The author of the following text is “Aichi Academy”
This is an excerpt from the document.
WORK PROGRAM number 3
The use of free software in the professional activities of computer science teachers
Category students: teachers of computer science
Published at the request of readers of
this topic about strange questions .
')
Personally, I was most surprised by the questions on the topic “Creating and Editing Internet Applications”. It seems to be referring to something like Quanta Plus.
Linux OS for users1. Indicate for what purposes a particular image of bootable diskettes is needed:
1 This boot image provides support for less common drivers such as NET and SCSI. They should use if the other options are not passed. A cdrom.img
2 For installation from repositories accessible via NFS, FTP, HTTP. Network configuration for the machine can be manual or automatic. B hd.img
3 Used when the installation source is accessible via a PCMCIA card (network, CD-ROM). C network.img
4 For installation from a local IDE or SCSI device CD-ROM. It is used when it is impossible to directly boot from CD-ROM. D other.img
5 This image is used if you are unable to install from a CD-ROM. You just need to copy the contents of the CD to your hard disk (in the FAT, ext2fs or ReiserFS partition) and boot from the floppy with this image. E pcmcia.img
2. Specify how long file and directory names can be in Linux.
3. If you log in as a regular user and try to access files outside your home directory, you will often receive the following error message: Access is denied. Specify what needs to be done to access all files (select all the correct answer options):
a. need to log in as administrator
b. this happens when the file system is locked - you need to reboot
c. need to log in as root
d. need to relogin
e. it is necessary to log in under another user with similar rights
4. Tick what the question mark “?” Means when defining search criteria for files and folders:
a. exactly one character is missing
b. missing any number of characters
5. Note which printing system is used in Linux Master:
a. Cups
b. Lpr
c. Netprint
d. Printer
6. Specify which of the listed utilities searches for files and folders in KDE.
a. Kdefind
b. Ksearch
c. Ksch
d. Kfind
7. Indicate which file systems can be created during formatting (select all the correct answer options).
a. MS-DOS
b. Linux
c. Ext2
d. Ext3
e. Minix
f. Swap
8. Which of the services can be used to configure network access to shared directories (select all the correct response options).
