The concepts of calculation and number can be described by a relationship. Number concept. Types of numbers. See what a "computable function" is in other dictionaries

"Modeling 3-d nanocircuitry" - Developed transitional circuitry for 3-d VLSI. Synthesis equation. An example of FIE design. Present and future of circuitry. Graph models of integral elements can be trees, or they can contain cycles. RS flip-flop synthesis equation in transient circuitry. Circuitry past and present.

"Teaching Technologies and Methods" - Structuring the content of the project (indicating step-by-step results). Innovative methods can be implemented in both traditional and distance technology learning. New role teacher. Innovative teaching methods and technologies. Innovative technologies - sets of methods and tools that support the stages of implementation of an innovation.

"Modeling a nightgown" - Model # 2. Crossword. Nightgown modeling. Model No. 1. Modeling Neck Wrap Shuttlecock. Nightgown sketches. When modeling a product, an artist must take into account: Presentation. Fashion designer. Model No. 6. Model No. 3. Changing the details of the product drawing in accordance with the selected style is called modeling.

“Modeling Projects” - Today IPMA includes 34 countries, including Russia, which is represented by the national project management association SOVNET. The definition already contains diversity, but all options contain a common feature - the project involves the definition of a goal. Simulation in spreadsheets... Grade 10. Graphics editor; Grade 9 Project "Parquet Modeling".

"Stages of modeling" - IV stage Analysis of simulation results. Stage 1 problem statement. The purpose of the simulation. Information model. Computer experiment. Formulation of the problem. Model development. Modeling and formalization. Stages of modeling. The main stages of modeling. Description of the task. Carrying out an experiment. Stage III Computer experiment.

"Computer Information Modeling" - Computer model... Static. Any object or phenomenon can be the object of modeling. All information models can be created using a computer. Computer generated atom model. Physics - models of physical phenomena. Graphic drawing diagram blueprint diagram. Information Modeling in Computer Science.

Number is an abstraction used to quantify objects. Numbers arose in primitive society in connection with the need of people to count objects. Over time, with the development of science, number has become the most important mathematical concept.

To solve problems and prove various theorems, you need to understand what types of numbers are. The main types of numbers include: natural numbers, whole numbers, rational numbers, real numbers.

Integers - these are numbers obtained by natural counting of objects, or rather by their numbering ("first", "second", "third" ...). A set of natural numbers is denoted by a Latin letter N (can be memorized based on the English word natural). We can say that N ={1,2,3,....}

Whole numbers Are numbers from the set (0, 1, -1, 2, -2, ....). This set consists of three parts - natural numbers, negative integers (opposite to natural numbers) and the number 0 (zero). Integers are denoted by a Latin letter Z ... We can say that Z ={1,2,3,....}.

Rational numbers Are numbers that can be represented as fractions, where m is an integer and n is a natural number. The Latin letter is used to represent rational numbers Q ... All natural numbers and integers are rational.

Real (real) numbers Is a number that is used to measure continuous quantities. The set of real numbers is denoted by the Latin letter R. Real numbers include rational numbers and irrational numbers. Irrational numbers are numbers that result from doing various operations with rational numbers (for example, root extraction, calculating logarithms), but they are not rational.

1. Number systems.

Number system is a way of naming and writing numbers. Depending on the method of displaying numbers, it is divided into positional-decimal and non-positional-Roman.

The PC uses 2-digit, 8-digit and 16-digit number systems.

Differences: the record of a number in the 16th system is much shorter compared to another record, i.e. requires less bit depth.

In the positional number system, each digit retains its constant value regardless of the position it occupies in the number. In the positional number system, each digit determines not only its meaning, but depends on the position it occupies in the number. Each number system is characterized by a radix. The base is the number of different digits that are used to write numbers in a given number system. The base shows how many times the value of the same digit changes when moving to an adjacent position. The computer uses a 2-number system. The base of the system can be any number. Arithmetic operations on numbers in any position are performed according to the rules similar to the 10th number system. For number system 2, binary arithmetic is used, which is implemented in a computer to perform arithmetic calculations.

Binary addition: 0 + 0 \u003d 1; 0 + 1 \u003d 1; 1 + 0 \u003d 1; 1 + 1 \u003d 10

Subtraction: 0-0 \u003d 0; 1-0 \u003d 1; 1-1 \u003d 0; 10-1 \u003d 1

Multiplication: 0 * 0 \u003d 0; 0 * 1 \u003d 0; 1 * 0 \u003d 0; 1 * 1 \u003d 1

The computer widely uses number system 8 and number 16. They are used to shorten the notation of binary numbers.

2. The concept of a set.

The concept of "set" is a fundamental concept in mathematics and has no definition. The nature of the generation of any set is diverse, in particular, the surrounding objects, wildlife, etc.

Definition 1: The objects from which the set is formed are called elements of this set... To designate a set, capital letters of the Latin alphabet are used: for example, X, Y, Z, and in curly brackets separated by commas, its elements are written in lowercase letters, for example: (x, y, z).

An example of the designation of a set and its elements:

X \u003d (x 1, x 2,…, x n) is a set consisting of n elements. If an element x belongs to the set X, then it should be written: xÎX, otherwise the element x does not belong to the set X, which is written: xÏX. Elements of an abstract set can be, for example, numbers, functions, letters, shapes, etc. In mathematics, in any section, the concept of a set is used. In particular, we can give some concrete sets of real numbers. The set of real numbers x satisfying the inequalities:

A ≤ x ≤ b is called segment and is indicated by;

A ≤ x< b или а < x ≤ b называется half-segment and is indicated by:;

· a< x < b называется interval and is denoted by (a, b).

Definition 2: A set that has a finite number of elements is called finite. Example. X \u003d (x 1, x 2, x 3).

Definition 3: The set is called endlessif it consists of an infinite number of elements. For example, the set of all real numbers is infinite. An example of a recording. X \u003d (x 1, x 2, ...).

Definition 4: A set containing no elements is called an empty set and denoted by символом.

The characteristic of a set is the concept of cardinality. Power is the number of its elements. The set Y \u003d (y 1, y 2, ...) has the same cardinality as the set X \u003d (x 1, x 2, ...) if there is a one-to-one correspondence y \u003d f (x) between the elements of these sets. Such sets have the same cardinality or are equal. The empty set has cardinality zero.

3. Methods for specifying sets.

It is believed that the set is given by its elements, i.e. set is given, if one can say about any object: it belongs to this set or does not belong. You can define a set in the following ways:

1) If the set is finite, then it can be specified by listing all its elements. So, if the set Aconsists of elements 2, 5, 7, 12 then write A \u003d (2, 5, 7, 12). Number of elements in a set A equally 4 , write n (A) \u003d 4.

But if the set is infinite, then its elements cannot be enumerated. It is difficult to define a set by enumeration and a finite set with a large number of elements. In such cases, another way of defining the set is used.

2) The set can be specified by specifying the characteristic property of its elements. Characteristic property - this is a property that each element belonging to a set possesses, and not a single element that does not belong to it possesses. Consider, for example, a set X of two-digit numbers: the property that each element of a given set possesses is "to be a two-digit number." This characteristic property makes it possible to decide whether an object belongs to the set X or not. For example, the number 45 is contained in this set, because it is two-digit, and the number 4 does not belong to the set X, since it is unambiguous and not two-valued. It happens that one and the same set can be specified by specifying different characteristic properties of its elements. For example, a set of squares can be defined as a set of rectangles with equal sides and as a set of rhombuses with right angles.

In cases where the characteristic property of the elements of a set can be represented in symbolic form, a corresponding notation is possible. If the set IN consists of all natural numbers less than 10, then they write В \u003d (x N | x<10}.

The second method is more general and allows you to specify both finite and infinite sets.

4. Number sets.

Numeric - a set, the elements of which are numbers. Numeric sets are specified on the axis of real numbers R. On this axis, the scale is selected and the origin and direction are indicated. The most common number sets are:

· - a set of natural numbers;

· - a set of integers;

· - a set of rational or fractional numbers;

· - a set of real numbers.

5. The cardinality of the set. Give examples of finite and infinite sets.

Sets are called equipotent, equivalent if there is a one-to-one or one-to-one correspondence between them, that is, such a pairwise correspondence. when each element of one set is associated with one single element of another set and vice versa, while different elements of one set are compared with different elements of another.

For example, let's take a group of thirty students and issue exam tickets, one ticket to each student from a stack of thirty tickets, such a pairwise correspondence of 30 students and 30 tickets will be one-to-one.

Two sets of equal power with the same third set are equal. If the sets M and N are of equal power, then the sets of all subsets of each of these sets M and N are also of equal power.

A subset of a given set is understood as a set, each element of which is an element of this set. So many cars and many trucks will be subsets of many cars.

The cardinality of the set of real numbers is called the cardinality of the continuum and is denoted by the letter "Aleph" א ... The smallest infinite area is the cardinality of the set of natural numbers. The cardinality of the set of all natural numbers is usually denoted (aleph-zero).

