information within all blocks of RAM

Free access to a randomly selected RAM cell

86. The resolution of the monitor is:

Number of clearly rendered colors

Number of dots (pixels) of the image in horizontal and vertical directions

Diagonal size

87. The original meaning of the word “computer” is:

Multifunctional calculator

A type of kinescope

Man doing calculations

88. Registered signals are:

Flows of electromagnetic waves

Method of transmitting information over long distances

89. A modem is a device designed for:

Converting text and graphic information into analogue

Organization of digital communication between two computers via a telephone line

Providing Internet access for computers

90. The family tree is... an information model

Branching

Network

Hierarchical

91. Computer com ports provide:

Transferring data between a computer and phones, PDAs, peripheral devices

Access to the Internet

Connecting an external hard drive

92. An email subscriber's mailbox is:

A section of mail server RAM allocated to a specific user

An area of ​​memory on the mail server's hard drive allocated to a specific user

A special device for transmitting and storing correspondence in electronic form

93. The file extension usually characterizes:

Type of information contained in the file

File purpose

File size

94. Software control of a computer involves:

A sequence of commands, the execution of which leads to the activation of a specific computer function

Using an operating system that synchronizes the hardware

Converting analog information signal to digital

test-95. The main characteristics of the processor do not include:

RAM capacity

Clock frequency

System bus frequency

96. TrueType font type means that:

Text typed in this font will look the same both on the monitor and printed

Text typed in this font can be edited in any text editor

This font was used by default when documents were initially created.

97. Web pages have the extension:

98. Ole technology provides aggregation of documents created by:

In any Microsoft Office application

Any application that meets the CUA standard

As a graphical flow of information

99. Text data can be processed:

Multi-office applications

Hypertext applications

Test editors

100. A virtual device is:

Modeled functional equivalent of the device

Network device

Type of computer

101. A file system is:

How to organize files on disk

Storage media capacity

Physical organization of the storage medium

102. The full path to the file is specified as the address D:\Doc\Test.doc. Give the full file name:

D:\Doc\Test.doc

103. Based on functionality, the following types of software are distinguished:

Application, software, target

Application, system, instrumental

Office, system, management

105. What structure do folders (directories) form?

Relational

System

Hierarchical

test_106. Mandatory software quality criteria include:

Reliability

Versatility

Ease of use

107. At the physical level of the network, the unit of exchange is:

108. Specify the difference between an information retrieval system and a database management system:

It is forbidden to edit data

No sorting or search tools

Varying amount of available information

109. The process of writing a program never includes:

Records of operators in any programming language

Debugging code

Changes in the computer's physical environment

110. Repeated execution of the same program section is called:

A cyclical process

Regression

Repeating cycle

111. What does the electronic document management system provide?

Translation of handwritten documents into electronic form

Managing documents created electronically

Automation of company activities

112. The URL contains information about:

File type and location

The location of the file and the programming language in which it was created

File type and application type

113. The main function of the server is:

Transferring information from user to user

Information storage

Performing specific actions based on user requests

114. The network operating system implements:

Connecting computers into a single computer network

Network resource management

Protocol and Interface Management

115. Interaction between the client and the server when working on the WWW occurs according to the protocol:

test*116. FTP archive (base) is:

Database

Web server

File storage

117. At the program debugging stage:

Checking the correct operation of the program

The correctness of the selected data and operators is checked

An interim analysis of the program's effectiveness is being carried out

COMPUTER SCIENCE TESTS(Correct answers are marked with (*).)

SECTION 1. PC HARDWARE AND SOFTWARE

TOPIC 1.1 Information and information processes

1. Computer science is the science of
1) location of information on technical media;
2) information, its storage and data sorting;
3) information, its properties, methods of presentation, methods of collection, processing, storage and transmission; (*)
4) the use of computers in the educational process.

2. Papyrus, books and floppy disks allow...
1) store information; (*)
2) transform information;
3) process information;
4) create information.

