You can save the information before turning off your computer. External memory includes

1. in random access memory

2. in external memory

3. in the magnetic disk controller

A14. The program is:

1. algorithm written in a programming language

2. set of commands operating system computer

3. directed graph indicating the order of execution of computer commands

4. Component interaction protocol computer network

A15. Given: a = DD 16, b = 337 8. Which of the numbers C written in binary system notation satisfies the inequality a< c < b?

A16. Assuming that each character is encoded by one byte, determine the information volume of the following statement by Alexei Tolstoy:
The one who does nothing makes no mistakes, although this is his main mistake.

4. 123 bytes

A17. Assuming that each character is encoded by 16 bits, estimate the information volume of the following Pushkin phrase in Unicode encoding:
A habit has been given to us from above: It is a substitute for happiness.

3. 44 bytes

4. 704 bytes

A18. The value of the expression 10 16 + 10 8 * 10 2 in the binary number system is

A19. To encode the letters A, B, C, D, they decided to use two-digit sequential binary numbers (from 00 to 11, respectively). If you encode the sequence of GBVA characters in this way and write the result in hexadecimal code, you get:

A20. In forming a chain of four beads, some rules are used: At the end of the chain there is one of the beads P, N, T, O. On the first place there is one of the beads P, R, T, O, which is not in the third place. In third place is one of the O, P, T beads that is not the last one in the chain. Which of the following chains could be created taking into account these rules?



Block B

IN 1. Which of the following refers to computer input devices? Please indicate letters in your answer.

2. Printer

3. Plotter

4. Monitor

5. Microphone

6. Speakers

Answer: a, d

AT 2. When determining the correspondence for all elements of the 1st column, indicated by a number, one element of the 2nd column, indicated by a letter, is indicated. In this case, one element of the 2nd column can correspond to several elements of the 1st column (for multiple matching tasks) or not correspond to any of the elements of the 1st column (for single-valued matching tasks).

Answer: 1d,d 2a,b

AT 3. How many bytes does the word “information” contain? Write down only the number in your answer.

Block A. Choose one answer.

A1. Which of the following input devices belongs to the class of manipulators:

  1. Touchpad
  2. Joystick
  3. Microphone
  4. Keyboard

A2. You can save information before turning off your computer

  1. in RAM
  2. in external memory
  3. in the magnetic disk controller

A3. The permanent storage device is used to store:

  1. user programs during operation
  2. especially valuable application programs
  3. especially valuable documents
  4. constantly used programs
  5. programs bootstrap computer and testing its nodes

A4. Personal Computer- This…

  1. device for working with text information
  2. electronic number processing device
  3. electronic information processing device

A5. In what PC device is information processed?

  1. External memory
  2. Display
  3. CPU

A6. Printers are:

  1. matrix, laser, inkjet
  2. monochrome, color, black and white
  3. desktop, portable

A7. Computer architecture is

  1. technical description of computer device parts
  2. description of devices for input/output information
  3. description software for computer operation

A8. Device for outputting text and graphic information on various solid media

  1. monitor
  2. Printer
  3. scanner
  4. modem

A9. Scanners are:

  1. horizontal and vertical
  2. internal and external
  3. manual, roller and tablet
  4. matrix, inkjet and laser

A10. Graphics tablet(digitizer) - device:

  1. for computer games
  2. when carrying out engineering calculations
  3. for transferring symbolic information to a computer
  4. for entering drawings and drawings into a PC

A11. Given: a = EA 16, b=3548. Which of the numbers C, written in the binary number system, satisfies the inequality a

  1. 11101010 2
  2. 11101110 2
  3. 11101011 2
  4. 11101100 2

A12. Assuming that each character is encoded in one byte, determine the information volume of the following statement by Jean-Jacques Rousseau:
Thousands of paths lead to error, but only one to truth.

  1. 92 bits
  2. 220 bit
  3. 456 bit
  4. 512 bit

A13. Unicode has two bytes for each character. Determine the information volume of a word of twenty-four characters in this encoding.