The powers are often referred to as cardinals. This concept was introduced by the German mathematician G. Cantor. If the sets are denoted by the symbolic letters M, N, then the cardinal numbers are denoted by m, n. G. Cantor proved that the set of all subsets of a given set M has cardinality greater than the set M.

A set equal to the set of all natural numbers is called a countable set.

6. Subsets of the specified set.

If we select several elements from our set and group them separately, then this will be a subset of our set. There are many combinations from which a subset can be obtained; the number of combinations only depends on the number of elements in the original set.

Suppose we have two sets A and B. If each element of the set B is an element of the set A, then the set B is called a subset of A. It is denoted: B ⊂ A. Example.

How many subsets of the set A \u003d 1; 2; 3.

Decision. Subsets consisting of the elements of our set. Then we have 4 options for the number of elements in the subset:

The subset can be 1 item, 2, 3 items and can be empty. Let's write down our elements in sequence.

Subset of 1 item: 1,2,3

Subset of 2 items: 1,2,1,3,2,3.

Subset of 3 items: 1; 2; 3

Let's not forget that the empty set is also a subset of our set. Then we get that we have 3 + 3 + 1 + 1 \u003d 8 subsets.

7. Operations on sets.

You can perform certain operations on sets, similar in some respects to operations on real numbers in algebra. Therefore, we can talk about the algebra of sets.

Consolidation (connection of) sets A and IN a set is called (symbolically it is denoted by), consisting of all those elements that belong to at least one of the sets A or IN... In the form of xunion of sets is written as follows

The entry reads: "union A and IN" or " Acombined with IN».

Operations on sets are graphically depicted using Euler circles (sometimes the term "Venn-Euler diagrams" is used). If all elements of the set Awill be concentrated within the circle A, and the elements of the set IN- within the circle IN, then the union operation using Euler circles can be represented in the following form

Example 1... By combining the set A \u003d (0, 2, 4, 6, 8) even digits and sets IN \u003d (1, 3, 5, 7, 9) odd digits is the set \u003d (0, 1, 2, 3, 4, 5, 6, 7, 8, 9) of all decimal digits.

8. Graphic representation of sets. Euler-Venn diagrams.

Euler-Venn diagrams are geometric representations of sets. The construction of a diagram consists in the image of a large rectangle representing a universal set U, and inside it - circles (or some other closed figures), representing sets. The shapes should intersect in the most general way required by the problem and should be marked accordingly. Points lying within different areas of the diagram can be considered as elements of the corresponding sets. Having constructed a diagram, it is possible to shade certain areas to denote the newly formed sets.

Operations on sets are considered to obtain new sets from existing ones.

Definition. Consolidation sets A and B is called a set consisting of all those elements that belong to at least one of the sets A, B (Fig. 1):

Definition. Intersection sets A and B is called a set consisting of all those and only those elements that belong simultaneously to both the set A and the set B (Fig. 2):

Definition. Difference sets A and B is called the set of all those and only those elements of A that are not contained in B (Fig. 3):

Definition. Symmetric difference setsA and B is called the set of elements of these sets that belong either only to set A, or only to set B (Fig. 4):

Cartesian (or direct) product of setsA and B such a resulting set of pairs of the form ( x,y) constructed in such a way that the first element from the set A , and the second element of the pair is from the set B ... Common designation:

A× B={(x,y)|xA,yB}

The products of three or more sets can be constructed as follows:

A× B× C={(x,y,z)|xA,yB,zC}

Works of the form A× A,A× A× A,A× A× A× A etc. it is customary to write in the form of a degree: A 2 ,A 3 ,A 4 (the base of the degree is the multiplier, the indicator is the number of works). One reads such an entry as "Cartesian square" (cube, etc.). There are other readings for basic sets. For example, R n it is customary to read as "er nnoe".

Properties

Consider several properties of the Cartesian product:

1. If A,B are finite sets, then A× B - the final. And vice versa, if one of the multiplier sets is infinite, then the result of their product is an infinite set.

2. The number of elements in a Cartesian product is equal to the product of the numbers of elements of the multiplier sets (if they are finite, of course): | A× B|=|A|⋅|B| .

3. A np ≠(A n) p - in the first case, it is advisable to consider the result of the Cartesian product as a matrix of dimensions 1 × np , in the second - as a matrix of sizes n× p .

4. The commutative law is not fulfilled, because the pairs of elements of the result of the Cartesian product are ordered: A× BB× A .

5. The associative law is not fulfilled: ( A× BCA×( B× C) .

6. Distributivity takes place with respect to the basic operations on sets: ( ABC=(A× C)∗(B× C),∗∈{∩,∪,∖}

10. The concept of utterance. Elementary and compound statements.

Utterance- This is a statement or declarative sentence about which we can say that it is true (I-1) or false (L-0), but not both at the same time.

For example, "It is raining today", "Ivanov completed laboratory work No. 2 in physics."

If we have several initial statements, then using logical alliances or particles we can form new statements, the truth value of which depends only on the truth values \u200b\u200bof the original statements and on the specific conjunctions and particles that participate in the construction of a new statement. Words and expressions “and”, “or”, “not”, “if ... then”, “therefore”, “then and only then” are examples of such unions. The original statements are called simple , and new statements built from them with the help of certain logical unions - constituent ... Of course, the word "simple" has nothing to do with the essence or structure of the original statements, which themselves can be very complex. In this context, the word "simple" is synonymous with the word "original". The important thing is that the truth values \u200b\u200bof simple statements are assumed to be known or given; in any case they are not discussed in any way.

Although a statement like "Today is not Thursday" is not composed of two different simple statements, for consistency of construction it is also considered a compound one, since its truth value is determined by the truth value of another statement "Today is Thursday."

Example 2. The following statements are considered compound:

I read Moskovsky Komsomolets and I read Kommersant.

If he said this, then it is true.

The sun is not a star.

If it is sunny and the temperature exceeds 25 0, I will come by train or car

Simple statements that are part of the compound, in themselves, can be completely arbitrary. In particular, they themselves can be composite. The basic types of compound statements described below are determined independently of the simple statements that form them.

11. Operations on statements.

1. Operation of negation.

By denying utterances A (reads "not A"," It is not true that A"), Which is true when A false and false when A - true.

Denying each other Aand are called opposite.

2. Conjunction operation.

Conjunction statements Aand IN is the statement denoted A B (reads " A and IN"), The true values \u200b\u200bof which are determined if and only if both statements A and INare true.

A conjunction of statements is called a logical product and is often denoted AB.

Let the statement be given A - “in March the air temperature is from 0 C to + 7 C"And the statement IN - "It is raining in Vitebsk." Then A B will be as follows: “in March the air temperature from 0 C to + 7 Cand it is raining in Vitebsk. " This conjunction will be true if there are statements A and IN true. If it turns out that the temperature was less 0 C or there was no rain in Vitebsk, then A B will be false.

3 ... Disjunction operation.

Disjunction statements Aand INcalled a statement A B (A or IN), which is true if and only if at least one of the statements is true and false - when both statements are false.

A disjunction of statements is also called a logical sum A + B.

The saying “ 4<5 or 4=5 "Is true. Since the saying “ 4<5 "- true, and the statement" 4=5 "- false, then A B represents the true saying “ 4 5 ».

4 ... Implication operation.

By implicationstatements A and IN called a statement A B ("if Athen IN"," From A should IN"), The value of which is false if and only if A true, and IN false.

In implication A B utterance A called basis,or a parcel, and the statement INconsequence,or conclusion.

12. Truth tables of statements.

A truth table is a table that establishes a correspondence between all possible sets of logical variables included in a logical function and the values \u200b\u200bof the function.

Truth tables are used for:

Calculating the truth of complex statements;

Establishing the equivalence of statements;

Definitions of tautologies.

§ The creation of computer viruses is a criminal offense.

§ The most important regulatory legal act in the field of information security in Russia is Constitution of the Russian Federation.

§ The main state body of the Russian Federation that controls activities in the field of information protection is State Duma Security Committee.

§ Among the logos of software products, the logo of the antivirus program is (drawn in the form of an insect)

§ A characteristic feature of Dr. Web is an opportunity installation on the infected machine.

§ The first virus outbreak in the world was caused by a malicious program "Brain".

§ Possible punishment under Article 273 of the Criminal Code of the Russian Federation for the creation, use and distribution of malicious computer programs that did not entail serious consequences - restriction of freedom for up to 4 (or 7) years.

§ Malicious program "Trojan horse"penetrates the computer under the guise of another program (known and harmless) and at the same time has hidden destructive functions.

