Digitalization of psychology Synergy
Replenishment date: 16.03.2023
Content: Digital Psychology.docx (27.09 KB)
️Automatic issue of goods ✔️
️Automatic issue of goods ✔️
Sales:
0
Refunds:
0
Reviews:
0
Views:
264
Description
1. Where is the image that you posted on the social network actually stored if you have a private page?
*On my device from which I uploaded the photo
*My ISP
*On social network servers
*Nowhere, because the account is closed
2. What features does Dropbox provide?
*File storage and sharing
*Time planning
*Post service
*File storage
3. Information resources may be proprietary...
*exclusively states
*state and commercial structures
*state, commercial structures and individuals
4. The result of text scanning is ….
*Bitmap
*Vector image
*Fractal image
*Text
5. Text entry and editing, full text search, spreadsheets are…
*information systems
*information technology
*subject technologies
*basic technologies
6. The file system defines
*a way to organize data on a disk
*physical characteristics of the carrier
*disk capacity
*number of disks
7. What is the name of the method of psychological pressure on the user on the Internet, which includes insults and manifestations of aggression?
*Cyberbullying
*Spam
*Trolling
*Gaslighting
8. What happens if you press Ctrl+A in a MS Word document?
*Search window will open
* Selects all text in the document
*Document will be saved
*The document will be deleted from the computer
9. What is a driver?
*A program that increases computer performance
*A program that provides interaction between the operating system and an external physical device
*Numeric code corresponding to the device model
*Program for drivers using maps and navigator to move around the city
10. How to use passwords correctly?
*Choose several different passwords and write them down in notes on your phone
*Use for all accounts the same easy-to-remember password that you have used for the past years and you will definitely not forget
*Use different complex passwords for each account
*Use something personal as your password, such as your pet's name or your date of birth
11. ... - a set of various properties of the product, expressing its ability to meet the needs of the user.
*value
*productivity
*quality
12. The figure shows an example ...
Surname First name Patronymic Name group day of the week
Ivanov Ivan Petrovich Database DBN -101 sr
Svetlova Elena Igorevna English DBN -102 sr
Pushchin Oleg Sergeevich English DBN -101 t
*report
*request
*tables
*screen form
13. Which computer mode can you use if you want
limit power consumption, but do not want to turn off the computer completely or close running applications?
*Sleeping mode
*Completion
*Pause
*Logout
14. The Excel program is used to create ...
*text documents
*spreadsheets
*graphic images
*diagrams
15. Books posted in electronic libraries, ...
*violate the rights of intellectual property owners
*located there illegally
*contain only outdated sources
* posted there by the authors themselves and with the consent of the copyright holders
16. ... is a program that controls a specific model of an external device and takes into account all its features
*driver
*drive unit
*operating system
*adapter
17. Mode "Corrections" in MS Word allows you to see the document edits made by other users. Which?
*File name fix
*Document extension fix
*Corrections in the text and its formatting
*Displays all listed changes
18. The life cycle of a software product begins from the moment ...
*development of the concept of automation
*download and install programs in the computer system
*product purchases
*practical use
19. How to set up a mail filter so that emails from colleagues marked "Urgent" do not fall into spam and are marked as important?
*Select the options "Never send to spam" and "Always mark as
*On my device from which I uploaded the photo
*My ISP
*On social network servers
*Nowhere, because the account is closed
2. What features does Dropbox provide?
*File storage and sharing
*Time planning
*Post service
*File storage
3. Information resources may be proprietary...
*exclusively states
*state and commercial structures
*state, commercial structures and individuals
4. The result of text scanning is ….
*Bitmap
*Vector image
*Fractal image
*Text
5. Text entry and editing, full text search, spreadsheets are…
*information systems
*information technology
*subject technologies
*basic technologies
6. The file system defines
*a way to organize data on a disk
*physical characteristics of the carrier
*disk capacity
*number of disks
7. What is the name of the method of psychological pressure on the user on the Internet, which includes insults and manifestations of aggression?
*Cyberbullying
*Spam
*Trolling
*Gaslighting
8. What happens if you press Ctrl+A in a MS Word document?
*Search window will open
* Selects all text in the document
*Document will be saved
*The document will be deleted from the computer
9. What is a driver?
*A program that increases computer performance
*A program that provides interaction between the operating system and an external physical device
*Numeric code corresponding to the device model
*Program for drivers using maps and navigator to move around the city
10. How to use passwords correctly?
*Choose several different passwords and write them down in notes on your phone
*Use for all accounts the same easy-to-remember password that you have used for the past years and you will definitely not forget
*Use different complex passwords for each account
*Use something personal as your password, such as your pet's name or your date of birth
11. ... - a set of various properties of the product, expressing its ability to meet the needs of the user.