  1. 384 bits
  2. 192 bits
  3. 256 bit
  4. 48 bit

A14. The meteorological station monitors air humidity. The result of one measurement is an integer from 0 to 100 percent, which is written using the smallest possible number of bits. The station made 80 measurements. Determine the information volume of the observation results.

  1. 80 bit
  2. 70 bytes
  3. 80 bytes
  4. 560 bytes

A15. Calculate the sum of the numbers x and y, with x = A6 16, y = 75 8. Present the result in the binary number system.

  1. 11011011 2
  2. 11110001 2
  3. 11100011 2
  4. 10010011 2


¬(The first letter of the name is a vowel → The fourth letter of the name is a consonant)?

  1. ELENA
  2. VADIM
  3. ANTON
  4. FEDOR
X Y Z F
1 1 1 1
1 1 0 1
1 0 1 1
  1. X v ¬ Y v Z
  2. X Λ Y Λ Z
  3. X Λ Y Λ ¬ Z
  4. ¬X v Y v ¬Z

A18. After launching Excel, a blank... appears in the document window.

  1. workbook
  2. notebook
  3. table
  4. page

A19. The word with which the program title begins.

  1. program
  2. readln
  3. integer
  4. begin

A20. Determine the value of variable c after executing the following program fragment.

a:= 5;
a:= a + 6;
b:= -a;
c:= a - 2*b;

  1. c = -11
  2. c = 15
  3. c = 27
  4. c = 33

Block B

B1. Which of the following refers to computer output devices? Please indicate letters in your answer.

  1. Scanner
  2. Printer
  3. Plotter
  4. Monitor
  5. Microphone
  6. Columns

Answer: b,c,d,f

B2. Match

Purpose Device
1. Input device a) monitor
2. Output devices b) printer
c) floppy disk
d) scanner
d) digitizer

Answer: 1d,d 2a,b

AT 3. How many bits does the word “computer science” contain? Write down only the number in your answer.

B4. Establish a correspondence between the concepts of the Pascal language and their description:

Answer: 1a,c 2e 3d 4d,b

AT 5. Note the main ways to describe algorithms.

  1. Block diagram
  2. Verbal
  3. Using networks
  4. Using normal forms
  5. Using graph diagrams

Option 2.

Block A. Choose one answer.

A1. A device for entering information from a sheet of paper is called:

  1. Plotter
  2. Streamer
  3. Driver
  4. Scanner

A2. The driver is

  1. long-term storage device
  2. a program that controls a specific external device
  3. input device
  4. output device

A3. When connecting a computer to the telephone network, use:

  1. modem
  2. Fax
  3. scanner
  4. Printer

A4. Specify input devices.

  1. Microphone, keyboard, scanner, digital camera
  2. Mouse, light pen, hard drive
  3. Printer, keyboard, joystick

A5. What PC device is intended for outputting information?

  1. CPU
  2. Monitor
  3. Keyboard

A6. External memory includes…….

  1. modem, disk, cassette
  2. cassette, optical disc, tape recorder
  3. disc, cassette, optical disc

A7. The processor includes:

  1. devices for recording information, reading information
  2. arithmetic logic unit, control device
  3. information input and output devices
  4. information storage device

A8. A type of printer in which an image is created by applying mechanical pressure to the paper through an ink ribbon. Either symbol templates or needles are used, structurally combined into matrices.

  1. impact type (matrix)
  2. inkjet
  3. photoelectronic

A9. There are no monitors

  1. monochrome
  2. liquid crystal
  3. CRT based
  4. infrared

A10. When you turn off your computer, all information is erased

  1. on CD-ROM disk
  2. in RAM
  3. on a floppy disk

A11. Given: a = E71 6, b = 351 8. Which of the numbers C, written in the binary number system, satisfies the inequality a

  1. 1101010
  2. 11101000
  3. 11101011
  4. 11101100

A12. Assuming that each character is encoded by one byte, determine the information volume of the following statement by Alexei Tolstoy:
The one who does nothing makes no mistakes, although this is his main mistake.