a. Autofs
b. Samba
c. Standard system settings
d. Nfs
e. None of the above
9. Specify the keyboard control module.
10. Specify the login user who is allowed to execute any commands in the system.
OpenOffice.org for usersOpenOffice.org Writer text editor
11. Match the formatting elements with their functions.
1 Used for typing A Style
2 Used to emphasize attention in the text. B Outline.
3 Used to position text at specific positions. C Alignment.
4 Used to save time when formatting and maintain consistency in the design of the document D Font
12. To remove a table from the text, apply:
a. delete key
b. backspace key
c. menu command Table / Delete / Table
d. Delete button on the Table toolbar
13. Specify the default extension for files saved in the OpenOffice.org Writer program.
a. .doc
b. .rtf
c. .odt
d. .txt
14. With the help of the wizard you can create (select all the correct answer options):
a. letter
b. Fax
c. address data source
d. New text document
Spreadsheets OpenOffice.org Calc
15. Match the numeric formats and their descriptions.
1 Displays the number + text "rub" A Dates
2 Number and percent sign are displayed. B Numeric
3 The year, month, day is displayed. C Money
4 A number with three decimal places is displayed. D Percentage
16. Criteria in the advanced filter from different lines are linked by the condition:
a. AND
b. OR
c. TRUE
d. LYING
17. The cell may contain (select all the correct answer options):
a. number
b. text
c. formula
d. note
18. There are filters (select all the correct answer options):
a. standard
b. extended
c. truncated
d. AutoFilter
OpenOffice.org Impress Presentations
19. Specify which mode is most convenient for moving slides.
a. note mode
b. slide sorter
c. drawing mode
d. structure mode
20. Specify how to set text alignment.
a. Format> Characters
b. Format> Position and Size
c. Format> Paragraph
d. Format> Bullets and Numbering
21. Specify which toolbar can be used to create graphic objects.
a. Drawing
b. Picture
c. Standard
d. Circles and ovals
22. Tick what the Hide slide operation is for.
a. Hide slide operation is equivalent to deleting a slide
b. so that this slide is not displayed on the screen while working with the presentation
c. so that this could not print
d. to prevent this slide from being displayed during the presentation
Graphic Editor OpenOffice.org Draw
23. Note what applies to objects:
a. rectangle
b. gradient
c. scale
d. fill
24. Tick with which the fill can be implemented (select all the correct answer options):
a. hatching
b. texture
c. gradient
d. material
25. Indicate which functions can be applied to the figures (select all the correct answer options):
a. addition
b. difference
c. intersection
d. multiplication
26. Indicate which operations are used to merge the figures into one (select all the correct answer options):
a. grouping
b. Union
c. morph
d. duplication
Manage email and personal contacts. Work on the Internet
27. Tick what network protocols are for.
a. fix connection errors
b. blocking the spread of viruses
c. determine the rules of the network
d. filter incoming email messages
28. Tick what needs to be done to follow up with Mozilla Thunderbird.
a. enter mailing recipients manually in the Message Composing window
b. group cards in your address book
c. create a mailing list in your address book
d. This option is not available in the program.
29. Check whether you can assign a web page that will open when the browser starts.
a. not
b. Yes
30. Indicate whether you can create multiple accounts in Mozilla Thunderbird.
a. Yes
b. not
Compress and archive files
31. Specify what actions will be performed when running the bzip2 note2 command:
a. the note2 file will be compressed as note2.bz2
b. note2 archive will be checked for errors
c. note2 file will be decompressed into the current folder
32. Specify which option allows you to extract files from the archive using tar.
a. -c
b. -f
c. -t
d. -x
e. -z
Installation and administration of Linux Master
33. Specify what keyboard shortcut you can call the graphical console.
34. Specify which command creates a new file.
35. Write what team you can add a user to the system.
36. You set up logs. The severity level is encoded with a number from 0 to 7. Determine the incorrect matches (select all the correct answers).
a. 0 - EMERG (the system is not operational, the old name is PANIC)
b. 7 - DEBUG (debug print)
c. 6 - ALERT (immediate intervention required)
d. 2 - CRIT (critical condition)
e. 3 - ERR (error, old name ERROR)
f. 1 - WARNING (warning, old name WARN)
37. Specify which utilities can be used to configure the kernel.
a. Make config
b. Make install
c. Make menuconfig
d. Make xconfig
e. Make reconfigure
38. Check the ways in which printers connected to Linux Master can be controlled (select all the correct answers).
a. via web interface
b. changing configuration files
c. via ftp
39. Write what command is used to mount file systems.
40. Check with which utilities you can copy the file to a remote computer (select all the correct answer options).
a. ssh
b. centersh
c. rcp
d. scp
e. telnet
f. rlogin
41. Write, with the help of which command you can display full information about the processes running in the system.
42. Check with which utility you can backup.
a. tar
b. dump
c. rar
d. tcpdump
43. Tick what the main danger is when using NFS.
a. The server does not work correctly with the NFS protocol on other OS
b. the client cannot always mount the resource, and sometimes a reboot of the machine is required
c. trust relationship established between client and server
44. Specify which of the records for DNS points to DNS servers for this domain.
a. MX
b. PTR
c. CNAME
d. SOA
e. NS
45. Write to which team displays a list of users who are currently registered in the system (logged in).
46. Write what team creates a new directory.
47. Write what team can add a group to the system.
48. Choose the correct order of configuration and package installation from source.
a. make; make install; ./configure
b. ./configure; install make; make
c. ./configure; make; make install
d. make install; make; ./ configure
49. Specify the main file that is responsible for the server configuration.
a. /etc/syslogd.conf
b. /etc/syslog.conf
c. / etc / default / syslog
d. / etc / syslog
50. A description of each installed printer (corresponding PPD file) is located in the directory:
a. / etc / cups / conf / ppd /
b. / etc / cups / ppd /
c. / var / spool / lp / ppd /
51. Match the device names with their descriptions:
1 / dev / console A Files supporting pseudo-terminals. Used for remote work sessions using telnet
2 / dev / pty B Special devices for working with modems
3 / dev / cua C SCSI Hard Drives
4 / dev / sd D IDE Hard Drives
5 / dev / hd E The system console, i.e. monitor and keyboard physically connected to computer
52. Check with which utilities you can access the remote machine in order to execute various commands on it (select all the correct answer options).
a. ssh
b. centersh
c. rcp
d. scp
e. telnet
f. rlogin
53. Match the names of the protocols with their descriptions:
1 nfs A Used to prevent different clients from changing data simultaneously.
2 mountd B Used to create, read / write, search files. Also manages authentication and statistics.
3 nsm C Monitors the current state of the computer (server or client) to inform
4 nlm D Responsible for connecting external systems to access via NFS
54. Indicate what is needed to determine the security policy on the network.
a. identify used services
b. determine in which file passwords are stored
c. determine which font is installed on the computer
d. determine which services which groups should have access to
e. deny access to all users except those registered in the system
55. Check which of the records for DNS points to the mail server for this domain.
a. MX
b. PTR
c. CNAME
d. SOA
e. NS
56. Write what command you can use to check the file system for errors.
The use of antiviruses. Protection against hacker attacks and spam
57. Your student is very pleased with the new friend, whom he met in one of the chats. Choose a sign by which you can determine that this new buddy is an adult:
a. he uses as a pseudonym the name of a famous literary hero
b. his messages contain almost no spelling errors
c. he asks your student to send his photo
d. he invites your student to arrange a personal meeting
58. Select the function that ClamAV does not perform without additional modules:
a. on-demand file checking
b. anti-virus database update
c. checking email attachments
d. automatic file access checking
59. Choose the most effective method to protect students from the targeted actions of cybercriminals on the Internet:
a. keep students away from computers
b. prohibit the use of the Internet at school
c. conduct explanatory work with students with specific examples
d. use filtering software on the internet gateway
60. Specify which program is updating the ClamAV antivirus anti-virus database:
a. clamdscan
b. freshclam
c. sigtool
d. clamav-milter
Exclusion of student access to Internet resources incompatible with the tasks of their education
61. Specify which of the Squid proxy logs (logs) contains information about user requests:
a. /var/log/squid/store.log
b. /var/log/squid/cache.log
c. /var/log/access.log
d. /var/log/squid/access.log
62. Note the name of the ICF configuration file containing the correspondence of users to roles.
a. c-icap.conf;
b. custom_roles;
c. users;
d. generic_roles;
63. Select the option that indicates the correct path to the Squid proxy configuration file:
a. /etc/squid/squid.conf;
b. /etc/squid.conf;
c. /usr/etc/squid/squid.conf;
d. /etc/squid/cachemgr.conf.
64. Note which role will be assigned to the teacher user, working on the computer with the IP address 192.168.1.100, if the users file has the following contents:
user @ Pupils
@ 192.168.0.0 / 24 Class_25
teacher @ 192.168.1.100 / 32 Informatika
a. none of the roles
b. Class_25
c. Informatika
d. Pupils
Database Management with OpenOffice.org Base
65. Specify the metacharacter, when using which in the query designer all columns of this table will be displayed.
a. %
b. ^
c. #
d. *
e. @
f.!
66. Indicate whether a query can be executed that retrieves data not from a physical table, but from another query.
a. no, he can not
b. maybe if this other (basic) query itself retrieves data from the table
c. may in any case
d. maybe if this other (basic) query retrieves no more than 5000 rows of data
67. Specify the name of the element that allows you to distinguish one row of the table from another.
a. primary recording
b. primary line
c. primary key
d. key record
e. key value
68. Check whether we can indicate at the time of creating a new table that when inserting a new row into it, filling in the field of this column is a prerequisite.
a. we can, but only for the primary key column
b. we can, but only for a column of numeric types
c. cannot, input is always optional
d. we can for any column
Creating and editing Internet applications
69. Check what needs to be done to upload the site to the server.
a. click on the “Transfer project file” button in the “Main” panel
b. in the “Service” menu, select the command “Download site”
c. in the "File" menu, select the "Transfer website to server" command
d. in the "Project" menu, select the "Transfer project to server" command
70. Specify how you can display both the web page and its html-code simultaneously (select all the correct answer options).
a. it's impossible
b. in the "Tools" menu, select the command "Display html-code and page"
c. on the toolbar "Navigation" click "Visual and code editor"
d. in the "View" menu, select the "Visual and code editor" command
71. Specify how to view the web page whose html code is presented on the screen.
a. Click the View button on the Navigation toolbar.
b. click the "Convert html-code" button on the "View" toolbar
c. in the "Edit" menu, select the command "View Web-page"
72. Specify how to save the current document as a template.
a. in the “Tools” menu, select the “Convert to template” command
b. in the menu "File" choose the command "Save as template"
c. on the "Basic" toolbar, click "Save Template"
d. in the "Project" menu, select the "Convert to a project template" command