3.What is meant by information?
1. This is a property of an object.
2. Part of the world around us.
3. This is information about something. (*)

4.Which statement is false?
1. Information can be text.
2. Information can be audio.
3. Information cannot be in graphical form. (*)

5.Which statement is true?
1. Information cannot be stored or transmitted.
2. Information can be transformed and transmitted. (*)
3. Information is part of the world around us.

6. What form of information has a person already learned to store for a long time?
1) visual images; (*) 3) taste images;
2) tactile images; 4) olfactory images.

7. Communication channels (telephone, fiber optic, satellite, etc.) Allow…
1) store information;
2) transmit information; (*)
3) process information;
4) create information.

8. In computer science, it is necessary to be able to determine the amount of information. What approach to defining the concept of “information” is used for this?
1) ordinary, information is a synonym for the words: message, information;
2) philosophical, information is correlated with the concepts: reflection, cognition;
3) cybernetic, information is understood as a feedback signal in the control system;
4) probabilistic, information is a measure of uncertainty reduction (*)

9. In computer science, the amount of information is defined as
1) reliability of information;
2) information transfer speed;
3) a measure of uncertainty reduction; (*)
4) amount of RAM.

Topic 1.2 Principles of operation and design of a computer

1. A device for exchanging information with other computers via the telephone network is:
1) telephone; 2) network; 3) cable; 4) modem; (*) 5) none of the answers 1-4 are correct.

2. A program that ensures interaction between the operating system and a peripheral device (printer, disk drive, display, etc.) is:
1) translator 2) controller 3) driver (*) 4) compiler 5) operating system.

3. Compact disc (CD, DVD) is:
1) small disk;
2) magnetic disk with high density of information recording;
3) an optical disk, information from which is read by a laser beam; (*)
4) disk after performing the information compression operation
5) small removable magnetic disk.

4. A file is:
1) the name given to a program or data used in a computer;
2) a named sequence of data located on external media
3) an operating system command that ensures working with data;
4) a program placed in memory and ready for execution;
5) data located in memory and used by a program.

5.Computer performance (speed of operations) depends on...
1) display screen size
2) processor frequencies (*)
3) supply voltage
4) the speed of pressing the keys

6. A common property of Babbage’s machine, the modern computer and the human brain is the ability to process...
1) numerical information (*)
2) text information
3) audio information
4) graphic information

7.What action is not recommended to be performed when the
computer?
1) insert/remove floppy disk
2) disconnect/connect external devices (*)
3) restart the computer by pressing the RESET button
4) restart the computer by pressing the CTRL-ALT-DEL keys

8.What does a basic computer kit consist of?
1. System unit, keyboard.
2. Monitor, keyboard, mouse.
3. System unit, keyboard, monitor, mouse. (*)

9. The statement is true
1. Keyboard - information input device. (*)
2. Monitor - transmission device.
3. Mouse is a printing device.
4. Printer - information input device.

10.Which key activates the small numeric keypad?
1. Caps Lock.
2. Num Lock. (*)
3. Tab.
4. Ctrl.

11.File is...
1) unit of information
2) named memory area (*)
3) text printed on a printer
4) a program for creating text.

12. What are file parameters?
1) Ability to copy and move a file.
2) Name, type, size, date and time of file creation.(*)
3) A window containing information about the file.

19.File type indicates
1) file size
2) type of information in the file - text, graphic, sound (*)
3) date of creation of the file.

20.Writing and reading information in floppy drives
carried out using...
1) magnetic head (*)

2) laser

3) thermoelement
4) touch sensor

21.When you turn off the computer, all information is erased...
1) on a floppy disk
2) on a CD-ROM disk
3) on the hard drive
4) in RAM (*)

Topic 1.3 Presentation of information in a computer

1. How is the decimal number 2 written in the binary number system?
1) 00; 2) 10; (*) 3) 01; 4) 11.

2. The processor processes information...
1) in the decimal number system
2) in binary code (*)
3) in BASIC language
4) in text form

3. How many bits are in the word INFORMATICS?

11
88 (*)
44
1

4.How is the decimal number 5 written in the binary number system?