  1. 512 bit
  2. 608 bit
  3. 8 KB
  4. 123 bytes

A13. Assuming that each character is encoded by 16 bits, estimate the information volume of the following Pushkin phrase in Unicode encoding:
A habit has been given to us from above: It is a substitute for happiness.

  1. 44 bits
  2. 704 bits
  3. 44 bytes
  4. 704 bytes

A14. 678 athletes participate in cyclocross. A special device registers each participant's passing of the intermediate finish, recording its number using the minimum possible number of bits, the same for each athlete. What is the information volume of the message recorded by the device after 200 cyclists have completed the intermediate finish?

  1. 200 bits
  2. 200 bytes
  3. 220 bytes
  4. 250 bytes

A15. The value of the expression 101 6 + 10 8 * 10 2 in the binary number system is

  1. 1010 2
  2. 11010 2
  3. 100000 2
  4. 110000 2

A16. For which symbolic expression is the statement false:
First letter is vowel → ¬ (Third letter is consonant)?

  1. abedc
  2. becde
  3. babas
  4. abcab

A17. The symbol F denotes one of the following logical expressions from three arguments: X, Y, Z. A fragment of the truth table of the expression F is given (see table). Which expression matches F?

X Y Z F
0 1 0 0
1 1 0 1
1 0 1 0
  1. ¬X v Y v ¬Z
  2. X Λ Y Λ ¬Z
  3. ¬X Λ Y Λ Z
  4. X v ¬Y v Z

A18. Lines in the workbook are designated:

  1. Roman numerals
  2. in Russian letters
  3. with Latin letters
  4. Arabic numerals

A19. What is the assignment command in PascalABC? Select one of the answer options:

A20. Determine the value of variable b after executing the following program fragment, where a and b are real variables:

a:= -5;
b:= 5 + 7 * a;
b:= b / 2 * a;

  1. -75

Block B

B1. Which of the following refers to computer input devices? Please indicate letters in your answer.

  1. Scanner
  2. Printer
  3. Plotter
  4. Monitor
  5. Microphone
  6. Columns

Answer: a, d

AT 2. Match

Purpose Device
1. Input device a) display
2. Output devices b) printer
c) hard drive
d) scanner
d) keyboard

Answer: 1d,d 2a,b

B3. How many bytes does the word “information” contain? Write down only the number in your answer.

AT 4. Write down only those letters whose words represent Pascal data types.

  1. var
  2. begin
  3. real
  4. write
  5. integer

Answer: c, d

B5. Which of the following properties are the main properties of the algorithm?

  1. Efficiency
  2. Mass character
  3. Correctness
  4. Certainty

Option 3

Block A. Choose one answer.

A1. Printers cannot be:

  1. Tablet
  2. Matrix
  3. Laser
  4. Jet

A2. "The program stored in external memory, after being called for execution, ends up in ..... and is processed by ....".

  • processor input device
  • processor processor registers
  • processor by processor
  • RAM by processor
  • file by processor

A3. The minimum composition of a personal computer...

  1. hard drive, disk drive, monitor, keyboard
  2. monitor, keyboard, system unit
  3. printer, keyboard, monitor, memory

A4. When you turn off your computer, all information is erased

  1. on CD-ROM disk
  2. in RAM
  3. on a floppy disk

A5. External storage devices include...

  1. CPU
  2. Diskette
  3. Monitor

A6. Random Access Memory (RAM) is physically

  1. Microcircuit
  2. Floppy disk
  3. Magnetic disk

A7. For a peripheral device to function properly, the driver for that device must be located

  1. in RAM
  2. on your hard drive
  3. on installation floppy disks
  4. printed

A8. A type of printer in which the main element is the print head, consisting of nozzles to which ink is supplied.

  1. jet
  2. laser
  3. matrix

A9. Personal computer cases are:

  1. horizontal and vertical
  2. internal and external
  3. manual, roller and tablet
  4. matrix, inkjet and laser

A10. Printers are:

  1. desktop, portable
  2. matrix, laser, inkjet
  3. monochrome, color, black and white
  4. CRT based

A 11. How is the number 82 represented in the binary number system?