*value
*productivity
*quality
12. The figure shows an example ...
Surname First name Patronymic Name group day of the week
Ivanov Ivan Petrovich Database DBN -101 sr
Svetlova Elena Igorevna English DBN -102 sr
Pushchin Oleg Sergeevich English DBN -101 t
*report
*request
*tables
*screen form
13. Which computer mode can you use if you want
limit power consumption, but do not want to turn off the computer completely or close running applications?
*Sleeping mode
*Completion
*Pause
*Logout
14. The Excel program is used to create ...
*text documents
*spreadsheets
*graphic images
*diagrams
15. Books posted in electronic libraries, ...
*violate the rights of intellectual property owners
*located there illegally
*contain only outdated sources
* posted there by the authors themselves and with the consent of the copyright holders
16. ... is a program that controls a specific model of an external device and takes into account all its features
*driver
*drive unit
*operating system
*adapter
17. Mode "Corrections" in MS Word allows you to see the document edits made by other users. Which?
*File name fix
*Document extension fix
*Corrections in the text and its formatting
*Displays all listed changes
18. The life cycle of a software product begins from the moment ...
*development of the concept of automation
*download and install programs in the computer system
*product purchases
*practical use
19. How to set up a mail filter so that emails from colleagues marked "Urgent" do not fall into spam and are marked as important?
*Select the options "Never send to spam" and "Always mark as
Additional Information
31. A key in a relational database table can be a field...First name Last name e-mail Favorite animal Address
Vasya Pupkin Ddd_3452@mail.ru constrictor Lesnaya 23, apt. 56
Galya Shubina Galina_malina@yandex.ru Cow Tverskaya 13, apt. 3
*Name
*Surname
*Favorite animal
*Address
32. In ... it is said: "Everyone has the right to freely seek, receive, transmit, produce and disseminate information in any lawful way ..."
*Constitution of the Russian Federation
*Federal Law "On Information"
*Federal Law "On Participation in International Exchange"
*Civil Code of the Russian Federation
33. What is the name of checking information posted in the media or the Internet for accuracy?
*Audit
*Investigation
*Journalism
*Fact-checking
34. In MS Excel ... means absolute reference
*C22
*R1C2
*$A$5
*#A#5
35. When transposing the range A5:A10, the range was obtained ...
*A1:F1
*E5:J10
*A11:A16
*A5:B10
36. What do you need to join a Zoom online meeting?
*Optional equipment
*URL link to Zoom website
*Phone number of the conference creator
*Invitation link
37. During execution, the application program is stored ...
*in video memory
*in the processor
*in RAM
*on hard drive
38. Information is enough to make a decision, therefore, information
*actual
*adequate
*sufficient
*full
39. In the fragment of the training table for classifying teenagers according to external features, the class is ...
No. Height Weight Temperament
234 167 86 melancholic
235 143 35 sanguine
236 136 50 melancholic
*height
*the weight
*temperament
*No.
40. What programs are used to reduce the size of files?
*Programs-translators
*File backup software
*Interpreter programs
*Programs-archivers
41. The main benefit of special analytical materials ConsultantPlus is that they:
*help solve a computational problem
* help to learn how to search for documents in the ConsultantPlus system
*provide the fastest access to a specific regulation
* help to understand the practical issue
42. Which of the following links is similar to a scam clone of a site where scammers will try to steal your personal information?
*https://www.aeroflot.ru/xx-ru
*http://sberbank.ru.org
*https://account.mail.ru/
*None of the links will lead to a fake copy of the site
43. Interface is…
*a set of tools and rules for the interaction of PC devices, programs and the user
*hardware complex
*software product element
*part of network equipment
44. A file system is needed...
*to organize the storage structure
*to organize the hardware structure
*for hardware testing
*for hardware management
45. The information contained in a citizen's passport is ...
*data
*knowledge
*information
*information resource
46. By hypertext link from document 1 to document 2 transition ...
*to the place of document 2 that is mentioned in document 1 or to the beginning of document 2
*to document title 2 in a structured link list
*always to the beginning of the document 2
*always to the place of document 2 that is mentioned in document 1
47. Management errors at the stage ... can lead to the fact that the human factor will negate all the benefits of automation.
*user training
*filling databases
* signing contracts
*creation of TK
48. The main criterion for the advent of the information society is ...
*employment of the general population in the field of information processing
*presence of personal computers among the population
*development of information technologies
*creation of electronic information resources
49. It is not true that the objects of legal protection of information is ...
*only commercial information
*computing systems
*democracy, knowledge and spiritual values of society
*constitutional system, sovereignty and territorial integrity of the state
50. Any diagram is built on the basis of ...
*table data
*graphic file
*Excel books
*text file
51. What is the name of the base