G. Teaching a basic computer science course in high school - Semakin I.G. Sequence of codes 105 162 109 tables

Test No. 1

    Information stored in books, magnetic media, gramophone records is called:

A) archival; B) internal; C) useful; D) external; E) operational.

    Information that cannot be stored on external media is:

A) smells; B) image and sound; C) sound only;

    text written in any language; E) image only.

    The student writes a summary. Which information processes performed by the student?

A) reception and transmission; B) reception and processing; C) reception, processing and storage;

    npneM. storage, transfer; E) reception, processing, storage, transmission.

    Vanya is in first grade and knows the multiplication table well, but doesn’t know in English. Which message will be informative for Vanya?

    2x8=16. B)MY FRIEND IS SCHOOLBOY. C) Vanya studies at school.

    There are 26 letters in the English alphabet. E) 6 MULTIPLAY 8 EQUAL 48.

    Select declarative information from the proposed statements:

A ) 1 byte 8 bits.

    To restart the computer, you must press the key combination Ctrl+Alt+Del.

C) Display - information output device.

E) The Earth revolves around the Sun in 365 days.

5. A message in the Multi language contains 64 characters, which is 1/4 of a kilobyte. How many characters does the Multi tribe alphabet contain?

A ) 8; B) 16; C) 32; D)4; E) 64.

7. The Multi tribe writes letters using a 32-character alphabet. The Pulti tribe uses a 64-character alphabet. The tribal leaders exchanged letters. The Multi tribe letter contained 80 characters, and the Pulti tribe letter contained 70 characters. Compare the amount of information contained in letters.

A) the volume of the letter from the Pulti tribe is 10 bytes less:

C) the volume of the letter from the Pulti tribe is 20 bytes larger;

C) the volume of the Multi tribe letter is 20 bits less;

D) the volume of the Multi tribe letter is 10 bits larger;

E) the volume of the Pulti tribe's letter is 1920 bits larger.

8. An information message with a volume of 1.5 kilobytes contains 3072 characters. How many characters does the alphabet with which this message was written contain?

A) 16: B) 128; C) 32; D) 64; E) 256.

9. Before turning off the computer, you can save information:

A) in random access memory; B)in external memory; C) in processor registers;

D) on the disk drive; E) in the magnetic disk controller.

10. The electronic unit, work manager external device, called:

A) adapter (controller); B) driver; C) processor register; D) common bus;

    interface.

11. The smallest addressable part of computer memory:

A)bit; B) file; C) kilobyte; D) byte; E) cell.

    “The directory (folder) contains information about ..... stored in...”. Instead of ellipses, insert the appropriate words:

A) programs, RAM; B) files, RAM:

C) programs, external memory; D) files, external memory;

E) programs, processor.

    The driver is:

    long-term storage device:

    a program that controls a specific external device;

    input device;

    a device that allows you to connect a new external device to your computer

device;

    output device.

storage device in the form:

A) block; B) catalogue; C) directories; D) programs; E) file.

    How much information can a 16-bit processor process in one operation?

A) 16 bytes; B) 16 kilobytes; C) 1/16 kilobyte; D) 2 bytes; E) 160 bits.

    The application is unloaded from memory and stops working if

C) switch to another window; E) move the application window;

E) close the application window.

    The tetris.com file is located on the C: drive in the GAMES directory, which is a subdirectory of the DAY directory. Select full file name:

    From:\tetris.com\GAMES\DA Y;

    C:\GAMES\tetris.com;

    C:\DAY\GAMES\tetris.com;

    C:\GAMES\DAY\tetris.com;

    C:\DAY\tetris.com.

    Suggested commands:

    create a file home.txt; 2.create a TOWN directory; 3.create a STREET directory;

    enter the created directory; 5.make drive A: current.

Arrange the numbered commands so that an algorithm is obtained that creates a file on an empty floppy disk with the full name A:\TOWN\STREET\home.txt.

A) 5; 2; 4; 3; 4; 1; AT 5; 2; 3; 1; C) 5; 1; 3; 4; 2; D) 5; 1; 2; 3; 4; E) 1; 3; 2; 5.

    “...memory means that any information is entered into memory and retrieved from it by...”. Instead of ellipses, insert the appropriate words:

A) discreteness; addresses; B) addressability; values; C) discreteness; bits; D) addressability; bytes; E) addressability; addresses.

    Application software includes:

A) programming languages; B) operating systems; C) dialog shell; D) the totality of all programs installed on the computer:

E) text editors.

Test No. 2

    The coordinates of the text editor cursor are fixed:

A) in the text editor menu; C) in the dictionary of a text editor;

C) in the status bar of a text editor; D)b text editor window;

E) in the copy buffer.

    Code sequence 105 162 109 encoding table encrypts

some characters. Insert the correct continuation instead of the ellipsis. "Among these symbols..."

    There cannot be letters of the Russian alphabet;

    there cannot be letters of the Latin alphabet;

    there may be letters of the Russian and Latin alphabets;

    there cannot be letters of the Russian and Latin alphabets;

E) there can be only one letter of the Latin alphabet.

    The character encoding table corresponds between:

    symbols, their decimal numbers and binary codes;

    symbols of different alphabets;

    characters and the number of bytes they occupy;

    symbols and numbers of memory cells they occupy;

    symbols and keys.

    Select an action related to text formatting:

A) copying text fragments; B) correction of typos;

C) spell check; D) changing the indentation of the red line;

E) moving text fragments.

    Specify the command(s) that, when executed, will move the selected text fragment to the clipboard:

A) insert; B) replace; C) check spelling; D) align to the center;

E) cut and copy.

    The text takes up 0.25 kilobytes of computer memory. How many characters does the text contain?

A)256; B) 2048; C)32; D)250; E)2000.

    The code (number) of the letter j in the character encoding table is 106. What sequence of letters will correspond to the word “file”? Alphabet of Latin letters: abcdefghij klmnop ...

A)110 107 104 111; B)74 98 120 66; C)132 112 90 140;

    102 105 108 101; E) 90 102 114 86.

8. What characters can be encrypted with ASCII table codes 119 and 251?

A) "d" and "sh"; B) “j” and “s”; C) “d” and “D”; D) “I” and “t”; E) “w” and “s”.

9. It takes 84,000 bits to store text. How many pages will this text take if the page contains 30 lines of 70 characters per line?

A) 40; AT 5; C) 50; D)400; E) 350.

10.B text editor You can use only one font and two buttons to set effects such as bold and italic. How many different character styles can you get?

A)l; AT 2; C) 3; D) 4; E) 6.

Test No. 3 (final)

1. To encode blue color, use the code 01101. How many colors does the palette contain?

A) 5; AT 3; C) 32; D) 10; E) 4.

    To store text, 10 KB is required. How many pages will this text take if the page contains 40 lines of 64 characters per line?

A) 4; B) 40; C) 256; D)160; E) 320.

    The video memory capacity is 31.25 KB. The graphic display operates in 320 x 200 pixel mode. What is the maximum number of colors a palette can contain?

A) 4; AT 2; C) 8; D) 16; E) 32.

    How much information can 32 process in one operation?

bit processor?

A) 32 bytes; B) 32 kilobytes C) 1/32 kilobytes; D) 4 bytes; E) 320 bits.

    A magnetic disk drive is a device for:

A) only records of information; B) information storage; C) information processing; D) read-only information; E) reading and writing information.

    For 5 minutes at a speed of 10 bytes/sec, the leader of the Multi tribe transmitted an information message. How many characters did it contain if the tribe's alphabet consists of 32 characters?

A) 4800; B) 2400; C) 600; D) 60; E) 80.

    To output devices graphic information applies:

A) display; B) mouse; C) keyboard; D) scanner; E) graphic editor.

    The directory (folder) contains information about... stored in.... Instead of ellipses, insert the appropriate words:

A) programs, RAM; B) files, RAM;

C) programs, external memory; D) files, external memory;

E) programs, processor.

    The application is unloaded from memory and stops working if:

A) launch another application; C) minimize the application window;

    switch to another window; D) move the application window;

E) close the application window.

    The lines.exe file is located on the C: drive in the GAMES directory, which is a subdirectory of the MY directory. Select full file name:

A) C:\lincs.exe\GAMES\MY; B)C:\GAMES\lines.exe; C)C:\MY\GAMES\lines.exe;

    C:\GAMES\MY\lines.exe; E) C:\GAMES\lines.exe.

1 1. The system software includes:

A) programming languages; B) operating systems; C) graphic editors; D) computer games; E) text editors.

    The smallest image element on a graphics screen is:

A) cursor; B) symbol; C) picture; D) pixel; E) line.

    To fix the capital letters mode, use the key:

A) Ctrl; B) Esc; C) Num Lock; D) Caps Lock; E) Delete.

    The green color is coded using code 010. How many colors does it contain?

A) 4; AT 3; C) 8; D) 16; E) 6.