§ The earliest graphical information models include: rock paintings

§ To study planet Earth, you can create: more than three models

§ A visual means of representing the composition and structure of a system is called: count

§ The following documents can be considered as an information model of state governance: Constitution of the Russian Federation

§ In relation to whole - part, there are no concepts: carrier - Winchester

§ The ordering of information on a specific basis is called: systematization

§ Of the models below, the verbal one is: cV of the applicant for a vacant position

§ Animation of the Earth's movement around the Sun on a computer is __model: dynamic

§ In a relationship an object - model there are concepts: clothing sketch

§ The concept of "furniture" and "table" can be described by the relation: general-particular

§ In the model-subject relationship, there are no concepts: film script

§ The concepts of "calculation" and "number" can be described by the relation: result process

§ The system usually consists of: multiple objects

§ The material model is: toy car

§ The weekly temperature graph is a graphical model: information

§ The model of an absolutely elastic collision of two bodies, written in the form of formulas, is: sign math

§ Carrying out research on a real object with the subsequent processing of the results of the experiment is__modeling : natural

§ The circuit diagram is a __ information model: graphic

§ Finding the optimal path from the input data to the result is used in the model: “ labyrinth search "

§ Models that are a collection of useful and necessary information about an object are called: information

§ A sign or quantity that characterizes any property of an object and can take different values \u200b\u200bare called _models: parameter

§ The adequacy of theoretical models to the laws of the real world is checked using: experiences and experiments

§ Combining parts of a system into a single whole during the modeling process is called __systems: aggregation

§ The development of any science as a whole can be interpreted in a very general, but quite reasonable sense, as __ modeling: theoretical

§ Evaluation of the functional completeness, accuracy and reliability of the forecast model, when the verification of the adequacy for some reason is impossible, is called the __ model: verification

§ The process of presenting information about a modeling object in any chosen form is called: formalization

§ The correct order of the stages of mathematical modeling of the process is as follows: defining the goals of modeling - building a mathematical model - conducting research - analyzing the result

§ The modeling process includes __, the subject and the object of modeling: model

§ The model property displays only the essential aspects of the object: simplicity

§ The result of the formalization process is a __ model: mathematical

§ In the process of modeling, the formation of an idea about the components of the original object is carried out at the stage: model development

§ The decomposition of the whole into parts (structural division) in the process of modeling is called the __ system: decomposition

§ The term "communication channel" in computer science is understood as: telephone, telegraph, or satellite communication line and hardware used to transmit information

§ An event occurred - the fox took the trail of the hare. Then it is true that: organ that perceives an information signal - nose

§ Deliberate distortion of information will affect the __ property of information: credibility

§ Entropy in information theory is: a measure of system state uncertainty

§ If the message carries 1 bit of information, then it reduces the uncertainty of knowledge: 2 times

§ The discreteness property of the algorithm means that: the algorithm is split into a series of separate complete commands, each of which must be executed before the executor proceeds to the next

§ When solving a problem on a computer at the stage of debugging the program, the following is not performed: writing an algorithm in a programming language

§ The founder of domestic computing technology is: lebedev

§ The first adding machine, which performed 4 arithmetic operations, was constructed in the 17th century: leibniz

§ A decisive contribution to the possibility of formal transformations of logical expressions was made by: boole

§ The idea of \u200b\u200bsoftware control of computational processes was first formulated: babbage

§ The first programmer in the world is: lovelace

§ The first means of transmitting information over long distances is considered to be: mail

§ The very first instruments used for counting in ancient man were: fingers

§ In 1896 __ founded a company for the production of tabulation machines, which in 1924, after a series of mergers and renames, became the famous company ICM: Herman Hollerith

§ The stage of solving the problem on a computer, including the choice of a programming language, clarification of methods for organizing data, recording an algorithm in the selected programming language, is called: programming

§ Solving problems on computers consists of a number of stages. The stage "setting the problem" is followed by the stage : problem analysis and modeling

§ The most effective means of controlling data on the network are: passwords, ID cards and keys

§ In the "person - TV" system, information carriers are: sound and light waves

§ In the "radio transmission tower-radio receiver" system, the information carriers are: electromagnetic waves

§ 2 friends are talking on the phone. In this case, the source of information, the receiver of information and the communication channel are, respectively : a person speaking, a person listening, a set of technical devices that provide communication

§ The pragmatic aspect is the characteristic of information in terms of its: usefulness

§ Peripheral devices perform the function ... a) control of the operation of a computer according to a given program b) input-output of information c) operational storage of information d) processing of data entered into a computer.
Correct answer: b.

§ Flash drives use ____________ memory.
Correct answer: semiconductor.

§ The main parameters of laser printers include: a) carriage width, maximum print speed b) data buffer, noise level c) resolution, print buffer d) productivity, paper format.
Correct answer: in, g.

§ Parameters such as pixel response time and viewing angle are typical for the following devices: a) LCD monitor b) TFT monitor c) plotter d) scanner.
The correct answer is a, b.

§ The integrated Microsoft Office package includes: a) an application for working with business graphics b) a database management system c) a vector graphics editor d) a raster graphics editor.
The correct answer is a, b.

§ The characteristics of the quality of information include: A) completeness, B) cyclicity, C) expressiveness, D) reliability, E) relevance, E) direction
Correct answer: A, D, D

§ The error "missing semicolon" can be detected at the stage of semantic analysis / code optimization / parsing / lexical analysis.
Lexical analysis - parsing a program into a sequence of lines (lexemes), convenient from the point of view of the compiler. Parsing is the process of matching a linear sequence of tokens of a language with its formal grammar. Semantic analysis - analysis of the internal model (database) of a set of named objects, with which the program works, with a description of their properties, characteristics and relationships. In other words, this is a semantic analysis. The code optimizer does not look for errors at all. Correct answer: parsing.

§ What type is the variable written in the program as 1.00E02?
Real.

§ The logical programming language is Prolog / LISP / BASIC / ADA.
Logic programming is a programming paradigm based on automatic theorem proving. Logic programming is based on the theory and apparatus of mathematical logic using the mathematical principles of resolutions. The most famous logic programming language is Prolog.

§ The concept of "class hierarchy" is inherent in the dynamic / heuristic / object-oriented / structured programming methodology.
Class hierarchy in computer science means the classification of object types, considering objects as an implementation of classes (a class is like a stub, and an object is what is built on the basis of this stub) and linking different classes with relationships like "inherit", "extend". Correct answer: object oriented programming.

§ With a structural approach to programming, the following concepts can be used: a) alternative choice, b) loop, c) subroutine, d) inheritance.
Structural programming is a software development methodology based on the presentation of a program in the form of a hierarchical block structure. In accordance with it 1) any program is a structure built of three types of basic constructions: sequential execution, branching, loop; 2) repeating fragments are formatted as subroutines; 3) the development of the program is carried out step by step. Therefore, the correct answers are: a, b, c.

§ When designing software, the following approaches are used: a) top down, b) bottom up, c) left to right, d) right to left.
Answers a and b are correct. Honestly, I don't have a rigorous justification, but, as I understand it, first you need to reduce the problem to specific tasks (analysis), come up with a solution and implement them from small to large (synthesis).

§ The description of a loop with a precondition is an expression: a) while the condition is true, execute the operator; b) if the condition is true, execute the operator, otherwise stop; c) execute the operator while the condition is false; d) execute the operator a specified number of times.
The correct answer is a.

§ Algorithm recording tools are NOT: block diagrams, programming languages, translators, pseudo codes.
Translators. They only translate the program from one language to another. For example, from a programming language to machine code.

§ The representation of the relational data model in the DBMS is implemented as ...
... tables. The relational model focuses on organizing data in two-dimensional tables. Each relational table is a two-dimensional array and has the following properties: each table element is one data element, all cells in a table column are homogeneous, that is, all elements in a column have the same type (numeric, character, etc.), each column has a unique name, there are no identical rows in the table, the order of rows and columns can be arbitrary.

§ In vector graphic editors, you can use perspective / orthogonal / polygon / virtual projections.
Perspective and orthogonal.

§ The cell in the spreadsheet contains the number 1.1E + 11. What does it look like in decimal?
110000000000.

§ Text in a MS Word document located between two characters ¶.
Paragraph.

§ The system recognizes the file format by its ...
... expansion.

§ To terminate or start processes and get an idea of \u200b\u200bthe current system load, the program is used ...
...Task Manager.

§ Data output devices: a) CD-ROM drive, b) hard disk, c) monitor, d) scanner, e) laser printer.
Correct answer: c and d.

§ A device that can store data only when the computer is powered on.
RAM.

§ The number of bits simultaneously processed by the processor.
Bit depth.

§ List true statements.
1. The appearance of the second generation of computers was due to the transition from vacuum tubes to transistors.
2. In the first generation computer there was no control device.
3. The first generation computers lacked operative memory.
4. Third-generation machines are a family of machines with a common architecture, that is, software compatible.
5. A computer with an Intel Pentium III processor belongs to the fourth generation of computers.

True statements: 1, 4, 5. For those interested, I recommend a wonderful blogdedicated to computer literacy.