101 (*)
110
111
100

5. The minimum unit of measurement of the amount of information is taken
1) 1 baud;
2) 1 bit; (*)
3) 1 byte;
4) 1 KB.

6.What is 1 MB equal to...
1) 1,000,000 bits; 3) 1024 KB; (*)
2) 1,000,000 bytes; 4) 1024 bytes.

7. 1 bit is the amount of information when uncertainty...
1) doubles;
2) decreases by half; (*)
3) does not change;
4) decreases by eight times.

Topic 1.4 Algorithms and executors. Modeling and formalization

1.What is an algorithm called?
1) sequence of commands that the executor can execute (*)
2) system of performer commands
3) numbered sequence of lines
4) unnumbered sequence of lines

2. What is an algorithm executor?
1. This is a list of commands to solve the problem.
2. This is a program compiled according to a given algorithm.
3. This is an object that is capable of understanding and executing the commands specified in the algorithm. (*)

3. Which algorithm is called cyclic?

(*)

4. Which algorithm is called linear?
1. An algorithm in which commands work sequentially one after another. (*)
2. An algorithm in which a team or several teams work repeatedly.
3. An algorithm that works either along one branch or another, depending on the fulfillment of a condition.

5. Which algorithm is called the branching algorithm?
1. An algorithm in which commands work sequentially one after another.
2. An algorithm in which a team or several teams work repeatedly.
3. An algorithm that works either along one branch or another, depending on the fulfillment of the condition.(*)

6. A model is the replacement of the object under study with another object that reflects ...
1) all sides of this object
2) some sides of this object
3) essential aspects of this object (*)
4) insignificant aspects of this object

7.The model contains information...
1) the same as the modeled object
2) smaller than the modeled object (*)
3) larger than the modeled object
4) does not contain information

8.What are the main stages of information processing by a computer?
1. Input and output of information.
2. Input, transformation, storage, output of information. *
3. Saving information in a file.

9.Which stage of solving a problem on a computer is missing in the following chain:
object - ... - study of the model on a computer - analysis of the results and adjustment of the model?
1) building an information model (*)
2) coding of the algorithm in a programming language
3) analysis of the obtained data
4) algorithm development

10. The property of the algorithm is:

    Efficiency; (*)

    Cyclicality;

    Ability to change the sequence of command execution;

    Possibility of executing the algorithm in reverse order;

    Ease of writing in programming languages.

11. The property of an algorithm, which consists in the fact that each action and the algorithm as a whole must be able to be completed, is called

    Discreteness;

    Certainty;

    Limb;

    Mass character;

    Productivity. (*)

12. The property of an algorithm, that the algorithm must consist of specific actions following in a certain order, is called

    Discreteness; (*)

    Determinism;

    Limb;

    Mass character;

    Productivity.

13. The property of an algorithm that the same algorithm can be used with different initial data is called

    Discreteness;

    Certainty;

    Limb;

    Mass character; (*)

    Productivity.

14. The property of an algorithm that any action must be strictly and unambiguously defined in each case is called

    Discreteness;

    Certainty;

    Limb;

    Mass character;

    Productivity.

(*) Theme 1.5

Basics of programming 1. Choose the correct representation of the arithmetic expression

    in algorithmic language:

    X+3y/5xy

    X + 3*y / 5*x*y

    (x + 3y) / 5xy

    (x + 3*y) / (5*x*y) (*)

X + 3*y / (5*x*y)

    12. An algorithm written in a computer-friendly programming language is called

    Algorithms executor;

    Program; (*)

    Listing;

    Texting;

Algorithm protocol.

    13. Assignment operators do the following:

    set the value of variables; (*)

    change the values ​​of constants;

organize the implementation of repeatable actions;

    14. Conditional statements do the following:

    set the value of variables; (*)

    set the value of variables;

    branch algorithms and organize their execution along one of the branches; (*)

    organize the implementation of repeatable actions

    organize unconditional transitions in the algorithm;

assign variables to certain sets of valid values.