  1. 1010010 2
  2. 1010011 2
  3. 100101 2
  4. 1000100 2

A12. Assuming that each character is encoded by one byte, determine the information volume of the following statement by Rene Descartes:
I think, therefore I exist.

  1. 28 bit
  2. 272 bits
  3. 32 KB
  4. 34 bits

A13. Assuming that each character is encoded with 16 bits, estimate the information volume of the following phrase in Unicode encoding:
There are 6000 milliliters in six liters.

  1. 1024 bytes
  2. 1024 bits
  3. 512 bytes
  4. 512 bit

A14. In production, there is an automated system for informing the warehouse about the need to deliver certain groups of consumables to the workshop. The system is designed in such a way that a conditional number of consumables is transmitted to the warehouse via a communication channel (in this case, the same, but the minimum possible number of bits in the binary representation of this number is used). It is known that a request was sent for the supply of 9 groups of materials out of 19 used in production. Determine the volume of the message sent.

  1. 35 bytes
  2. 45 bit
  3. 55 bit
  4. 65 bytes

A15. Calculate the sum of binary numbers x and y if x = 1010101 2 and y = 1010011 2

  1. 10100010 2
  2. 10101000 2
  3. 10100100 2
  4. 10111000 2

A16. For which name is the statement true:
(Second letter is vowel → First letter is vowel) Λ Is the last letter a consonant?

  1. IRINA
  2. MAKSIM
  3. MARIA
  4. STEPAN

A17. The symbol F denotes one of the following logical expressions from three arguments: X, Y, Z. A fragment of the truth table of the expression F is given (see table). Which expression matches F?

X Y Z F
0 0 0 1
0 0 1 0
0 1 0 0
  1. X Λ Y Λ Z
  2. ¬X Λ ¬Y Λ Z
  3. X Λ Y Λ ¬Z
  4. ¬X Λ ¬Y Λ ¬Z

1. in RAM

2. in external memory

3. in the magnetic disk controller

11. The program is:

1. algorithm written in a programming language

2. set of computer operating system commands

3. directed graph indicating the order of execution of computer commands

4. protocol for interaction of computer network components

12. Operating system:

1. a program system that ensures the joint operation of all computer devices for processing information

2. a system of mathematical operations for solving individual problems

3. system of scheduled repair and maintenance of computer equipment

4. program for scanning documents

13. What files are infected by macro viruses?

1. executive;

2. graphic and sound;

3. Word document files and Excel spreadsheets;

4. html documents.

14. What is the antivirus program based on?

1. waiting for the start of a virus attack

2. to compare program codes with known viruses

3. on deleting infected files

4. on creating viruses

15. A device that converts analog signals into digital signals and vice versa is called:

1. network card

3. processor

4. adapter

16. Among the main advantages of working with text in a word processor (compared to a typewriter) are:

1. the ability to edit text multiple times

2. possibility of faster typing

3. the ability to reduce labor intensity when working with text

4. ability to use different fonts when typing

Option

When completing tasks, choose the correct one from the four options offered to you.

1. One of the fundamental concepts of computer science is:

2. information

3. communication channel

4. Norton Commander

2. Information that does not depend on personal opinion or judgment is called:

1. reliable

2. current

3. objective

3. Visual information is provided by:

1. picture

2. sound of thunder

3. apple taste

4. mosquito bite

4. In what language is the information processed by the computer presented?

1. in BASIC

2. in text form

3. in binary codes

4. in decimal number system

5. Translation of text from English into Russian can be called:

1. storage process

2. receiving process

3. protection process

4. processing process

6. The code is called:

1. fixed length binary word

2. sequence of characters

3. arbitrary finite sequence of characters

4. a set of symbols (symbols) for presenting information

7. In what PC device is information processed?

1. external memory

2. display

3. processor

8. Information input device - joystick - is used:

1. for computer games;

2. when carrying out engineering calculations;

3. for transferring graphic information to a computer;

4. for transmitting symbolic information to a computer;

There are no monitors

1. monochrome

2. liquid crystal

3. CRT based

4. infrared

10. External memory includes:

1. modem, disk, cassette

2. cassette, optical disc, tape recorder

3. disk, cassette, optical disk

4. Mouse, light pen, hard drive

When using materials from this site - and placing a banner is MANDATORY!!!