§ The least significant bit of binary notation of a multiple of 2 is ...
0 ! The binary notation of a number consists of zeros and ones, which are factors before powers of two. For example, the binary number 1101 in the decimal number system is 13 (1 · 2 3 + 1 · 2 2 +0 · 2 1 +1 · 2 0). The least significant bit is 0 or 1, standing in the rightmost place in the record, in our case, the factor in front of 2 0. For the number to be even (multiple of 2), this factor must be equal to 0.

§ Order logical operations - disjunction, inversion, conjunction - by priority.
Inversion (logical negation), conjunction (logical multiplication), disjunction (logical addition).

§ The amount of information that contains a message that reduces the uncertainty of knowledge by 2 times is called ...
As a unit of information, the amount of information is taken that contains a message that halves the uncertainty of knowledge. Such a unit is named bit.

§ The set of formulas reflecting certain properties of an object / original or its behavior is called a physical / statistical / mathematical / dynamic model.
This is a mathematical model.

§ FTP is designed for
a) file transfer
b) downloading messages from newsgroups
c) web browsing
d) chatting.

The correct answer is a.

§ As a result of executing a fragment of the algorithm
input X, A, B, C
Y \u003d X ^ A + B * sin (C)
pin Y

when entering values \u200b\u200bX, A, B, C equal to 5,2,467,0 respectively, the value of Y will be ...

25.

§ Fragment of the program
S: \u003d 0
nts for i from 1 to 10
input a
S: \u003d S + a
kts
S: \u003d S / 10
pin S

outputs ...
1) tenth of the last number of 10 entered from the keyboard
2) the sum of 10 numbers entered from the keyboard
3) remainder after division by 10 of a given number
4) the average of 10 numbers entered from the keyboard.

Let's first deal with the notation. The: \u003d operator means assigning a value to a variable. nts and kts - the beginning and end of the cycle, in our case from 1 to 10. This means that the actions between nts and kts are repeated 10 times. input - input of the variable value from the keyboard.
It turns out that first we start a variable with the value 0. Then we enter numbers 10 times from the keyboard and add them up. Divide the result by 10. This is the average. The correct answer is 4.

§ The Bat program allows ... to upload Web pages / upload and edit e-mail / archive e-mail / transfer files via FTP.
Correct answer: upload and edit email.

§ Network worms are ... programs that modify files on disks and spread within a computer / program, which do not modify files on disks, but spread on a computer network, penetrate the computer's operating system, find addresses of other computers or users and send at these addresses their copies / programs that spread only by means of e-mail / malware, the action of which is to create failures when the computer is powered from the mains.
The category of network worms includes malicious programs whose main goal is as widespread as possible. The mechanism of their distribution is generally structured as follows: 1) a network worm enters a computer (via an email attachment, an Internet link, a file-sharing network, etc.) 2) a copy (copies) of the worm is created and launched 3) copies tend to go to the following devices (computers) on the Internet, local network.
The correct answer, as often happens, is the longest - programs that do not modify files on disks, but spread in a computer network, penetrate the computer's operating system, find the addresses of other computers or users and send copies of themselves to these addresses.

§ Compared with other types of cables, fiber optic ...
a) has the lowest cost
b) has a high speed of information transfer
c) has no radiation
d) not affected by electromagnetic fields
e) allows wireless data transmission.

Correct answers: b, c, d.

§ An object of object-oriented programming is called 1) a set of state variables and associated methods (operations); 2) a group of data and methods (functions) for working with this data; 3) a function or procedure that performs certain actions; 4) characteristic assigned to a class element
The correct answer is 1.

§ For object-oriented programming technology, it is true that 1) classes form a hierarchy based on the principles of inheritance; 2) procedures that implement some algorithms are used as the main elements of the program; 3) the behavior of objects of the same class is very different; 4) the external description of the class (interface) reflects the structure of the object
The correct answer is 1.

§ For object-oriented programming technology, it is true that 1) classes and objects are used as the main elements of the program; 2) the internal description of the class (implementation) describes the abstraction of the behavior of all objects of this class, but hides the features of the object's behavior; 3) procedures that implement some algorithms are used as the main elements of the program; 4) the external description of the class (interface) reflects the structure of the object
The correct answer is 1.

§ One of the fundamental concepts of object-oriented programming "encapsulation" means 1) combining data and algorithms for processing this data into a single whole; 2) the property of different objects to perform the same action in different ways; 3) the ability of an object to save the properties and methods of the parent class; 4) conclusion in a separate module of all procedures for working with the object
The correct answer is 1.

§ For object-oriented programming technology, it is true that inheritance is 1) the ability of an object to retain the properties and methods of the parent class; 2) hiding information and combining data and methods within an object; 3) the ability to set different actions in the hierarchy of objects in a method with one name; 4) conclusion in a separate module of procedures for working with an object
The correct answer is 1.

§ In object-oriented programming, a user-defined data type that has internal data and methods for working with them in the form of procedures or functions is called 1) a class; 2) an attribute; 3) field; 4) property
The correct answer is 1.

§ Viruses can be: a) bootable, b) mutants, c) invisible, d) defective, e) logical.
The correct answer is a, c, d.

§ Software tools for protecting information in a computer network are: 1) Firewall, 2) Antivirus, 3) Sniffer, 4) Backup.
The correct answer is 1, 2.

§ An electronic digital signature establishes _____ information. 1) consistency 2) authenticity 3) volume 4) inconsistency
The correct answer is 2.

§ Electronic digital signature of a document allows you to resolve the issue of ____ document (s). 1) access mode 2) value 3) authenticity 4) secrecy
The correct answer is 3.

§ A compressed source image is commonly used ... 1) as a key for encrypting text 2) for creating an electronic digital signature 3) as a public key in symmetric algorithms 4) as a result of encrypting text for sending it over an unsecured channel
The correct answer is 2.

§ Network worms are ... 1) Programs that do not modify files on disks, but spread over a computer network, penetrate the computer's operating system, find the addresses of other computers or users and send copies of themselves to these addresses 2) Malicious programs, the action of which is to create power failures of the computer from the mains 3) Programs that are distributed only via e-mail 4) Programs that modify files on disks and are distributed within the computer
The correct answer is 1.

§ The authenticity of the document can be verified ... 1) by the author's secret key 2) by verifying the image of the handwritten signature 3) by his electronic signature 4) by his secret key
The correct answer is 3.

§ To destroy ("bite out") the virus after its recognition, they use ... 1) phage programs 2) auditor programs 3) filter programs 4) vaccine programs
The correct answer is 1.

§ You need to send an email to the remote recipient. In this case, the recipient must know that this is exactly the same message. To do this, you need to ... 1) use a digital signature 2) close the message with a password 3) send the message via a secret communication channel 4) archive the message
The correct answer is 1.

§ A malicious program ________________ penetrates the computer under the guise of another program (known and harmless) and has hidden destructive functions. 1) "Trojan horse" 2) stealth virus 3) macro virus 4) "computer worm"
The correct answer is 1.

§ The essence of information compromise 1) making changes to the database, as a result of which the user is deprived of access to information 2) unauthorized access to transmitted information through communication channels and destruction of the content of transmitted messages 3) making unauthorized changes to the database, as a result of which the consumer is forced to either abandon it, or make additional efforts to identify changes and restore true information
The correct answer is 3.

§ The main threats to the availability of information 1) unintentional user errors 2) malicious data modification 3) hacker attack 4) software and hardware failure 5) destruction or damage to premises 6) data interception
The correct answers are 1,4,5.

§ The concept of a defense system against information weapons should not include ... 1) signs signaling a possible attack 2) procedures for assessing the level and characteristics of an attack against national infrastructure in general and individual users 3) means of counter-attack using information weapons 4) mechanisms for protecting users from various types and levels of threats to the national information infrastructure
The correct answer is 3.

§ Information leakage means ... 1) the unauthorized process of transferring information from the source to the attacker 2) the process of destroying information 3) unintentional loss of the information carrier 4) the process of disclosing classified information
The correct answer is 1.

§ When setting an electronic password, there are a number of precautions to be taken, in particular 1) use jargon words, since they are more difficult for a cracker to guess 2) be sure to write down the password so as not to forget it, and keep it in a safe place 3) change the password if for any reason you told your relatives 4) use one the same password for different purposes, for example, to access both the mailbox and the secure disk, so as not to get confused
The correct answer is 3.

§ The most effective way to protect the local computer from unauthorized access when it is turned on is ... 1) using software and hardware protection 2) setting a password on the BIOS 3) using the latest operating system 4) setting a password on the operating system
The correct answer is 1.

§ The most effective means of monitoring data on the network are ... 1) archiving systems 2) antivirus software 3) RAID disks 4) passwords, ID cards and keys
The correct answer is 4.

§ Internet proxy server 1) is used for the exchange of electronic signatures between network subscribers 2) allows encryption of electronic information 3) provides the user with a secure communication channel 4) provides anonymization of access to various resources
The correct answer is 4.