    14. Conditional statements do the following:

    set the value of variables; (*)

    15. Loop statements do the following:

    branch algorithms and organize their execution along one of the branches;

    organize the implementation of repeatable actions

    organize the implementation of repeatable actions; (*)

display information on the monitor screen
16. Which of the following lines are incorrect?

1) if a

2) if 5 then s:=s+5 (*)

4) 3) if x>y then s:=s+1; else s:=s-1 (*)<>if k

m then k :=m
18.What value of the variable s will be printed after executing a fragment of a program in BASIC? 1) 2 2) 3 3) 5 4) 6 (*)

A=2 b=3 if a

19.What value of the variable s will be printed after executing a fragment of the BASIC program?

a$="5"

b$="4"

s$=a$+b$
1)4 2)5 3)9 4)54 (*)

print s$

SECTION 2. INFORMATION TECHNOLOGY

Topic 2.1 Text information processing technology
1.The minimum object used in a text editor is...
1) Word
2) screen point (pixels)
3) paragraph

4) familiar place (symbol) (*)
2.In modern text editors, the Format operation allows you to…
1) saving the document
2) table insertion
3) select paragraph and font parameters (*)

4) inserting a picture
4. In a text editor, the Copy operation becomes possible after...
2) save the file
3) file printout
4) highlighting a piece of text (*)

5.In a text editor, the main parameters when setting font parameters are...
1) typeface, size, style (*)
2) indentation, spacing
3) margins, orientation
4) style, pattern

6.The essence of the text file format conversion process is...
1) changing font sizes
2) changing paragraph formatting options
3) binary character conversion (*)
4) changing page parameters when printing

7.Primitives in a graphic editor are called
1) line, circle (*)
2) pencil, brush, eraser
3) selection copy, paste
4) sets of colors (palette)

8.The tools in the graphic editor are...
1) line, circle, rectangle
2) selection, copy, paste
3) pencil, brush, eraser (*)
4) sets of colors (palettes)

9.The main operations possible in the graphic editor include...
1) line, circle, rectangle
2) pencil, brush, eraser
3) selection, copy, paste (*)
4) sets of colors (palette)

Topic 2.2 Numerical information processing technology

1.In spreadsheets, the group of cells A1:B3 is highlighted. How many cells are in this group?
1) 6 (*) 2) 5 3) 4 4) 3

2.The main element of spreadsheets is...
1) cell (*) 3) column 2) row 4) table

3. The result of calculations in cell C1 will be:
A 1 B1 C1
5 =A1*2 =A1+B1

1) 5 2) 10 3) 15 (*) 4) 20

    when the address referenced by the formula changes when the formula is copied (*)

    when the address referenced by the formula when copied does not change

5.After entering a number into a cell, you see “######” instead of the result. What is the reason for this situation?

    There is not enough cell width to show the entered number (*)

    number entered incorrectly

    the number is entered in a protected cell

6.To rename a sheet in Excel you need:

    click L.K.M on the sheet and enter a new name

    click p.k.m on the sheet, and change the name

    double click on the sheet name and change the name (*)

7.You built a chart using some data from a table, and after some time you changed this data. How to rebuild a chart for new data?

    just click once on the diagram

    just double-click on the diagram

    The chart will be recalculated automatically in standard mode (*)

8.After entering a number into a cell, you see “######” instead of the result. How to fix the error?

    change column width (*)

    change line height

    correct inaccuracies in the formula

9.When preparing to print a sheet containing a table and a diagram, it turned out that the diagram was printed in parts on different pages. Which of the following techniques will help solve this problem?

    change the page orientation or scale for printing a sheet (*)

    resize the image on the screen

    move chart to another sheet

    place rigid page dividers on the sheet as needed

10. Source data in spreadsheets is called:

    numbers obtained as a result of calculations

    numbers entered into table cells

    information entered into table cells used for calculations (*)