15. The text was typed in a text editor: FOUR BLACK GUYS

THE CRAZY CHICKEN WERE DRAWN WITH BLACK INK CHECKING. The “Find and Replace” command to correct errors (letters are missing in words) can look like this:

A) Find CHET and replace it with CHET; C) Find CHE to replace with BLACK; C) Find ET and replace it with EPT; D) Find CHATE and replace it with DASH; E) Find ETE and replace it with DASH.

    The code (number) of the letter “O” in some character encoding table is 142. What is encrypted using the sequence of codes: 145 143 142 144 146?

A) CPORT; B) SPORT C) SNORT: D) SPORT; E) SNORTH.

1 7. During the raster conversion process graphic file the number of colors has decreased from 4096 to 64. How many times has the file size decreased?

A) 2 times; B) 4 times; C) 8 times; D) 16 times; E) 64 times.

18. About the type of information stored in the file (text, graphic, sound, executable program etc.), the user can find out:

A) by file name; C) by the name of the directory (folder) in which the file is stored;

    By full file name; D)no logical drive name;

E) by file name extension.

    The text is given: “The bull goes and swings.” The following commands are applied to the text (in word order): select the word; cut out; highlight a word; copy; highlight a word; cut out; insert; insert. What will be displayed on the screen after executing these commands?

A) the bull is swinging; B) the goby the goby is swinging; C) goby goby swings swings;

D) The bull is swinging; E) swings swings.

    To obtain a two-color image for each pixel, you need to select:

A) 1 byte of video memory; B) 2 machine words of video memory; C) 1 bit of video memory;

    2 bytes of video memory; E) 2 bits of video memory.

    To store an area of ​​the monitor screen measuring 256 x 128 pixels, 32 KB of video memory is allocated. Determine the maximum possible number of colors in the palette.

A) 64; AT 8; C) 512; D) 256; E) 2.

    From the proposed messages, choose a declarative one.

A) The Moon is a satellite of the Earth. B) The boiling point of water is 100 °C.

C) Computer science is an interesting subject. D) To delete a file in Windows Commander, you need to press the F8 key. E) Operating room Windows system created by Microsoft.

    To system software includes:

A) programming systems; B) operating systems; C) text

editors; D) game programs; E) processor and motherboard.

    A graphic screen point can be colored in one of the following colors: red, green, brown, black. How much video memory will be allocated to encode each pixel?

A) 4 bits; B) 2 bytes; C) 4 bytes; D) 2 bits; E) 3 bits.

    The text editor window contains 25 lines of 60 characters per line. Window of a graphic editor working in two-color mode, 80 x 25 pixels. Compare the amount of memory required to store text that occupies the entire window of a text editor and to encode a picture that occupies the entire working area of ​​a graphics editor:

    text requires more memory than a picture;

    text requires less memory than a picture;

    text memory requires the same amount of memory as a picture;

    There is not enough information to answer the question.

Note. The comparison question contains only 4 answer options.

    Which of the following types of compact discs (l)CD-ROM (2)CD-R; (3)CD-RW; (4) Is DVD-ROM intended for recording new information?

A)(1); B)(1), (4); C) (2); D) (3); E) (2), (3).

    What computer device carries out the audio sampling process?

A) sound card; B) columns; C) headphones; D) microphone; E) processor.

    Which of the following devices: (1) modem; (2) scanner; (3) CD-ROM drive; (4) LAN card; (5) is a sound card necessarily included in a multimedia computer?

A) (1), (4); AT 12); C) (2), (4); D) (3), (5); E)(1).

    Suggested commands:

    delete the selected file; 2) enter the WORK directory; 3) enter the STUD directory; 4) make drive C: current; 5) select the otchet.doc file.

Arrange the numbered commands so that an algorithm is obtained that deletes the file with the full name C:\WORK\STUD\otchet. doc.

A) 4, 3, 2, 5, 1; B) 4, 3, 2, 1; C) 5, 4, 3, 2, 1; D) 4, 2, 3, 1; E) 4, 2, 3, 5, 1.

    How many characters does a message written using a 16-character alphabet contain if its size is Vie part of a megabyte?

A) 131 072; B) 32,768; C) 16,384; D) 4096; E) 128,000.

Computer Science 10th grade Test No. 1.

1. Information stored in books, on magnetic media, and gramophone records is called:

a) Archive;

c) Internal;

c) Useful;

d) External.

e) Operational.

2. Figurative information that can be stored on external media is:

a) Taste images;

c) Image and sound;

c) Tactile images;

e) Text written in any language;

f) Image only.

3. The student writes a statement, what information processes are performed by the student?

a) Reception and departure;

c) Reception and processing;

c) Reception, processing and storage;

e) Reception, storage, dispatch.

f) Reception, processing, storage, dispatch.

4. Vanya is in first grade and knows the multiplication tables well, but does not know English. Which message will be informative for Vanya?

c) MY FRIEND IS SCHOOLBOY;

c) Vanya studies at school;

e) there are 26 letters in the English alphabet;

e) 6 MULTIPLAY 8 EQUAL 48.

5. Select declarative information from the proposed messages

a) bit - a unit of information;

c) the sum of the angles in a triangle is 180 degrees;

c) Pushkin is a great Russian poet;

e) circle - a set of points equidistant from the center;

f) when multiplying simple fractions, their numerators and denominators are multiplied.

6. For 5 minutes at a speed of 20 bytes/s, the leader of the Multi tribe transmitted an information message. How many characters did it contain if the tribe's alphabet consists of 32 characters?

7. 1.5 megabytes are equal to:

a) 1536 KB;

c) 1500 KB;

c) 1536 bytes;

e) 1500 bytes;

e) 0.015 GB.

8. An information message with a volume of 1.5 KB contains 3072 characters. How many characters does the alphabet with which this message is written contain?

9. The result of adding two numbers written in Roman numerals MSM +LXIV, is equal to:

e) 1164.

10. The number 30111011 can exist in number systems with bases:

Answers to test No. 1

Question no.

Computer Science 10th grade Test No. 2.

    Before turning off your computer, you can save information:

a) in RAM;

c) in external memory;

c) in computer registers;

e) on the disk drive;

e) in the magnetic disk controller.

2. The electronic unit that controls the operation of the external device is called:

a) adapter (controller);

c) driver;

c) processor register;

e) common bus;

e) interface.

3. The smallest addressable part of computer memory:

c) kilobyte;

e) cell.

4. “The directory contains information about .... stored in ....” Instead of ellipses, you need to insert the words:

c) external memory files;

e) programs, processor.

5. Driver is:

a) long-term storage device;

c) a program that controls a specific external device;

c) input device;

e) a device that allows you to connect a new external device to your computer;

e) output device.

6. While the computer is running, the following is constantly stored in RAM:

a) core operating system;

c) the entire operating system;

c) application software;

e) programming system;

e) the program is an archiver.

c) catalogue;

c) directories;

e) programs;

    The template that is used for file search, whose names begin with the symbol "F»:

    The application is unloaded from memory and stops working if:

a) launch another application;

c) minimize the application window;

c) switch to another window;

e) move the application window;

f) close the application window.

    The taskbar is used for:

a) switching between running applications;

c) shutdown Windows;

c) data exchange between applications;

e) launching MS DOS programs;

e) browsing directories.

11. Filetetris. comlocated on drive C in the directoryGAMES, which is a subdirectory of the directoryDAY. Full name file:

a) C:\\GAMES\DAY;

c) C:\GAMES\;

c) C:\DAY\GAMES\ ;

e) C:\GAMES\DAY\;

e) C:\GAMES\ .

12. A set of commands is proposed:

    create filehome. txt;

    create directoryTOWN;

    create directorySTREET;

    enter the created directory;

    make drive A current.

To obtain an algorithm by which a file with the full name is created on an empty floppy diskA:\ TOWN\ STREET\home. txt, these commands should be arranged like this:

a) 5; 2; 4; 3; 4; 1;

c) 5; 1; 3; 4; 2;

e) 5; 1; 2; 3; 4;

13. “...memory means that any information is entered into memory and retrieved from it by...”. Instead of ellipses, you need to insert the words:

a) discreteness; addresses;

c) addressability; values;

c) discreteness; bits;

e) addressability; bytes;

f) addressability; addresses.

14. Application software includes:

a) programming languages;

c) operating systems;

c) dialog shell;

e) the totality of all programs installed on the computer;

e) text editors.

15. “A program stored in external memory, after being called for execution, ends up in ... and is processed ....” Instead of ellipses, you need to insert the words:

a) input device; processor;

c) processor; processor registers;

c) processor; processor;

e) RAM; processor;

e) file, processor.

Answers to test No. 2

Question no.

Computer Science 10th grade Test No. 3

    The coordinates of the text editor cursor are fixed:

a) in the text editor menu;

c) in the dictionary of a text editor;

c) in the status bar of a text editor;

e) in a text editor window;

e) in the copy buffer.