§ Automatic encryption-decryption of information when writing to media is provided by the file system ... 1) DFS 2) FAT-64 3) NTFS 4) FAT-32
The correct answer is 3.

§ The Trojan horse is ... 1) a program whose malicious action is expressed in the deletion and / or modification of system files of a computer 2) a program that infects a computer regardless of the user's actions 3) a program that penetrates a user's computer via the Internet 4) a malicious program that does not reproduce itself, but gives itself out for something useful, thereby trying to induce the user to rewrite and install the program on their own computer
The correct answer is 4.

§ Reasons for data errors: 1) measurement error 2) error in recording measurement results in an intermediate document 3) incorrect interpretation of data 4) errors in transferring data from an intermediate document to a computer 5) use of unacceptable methods of data analysis 6) fatal natural causes 7) deliberate distortion of data 8) errors in the identification of an object or a business entity
The correct answers are 1,2,4,7,8.

§ The threat of remote administration in a computer network means a threat ... 1) unauthorized control of a remote computer 2) the introduction of aggressive program code within the active objects of Web pages 3) interception or substitution of data along the transportation routes 4) interference with privacy 5) interference with privacy 6) delivery of inappropriate content
The correct answer is 1.

§ Security services: 1) identification and authentication 2) encryption 3) password inversion 4) integrity control 5) conflict management 6) escaping 7) ensure secure recovery 8) write caching
The correct answers are 1,2,4,6,7.

§ The fundamental difference between firewalls (ME) and intrusion detection systems (IDS): 1) ME were developed for active or passive protection, and IDS - for active or passive detection 2) ME were developed for active or passive detection, and IDS - for active or passive protection 3) MEs work only at the network level, and IDS - also on the physical
The correct answer is 1.

§ Information security of an automated system is a state of an automated system in which it, ... 1) on the one hand, is able to withstand the effects of external and internal information threats, and on the other, its presence and functioning does not create information threats to the elements of the system itself and external environment 2) on the one hand, it is able to withstand the effects of external and internal information threats, and on the other hand, the costs of its operation are lower than the expected damage from the leakage of protected information 3) is able to withstand only information threats, both external and internal 4) is capable resist only external information threats
The correct answer is 1.

§ In accordance with the norms of Russian legislation, information protection is the adoption of legal, organizational and technical measures aimed at ... 1) ensuring the protection of information from unauthorized access, destruction, modification, blocking, copying, provision, distribution, as well as from other illegal actions in relation to such information 2) implementation of the right to access information 3) compliance with international law in the field of information security 4) identification of violators and bringing them to justice 5) compliance with confidentiality of information with limited access 6) development of methods and improvement of information security
The correct answers are 1,2,5.

§ Type of threat of an action aimed at the unauthorized use of information resources, which does not affect its functioning - ... threat 1) active 2) passive 3) secret 4) indifferent
The correct answer is 2.

§ File system object protection tools are based on ... 1) defining user rights for operations with files and directories 2) setting attributes of files and directories that do not depend on user rights
The correct answer is 1.

§ Elements of the Copyright Mark: 1) the letters C in a circle or parentheses 2) the letters P in a circle or parentheses 3) the name (name) of the copyright holder 4) the name of the protected object 5) the year of the first release of the program
The correct answers are 1,3,5.

§ A document defining the most important security services and proposing a method for classifying information systems according to security requirements 1) X.800 recommendations 2) orange book 3) law “On information, information technology and information protection” 4) GOST 153.84 T
The correct answer is 2.

§ Sections of modern cryptography: 1) symmetric cryptosystems 2) public key cryptosystems 3) cryptosystems with duplicated protection 4) data transmission control
The correct answers are 1, 2.

§ Information constituting a state secret cannot be classified ... 1) "for official use" 2) "secret" 3) "top secret" 4) "special importance"
The correct answer is 1.

§ The most effective means of protecting against network attacks 1) using firewalls 2) using anti-virus programs 3) visiting only “reliable” Internet sites 4) using only certified browser programs when accessing the Internet
The correct answer is 1.

§ Does not apply to forms of information protection ... 1) analytical 2) legal 3) organizational and technical 4) insurance
The correct answers are 1.4.

§ According to the principles of operation, computer facilities are divided into ... 1) digital 2) analog 3) combined 4) electronic 5) tube 6) transistor 7) microprocessor 8) specialized 9) universal
The correct answer is 1, 2, 3.

§ Information on magnetic disks is recorded ... 1) along concentric tracks and sectors 2) in special magnetic windows 3) along index holes 4) in disk registers
The correct answer is 1.

§
The correct answer is 1.

§ The multimedia computer necessarily includes ...1) CD-ROM drive 2) projection panel 3) modem 4) network card
The correct answer is 1.

§ Parameters such as resolution and performance are typical for ...1) flatbed scanners 2) laser printers 3) touch screens 4) TFT monitors
The correct answers are 1, 2.

§ Printing devices use the ________-color representation model 1) CMYK 2) JPEG 3) BMP 4) PSD
The correct answer is 1.

§ The main parameters of flatbed scanners include ... 1) resolution 2) dynamic range 3) number of nozzles 4) data buffer size
The correct answers are 1, 2.

§ In the ASCII code table, the international standard refers to ... 1) first 128 2) first 64 3) last 128 4) all 256
The correct answer is 1.

§ You must send an email to the remote recipient. In this case, the recipient must know that this is exactly the same message. To do this, you need ... 1) use a digital signature 2) send the message via a secret communication channel 3) archive the message 4) close the message with a password
The correct answer is 1.

§ The standard code for communication is code ... 1) ASCII 2) ACCESS 3) ANSI 4) BIOS
The correct answer is 1.

§ 65536 different characters can be encoded in the __________ code table. 1) Unicode 2) KOI-8P 3) ASCII 4) CP-1251
The correct answer is 1.

§ Cyrillic encodings: 1) KOI-8R 2) CP-1251 3) RADIX-50 4) ISO 8859-5
The correct answers are 1, 2, 4.

§ In order to establish the exchange of digitally signed electronic messages, it is necessary to transmit to the recipient of the messages ... 1) public encryption key 2) private encryption key 3) type of your digital signature 4) encryption algorithm you use
The correct answer is 1.

§ For 5 letters of the Latin alphabet, their binary codes are given: a - 000, b - 110, c - 01, d - 001, e - 10. Then the binary string 1100000100110 encodes a set of letters: 1) bacde 2) baade 3) badde 4) bacdb
The correct answer is 1.


The correct answer is 1.

§ In the auditorium, there are two rectangular areas of the spectator seats: one is 6 by 12, and the other is 8 by 4. The minimum number of bits required to encode each seat in an automated system is ... 1) 7 2) 2 3) 104 4) 128
The correct answer is 1.

§ 28 triggers can store ___ bytes of information 1) 3,5 2) 28 3) 7 4) 2,5
The correct answer is 1.

§ If the average reading speed is 160 words per minute (one word - on average 6 characters), then in four hours of continuous reading you can read _______ KB of text (accept a single-byte character code) 1) 225 2) 255 3) 256 4) 4096
The correct answer is 1.

§ To memorize 8 bytes of information, ___ trigger (s) are required 1) 64 2) 8 3) 1 4) 16
The correct answer is 1.

§ The maximum number of pages in a book (32 lines of 64 characters each, 1 character takes 8 bits), which fits in a file of 640 KB, is ... 1) 320 2) 640 3) 540 4) 12801
The correct answer is 1.

§ In the auditorium, there are two rectangular areas of the spectator seats: one is 6 by 12, and the other is 8 by 4. The minimum number of bits that is required to encode each seat in an automated system is: 1) 7 2) 2 3) 104 4) 128
The correct answer is 1.

§ The code table CP-1251 (Windows Cyrillic) is used. A file in simple text format, if there are 200 pages in the text, 32 lines on a page, and on average 48 characters per line, it will take __________ kilobyte (s) 1) 300 2) 307.2 3) 384 4) 2400
The correct answer is 1.

§ A message of 2 33 bits contains ______ gigabyte (s) of information. 1) 1 2) 4 3) 3 4) 33
The correct answer is 1.

§ 50-character message was recorded in 8-bit Windows-1251 encoding. After being pasted into a text editor, the message was recoded to 16-bit Unicode. The amount of memory occupied by the message has increased by ... 1) 50 bytes 2) 100 bits 3) 400 bytes 4) 50 bits
The correct answer is 1.

§ Morse code allows you to encode characters for radio communications by specifying combinations of dots and dashes. Using Morse code with a length of at least three and no more than four signals (dots and dashes), it is possible to encode _______ different character (s) 1) 24 2) 12 3) 128 4) 64
The correct answer is 1.

§ The quality of the sound digitized by a sound card is determined by parameters such as ...1) sampling rate 2) coding depth 3) sound level 4) sound duration
The correct answers are 1, 2.