11. The formula is:

    connection between source and calculated data (*)

    cell addresses and arithmetic operations signs

    letters and numbers indicating cell addresses and arithmetic operations signs

12. The following types of data can be found inside spreadsheet cells:

    only numbers and text, drawings

    only numbers and formulas

    numbers, formulas, text, pictures (*)

    none of the listed objects

13.When the source data changes, all the results....

    automatically recalculated (*)

    stored in computer memory

    saved to disk

14.To delete a column (row) with unnecessary data and formulas, you must:

    select and use the command edit - delete. (*)

    click p.k.m. - clear contents

    select and press m.c.m - cut

15.To insert a row, use the following method:

    select the line before which you want to insert, then menu - insert - line (*)

    select the line before which you want to insert, then menu - edit - paste

    click p.k.m. on the line and use the "paste" command

    when the address referenced by the formula changes when the formula is copied

    when the address referenced by the formula when copied does not change (*)

Topic 2.3 Database management system

1. The database is presented in tabular form. The record forms...

    field in table

    field name

    row in the table (*)

    cell

2.The main element of the database is...

    field

    form

    table

    entry (*)

3.The main properties of the field are:

    data dimension and format

    presence of a "key" tag

    presence or absence of data

    field signature (title, name)

4.What is a recording?

    information entered into some of the fields, stored in the database under a certain number (*)

    serial number of information

    field name

    field unit

5.In the database, records are sorted alphabetically. What is the sort order?

    decreasing

    increasing (*)

6.In the database, records are sorted in the following order: Ivanov, Zhuravlev, Antonov. What is the sort order?

    descending (*)

    increasing

    not one of the above

    The sorting order depends on the user's tasks

7.Sorting is a mode...

    arranging records in a specific sequence (*)

    searching for information in the database

    adding new entries and editing old ones

Topic 2. 4 Computer networks. Viruses. Antivirus programs

1. A modem transmitting information at a speed of 28,800 bps can transmit two pages of text (3600 bytes) within
1) 1 second (*) 2) 1 minute 3) 1 hour 4) 1 day

2.Which method of connecting to the Internet provides the greatest opportunities for accessing information resources?
1) remote access via dial-up telephone channel
2) permanent connection via fiber optic channel (*)
3) permanent connection via a dedicated telephone channel
4) terminal connection via dial-up telephone channel

3. Hypertext is...
1) very large text
2) structured text in which transitions can be made using selected tags (*)
3) text typed on a computer
4) text that uses a large font size

4. Hyperlinks on a web page can provide a link...
1) to any web page of any Internet server
2) to any web page within this domain
3) to any web page of this server
4) within this web page (*)

5.Electronic mail (e-mail) allows you to send…
1) messages only
2) files only
3) messages and attached files (*)
4) video image

6.HTML (Hyper Text Markup Language) is…
1) Internet server
2) a tool for creating web pages (*)
3) programming language translator
4) a web page viewer

7.Internet servers containing file archives allow...
1) receive the necessary files from them (*)
2) receive email
3) participate in teleconferences
4) conduct video conferences

8. A web page may contain...
1) text, pictures, sound, video (*)
2) text, pictures, sound
3) text, drawings
4) text only

9. An Internet email address has been set: [email protected]
What is the name of the owner of this email address?
1) ru 2) glasnet.ru 3) user_name (*) 4) int.glasnet.ru

10.Browsers (for example, Microsoft Internet Explorer) are...
1) Internet servers
2) antivirus programs
3) programming language translators
4) web browsing tools (*)

11.Infection with computer viruses can occur in the process...

      1. working with files (*)

        formatting a floppy disk

        turn off the computer

        printing on a printer

12.What do you need to have to check your hard drive for a virus?

      1. protected program

        boot program

        file with antivirus program (*)

        write-protected floppy disk with antivirus program

13.A computer virus is...

      1. disk testing and treatment program

      2. any program written in low level languages

      3. a program copied from a poorly formatted floppy disk

      4. a special small-sized program that can assign itself to other programs, it has the ability to “multiply” (*)