Information technology in psychology Answers Tests Synergy.
Score 87/100 points Good
Use of unlicensed software ...
qualifies as hacking
can lead to information leakage
violates copyright
qualifies as phishing
Articles in Wikipedia ...
Any user can write, but any other user can correct it
written by professionals who must first prove their
scientific affiliation
Any user can write, but content should be reviewed by a professional reviewer
The President of the Russian Federation accepts ...
orders
the laws
messages
decrees
An interface is ... an element of a software product
a set of tools and rules for the interaction of PC devices.
programs and user
hardware complex piece of network equipment
Operating systems are software products that are part of ...
database management systems
system software
programming systems
application software
A cell reference can be ...
the address
formula
name
value
In a fragment of the training table for the classification of adolescents by external characteristics, the class is ...
growth
the weight
temperament
.... Consultant Plus presents an expert solution to a legal problem
Legal navigator
Quick search
Guide
... is an uncompressed audio format
Avi
Wav
Mp3
Mpeg4
The life cycle of a software product begins from the moment ...
product purchases
downloading and installing programs in a computer system
practical use
developing an automation concept
When several applications are running simultaneously, accessing the processor ...
occurs on priority
occurs simultaneously by all processes
not happening
takes turns
The legal reference system is ...
a collection of ready-made solutions on legal issues
an array of all legal acts issued in the Russian Federation
effective means of disseminating legal information
the official source of publication of regulatory legal acts
When transposing the range A5: A10, a range was obtained ...
A11: A16
E5: J10
A5: B10
A1: F1
Windows F1 key ...
reserved for calling Help
is used differently in each application
reserved for spell check
reserved for printing
Word is ...
information process
implementation of information technology
information transformation
Finished (boxed) products ...
do not require implementation
do not reflect the specifics of the business processes of the enterprise
do not require staff training
much cheaper than customized
The Windows Explorer program is designed to ...
database creation
work with files, folders and applications
perform hard disk defragmentation
typing
The minimum component of the table is
cell
formula
book
range
Clicking on the CODES link opens a list ...:
all editions of all codes
only currently valid codes
current or not effective changes to editions of all codes
original and current editions of codes
... In MS Excel means absolute reference
C22
R1C2
$ A $ 5
# A # 5
... is a special program for compressing and decompressing audio and video files
gif
Archiver
Codec
Visualizer
The Criminal Code of the Russian Federation in the dictionary of the "Type of document" field of the information bank "VersionProf" corresponds to the entry "..." only the Federal Law
Codex only
Code, Law and Federal Law
Code and Ordinance
The file system defines ...
way of organizing data on disk
physical characteristics of the wearer
disk capacity
number of disks
The scan result is ... an image
raster
vector
fractal
An electronic document acquires legal force if it ... contains an image of the signature of the responsible person
has an electronic signature and is certified by the seal
stored in a computer
has an electronic signature
Information Security deals with cases ...
attacks on information
unauthorized access
related only to electronic documents
loss of information due to fire
The state system of statistics., The library network, the archival fund belong to ...
body-specific information resources
information resources oriented to an external user
the consumer media sector
The downside ... images are resource intensive
fractal
raster
vector
Indicate the sequence of stages of IT implementation:
1 User training
2 Start in run mode
3 Pre-design survey
4 Checking the reports work 5 Test runs
6 Checking the reports work
7 Signing the contract
8 Screen customization
9 IT training
10 Populating the database with information
11 Formation of TK
Lattice writing to a cell indicates ...
error in the formula
program crash
the need to expand the cell
typing error
No feedback yet