§ The analog audio signal was sampled first using 65,536 levels of signal strength (audio CD sound quality) and then using 256 signal strength levels (sound quality of radio broadcasts). The information volumes of codes will differ by ____ times (s). 1) 2 2) 8 3) 16 4) 256
The correct answer is 1.

§ In sound creation mode, the sound card uses the methods ... 1) frequency modulation 2) wave tables 3) logic synthesis 4) pulse modulation
The correct answers are 1, 2.

§ In base ____, decimal 26 is written as 101. 1) 5 2) 2 3) 8 4) 16
The correct answer is 1.

§ The value of the sum 7779 16 +887 16 in hexadecimal notation is ...1) 8000 16 2) 8FFF 16 3) 7FFF 16 4) 7000 16
The correct answer is 1.

§ The value of the sum 100 2 +11 8 +10 16 in decimal notation is ... 1) 29 2) 121 3) 28 4) 111
The correct answer is 1.

§ The decimal number 63389 10 corresponds to a hexadecimal number ...1) F79D 2) 1397 16 3) 13970 16 4) ED7F
The correct answer is 1.

§ The difference in hexadecimal numbers 7777 16 -887 16 is ...1) 6EF0 16 2) 6890 16 3) 6458 16 4) 6DB0 16
The correct answer is 1.

§ The value of the sum of numbers 1110101 2 +1011011 2 in octal number system is 1) 320 2) 2110 3) 298 4) 318
The correct answer is 1.

§ The degree of conformity of the model to that real phenomenon (object, process), for the description of which it is being built, is called ___________ of the model. 1) adequacy 2) stability 3) flexibility 4) identity
The correct answer is 1.

§ 1) the layout of the university building 2) the formula for solving quadratic equations 3) circuit diagram 4) area map
The correct answer is 1.

§ The system usually consists of ... 1) several objects 2) one object 3) independent objects 4) object and model
The correct answer is 1.

§ The material model is ... 1) aircraft layout 2) map 3) drawing 4) diagram
The correct answer is 1.

§ A visual means of representing the composition and structure of a system is called ... 1) column 2) table 3) text 4) formula
The correct answer is 1.

§ The family tree is a ____________ information model. 1) hierarchical 2) tabular 3) network 4) verbal
The correct answer is 1.

§ Conducting research on a real object with the subsequent processing of the experimental results is _____________ modeling. 1) full-scale 2) imitation 3) evolutionary 4) mathematical
The correct answer is 1.

§ Visual, easy-to-use presentation of spatial data is one of the main tasks of __________ modeling. 1) geoinformation 2) logical 3) physical 4) simulation
The correct answer is 1.

§ Genetic algorithms and genetic programming are _____________ modeling tools. 1) evolutionary 2) full-scale 3) imitation 4) physical
The correct answer is 1.

§ The iconic model is ... 1) pie chart 2) anatomical dummy 3) model of the building 4) scale model of the ship
The correct answer is 1.

§ Of the proposed requirements for all models, _________________ model is not common. 1) static 2) flexibility 3) completeness 4) adequacy
The correct answer is 1.

§ The electrical circuit diagram is a _____________ information model. 1) graphic 2) tabular 3) hierarchical 4) verbal
The correct answer is 1.

§ To forecast the economic development of the region, it is (are) ... 1) simulation 2) full-scale modeling 3) fuzzy logic algorithms 4) full enumeration of possible solutions
The correct answer is 1.

§ The network information model can be represented (s) ... 1) regional computer network 2) computer file system 3) periodic system of chemical elements 4) computer technical description
The correct answer is 1.

§ The correct order of steps for mathematical modeling of the process is as follows: 1) defining the goals of modeling - building a mathematical model - conducting a study - analyzing the result 2) building a mathematical model - defining the goals of modeling - conducting a study - analyzing the result 3) defining the goals of modeling - building a mathematical model - analyzing the result - conducting a study 4) defining the goals of modeling - conducting research - building a mathematical model - analyzing the result
The correct answer is 1.

§ Models, which are a collection of useful and necessary information about an object, are called ... 1) informational 2) material 3) subject 4) dynamic
The correct answer is 1.

§ The basis for the classification of models into material and information is ... 1) presentation method 2) area of \u200b\u200buse 3) area of \u200b\u200bknowledge 4) time factor
The correct answer is 1.

§ The model is the replacement of the studied object by another object that reflects ... 1) essential aspects of a given object 2) all aspects of a given object 3) always the appearance of an object 4) insignificant aspects of a given object
The correct answer is 1.

§ Finding the optimal path from input data to result is used in the model ... 1) "labyrinthine search" 2) "black box" 3) "material point" 4) "structures of the human brain"
The correct answer is 1.

§ Artificial intelligence is a scientific direction associated with machine modeling of human intellectual functions, which is based on the provisions of science ... 1) cybernetics 2) informatics 3) mathematics 4) logic
The correct answer is 1.

§ The result of the formalization process is the ___________ model. 1) mathematical 2) descriptive 3) strategic 4) subject
The correct answer is 1.

§ The model of an absolutely elastic collision of two bodies, written in the form of formulas, is ... 1) sign mathematical 2) formal logical 3) structural information 4) descriptive information
The correct answer is 1.

§ General properties of all models:1) dynamism 2) limb 3) adequacy 4) information content
The correct answers are 2, 3, 4.

§ The written or oral representation of the information model by means of the spoken language is called the _______________ model. 1) verbal 2) simple 3) linguistic 4) logical
The correct answer is 1.

§ Computer simulation of an earthquake allows ... 1) determine the strength of buildings in order to ensure the safety of people 2) conduct a full-scale study of the processes occurring in nature during an earthquake 3) obtain the full cost of damage as a result of a possible earthquake 4) take measures to prevent an earthquake
The correct answer is 1.

§ In the process of modeling, the formation of an idea about the components of the original object is carried out at the stage ... 1) model development 2) problem statement 3) computer experiment 4) analysis of simulation results
The correct answer is 1.

§ A simplified representation of a real object is called ... 1) model 2) original 3) prototype 4) system
The correct answer is 1.

§ Hovering over a menu item with a small black arrow pointing to the right ...

§ 1) opens a submenu 2) opens an application 3) opens a dialog box for entering additional information 4) opens a folder "My Documents"
The correct answer is 1.

§ Highlighted part Taskbars called ...

§ 1) notification area 2) quick launch bar 3) toolbar 4) status bar
The correct answer is 1.

§ There is no _______________ menu in this window.

§ 1) contextual 2) systemic 3) pictographic 4) horizontal
The correct answer is 1.

§ Some menu items on the right are marked with ellipsis. Choosing such an item ...

§ 1) opens a dialog box for entering additional information 2) opens a submenu 3) starts the program for execution 4) opens the application
The correct answer is 1.

§ The figure shown is ...

§ 1) changing the order of the slides in the presentation 2) assigning transition effects from slide to slide 3) copying a slide 4) pasting an autoshape on a slide
The correct answer is 1.

§ 1) apply one of the standard themes to the presentation 2) select a layout for the slide layout 3) select a presentation template 4) configure the transition from slide to slide
The correct answer is 1.

§ Slide Sorter Mode is for ...

§ 1) adjusting the logical sequence of slides 2) viewing slides in full screen mode 3) viewing the structure of the presentation 4) adjusting the animation
The correct answer is 1.

§ If, in the situation shown in the figure, release the left mouse button, then ...

§ 1) Slide3 and Slide4 will swap places 2) a copy of Slide3 will be added 3) a blank slide without a name will be added 4) Slide4 will be deleted
The correct answer is 1.

§ For this slide, it is true that ...

§ 1) a gradient fill has been applied to the background of the slide 2) a texture fill has been applied to the background of the slide 3) there are no non-standard characters on the slide 4) there is no header or footer on the slide
The correct answer is 1.

§ Using the command Insert - Symbol for next slide

§ In the above window, the user selects ...

§ 1) transition effect when changing slides 2) transition sound when changing slides 3) speed of transition when changing slides 4) presentation template
The correct answer is 1.

§ Using the window shown in the figure, you can ...

§ 1) set up the transition from slide to slide 2) apply one of the standard themes to the presentation 3) select a presentation template 4) set up the animation of slide objects
The correct answer is 1.

§ The structure mode for working with a presentation allows ...

§ 1) enter new text on a slide or edit existing 2) assign transition effects from slide to slide 3) change the color scheme of the slide 4) change the overall design of the presentation
The correct answer is 1.

§ The extension of the file name created in the graphics editor Paint is ... 1) .bmp 2) .cdr 3) .ppt 4) .psd
The correct answer is 1.