    While the text editor is running, the spelling dictionary:

a) loaded into external memory as necessary;

c) is permanently located in the input device;

c) is constantly located in RAM;

e) loaded into RAM as needed;

e) is permanently located in the output device.

    The character encoding table corresponds between:

a) symbols, their decimal numbers and binary codes;

c) symbols of different alphabets;

c) characters and the number of bytes they occupy;

e) symbols and numbers of memory cells that they occupy;

e) symbols and keys.

    Graphics output devices include:

a) display;

c) keyboard;

e) scanner;

e) graphic editor.

    Text formatting includes the following:

a) copying text fragments;

c) correction of typos;

c) spell checking;

e) changing paragraph indentations;

f) moving text fragments.

    When you execute the following command(s), the selected text fragment goes to the clipboard:

a) insert;

c) replace;

c) check spelling;

e) align to the center;

e) cut and copy.

    The text takes up 0.25 KB of computer memory. How many characters does the text contain?

    Character numbers "Z" and "B" in the encoding tableASCIIrespectively equal:

    Video memory page size is 125 KB. The graphic display works with a 16-color palette. What is the resolution of the graphic display?

    The color code for green is 010. How many colors does the palette contain?

    Code (number) of the letter "j" in the character encoding table is 106. What sequence of codes will correspond to the word "file"? Alphabet of Latin letters:a b c d e fg hijklmnop

a) 110 107 104 111;

c) 74 98 120 66;

c) 132 112 90 140;

e) 102 105 108 101;

e) 90 102 114 86.

    The code sequence 105 162 109 of the encoding table encrypts some characters. Among these symbols:

a) there cannot be letters of the Russian alphabet;

c) there cannot be letters of the Latin alphabet;

c) there may be letters of the Russian and Latin alphabets;

e) there cannot be letters of the Russian and Latin alphabets;

f) there can be only one letter of the Latin alphabet.

    To store text, 84,000 bits are required. How many pages will this text take if the page contains 30 lines of 70 characters per line?

    The video memory capacity is 62.5 KB. Graphic display operates in 640 modeX400 pixels. What is the maximum number of colors a palette can contain?

    To delete an incorrectly typed character, use the key:

    The text editor window contains 25 lines of 60 characters per line. Window of a graphic editor working in two-color mode - 80 X 25 pixels. Compare the amount of memory required to store text that occupies the entire window of a text editor and to encode a picture that occupies the entire field of a graphics editor:

a) text requires more memory than a picture;

c) text requires less memory than a picture;

c) text requires as much memory as a picture;

e) there is not enough information to answer the question;

    What characters can be encrypted with table codes

ASCII 119 b 235?

a) “d” and “w”;

c) “j” and “s”;

c) “d” and “D”;

e) “I” and “t”;

e) “w” and “s”.

    Part of the book is presented with color images in a 16-color palette in 320 formatX 640 points. Pages containing text have a format of 64 lines of 48 characters per line. Determine the maximum possible number of pages that can be stored on a 40 MB hard disk if the number of pages represented by color images is 80 more quantity pages containing only text.

    "The contents of the video memory are continuously viewed... and displayed... on the screen." Instead of ellipses, you need to insert the words:

a) display processor, central processor;

V) central processor, display processor;

c) display processor, display processor;

e) central processor, graphics adapter;

e) graphics adapter, central processor.

    In the text editor, you can use only one font and two buttons, which are used to set effects such as bold and italic. How many different character styles can you get?

    For 5 minutes at a speed of 10 bytes/sec, the leader of the Multi tribe transmitted an information message. How many characters did it contain if the tribe's alphabet consists of 32 characters?

    An information message of 3 kilobytes contains 1024 characters. How many characters does the alphabet with which this message is written contain?

    "The directory contains information about... stored in...". Instead of ellipses, you need to put the words:

a) programs, RAM;

c) files, RAM;

c) programs, external memory;

e) files, external memory;

e) programs, processor.

    The program that controls the operation of a specific external device is called:

a) adapter;

c) driver;

c) command processor;

e) archivist;

e) controller.

    File,Line. exelocated on disk in the directoryGAMES, which is a subdirectory of the directoryM.Y.. Full file name:

a) C:\Line. exe\GAMES\MY;

c) C:\ GAMES\ lines.exe;

c) C:\ MY\ GAMES\ lines.exe;

e) C:\ GAMES\ MY\ lines.exe;

e)C:\GAMES\lines.exe.

    The word is typed using a slashed vector font:

A) CRAB;

V) ? ? ? ?;

With) CRAB;

d) CRAB;

    The information content of a message received by a person is:

a) the method of transmitting the message;

c) the method of processing the received message;

c) the method of receiving the message;

e) time of receipt of the message;

f) the presence of new knowledge and clarity.

    A magnetic disk drive is a device for:

a) only records of information;

c) storing information;

c) information processing;

e) read-only information;

f) reading and writing information.

    Which Desktop control(s) can be used to switch between open windows of folders and applications in the environment? Windows?

a) Start buttons;

c) taskbar;

c) system clock indicator;

e) keyboard layout indicator;

e) menu open windows and applications.

30. Application software includes:

a) programming systems;

c) operating system;

c) text editors;

e) operating system with a dialog shell;

f) shared devices.

Answers to test No. 3

Question no.

WITH

D

A

A

D

E

A

WITH

WITH

WITH

Question no.

Sections: Computer science

The purpose of the lesson. Introduce students to ways of representing and organizing texts in computer memory.

Questions studied:

  • Advantages of file storage of texts.
  • Coding of texts.
  • Encoding table, international standard ASCII.

During the classes

I.Organizing time

II. Explanation of new material

A computer can work with four types of information: text, graphic, numeric and sound. One of the most widespread applications of computers is working with texts: creating text documents and storing them on magnetic media in the form of files.

Why has working with test information on computers become so widespread?

Why in a very short period of time (10-15 years) in almost all enterprises and organizations, including our school, were typewriters replaced by computers?

To answer these questions, let’s consider the differences between processing and storing texts when writing manually and when creating texts on a computer.

Advantages of file storage of texts:

  1. saving paper;
  2. compact placement;
  3. the ability to reuse magnetic media for storing different documents;
  4. the ability to quickly copy to other magnetic media;
  5. the ability to transmit text over computer communication lines.

The most striking difference between computer text and paper text is that the information in it is organized according to the hypertext principle. Hypertext is a way of organizing text information within which semantic connections (hyperconnections) are established between its various fragments. You have already encountered hypertext when working with the Windows help system.

Sometimes it happens that a text consisting of letters of the Russian alphabet received from another computer cannot be read - some kind of “abracadabra” is visible on the monitor screen.

Guys, why do you think this is happening?

You don't have a definitive answer yet. At the end of the lesson we will try to answer this question again.

From a computer's point of view, text is any sequence of characters from the computer alphabet. It is not at all necessary that it be a text in one of the natural languages ​​(Russian, English, etc.). These can be mathematical or chemical formulas, phone numbers, numerical tables. The most important thing is that all the characters used are included in the computer alphabet.

Enable slide Computer alphabet presentation Coding texts

To represent information in a computer, an alphabet with a capacity of 256 characters is used.

What is the information weight of one character of such an alphabet?

Let us recall the formula connecting the information weight of an alphabet symbol and the power of the alphabet: 2i = N

If the alphabet power is 256, then i = 8, and therefore one character carries 8 bits of information.

Any information is represented in computer memory in binary form, which means that each character is represented by an 8-bit binary code.

8 bits = 1 byte, so the binary code for each character in computer text takes up 1 byte of memory.

The convenience of byte-by-byte character encoding is obvious because a byte is the smallest addressable part of memory and, therefore, the processor can access each character separately when processing text. On the other hand, 256 characters is quite a sufficient number to represent a wide variety of symbolic information.

Now the question arises, which eight-bit binary code to assign to each character. It is clear that this is a conditional matter; you can come up with many encoding methods.

All characters of the computer alphabet are numbered from 0 to 255. Each number corresponds to an eight-bit binary code from 00000000 to 11111111. This code is simply the serial number of the character in binary system Reckoning.

A table in which all characters of the computer alphabet are assigned serial numbers is called an encoding table.

The ASCII table (read aski) (American Standard Code for Information Interchange) has become the international standard for PCs. In practice, you can come across another table - KOI-8 (Information Exchange Code), which is used in global computer networks.

Let's look at the ASCII code table (textbook, p. 75).

Enable slide Encoding presentation characters Encoding texts

The ASCII code table is divided into two parts.

Only the first half of the table is the international standard, i.e. characters with numbers from 0 (00000000), to 127 (01111111). This includes lowercase and uppercase letters of the Latin alphabet, decimal numbers, punctuation marks, all kinds of brackets, commercial and other symbols.

Symbols with numbers from 0 to 31 are usually called control symbols. Their function is to control the process of displaying text on the screen or printing, feeding sound signal, text markup, etc.

Character 32 is a space, i.e. empty position in the text. All others are reflected by certain signs.

Please note that in the encoding table, letters (uppercase and lowercase) are arranged in alphabetical order, and numbers are ordered in ascending order. This observance of lexicographic order in the arrangement of symbols is called the principle of sequential coding of the alphabet.

The second half of the ASCII code table, called the code page (128 codes, starting from 10000000 and ending with 11111111), can have different options, each option has its own number.

The code page is primarily used to accommodate national alphabets other than Latin. In Russian national encodings, characters from the Russian alphabet are placed in this part of the table. For letters of the Russian alphabet, the principle of sequential coding is also observed.

Unfortunately, there are currently five different Cyrillic encodings (KOI8-R, Windows. MS-DOS, Macintosh and ISO). Because of this, problems often arise with transferring Russian text from one computer to another, from one software system to another.

Chronologically, one of the first standards for encoding Russian letters on computers was KOI8 ("Information Exchange Code, 8-bit"). This encoding was used back in the 70s on computers of the ES computer series, and from the mid-80s it began to be used in the first Russified versions of the UNIX operating system.

From the early 90s, the time of dominance of the MS DOS operating system, the CP866 encoding remains ("CP" means "Code Page", "code page").

Computers Apple, running the Mac OS operating system, use their own Mac encoding.

In addition, the International Standards Organization (ISO) has approved another encoding called ISO 8859-5 as a standard for the Russian language.

The most common encoding currently used is Microsoft Windows, abbreviated CP1251.

Since the late 90s, the problem of standardizing character encoding has been solved by the introduction of a new international standard called Unicode. This is a 16-bit encoding, i.e. it allocates 2 bytes of memory for each character. Of course, this increases the amount of memory occupied by 2 times. But such a code table allows the inclusion of up to 65536 characters. The complete specification of the Unicode standard includes all the existing, extinct and artificially created alphabets of the world, as well as many mathematical, musical, chemical and other symbols.

Guys, what questions will you have on the topic of the lesson?

Now let's try again to answer the question that was asked at the beginning of the lesson:

Why do we sometimes see text consisting of letters of the Russian alphabet, received from another computer, on our computer in the form of “abracadabra”?

Expected answer. Computers use different character encodings for the Russian language.

Now we will solve several examples.

Example 1. How many bits of computer memory does the word MICROPROCESSOR occupy?

Before we start solving the example, let’s remember how much memory one character of computer text takes up.

Expected answer. 1 byte

Solution. The word consists of 14 letters. Each letter is a symbol of the computer alphabet and therefore takes up 1 byte of memory. The word will take 14 bytes = 112 bits of memory, because 1 byte = 8 bits.

What is the principle of sequential alphabet coding?

Expected answer. In the encoding table, letters (uppercase and lowercase) are arranged in alphabetical order, and numbers are ordered in ascending order.

Knowing the principle of sequential encoding allows us to solve some problems without resorting to a character encoding table.

Example 2. What is encrypted with the sequence of decimal codes: 108 105 110 107, if the letter i in the character encoding table has a decimal code of 105?

Solution. Let's remember the order of letters in the Latin alphabet - ... i, j, k, l, m, n, o .... The letter j will have code 106, k - code 107, etc. Therefore, the word link is encoded.

What does the term "code page" mean?

Expected response. This is the name of the second half of the ASCII code table, designed to accommodate national alphabets other than Latin.

Is the principle of sequential encoding observed in code pages?

Expected response. Complied with

Let's find out by solving the following example.

Example 3. The word bit is encrypted using the sequence of decimal codes: 225 232 242. Find the sequence of decimal codes of the same word, written in capital letters.

Solution. When solving, we take into account that the difference between the decimal code of a lowercase Cyrillic letter and the decimal code of the corresponding capital letter is 32. If the letter b corresponds to code 225, capital letter B has the decimal code 225-32=193. Therefore, the word BIT corresponds to the sequence of codes: 193 200 210.

III. Independent practical work

(at the same time, students are called to solve examples at the board)

Example 4. The free amount of RAM on the computer is 640 KB. How many pages of a book will fit in it if the page has 16 lines of 64 characters per line?

Answer: (640?1024)/(16?64)=640 pp.

Example 5. The text occupies a full 10 sectors on a single-sided 180 KB floppy disk. The floppy disk is divided into 40 tracks of 9 sectors. How many characters does the text contain?

Answer: ((180?1024)/(40?9))?10=5120 characters.

IV. Summing up the lesson

Testing in the "Text editors" section

The character encoding table establishes the correspondence between

1) symbols, their decimal numbers and binary codes

2) symbols of different alphabets

3) characters and the number of bytes they occupy

4) symbols and numbers of memory cells that they occupy

5) symbols and keys

What will change when a symbol is presented on a monitor screen in different encodings(Windows, MS-DOS, KOI8-R, etc.)?

1) font typeface

2) character size

4) character outline

5) there will be no changes

The code (number) of the letter "j" in the character encoding table is 106. What sequence of letters will correspond to the word "file"?

Alphabet of Latin letters: abcdefghijklmn ...

1) 110 107 104 111

3) 132 112 90 140

4) 102 105 108 101

5) 90 102 114 86

The code sequence 105 162 109 of the encoding table encrypts some characters. Insert the correct statement in place of the ellipsis.

"Among these symbols..."

1) there cannot be letters of the Russian alphabet

2) there cannot be letters of the Latin alphabet

3) there may be letters of the Russian and Latin alphabets

4) there cannot be letters of the Russian and Latin alphabets

5) there can be only one letter of the Latin alphabet

To store text, 10 KB is required. How many pages will this text take if the page contains 40 lines of 64 characters per line?

Text editor cursor coordinates are fixed

1) in the text editor menu

2) in the dictionary of a text editor

3) in the status bar of the text editor

4) in a text editor window

5) in the copy buffer

Select a phrase whose spelling corresponds to the rules of typing on a computer:

1) All trams have ice windows. White trees, roofs, wires

2) I am a bright image in my heart: near the winter Volga, Yaroslavl is in the snow.

3) All trams have ice windows. White trees, roofs, wires.

4) I am a bright image in my heart on the shore: Yaroslavl is covered in snow near the winter Volga.

5) All trams have windows made of ice. The trees, roofs, and wires are white.

Select an action related to text formatting:

1) copying text fragments

2) correction of typos

3) spell check

4) changing the size of the fields

5) moving text fragments

When printing a document, 60 lines of 80 characters each fit on a page. What settings need to be changed to fit fewer characters on the page?

1) change the encoding

2) change the font style

3) reduce the size of page margins

4) reduce the font size

5) increase the spacing between lines

Which characters can be encrypted with ASCII table codes: 119 and 251?

In a text editor, you can use only one font and two buttons to set effects such as bold and italic. How many different character styles can you get?

The size of the text editor window is 20 lines of 64 characters per line. The cursor is located in the upper left corner of the screen and points to the character located in the 25th line and 5th position of the text. Which of the following symbols will be visible in the window?

1) standing in the 25th line and 70th position of the text

2) standing in the 35th line and 50th position of the text

3) standing in the 1st line and 1st position of the text

4) standing in the 46th line and 57th position of the text

5) standing in the 20th line and 5th position of the text

The minimum set of functions that a text editor must perform does not include:

1) saving files

3) text formatting

4) work with graphics

5) text editing

To edit incorrectly typed characters, use the following keys:

1) Backspace, Delete, Insert

2) Home, End, Insert

4) Backspace, Delete

The clipboard is:

1) RAM section

2) hard disk partition

3) part of the input device

4) ROM section

5) part of the output device

The text takes up 0.25 KB of computer memory. How many characters does the text contain?

While the text editor is running, the spelling dictionary

1) loaded into RAM as needed

2) loaded into external memory as needed

3) is permanently located in the input device

4) is permanently in ROM

5) is permanently located in the output device

To move a piece of text from one place in the document to another, you need to run the command(s):

1) Copy, Paste

2) Cut

5) Paste

The text consists of 50 lines of 60 characters each. The size of the text editor window is 20 ´ 50 characters. The cursor is in the upper left corner of the working field and its position is displayed in the status bar: (11,11). How many characters will be visible on the screen?

How many words (from a text editor's point of view) are there in the following text, containing a number of errors: “One, two, three, four, five. The bunny went out for a walk. You are running as a friend of the hunter.”

Literature

I. Semakin and others. Computer science. Basic course 7 – 9.

Search materials:

Number of your materials: 0.