You can save information before turning off your computer

1) in RAM

2) in external memory

3) in processor registers

4) on the disk drive

5) in the magnetic disk controller

The electronic unit that controls the operation of the external device is called:

1) adapter (controller)

2) driver

3) processor register

4) common bus

5) interface

Smallest addressable portion of computer memory:

3) kilobyte

"The directory contains information about ..... stored in .....". Instead of the ellipses, insert the appropriate statement:

1) programs, RAM

2) files, RAM

3) programs, external memory

4) files, external memory

5) programs, processor

The driver is

1) long-term storage device

2) a program that controls a specific external device

3) input device

4) a device that allows you to connect a new external

device

5) output device

While the computer is running, the RAM is always

1) operating system kernel

2) the entire operating system

3) application software

4) programming system

5) archiver program

2) catalog

3) directories

4) programs

How much information can a 16-bit processor process in one operation?

2) 16 KB

3) 1/16 KB

The application is unloaded from memory and stops working if

1) launch another application

2) minimize the application window

3) switch to another window

4) move the application window

5) close the application window

Suggested commands:

1) create a file home.txt;

2) create a TOWN directory;

3) create a STREET directory;

4) enter the created directory

5) make drive A: current.

Arrange the numbered commands so that an algorithm is obtained that creates a file on an empty floppy disk with the full name A:\TOWN\STREET\home.txt.

1) 5; 2; 4; 3; 4; 1

3) 5; 1; 3; 4; 2

4) 5; 1; 2; 3; 4

The taskbar is used to

1) switching between running applications

2) shutdown Windows

3) data exchange between applications

4) launch DOS programs

5) directory browsing

The tetris.com file is located on the C: drive in the GAMES directory, which is a subdirectory of the DAY directory. Select full file name:

1) From:\tetris.com\GAMES\DAY

2) C:\GAMES\tetris.com

3) C:\DAY\GAMES\tetris.com

4) C:\GAMES\DAY\tetris.com

5) C:\GAMES\tetris.com

"….. memory means that any information is entered into memory and retrieved from it by…..".

1) Discreteness; addresses

2) Addressability; values

3) Discreteness; bits

4) Addressability; bytes

5) Addressability; addresses

Application software includes:

1) programming languages

2) operating systems

3) dialog shell

4) the totality of all programs installed on the computer

5) text editors

"The program stored in external memory, after being called for execution, ends up in ..... and is processed by ....". Instead of the ellipsis, insert the appropriate statements:

1) input device; processor

2) processor; processor registers

3) processor; processor

4) RAM; processor

5) file; processor

How much information space will a text file containing on a floppy disk take up?

745 characters:

2) 745 bytes

3) one sector

4) one cluster

5) two sectors

System software includes:

1) programming languages

2) operating systems

3) graphic editors

4) computer games

5) text editors

“….. is information processed in a computer programmatically.” Instead of the ellipsis, insert the appropriate word:

1) Details

3) Values

5) Catalog

“Any information in a computer’s memory consists of….. and…”.

Instead of the ellipsis, insert the appropriate statements:

1) zeros; ones

2) words; proposals

3) symbols; signs

4) symbols; words

5) numbers; letters

"A blank formatted floppy disk can become a source of infection......".

Instead of the ellipsis, insert the appropriate words:

1) boot virus

2) file virus

3) macrovirus

4) network virus

5) all types of viruses

Testing in the section "Computer Architecture. Software" 10th grade.

Liked? Please thank us! It's free for you, and it's a big help to us! Add our website to your social network:

Instructions

Save information on your hard drive. If this information is sensitive, remember that simply hiding a folder is often not enough. Archive such information in an archive with a multi-digit password to prevent accidental or malicious access.

Burn information onto CDs and DVDs. Computers tend to break down sometimes, and this can lead to the loss of all the information they contain. After recording to a disc, handle it carefully - store it in a special case or in a disc box.

Use removable media such as external hard drives and high-capacity flash drives. These devices support , meaning you can put a password on them that will prevent other people from accessing it. But it is advisable to install an additional security measure, similar to the case with storage on a computer.

Use online document storage services. Keep in mind that when using services such as Google Docs, you should archive all information and set a password before uploading files to the server. This method is considered the most reliable compared to storing files on physical media.

Video on the topic

Hard drives come in different purposes and capacities. Due to the increased need to store large amounts of information, disks have become necessary attributes of life. However, these storage media sometimes become unusable. To prevent this from happening, you need to treat them with care and precision and be able to store these devices correctly.

You will need

  • -special box;
  • -program for measuring hard drive temperature;
  • - a computer with Internet access.

Instructions

Beware of dropped or impacted hard drives. The gyroscopic moment that occurs when a hard drive operates enhances the effect and effect of the impact, as a result of which the drive can completely stop working.

If the hard drive is an external device, pay attention to the conditions for turning off the drive and its subsequent placement. It is strictly prohibited by any hard drive manufacturer to turn the connector on or off while the computer is on, since current pulses can seriously damage the hard drive mechanics and electronics.

After disassembling the external drive box, do not touch the conductors and metal chips. The charge of static electricity, which can accumulate on the human body, pierces the thin semiconductor chips of the disk. To resolve this issue, first touch the drive housing.

The disc storage location should not be located near devices such as disposable lighters with a piezoelectric crystal. Such high-voltage devices create pulses with a voltage of 10-20 kilovolts, which is very harmful to the condition of hard drives.

When installing for storage, do not disassemble the disk; damage to the heads and platter surfaces may occur. In principle, disassembling the hard drive should be left to a specialist. Disc parts can be scratched very easily. This will not add durability and reliability to it, but the warranty service may well make claims.

Create an optimal temperature in the place where the discs are stored, and do not expose the discs to direct sunlight. Carefully wipe the air intakes of the ventilation holes with slightly damp cloths, clearing them of dust.

The Internet provides us with more and more new opportunities, making life easier. For example, new technologies make it possible to use the Internet to store important documents, including personal ones.

When traveling abroad, many are afraid of losing their documents and being stuck there until all the formalities are cleared up. If you lose your documents at home, there is nothing pleasant either. It's good that technology exists to get around this problem. As for abroad, it is still better to carry photocopies of documents certified by a notary with you. This way the originals will be safer.

However, if someone is afraid of a “total” loss of documents, then it is best to turn to the Internet, where there are universal services for storing any files, including personal documents. The names of these services: Dropbox, Google Drive, Yandex Disk. Cloud technologies allow you to access these services from any device.

All that remains is to scan the document and save it on any of the services, and after that you can view it from your computer, laptop, or smartphone. Moreover, this can be done from anywhere in the world where there is Internet. And it doesn’t matter if your computer or smartphone is broken - all information on such sites is reliably protected. Access the service from any Internet cafe or library and print documents if necessary.

It remains only to take into account a few nuances:

You will need to register on the site by creating a name and password to log in. It is better not to use your last name, first name and patronymic for this purpose; it is wiser to come up with something that is not related to you. And it’s better to have a separate email account.
- It seems that you need to scan and attach documents certified by a notary to such a service. Because no matter how securely your documents are stored, it is still not the original, but a copy. As a rule, copies are not valid without certification. These documents will also not have a real notary seal, but a scanned one. However, this is more reliable for communicating with bureaucrats.
- there is a possibility that your account will be hacked, and then the documents will become available to attackers. To avoid this, you need to come up with a strong password that is not used anywhere else. It should be long and consist of letters and numbers interspersed with each other. Dates of birth are the weakest passwords that can be deciphered very quickly.
- figure out where you will store the password so as not to forget or lose it, otherwise the whole idea of ​​​​storing documents may go to waste. In order to be able to recover your password, you need to record all the actions that were performed during registration on the service. Now even young people do not rely on their memory, not to mention the rest of the population. Also keep all records in a safe place.