§ On the local disk H: the sequence of actions has been performed: 1) create a folder A; 2) open folder A; 3) create folder 1; 4) close folder A; 5) create folder B; 6) create a folder 2. Draw the folder structure created as a result of these actions.
Correct answer

§ The teacher worked in the folder D: \\ Materials for classes \\ Group 11 \\ Laboratory work. Then I went to a higher level in the folder tree, went down to the Lectures folder and deleted the Introduction file from it. The full name of the file that the teacher deleted will be ... 1) D: \\ Lesson materials \\ Group 11 \\ Lectures \\ Introduction 2) D: \\ Lesson materials \\ Group 11 \\ Introduction 3) D: \\ Lesson materials \\ Lectures \\ Introduction4) D: \\ Introduction \\ Materials for lessons \\ Group 11 \\ Lectures
The correct answer is 1. Solution. The teacher worked in the Labs folder, which is nested in the Group 11. Therefore, moving to a higher level, the teacher found himself in the Group 11 folder, from which he went down to the Lectures folder and deleted the Introduction file from the Lectures folder. Thus, the full name of the remote file Introduction will be: D: \\ Lesson Materials \\ Group 11 \\ Lectures \\ Introduction

§ On some hard disk, the cluster size is 512 bytes. This disk contains four files of 100, 200, 1000 and 2500 bytes. ___________ cluster (s) are required to store all four files. 1) 9 2) 7 3) 8 4) 7.5
The correct answer is 1.

§ A group of file name extensions is united by a common feature: 1) .bmp, .jpeg, .cdr, .png 2) .txt, .doc, .rtf, .bat 3) .zip, .com, .ppt, .mp3 4) .bmp, .jpeg, .mpeg .wav
The correct answer is 1.

§ The file name newgames666.exe does not match the filename mask ... 1) * game?. * X? 2) * g? Me *.? X? 3) * game *.? X * 4) * g? Me *. * X *
The correct answer is 1.

§ The file name MUST NOT use a sequence of characters ... 1) Laboratory work: information coding.doc 2) Laboratory work. Information encoding.doc 3) Laboratory_work_information_coding.doc 4) Laboratory-work-information-encoding-.doc
The correct answer is 1.

§
The correct answer is 1.

§ Files are stored in a folder:

§ The names of all these files satisfy the mask:1) p * a _ ??. C * 2) p * a _ ??. C ?? 3) p? A _ ??. C * 4) p * a _ ?. c *
The correct answer is 1.

§ The user, moving from one folder to another, sequentially visited the folders ACADEMY, COURSE, GROUP, E: \\, PROFESSOR, LECTIONS. With each movement, the user either went down to a level below or ascended to a level higher. The full name of the folder from which the user started moving will be ... 1) E: \\ GROUP \\ COURSE \\ ACADEMY 2) E: \\ PROFESSOR \\ LECTIONS \\ ACADEMY 3) E: \\ ACADEMY \\ COURSE \\ GROUP 4) E: \\ ACADEMY
The correct answer is 1.

§ Some folder contains a list of files, initially ordered by date:

§ The files are sorted by name in ascending order. The file will be the last in the list ... 1) 6А.doc 2) 2Б.doc 3) 10Б.doc 4) 11А.doc
The correct answer is 1.

§ On some hard disk, the cluster size is 4096 bytes. This disk contains four files of 500, 10000, 8000 and 5000 bytes. _________ cluster (s) are required to store all four files. 1) 8 2) 6 3) 7 4) 5.75
The correct answer is 1.

§ Parameters such as pixel response time and viewing angle are specific to the following devices:1) LCD monitor 2) TFT monitor 3) plotter 4) scanner
The correct answers are 1, 2.

§ ____________ images are scaled without loss of quality. 1) vector 2) any 3) black and white 4) raster
The correct answer is 1.

§ To enter bitmap (raster) images, you cannot use ... 1) mouse 2) keyboard 3) graphics tablet 4) scanner
The correct answers are 1, 2.

§ The "staircase" effect appears when ___________ the image is enlarged. 1) raster 2) vector 3) any 4) fractal
The correct answer is 1.

§ The complementary color to the combination of colors "red + green" RGB model is ... 1) yellow 2) brown 3) lilac 4) khaki
The correct answer is 1.

§ On the monitor screen, any color is represented as the luminescence intensity (brightness) of three basic colors: red, green and blue, each of which can take a value from "no luminescence" to "maximum luminescence". The corresponding RGB color model has _____ possible states for each color. 1) 256 3) 255 3) 3072 4) 16 million
The correct answer is 1.

§ Graphic files that allow you to store animated images have the extension ... 1) .gif 2) .tiff 3) .jpeg 4) .png
The correct answer is 1.

§ You cannot use ... to display user-created bitmaps. 1) touch screen 2) graphic tablet 3) printer 4) plotter
The correct answers are 1, 2.

§ To draw a circle in the graphics editor Paint, select the "_______" element and hold down the "Shift" key during construction. 1) Ellipse 2) Rounded rectangle 3) Circle 4) Oval
The correct answer is 1.

§ To draw a diagonal straight line (at an angle of 45 degrees) in the Paint graphic editor, hold down the "_______" key while drawing. 1) Shift 2) Ctrl 3) Tab 4) Alt
The correct answer is 1.

§ For a graphic object in the given fragment of text, text wrapping is selected ...

§ 1) along the contour 2) around the frame 3) in the text 4) above and below
The correct answer is 1.

§ A fragment of a spreadsheet is given in the formulas display mode and in the values \u200b\u200bdisplay mode:

§ The value in cell B3 is ... 1) 15 2) 17 3) 28 4) 24
The correct answer is 1.

§ The table shows data on the number of winners of the Olympiad in informatics (I), mathematics (M) and physics (F) in three cities of Russia:

§ Column E counts the number of winners for each city, and row 5 - the number of winners for each subject. Diagram

§ built on ... 1) row 5 2) column E 3) cells B3, C3, D3 4) range B2: B4
The correct answer is 1.

§ A fragment of a spreadsheet is given. For this fragment of the table, it is true that in a cell ...

§ 1) C4 introduced the formula \u003d MIN (A2; A3; C2) 2) D1 introduced the formula \u003d MAX (A1: C1) 3) B4 introduced the formula \u003d SUM (B1: B3) * 5 4) D4 introduced the formula \u003d AVERAGE (A1 ; B2; C3)
The correct answer is 1.

§ You can automate the input operation in related tables ...

§ 1) lookup list 2) pattern 3) condition on a valid value 4) default value
The correct answer is 1.

§ Given a fragment of a spreadsheet:

§ The number of records that match the next custom autofilter conditions

§ equally...

§ 1) 4 2) 7 3) 3 4) 0
The correct answer is 1.

§ A fragment of a spreadsheet is given.

§ The number of records that match the autofilter condition

§ equally... 1) 2 2) 3 3) 4 4) 0
The correct answer is 1.

§ A fragment of a spreadsheet in the formulas display mode looks like this:

§ The formula from cell A1 is copied to cell B3. The formula appears in cell B3 ... 1) 2 * $ B $ 4 - $ C3 2) 4 * $ B $ 6 - $ C3 3) 2 * $ C $ 4 - $ D1 4) 2 * $ C $ 6 - $ D3
The correct answer is 1.

§ information about L. Landau will begin with cell 1) A7 2) A6 3) A8 4) A10
The correct answer is 1.

§ A fragment of a spreadsheet is given

§ The number of records that match the advanced filter conditions

§ equally... 1) 4 2) 5 3) 6 4) 3
The correct answer is 1.

§ After performing calculations ... 1) the values \u200b\u200bin cells B6 and C5 are equal 2) the values \u200b\u200bin cell B6 are greater than the value in cell C5 3) the values \u200b\u200bin cell B6 are less than the value in cell C5 4) an error message appears in cell B6
The correct answer is 1.

§ When copying the contents of cell A2 to cells B2 and A3, formulas appeared in them

§ Cell A2 contains the formula ... 1) \u003d $ A1 + B1 2) $ A1 + B1 3) \u003d $ A $ 1 + B1 4) \u003d $ A1 + $ B1
The correct answer is 1.

§ A fragment of a spreadsheet is given

§ After sorting by conditions

§ cell A9 will contain the last name ... 1) Berg P. 2) Landau L. 3) Becker G. 4) Bekesy D.
The correct answer is 1.

§ The diagram shows the number of winners of the Olympiad in informatics (I), mathematics (M) and physics (F) in three cities of Russia:

§ The diagram that correctly reflects the ratio of winners from all cities in each subject is ...
Correct answer -

§ Given a fragment of a spreadsheet in the formulas display mode:

§ After performing the calculations, the value in cell C6 will be ... 1) 87 2) 27 3) 45 4) 25
The correct answer is 1.

§ Given a fragment of a spreadsheet in the formulas display mode:

§ The formula from cell B2 was copied to cell B3. After that, the fragment of the spreadsheet in the mode of displaying values \u200b\u200btook the form:

§ The value in cell B1 is ... 1) 11 2) 22 3) 14 4) 7
The correct answer is 1.