Add 1 material

Certificate
about creating an electronic portfolio

Add 5 material

Secret
present

Add 10 materials

Certificate for
informatization of education

Add 12 materials

Review
free for any material

Add 15 materials

Video lessons
for quickly creating effective presentations

Add 17 materials

File:

tests 9th grade.docx

Municipal budgetary educational institution
"Secondary school No. 25"
APPROVED at the MS meeting
Protocol No. 1 of 08/30/2017
Chairman of the MS
_________ E.A. Maksimova
Fund of assessment funds for ongoing
and intermediate certification in the subject
"Informatics and ICT"
9th grade
(UMK N.D. Ugrinovich)
Compiled by: Voropaeva O.V., computer science teacher
CONSIDERED at a meeting of the Moscow Region
29.08.2017
Head of the Ministry of Defense
____________I.E. Denisova

Passport for a set of control and evaluation tools
Control and measurement materials were compiled by O.V. Voropaeva. based on mandatory
minimum content of education in computer science, are universal and can
used by teachers working on any computer science textbook for grade 9.
Suggested test work can be used in a knowledge control lesson, as well as when
consolidating the material covered, repeating what has been studied, etc. All tests are given in three
equivalent options with answers.
Main topics of the course:
1. Coding and processing of graphic and multimedia information
2. Coding and processing of text information
3. Coding and processing of numerical information
4. Algorithmization and programming language basics

6. Informatization of society
Specification:
Class Quantity
control
works
9
6
Subjects of certification work
1. Encoding and processing
graphic and multimedia
information
2. Coding and processing
text information
3. Encoding and processing
numerical information
4. Algorithmization and language basics
programming
5. Modeling and formalization
6. Informatization of society
Forms
certification
works
Control and
practical
work
Control
(testing) and
practical
work
Control
(testing) and
practical
work
Control and
practical
work
Control
Job
Control
Job
(testing)
2

Requirements for learning outcomes









As a result of studying computer science, students should be able to:
use personal computer and its peripheral equipment (printer,
scanner, modem, multimedia projector, digital camera, digital sensor);
follow the requirements of safety, hygiene, ergonomics and resource conservation when
working with information and communication technologies;
create drawings, drawings, graphic representations of a real object, in particular in
design process using basic operations graphic editors,
computer-aided design educational systems;
carry out simple digital image processing;
structure the text using page numbers, lists, links, tables of contents;
check spelling;
use tables and images in the text;
create and use various forms of information presentation: formulas, graphs,
diagrams,
create and use tables (including dynamic, electronic, in particular - in
practical problems),
move from one data representation to another;
create records in the database;


use acquired knowledge and skills in practical activities and everyday
life for:
 creation of information objects, including for registration of educational results
work;
creating simple models of objects and processes in the form of images and drawings,
creating simple models of objects and processes in the form of (electronic) tables,
conducting computer experiments using ready-made models of objects and
processes;
creating the simplest models of objects and processes in the form of programs (including in the form
block diagrams);
3



Criteria and norms for assessing knowledge, skills and abilities of students
Control involves identifying the level of mastery of educational material when studying how
individual sections, as well as the entire computer science course and information technologies generally.
When testing, all correct answers are taken as 100%, then the mark is set to
according to the table:
Task completion percentage
95% or more
8094%%
6679%%
less than 66%
Mark
Great
Fine
satisfactorily
unsatisfactory
When performing practical work and test work:
The content and volume of material to be tested in the test work is determined
program. When checking the assimilation of the material, the completeness and strength of assimilation is revealed
students of theory and the ability to apply it in practice in familiar and unfamiliar situations.
The grade also depends on the presence and nature of errors made by students.
a gross mistake - the semantic meaning of a concept or definition is completely distorted;


the error reflects inaccurate formulations indicating unclear
representation of the object in question;
defect - a misconception about an object that does not fundamentally affect knowledge
determined by the training program;
minor errors - inaccuracies in oral and written speech that do not distort the meaning
answer or solution, accidental typos, etc.
The standard against which students’ knowledge is assessed is mandatory
minimum content of computer science and information technology. Require from students
definitions that are not included in the school computer science course - this means incurring
problems related to violation of student rights (“Education Law”).
Based on the norms (five-point system) laid down in all subject areas
put a mark:

errors;




4


CMM kit
1. Control and practical work on the topic “Coding and processing of graphic and
multimedia information"
Option 1
1. Two-channel (stereo) sound recording is made with a sampling frequency of 11 kHz and
coding depth 16 bits. The recording lasts 6 minutes, its results are written to a file,


2. Color (with a palette of 256 colors) raster graphic image has a size of 10x10
points. How much memory will this image take in bytes?

decreased from 512 to 8. How many times did the information volume of the file decrease?
4. P.R. Create Animation in GIMP
Option 2
1. Single-channel (mono) sound recording is made with a sampling frequency of 8 kHz and depth
16 bit encoding. The recording lasts 2 minutes, its results are written to a file, compression
no data is produced. Which of the numbers below is closest to the size
the resulting file, expressed in megabytes?
2. A raster image measuring 64 by 64 pixels takes up 2 KB of memory. Specify
maximum number of colors in the image palette?
3. File
contained uncompressed
stereophonic music composition
lasting 4 minutes 16 seconds, digitized with 32768 quantization levels.
After converting the file by reducing the number of quantization levels to 8192
while maintaining the sampling frequency, its volume decreased by 5500 KB. C which
What sample rate was the file digitized at? Please indicate the whole number of Hz in your answer.
4. P.R. Create a drawing in COREL DROW
Option 3
1. Two-channel (stereo) sound recording is made with a sampling frequency of 8 kHz and
coding depth 24 bits. The recording lasts 4 minutes, its results are written to a file,
Data compression is not performed. Which of the numbers below is closest to
the size of the resulting file, expressed in megabytes?
2. A raster file containing a black and white image has a volume of one and a half kilobytes. Which
Will the size of the drawing be in pixels?
3. In the process of converting a raster graphics file, the number of colors
5

increased from 16 to 65,536. How many times did the information volume of the file increase?
4. P.R. Using Audacity, record your voice (read any quatrain), overdub
music to words, swap places into verse. the first and second pairs of lines. Decrease
(slightly) playback speed. Save under the name “Kr_OwnLastName”
Answers:
Option 1
1. 15MB
2. 100 b
3. 3 times
Option 2
1. 2MB
2. 16
3. 44,000Hz
Option 3
1. 11MB
2. 12 288
3. 4 times

 “5” is given when all tasks are completed completely or if there are 12 small ones
errors;
 “4” is given if there are 12 shortcomings or one error:
 “3” is given when 2/3 of the proposed tasks are completed;
 “2” is given if significant errors are made that show that the student does not speak
mandatory skills in the given topic to the fullest extent (ignorance of basic software
material) or refusal to perform educational duties:
2. Test and practical work “Coding and processing of text information”
Option 1
1. In one of the Unicode encoding variants, each character is encoded in two bytes.
Determine the number of characters in the message if the information volume of the message is
this encoding is 480 bits.
2. Through a certain connection, a 32 KB file is transferred within 16 seconds.
Determine the size of the file (in KB) that is transferred through the same connection to
within a minute.
1. In which of the sentences below are all the typing rules met, if

1) The stone is heavy while it lies in place; If you move it, it will become easier.
2) The stone is heavy while it lies in place; If you move it, it will become easier.
3) The stone is heavy while it lies in place; If you move it, it will become easier.
4) The stone is heavy while it lies in place; If you move it, it will become easier.
4. Which characters can be encrypted with ASCII table codes: 82 and 143?
1. R and Q
6

2. R and P
3. Shch and I
5. The article, typed on a computer, contains 16 pages, each page has 32 lines, each
line has 64 characters. Determine the information volume of the article in KOI8 encoding, in which
Each character is encoded with 8 bits.
1) 280 bytes
2) 32 KB
3) 35840 bits
4) 70 KB
6. An information message with a volume of 1.5 KB contains 3072 characters. What
How many bits are each character of this message encoded?
7. The coordinates of the text editor cursor are fixed:
A) in the text editor menu;
B) in the dictionary of a text editor;
C) in the status bar of a text editor;
D) in a text editor window;
E) in the copy buffer.
8. The code sequence 105 162 109 of the encoding table encrypts some characters.
Insert the correct continuation instead of the ellipsis. "Among these symbols..."
A) there cannot be letters of the Russian alphabet;
B) there cannot be letters of the Latin alphabet;
C) there may be letters of the Russian and Latin alphabets;
D) there cannot be letters of the Russian and Latin alphabets;
E) there can only be one letter of the Latin alphabet.
9. The character encoding table establishes correspondence between:
A) symbols, their decimal numbers and binary codes;
B) symbols of different alphabets;
C) characters and the number of bytes they occupy;
D) symbols and numbers of memory cells that they occupy;
E) symbols and keys.
10. Select an action related to text formatting:
A) copying text fragments;
B) correction of typos;
C) spell check;
D) changing the indentation of the red line;
E) moving text fragments.
11. Specify the command(s) that, when executed, will result in the selected text fragment being included in
clipboard:
7

A) insert;
B) replace;
C) check spelling;
D) align to the center;
E) cut and copy.
12. The text takes up 0.25 kilobytes of computer memory. How many characters does the text contain?
A)256; B)2048; C)32; D)250; E)2000.
13. The code (number) of the letter “j” in the character encoding table is 106. What is the sequence
letters will correspond to the word “file”? Alphabet of Latin letters:
a b c d e f g h i j k l m n o p . . .
A) 110 107 104 111;
B) 74 98 120 66;
C) 132 112 90 140;
D) 102 105 108 101;
E) 90 102 114 86.
14. In a text editor you can only use one font and two buttons for installation
effects such as bold and italics. How many different styles
can you get characters?
A)1; AT 2; C) 3; D)4; E) 6.


My father Andrey Pe
trovich Grinev in Molo
served to his fullest extent
Count Minich and went out to
resignation
prime minister
major in '17... WITH
since then he lived in his
Simbirsk village, where
married a girl
Avdotya Vasilievna Yu.,
daughters
poor
local nobleman.
There were nine of us
children.

Washerwoman Broadsword, thick
both the pockmarked girl and the crooked one
cowshed Akulka somehow
agreed at the same time
throw yourself at mother's feet, apologizing
in criminal weakness and crying
complaining about Monsieur who seduced
their inexperience.
Mother, this is not a joke
loved and complained to the priest.
His reprisal was short.
He immediately demanded a channel
French.
Practical work: Type a formula and write an anecdote according to the sample.
8

Option 2
1. In one of the Unicode encoding variants, each character is encoded with 16 bits.
Determine the information volume of a message of 512 characters in this encoding.
2. Transferring a 3750 KB file over a certain connection took 2 minutes. What is
the data transfer rate over this connection in bits per second?
3. In which of the sentences below are all the rules of typing met, if
Are there any spelling or punctuation errors?
1) He who does not respond with anger to anger saves both himself and the other.
2) He who does not respond with anger to anger saves both himself and the other.
3) He who does not return anger with anger saves both himself and the other.
4) He who does not respond with anger to anger saves both himself and the other.
4. The text is typed without first line indentation and aligned to the left.
How many paragraphs, from the point of view of typing in a text editor, do not have paragraph indentation
on the left in this piece of text?
5. How many bits are needed to encode a character from a 64-character alphabet?
6. In a text editor, the main parameters when setting paragraph parameters are:
1) typeface, size, style
9

2) indentation, spacing
3) margins, orientation
4) color, number of characters
7. As in word processor Word set a red line (according to the rules of the Russian language)?
1) Page settings - First line - Indent
2) Paragraph - First line - Indent
3) move the first line of the paragraph with “spaces”
4) Paragraph - First line - Indentation
8. What characters can be encrypted with ASCII table codes 119 and 251?
A) “d” and “w”; C) “d” and “D”; E) “w” and “s”.
B) "j" and "s"; D) “I” and “t”;
9. Delete a column Word tables along with its contents, you can select the line, then:
1) press the Esc key
2) press the Delete key
3) press the Insert key
4) execute the command Working with Table Layout - Delete Columns
10. Button
1) merge several cells
2) split cells
3) delete a group of cells
4) insert a group of cells
11. Machine translation systems are programs that perform automated
translation:
1) from a programming language to machine code language
2) text from one natural language to another
3) from one programming language to another
4) words or phrases from one natural language to another
12. Optical text recognition systems are:
1) programs that allow you to convert text presented in raster form
images, in editable form with full-text search capability
2) programs for working with the scanner
3) text editing programs
4) programs for translating texts
13. What information volume does the word PROCESSOR contain if the characters are taken from the table
Unicode?
1) 9 bits
2) 18 bit
3) 72 bits
4) 18 bytes
10

14.
Which formula, entered into a Word table cell, calculates the maximum of the values
located in the cells to the right of the cell with the formula?
15.
To store text, 84,000 bits are required. How many pages will this text take if
page contains 30 lines of 70 characters per line?
A) 40; AT 5; C) 50; D) 400; E) 350.
Practical work: Type a formula and a multi-level list.
Option 3.
1. The user created a message of 128 characters in KOI8 encoding, in which each
the character is encoded in 8 bits. After editing the information volume of the message
was 1280 bits. Determine how many characters were added to the message if it
the encoding has not changed.
2. In KOI8 encoding, each character is encoded as one byte. Define
information volume of the following message in this encoding:
Water wears away earth and stone.
1) 184 bit
2) 232 bit
3) 24 bytes
4) 216 bytes
3. How many paragraphs, from the point of view of typing in a text editor, does the following fragment contain?
text:
11

1) 8
2) 6
3) 3
4) 4
4. How many errors were made when typing A. Schnabel’s statement, if spelling and
Are there any punctuation errors?
The notes I play are no better than those of many other pianists. pauses between notes - here
where the art is hidden!

1) 5
2) 2
3) 3
4) 4
5. Which of the following actions relate to text formatting?
1. Copying a fragment
2. Delete a character
3. Setting the leveling mode
4. Inserting a word
6. How many characters can be encoded using a 5-bit code?
7. Text information in computer memory is encoded:
1) decimal code
2) using symbols
3) octal code
4) binary code
8. How to set double line spacing in Word?
1) Font - Spacing - Line spacing - Double
2) Paragraph - Spacing - Line spacing - Double
3) Paragraph - Spacing - Before - 6 pt
4) when typing text using the Enter key, insert between lines empty lines
in the word processor Word allows you to:
9. Button
1) create bulleted list
2) create a numbered list
3) divide the text into columns
12

4) align text to center
10 How to highlight one row of a table in a Word document?
1) place the cursor on the left side of the column cell until it becomes a white arrow and click
left mouse button
2) click the mouse on the selection bar to the left of the selected rows of the column when the cursor becomes
white arrow
3) place the cursor over the column, when it turns into a black vertical arrow, left click
mouse button
4) place the cursor in the table column and execute the command Table - Select table
11. Programs that allow you to convert text presented in raster form
images in an editable form with full-text search:
1) machine translation systems
2) optical text recognition systems
3) word processors
4) programs for working with the scanner
12. Program for optical text recognition:
1) Abbyy FineReader
2) Mozilla Firefox
3) Adobe Photoshop
4)Promt
13. How many bits are there per character in the Unicode encoding standard?
1) 2
2) 8
3) 16
4) 4
14. A 4 MB file is transferred over a certain connection in 16 seconds. Define
time in seconds during which a file of size 2048 can be transferred via the same connection
KB.
15. Compare the properties of characters and paragraphs for the following
texts. Compare using the following parameters: typeface, font size, style,
saturation, paragraph parameters.
My father Andrey Pe
trovich Grinev in Molo
served to his fullest extent
Count Minich and went out to
resignation of the prime minister
major in '17... Since then
he lived in his
Simbirsk village, where
and married a girl
Avdotya Vasilievna Yu.,
The washerwoman Broadsword, thick and
a pockmarked girl and a crooked cowshed
Akulka somehow agreed to
one time to rush to mother
legs, blaming the crime
bosti and crying complaining about
Monsieur,
who seduced them
inexperience.
Mother, this is not a joke
loved and complained
Father. He had a reprisal
13

short.
demanded the channel of the Frenchman.
immediately
He
daughters of the poor
local nobleman.
There were nine of us
children.
Practical work:
1. Create a table with data about your family members (full name, height, weight), their average age,
total weight.
2. Create a three-level list.
Answers:
Option 1
Option 2
Option 3
1. 30 characters
2. 120 KB
3. 3)
4. 1)
5. 32 KB
6. 4 bits
7. C)
8. C)
9. A)
10. D)
11. E)
12. A)
13. D)
14. D)
15. Same size
and font typeface.
1. 1024 b
2. 256,000 bps
3. 2)
4. 8)
5. 6 bit
6. 2)
7. 2)
8. E)
9. 4)
10. 1)
11. 2)
12. 1)
13. 4)
14. MAX
15. B)
1. 32 characters
2. 232 bit
3. 4)
4. 4)
5. 3)
6. 32 characters
7. 4)
8. 2)
9. 2)
10. 2)
11. 2)
12. 1)
13. 3)
14.8 sec
15. Same only
headset
Evaluation criteria:
Task completion percentage
95% or more
8094%%
6679%%
less than 66%
Mark
Great
Fine
satisfactorily
unsatisfactory

OPTION 1
1. The spreadsheet is intended for:
1. processing predominantly numerical data structured using tables;
2. orderly storage and processing of significant amounts of data;
3. visualization of structural relationships between data presented in tables;
4. editing graphical representations of large amounts of information.
14

2. In a spreadsheet, the main worksheet element is:
1) cell;
2) string;
3) column;
4) formula.
3. Select the correct row designation in the spreadsheet:
a. 18D;
b. K13;
c. 34;
d. AB.
4. Select the correct cell address in the spreadsheet:
a. 11D;
b. F12;
c. AB3;
d. B1A.
5. The expression 5(A2+C3):3(2B23D3) in the spreadsheet looks like:
1. 5(A2+C3)/3(2B23D3) ;
2. 5*(A2+C3)/3*(2*B23*D3) ;
3. 5*(A2+C3)/(3*(2*B23*D3)) ;
4. 5(A2+C3)/(3(2B23D3)) .
6. The active cell is the cell:
1. to record commands;
2. containing a formula that includes the name of the cell in which data is entered;
3. a formula that contains links to the contents of the dependent cell;
4. in which commands are entered.
7. Range is:
1. a set of cells forming a rectangular area in the table;
2. all cells of one row;
3. all cells of one column;
4. set of valid values.
8. What will be the value of cell A8 if you enter the formula =SUM(A1:A7)/2 into it:

1. 280;
2. 140;
3. 40;
4. 35?

IN
15
A

1
5
=A1*2
=A1+B1
A) 5
10.Expression 3(A1 + B1) : 5(2B1 – 3A2), written in accordance with the rules adopted in
mathematics, in a spreadsheet looks like:
B) 10
B) 15
D) 20

1. 3*(A1 + B1) / (5*(2*B1 – 3*A2))
2. 3(A1 + B1) : 5(2B1 – 3A2)
3. 3(A1 + B1) / (5(2B1 – 3A2))
4. 3(A1 + B1) / 5(2B1 – 3A2)

A
3
B
4
C
2
D
5
=D1C1+1 =D11
=B1*4
1
2


performing calculations, did the diagram based on the values ​​of the range of cells A2:D2 correspond to the figure?
1)=D1A1 2)=B1+1
Practical work:
1. Construct a histogram and pie chart (computer science) using the table:
4) =C1*D1
3)=D1+A1

The test result is presented in the table:
Surname
Aganyan
Voronin
Grigorchuk
Rodnina
Sergeenko
Cherepanova
Chemistry
46
45
68
56
74
83
Computer science
32
74
75
82
38
28
2. Graph the function:
Test No. 3 “Coding and processing of numerical information”
x

2
1 0

1 6
,
x

,0[
1 0
]
y

1
2 0
OPTION 2
1. A spreadsheet cannot be used for:
1) sorting tabular data;
2) performing mathematical and economic calculations;
16

3) constructing graphs and diagrams;
4) processing of graphic images.
11. The spreadsheet is:
1. a set of numbered lines and named letters of the Latin alphabet
columns;
2. a set of lines named in letters of the Latin alphabet and numbered
columns;
3. a set of numbered rows and columns;
4. a set of rows and columns named by the user in an arbitrary way.
11. Spreadsheet Rows:
1. are named by users in an arbitrary manner;
2. are designated by letters of the Russian alphabet;
3. are designated by letters of the Latin alphabet;
4. numbered.
11. In a spreadsheet, a cell is called:
1. horizontal line;
2. vertical column;
3. intersection of row and column;
4. cursor – frame on the screen.
5. Select the correct column designation in the spreadsheet:
1.DF;
2. F12;
3. AB;
4. 113.
6. A spreadsheet cell cannot contain:
1. number;
2. text;
3. sheet;
4. formula.
11. Select the correct formula entry for the spreadsheet:
1. C3+4*D4
2. C3=C1+2*C2
3. A5B5+23
4. =A2*A3A4
8. What will be the value of cell C1 if you enter the formula =A1+B1 into it:

1. 20;
2. 15;
3. 10;
4. 30?
9. The result of calculations in cell C1 will be:
A B
WITH
17

A1*2
1 5
1. 25 2. 50 3. 75 4. 100
=SUM(A1:B1)*A1
10. What formula will be obtained when copying the formula from cell C2 into cell C3:

1. =A1*A2+B2;
2. =$A$1*$A$2+$B$2;
3. =$A$1*A3+B3;
4. =$A$2*A3+B3;
5. =$B$2*A3+B4?
11. Given a fragment of a spreadsheet:

A
2
B
4
C
6
D
8
=B1/A1
=C1/A1+1
=D1/A1
1
2

Which of the formulas given below can be written in cell C2 so that the one constructed after
performing calculations on diagrams (cid:0) And according to the values ​​of the range of cells A2:D2, did it correspond to the picture?
1)=С1В1
4) =С 1+1
2)=A11
3)=D11
Practical work:
1. Construct a histogram and pie chart from the table.
(change the design of data series, chart background)
Weightlifting competition results table
Full name
Ayvazyan G.S.
Viktorov M.P.
Gordesiani B.Sh.
Mikhalchik M.S.
Weight
athlete
77,1
79,1
78,2
78,2
Taken in
jerk
150
147,5
147,5
147,5
18

Pai S.V.
Shapsugov M.Kh.
79,5
77,1
150
147,5
13  xxy
]12,8[,8)10(
2
2. Graph the function:
Answers:
Option 1
Option 2
1. 1
2. 1
3. C
4.B
5. 3
6. 4
7. 1
8. 2
9.B
10. 1
11. 3
1. 4
2. 1
3. 4
4. 3
5. 1
6. 3
7. 4
8. 4
9. 3
10. 3
11.1
Evaluation criteria:
Task completion percentage
95% or more
8094%%
6679%%
less than 66%
Mark
Great
Fine
satisfactorily
unsatisfactory
4. Test and practical work on the topic “Algorithms”
1. Define the concepts: algorithm, cyclic algorithm
Option 1


table.
X
Y
19

Algorithm 1
Algorithm 2
4. Create an algorithm (program) for finding the sum of all two-digit numbers that are multiples of three, using
loop with parameter.
Option 2
1. Define the concepts: program, branching algorithm
2. Find the value of x after executing Algorithm 1 if x=5.
3. Execute algorithm 2. Enter the values ​​of variables that change during the execution of the algorithm in
table.
X
Y
20

Algorithm 1
Algorithm 2
21

4. Create an algorithm (program) for finding the product of all two-digit numbers that are multiples of five,
using a loop with a parameter.
Answers:
22

Option 1
Option 2
2
1.
2.
3. 10 and 13, 15 and 18, 20 and 21, 25 and 24, 30 and 27
4.
1.
2. 39
3. 35 and 40, 33 and 45, 31 and 50, 29 and 55, 37 and 60
4.
Criteria for assessing performance results
 “5” is given when all tasks are completed completely or if there are 12 small ones
errors;
 “4” is given if there are 12 shortcomings or one error:
 “3” is given when 2/3 of the proposed tasks are completed;
 “2” is given if significant errors are made that show that the student does not speak
mandatory skills in the given topic to the fullest extent (ignorance of basic software
material) or refusal to perform work:
5. Test on the topic “Modeling”
Option 1
1) Roads have been built between settlements A, B, C, D, E, F, the length of which
is given in the table. (The absence of a number in the table means that there is no direct road between
no points.)
A
5
B
5
9
3
8
C
9
4
D
3
2
F
7
E
8
4
2
7
A
B
C
D
E
F

4) 17
1) 11
2) The transport company carries out cargo transportation by different modes of transport between
2) 13
3) 15
four cities: CHEREPOVETS, MOSCOW, KURSK, PERM. Freight delivery costs
and travel times are shown in the table:
Departure point Destination Cost (cu) Travel time
MOSCOW
MOSCOW
MOSCOW
PERMIAN
CHEREPOVETS
CHEREPOVETS
CHEREPOVETS
KURSK
KURSK
KURSK
KURSK
PERMIAN
KURSK
CHEREPOVETS
MOSCOW
PERMIAN
MOSCOW
KURSK
PERMIAN
MOSCOW
CHEREPOVETS
CHEREPOVETS
100
30
50
100
140
50
100
60
30
100
90
70
10
15
69
80
15
80
40
10
80
100
Determine the route for the cheapest option for delivering cargo from CHEREPOVETS to PERM.
If there are several such routes, indicate in your answer the most time-efficient option.
1) CHEREPOVETS - PERM
23

2) CHEREPOVETS – KURSK – PERM
3) CHEREPOVETS – MOSCOW – PERM
4) CHEREPOVETS – MOSCOW – KURSK – PERM
3) The figure shows a diagram of roads connecting cities A, B, C, D, D, E, F, Z, I, K. For each road
different paths from city A to city K?
B
IN
A
G
D
E
AND
TO
Z
AND
4) The performer Grasshopper has two teams:
1. add 3,
2. subtract 2.
The first of them increases the number on the screen by 3, the second - decreases it by 2 (negative numbers
are allowed). A Grasshopper program is a sequence of commands. How many different
numbers can be obtained from the number 1 using a program that contains exactly 5 instructions?

1. add 1
2. multiply by 3



Justify your answer.
Option2
1) Roads have been built between settlements A, B, C, D, E, F, length
which are given in the table. (The absence of a number in the table means that the straight line
there is no road between the points.)
A
B
3
9
4
C
3
9
3
8
D
3
2
F
7
E
4
8
2
7
A
B
C
D
E
F
Determine the length of the shortest path between points A and F (provided that
You can only move on constructed roads).
4) 17
1) 11
2) 13
3) 15
2) The tourist pilgrim must get from MURMANSK to KIEV. Bus
the company offered him the following list of routes that pass through
cities: MURMANSK, Kyiv, MOSCOW and SMOLENSK.
24

Departure point Arrival point Cost (cu) Number of monasteries
MURMANSK
MURMANSK
MURMANSK
MOSCOW
MOSCOW
MOSCOW
SMOLENSK
SMOLENSK
KYIV
KYIV
KYIV
KYIV
MOSCOW
SMOLENSK
KYIV
MURMANSK
SMOLENSK
KYIV
MOSCOW
MOSCOW
SMOLENSK
MURMANSK
200
100
110
60
100
20
40
30
60
35
190
81
10
30
7
9
15
15
15
7
10
37
In the table, the traveler indicated for himself the number of monasteries he would pass by.
pass the bus. Help the traveler get to his destination by spending
road no more than 190 USD and seeing the maximum number of monasteries. Please indicate in your answer
pilgrim route:
1) MURMANSK – SMOLENSK – Kyiv
2) MURMANSK – MOSCOW – Kyiv
3) MURMANSK – MOSCOW – SMOLENSK – Kyiv
4) MURMANSK – SMOLENSK – MOSCOW – Kyiv
3. The figure shows a diagram of roads connecting cities A, B, C, D, D, E, G, W. For each road
You can only move in one direction, indicated by the arrow. How many exist
different routes from city A to city Z?
A
B
IN
G
D
E
Z
AND
4) The Calculator performer has two commands:
1. add 1
2. multiply by 2.
The first one increases the number on the screen by 1, the second one doubles it.
A Calculator program is a sequence of commands. How many different
numbers can be obtained from the number 2 using a program that contains exactly 4
teams?
5*) The performer Triplet has two teams, which are assigned numbers:
1. add 1
2. multiply by 3
The first of them increases the number on the screen by 1, the second triples it.
A program for Tripleter is a sequence of commands.
How many programs are there that convert the number 1 to the number 20?
Justify your answer.
25

Answers:
Option 1
1. 17
2. 4)
3. 12
4. 6
Option 2
1. 15
2. 1)
3. 14
4. 15
Criteria for assessing performance results
 “5” is given when all tasks are completed completely or if there are 12 small ones
errors;
 “4” is given if there are 12 shortcomings or one error:
 “3” is given when 2/3 of the proposed tasks are completed;
 “2” is given if significant errors are made that show that the student does not speak
mandatory skills in the given topic to the fullest extent (ignorance of basic software
material) or refusal to perform educational duties:
Test No. 6 “Informatization of society”
1 The computers in your computer science classroom are connected to a network. This network...
a Local
b Regional
in Global
2 What device is needed to transmit data over telephone lines?
a Disk drive
b Modem
in Scanner
3 A network printer is installed on one of the office computers. Will others be able to
students from their computers to use this printer?
a Yes
b No
c Yes, if access to the printer is allowed
4 Which access type can be set for the My Documents folder on your
computer so that other students in the room can use documents from
this folder?
a Local
b Read only
in Full
5. The greatest opportunities for access to information resources are provided by
Internet connection method:
a) terminal connection via a dial-up telephone channel;
b) remote access via telephone communication channels;
c) permanent connection via fiber optic channel;
d) permanent connection over a dedicated channel.
6. Computer telecommunications- This:
a) connecting several computers into a single network;
26

and back;
b) transferring information from one computer to another using floppy disks;
c) remote data transfer from one computer to another;
d) exchange of information between users about the state of the computer;
7. Server is:
A) network program, which conducts a dialogue between one user and another;
b) powerful computer, to which other computers are connected;
c) an individual user’s computer connected to a common network;
d) a standard that defines the form of presentation and method of sending a message.
8. Modem is:
a) a powerful computer to which other computers are connected;
b) a device that converts digital signals computer to analog telephone signal
c) a program that allows dialogue between several computers;
d) a personal computer used to receive and send correspondence.
9. Data transfer speed is:
a) the amount of information transmitted per second;
b) the number of bytes of information transmitted per minute;
c) the number of bytes of information transferred from one computer to another;
d) the number of bits of information transmitted through the modem per unit of time.
10. Addressing is:
a) a method for identifying subscribers on the network;
b) server address;
c) postal address of the network user;
d) the number of bauds (characters/sec) of information sent by your modem.
11. Local computer networks are:
a) a network to which all computers in your city are connected;
b) the network to which all computers in your country are connected;
c) the network to which the computers of your computer science classroom or one building are connected;
d) a network to which all computers are connected.
12. Network adapter- This:
A) special program, through which several computers communicate;
b) special hardware for effective interaction of personal
network computers;
c) a special network resource management system public access;
d) a system for exchanging information between different computers.
13. Domain is:
a) part of the address that determines the address of the user’s computer on the network;
b) the name of the program for communication between computers;
c) the name of the device that communicates between computers;
G)
14. Which of the following methods of connecting to the Internet provides
unit of measurement of information.
greatest opportunities for access to information resources:
a) permanent connection via fiber optic channel;
b) remote access via telephone channels;
c) permanent connection via a dedicated channel;
d) terminal connection via a dial-up telephone channel;
e) temporary access via telephone channels.
27

15. Exchange of information between computer networks in which different
carried out with
information presentation standards (network protocols),
using:
a) host computers;
b) email;
c) gateways;
d) modems;
d) file servers.
16. Mailbox email subscriber is:
a) regular mailbox;
b) some area of ​​RAM of the file server;
c) part of the memory on the hard drive of the mail server allocated for the user;
d) part of the memory on the hard drive of the workstation;
e) special electronic device for storing text files.
17. Distinctive feature The web document is:
a) lack of a strictly defined document presentation format;
b) the fact that its replication is carried out by the originator of the document;
c) the presence of hypertext links in it;
d) the presence of illustrations;
d) its compactness.
18.
Complex of hardware and software allowing computers
exchange data is:
a) highway;
b) interface;
c) adapter;
G) computer network;
e) data buses.
19. Global computer network is:
a) information system with hyperlinks;
b) many computers connected by information transmission channels and located in
within one room or building;
c) a set of host computers and file servers;
d) a system for exchanging information on a specific topic;
d) totality local networks and computers located over long distances and
connected via communication channels into a single system.
20. Many computers connected by information transmission channels and located
within one room, building, is called:
a) global computer network;
b) information system with hyperlinks;
c) local computer network;
d) email;
e) regional computer network.
21. Information resources include:
a) a set of documents on paper;
b) the entire set of individual documents, as well as all documents located in
special storage facilities (libraries, video libraries, funds, archives);
c) all documents stored in archives;
d) books and other printed publications;
e) information stored on paper and magnetic media.
28

22. To store files intended for public access by network users,
used:
a) host computer;
b) fileserver;
c) workstation;
d) client server;
d) switch.
23. Network protocol- This:
a) a set of agreements on interactions in a computer network;
b) sequential recording of events occurring on a computer network;
c) rules for interpreting data transmitted over the network;
d) rules for establishing communication between two computers on the network;
e) coordination of various processes over time.
24. Activities aimed at collecting, storing, processing, transferring and using
information is called:
a) work activity;
b) sports activities;
c) information activities;
d) artistic activity;
d) scientific activities.
25. Transport protocol (TCP) provides:
a) splitting files into IP packets during transmission and assembling files during receiving;
b) reception, transmission and delivery of one communication session;
c) providing the user with already processed information;
d) delivery of information from the sender’s computer to the recipient’s computer;
e) collecting files from IP packets during file transfer.
26. Routing Protocol (IP) provides:
a) delivery of information from the sender’s computer to the recipient’s computer;
b) interpreting data and preparing it for the user level;
c) preservation of mechanical and functional parameters physical connection in computer
networks;
d) control of data transmission equipment and communication channels;
e) splitting files into IP packets during transmission and assembling files during receiving.
27. A computer connected to the Internet must have:
a) IP address;
b) WEB page;
c) home WEB page;
d) domain name;
e) URL.
28. Email(email) allows you to send:
a) messages and attached files;
b) exclusively text messages;
c) executable programs;
d) www pages;
e) exclusively databases.
29. WEB pages have the extension:
a) *.HTM;
b) *.THT;
c) *.WEB;
29

d) *.EXE;
d) *. www.
30. HTML (HYPER TEXT MARKUP LANGUAGE) is
a) a means of creating WEB pages;
b) programming system;
c) graphic editor;
d) database management system;
d) expert system.
Answers:
1
A
2
b
3
V
4
V
5
V
6
V
7
b
8
b
9
G
10 11 12 13 14 15 16 17
A
V
b
A
A
V
V
V
18
19
20
21
22
23
24
25
26
27
28
29
30
G
d
V
d
b
A
V
A
A
A
A
A
A
Evaluation criteria:
Task completion percentage
95% or more
8094%%
6679%%
less than 66%
Mark
Great
Fine
satisfactorily
unsatisfactory
Change registration sheet
Accepted/date
Content changes made
date
Causes
30