§ Given a fragment of a spreadsheet and a diagram:

§ The range of cells, according to the values \u200b\u200bof which the chart was built: 1) A3: C3 2) C1: C3 3) A1: C3 4) A1: C1
The correct answer is 1.

§ The teleconference is attended by teachers of mathematics, physics and computer science. Teachers have different qualifications: no category (BC), II, I, or the highest (VC) category. Diagram 1 shows the number of teachers with different skill levels, while Diagram 2 shows the distribution of teachers by subject.

§ From the analysis of both diagrams, it follows that all teachers ... 1) I category can be teachers of mathematics 2) I category can be teachers of physics 3) computer science can have the highest category 4) mathematicians can have II category
The correct answer is 1.

§ In a text editor MS Word a piece of text

converted to a table using ";" as a separator. The third column of the resulting table looks like ...

Correct answer -

The calculation of the values \u200b\u200bof a swarm can be carried out using a predetermined effective procedure, or algorithm. A characteristic feature of computational processes is that the required values \u200b\u200bof tasks are calculated sequentially from the given initial values \u200b\u200baccording to certain, predetermined rules and instructions. On the basis of numerous examples of computational processes in mathematics, an intuitive concept of a computational procedure was formed. In connection with the general program of substantiation of mathematics in the 20th century. the problem arose of creating not an intuitive, but an exact concept of an algorithm. A rigorous definition of V.F., effective procedures and algorithms was given in various forms by D. Hilbert, K. Godel, A. Church, S. Kleene ), E. Post (E. Post), A. Turing and A. A. Markov.

The general idea of \u200b\u200bvarious approaches to the creation of rigorous mathematical. definitions of the concepts under consideration is as follows: a detailed analysis of already known or conceivable computational processes is carried out, the essential features of these processes are revealed, and suitable mathematical methods are found. analogs of these processes and their features.

The implementation of various aspects of this idea is ambiguous and leads to different variants of mathematics. algorithm concepts. The main mathematical. models of the concept of an algorithm are Turing machines, partially recursive functions, normal Markov algorithms, etc.

Turing machines. The algorithms used in mathematics resemble a machine that operates in separate ticks and responds in finite ticks. A. Turing and E. Post described the concepts abstract computers, on which it is possible to simulate computational processes. Turing machine (sometimes called Turing - Post) M consists of:

finite alphabet where arbitrary characters; finite ordered sequences of alphabet characters are called. words in the alphabet; with the help of words in the alphabet, the initial data of the problem, intermediate calculations and the received answers are encoded;

a finite list of elementary states in which the machine M can be; in this case, it is considered the initial state in which M is located when it starts work, and - the final state: if M comes to the state then it stops its work;

a program made up of individual teams that have one of the following types: where is one of the symbols of the movement L, P or C.

The configuration of the machine MV at a given time is coded by a word of the form where Ai IN - certain words in the alphabet (instead of the empty word Apishut a 0). The configuration of the machine М at the next moment in time (after performing one cycle of work) is also encoded with a word, which depends on the command:

if D \u003d A, then we get the word

if D \u003d C, then we get the word

if D \u003d P and B \u003d a p B ", it turns out the word

if D \u003d P and IN - empty word, then the word is obtained Aa k a 0 q l B.

The operation of the machine M can be described as follows: they encode the initial data using some initial configuration (here); according to the program of the machine M, the following configuration is obtained, etc., if at any moment a configuration containing the final state is obtained, then operation is stopped; the final one is decoded in response; if the machine never stops, then the answer in the problem is considered indefinite.

Any computational edge that can be reduced to the operation of a suitable Turing machine is intuitively efficient. The inversion of the previous statement is called Turing's thesis: any efficient computational procedure can be implemented on the corresponding machine M. This thesis cannot be proven, since it combines two concepts - strict mathematical. the concept of a Turing machine and the vague, intuitive concept of an efficient procedure. If we simulate on Turing machines the calculation of the values \u200b\u200bof a function, domain of definition and values \u200b\u200bwhich are the essence of a set of natural numbers, then we come to the concept of a computable (on Turing machines) function. see also Turing machine.

Partially recursive functions. All known examples of algorithms can be reduced to the issue of calculating the values \u200b\u200bof a suitable function. Considering this feature of the algorithms to be the main one, A. Church, K. Gödel and S. Kleene identified a wide range of functions, called partially recursive. Let F - a class of partial functions, domains and values \u200b\u200bof which are the sets of natural numbers. The following operations are defined on the set F:

superposition of functions: if then they say that the function

obtained from using superposition; m-operator: let's say that the function is obtained from and using , and write

if and are defined n are not equal to each other for and

It is clear that if these operations are applied to functions, the value of which we are able to calculate, then there are algorithms that calculate the values \u200b\u200bof functions and The following functions are considered to be the simplest: and


There are lightweight algorithms that calculate the values \u200b\u200bof the simplest functions.

The function f is called. partially recursive if in a finite number of steps it can be obtained from the simplest ones using the superposition and the -operator. Everywhere a certain is called. general recursive. The value of any partially recursive function can be calculated efficiently in an intuitive sense. Conversion of this statement. received the name of Church's thesis: any function whose value can be calculated efficiently is partially recursive. Thus, according to Church's thesis, computable functions are partially recursive functions.

Normal Markov Algorithms. Every concrete one deals with a certain alphabet, and a concrete task is reduced to processing the words of a given alphabet according to certain predetermined rules. This approach to the theory of algorithms was developed by A.A. Markov, who proposed the concept of a normal algorithm as a mathematical one. models of the concept of a computational procedure.

A normal algorithm j consists of some alphabet and a finite ordered list of rules of the form, where are some words in the alphabet. Some of the rules are highlighted and named final. The rule is applied to the word P as follows: the word P is represented in the form, where and are words in the alphabet, possibly empty, and from all such representations the one in which the word Q has the smallest length is selected; then the result of applying this rule to the word Rnaz. word QBR. The normal algorithm is applied to the word P in the following way: apply to the word P The first rule from those that can be applied to P, get the word; apply to the first rule from those to-rye can be applied to, get a word, etc. As a result, words are obtained, which breaks off after the application of any final rule.

By coding the information appropriately, one can use normal algorithms to solve various algorithms. tasks. Any computational procedure modeled using a normal algorithm is intuitively efficient.

The inversion of this statement is called the Markov thesis: any efficient computational procedure can be modeled using a suitable normal algorithm. If we simulate using normal algorithms the computation of values \u200b\u200bof functions from the class F, then we come to another concept of a computable function. Other refinements of the concept of algorithms have been proposed (see. Algorithm, and Normal Algorithm).

The following result is proved about the equivalence of different concepts of the concept of an algorithm: the classes of functions computable on Turing machines, partially recursive functions computable using normal Markov algorithms (similar classes of functions for other concepts of the concept of an algorithm) coincide. In the opinion of the majority of modern mathematicians, this class of functions is adequate to the intuitive class of V. f. and is identified with it. Such 1 identification makes it possible to give mathematics to algorithmic problems.

Lit.: Maltsev AI, Algorithms and recursive functions, M., 1965; Rogers X., Theory of recursive functions and effective computability, trans. from English., M., 1972; Turing A. M., "Proc. London Math. Soc.", 1937, v. 42, no. 2, p. 230-65; Klini SK, Introduction to metamathematics, trans. from English., M., 1957; Markov A.A., Theory of algorithms, Moscow, 1954 ("Tr. Mat. Institute of the Academy of Sciences of the USSR", vol. 42).

I. A. Lavrov, A. D. Taimanov.


Encyclopedia of Mathematics. - M .: Soviet encyclopedia... I. M. Vinogradov. 1977-1985.

See what "COMPUTABLE FUNCTION" is in other dictionaries:

    One of the basic concepts of the theory of algorithms. See Algorithm. Philosophical Encyclopedia. In 5 x t. M .: Soviet encyclopedia. Edited by F.V. Konstantinov. 1960 1970 ... Philosophical Encyclopedia

    computable function - - Topics information security EN computable function ... Technical translator's guide

    One of the basic concepts of the theory of algorithms. A function f is called computable if there is an Algorithm that transforms any object x for which the function f is defined into an object f (x) and is not applicable to any x for which f is not ... ... Great Soviet Encyclopedia

    Computable functions are a set of functions of a kind that can be implemented on a Turing machine. The task of calculating a function is called algorithmically solvable or algorithmically unsolvable, depending on whether it is possible to write ... ... Wikipedia

    Frequently, one of the math. refinements of the intuitive concept of a computable function, defined as follows. Functions are considered, given on natural numbers and with natural values. ... ... Encyclopedia of Mathematics

    In this article, we will prove a theorem on the existence of an enumerable but undecidable set. Let me remind you that, by Post's theorem, an enumerable set is decidable if and only if its complement is enumerable. Basic definitions such as ... Wikipedia

 

It might be useful to read: