Printers Summary: Printers their characteristics and functionality. The main parameters of laser printers include

Laser printers provide high quality printing, not inferior, and in many cases superior to printing. They also have a high print speed, which is measured in pages per minute. (rt-page per minute).As in dot-matrix printers, the final image is formed from individual points

They use the electrographic method of imaging used in copiers of the same name. The laser is used to create an ultra-thin light beam that draws on the surface of a precharged photosensitive drum the contours of an invisible point electron image - the electric charge flows from the points illuminated by the laser beam on the surface of the drum. After the development of the electronic image by the dye (toner) powder adhering to the discharged areas, printing is performed — the toner is transferred from the drum to the paper and the image is fixed on the paper by heating the toner until it is melted.

The principle of operation of laser printers is as follows:

§ in accordance with the incoming data, the laser head emits light pulses that are reflected from the mirror and fall on the surface of the photosensitive drum;

§ horizontal image scan is performed by rotating the mirror;

§ surface areas of the photosensitive drum that received a light pulse acquire a static charge;

§ the drum during rotation passes through a container filled with a coloring composition (toner), and the toner is fixed in areas with a static charge;

§ with further rotation of the drum, its surface comes in contact with a paper sheet, as a result of which the toner is transferred to paper;

§ a sheet of paper with toner applied to it is pulled through the heating element, as a result of which the toner particles are sintered and fixed on the paper.

The main parameters of laser printers include:

Resolution, dpi (dots per inch - dots per inch);

Productivity (pages per minute);

The size of paper used;

The amount of internal RAM.

When choosing a laser printer, it is also necessary to take into account the parameter of the cost of the print, that is, the cost of consumables for obtaining one printed sheet of a standard A4 format. Consumables include toner and drum, which after printing a certain number of prints loses its properties. As a unit of measure, use cent per page(meaning US cents). Currently, the theoretical limit for this indicator is about 1.0-1.5. In practice, mass-produced laser printers provide values \u200b\u200bfrom 2.0 to 6.0.



The main advantage of laser printers is the ability to produce high quality prints. Middle-class models provide print resolutions up to 600 dpi, and professional models - up to 1200 dpi.

LED printers. The principle of operation of LED printers is similar to the principle of operation of laser printers. The difference is that the light source is not a laser head, but a line of LEDs. Since this line is located across the entire width of the printed page, there is no need for a mechanism for forming a horizontal scan and the whole structure is simpler, more reliable and cheaper. Typical print resolution for LED printers is around 600 dpi.

Laser printers provide the highest quality printing with a resolution of up to 50 dots / mm (1200 dpi) and print speeds up to 1000 characters / s. Color laser printers are widely used. For example, a Tektronix laser printer (USA) Phaser 550 has a horizontal and vertical resolution of 1200 dpi; color printing speed - 5 A4 pages per minute, monochrome printing speed - 14 pages / min. The characteristics of some models of laser printers are given in table 4.12.

Table 4.12.

Comparison of some Epson and Hewlett Packard printers


Advantages laser

printers:

Highest quality;

High speed;

Low noise level.

disadvantages laser

printers:

High price;

Large dimensions;

They require quality service.


Printers can be connected via both parallel and serial ports. Parallel ports are used to connect printers operating in parallel (receiving information immediately by byte). For example, adapters like Centronics allow you to connect up to three printers at the same time. Serial ports (2 devices) are used for connecting sequentially working (receiving information sequentially in 1 bit) printers, for example adapters of the RS-232C type (joint C2). A serial printing device does not mean at all that it is slow. Most printers use parallel ports.

Many high-speed printers have their own buffer memory with a capacity of up to several hundred kilobytes. In conclusion, it should be noted that the most popular printers for personal computers (their share is at least 30%) are produced by the Japanese company Seiko Epson. The printer control language (ESC / P) has become virtually standard. Printers from Star Micronics, Hewlett Packard, Xerox, Mannesmann, Citizen, Panasonic, etc. are also widely used.

III. Multimedia devices

The current level of development of computer technology has had a huge impact on the process of creating and producing audio-visual materials. The revolutionary technical leap in the field of digital sound recording made it possible to replace bulky and expensive studios with a personal computer. The essence of this “revolution” is that if earlier all the technical issues of processing audio information were solved using a large number of devices, now these problems are quite successfully solved by sound cards, boards, and, accordingly, software.

Sound cards . Today, a device designed to input and output sound information to a computer is a sound card. Sometimes they are called “sound blasters”, “sound adapters”, but we still focus on the concept of “sound card”.

What makes a sound card? Some believe that it simply provides the musical and sound accompaniment of computer games. However, in reality this is far from the case. Generally speaking, having even the most ordinary sound card, you have the ability to easily compose and direct radio programs, melodies, and provide signal processing. Yes, all this in one way or another allows you to make the simplest sound card. Another thing is that for this it is often necessary to have specific programs, although not very complex, but not widely used. This does not mean that these programs are designed only for professionals. Just very often they do not get wide distribution because their manufacturers are not always large companies, such as, for example, Microsoft, IBM, etc. It should be noted that the software of magnate companies is not always as convenient as possible, and sometimes programs to nobody, in general, unknown people, literally make a revolution in certain areas. In addition, often ignorance of even the minimum capabilities of sound cards is also due to the fact that sound processing programs are not included in the standard delivery of operating systems.

Video capture cards . To work with a video image on a computer, it must be digitized or converted into a form that can be understood by a computer. To do this, there are special capture cards that are inserted into the motherboard of your computer and allow you to input a video signal from an external source, convert it into an understandable format for your computer, compress this signal, and, ultimately, output the edited video clip back to the original or other equipment . Such equipment may be a VCR, video camera, and other media that reproduces and stores video information.

The range of tasks solved by multimedia devices is expanding with the development of computer software and hardware. However, in almost any design there are such devices as:

n Analog-to-digital and digital-to-analog converters;

n Musical synthesizer;

n Microphone and headphone jacks (or an external amplifier), as well as microphones and headphones.

Many modern sound cards, in addition, have a number of other devices. Even a simple listing of them indicates how complex, and for many of us, an interesting thing is the sound card:

n Signal processor for compressing audio information and implementing various effects;

n Permanent storage device containing samples of synthesized sounds;

n Random access memory for temporary storage of sound samples of instruments.

All these devices have recently become increasingly important, since the current trend of computerization of all spheres of human activity seems to in the near future completely virtualize professional studios and objects. It also affects the military sphere and the sphere of our professional activity.

IV. Communication and telecommunication facilities

Modem. A device designed to exchange information between remote computers via communication channels is usually called a modem (Modulator + DEM modulator). Moreover, the communication channel is understood as physical lines (wired, fiber, cable, radio frequency), the method of their use (dial-up and dedicated) and the method of data transfer (digital or analog signals). Depending on the type of communication channel, transmit-receive devices are divided into radio modems, cable modems, and others. The most widely used modems are oriented to connect to dial-up telephone channels.

Digital data entering the modem from the computer is converted into it by modulation (in amplitude, frequency, phase) in accordance with the chosen standard (protocol) and sent to the telephone line. A receiver modem that understands this protocol performs the inverse transform (demodulation) and sends the recovered digital data to its computer. Thus, remote communication between computers and data exchange between them is provided.

The main consumer parameters of modems include:

§ performance (bit / s);

§ supported communication protocols and error correction.

The amount of data transmitted per unit time depends on the modem’s performance. The efficiency of the interaction of this modem with adjacent modems depends on the supported protocols (the probability that they will interact with each other at optimal settings). At present, only the simplicity of installing and configuring the modem depends on the bus interface (in the future, with the general improvement of communication channels, the bus interface will also begin to affect performance).

Codec - A software or hardware unit designed for compression / decompression (Compressor + Decompressor). Used to convert the signal to a form convenient for transmission over communication channels. Used in communication systems.

Devices of this type are connected to a special port available on the motherboard of the computer. .

Network adapters - hardware - software modules providing the joint work of geographically remote computers on the same network under a single leadership and access to the hardware and software resources of the network.

Conclusion

The main trend in the development of computer technology at present is the further expansion of the scope of computers and, as a result, the transition from individual machines to their systems - computer systems and complexes of various configurations with a wide range of functionality and characteristics.

The most promising, created on the basis of personal computers, geographically distributed multi-machine computing systems - computer networks - are oriented not so much on computing information processing as on communication information services: email, teleconferencing systems and information and reference systems.

In the development and creation of the actual computer itself, a powerful and sustainable priority in recent years has been super-powerful computers - super-computers and miniature PCs. Exploration work is underway to create a 6th generation computer based on a distributed neural architecture - neurocomputers. In particular, existing neural network MPs can be used in neurocomputers - transporters (network microprocessors with built-in communications).

The widespread introduction of multimedia will allow you to communicate with your computer in a natural language, and multimedia can not be interpreted narrowly, only as multimedia for PC. This is already being promoted by:

The emerging technology of media servers capable of collecting and storing huge amounts of information and delivering it in real time for a multitude of simultaneously incoming requests;

Systems of superfast broadband information lines connecting all consumer systems.

Experts predict in the coming years the possibility of creating a computer model of the real world - a virtual system in which we can actively live and manipulate real objects. Many prerequisites for this already exist, but there are also problems. The most important of them is ensuring intellectual property rights and confidentiality of information.

Test questions and tasks

1. What do you see the dialectical nature of the relationship between software and hardware?

2. What elements does the canonical computer consist of?

3. What are the principles of program management?

4. What is a PC team? What are the main types of teams?

5. Describe the process of command execution.

6. What are the main signs of the classification of computers?

7. What is a personal computer?

8. What are the main elements that make up a PC?

9. What are the main functional characteristics of the PC.

10. How is a PC system different from its design?

11. What are the main elements of the microprocessor?

12. What are the main elements of the intrasystem machine interface. What about the peripherals of a personal computer?

13. What does the video system of a personal computer include?

14. What are the quality indicators of the memory of a personal computer?

15. Describe the logical structure of the main memory.

16. How are external memories classified?

17. What are the main information input-output devices?

18. What is the difference between the concepts: user interface, internal system interface?

19. Name and describe the main elements of the multimedia and communication equipment of a PC.

20. The study of the components of the system unit.

Set the location of the power supply;

Set the location of the motherboard;

Set the nature of connecting the motherboard to the power supply;

Set the location of the hard drive;

Set Floppy Drive and Drive Locations CD-ROM;

Set the location of the sound card and video card;

Learn how to connect a mouse. The mouse can be connected to a serial port connector or to a special port PS / 2having a round connector. The latest models can connect to the keyboard via interface connectors USB.

21. The study of the components of the motherboard.

Locate the processor and study the organization of its cooling system. By marking, determine the type of processor and manufacturer;

Set the location of the connectors for installing the RAM modules. Find out their number and type of modules used ( Dimm or SIMM);

Set the location of the expansion card slots. Find out their number and type ( ISA, VLB, PCI, AGP) Record their differences in shape and color.

22. Studying the order of starting the computer.

Turn on the monitor and computer system;

When power is applied, a BIOS version message is displayed on the monitor screen. To observe the messages, use the Pause / Break key. It pauses the download and makes it possible to carefully read the message. To continue the run, use the ENTER key.

Chapter 5. PC system software

§ 5.1. PC software

Personal computers, like computers of other classes, are a combination of hardware and software. Hardware (processor, memory, input / output devices, etc.) carry out data processing for certain programs. A set of programs form the PC software.

In a laser (electrographic) printer, the printed image is formed by the laser beam pointwise (and line by line) on a rotating drum covered with a layer of semiconductor material - a photoreceptor (selenium is usually used). This material is able to reduce resistivity under the influence of light. A special device (korotron) applies an electric charge to the photoreceptor. Under the influence of the laser beam at this point, the sign of the electric charge changes.

The formed string during the rotation of the drum falls into the deposition zone of the toner - a finely divided mixture of polymer, dye and magnetic material. The toner through the magnetic shaft and squeegee (toner charge device) enters the drum, and the toner particles are attracted to areas with the opposite charge. At this time, a sheet of paper charged by another corotron also enters the drum and toner particles are transferred to it due to the greater charge of the sheet. After “rolling” the sealed area, the toner is pressed into the paper with a mechanical roller and the sheet is heated in the oven (fuser) to the melting temperature of the polymer, which leads to strong adhesion of the toner to the paper.

Design options for laser printers include the so-called "combined" or "separate" placement of transfer mechanisms.

In the first case, both the drum and the toner with transfer devices (except for the laser-optical system) are in the cartridge. When placed separately in the cartridge, only the squeegee and toner are located. LED printers have a different imaging mechanism.

Laser Printer Settings

The main technical and consumer parameters of laser printers include

  • 1. Color range
  • 2. resolution,
  • 4. resource
  • 5. print speed,
  • 6. The cost of printing per sheet.

As for the color range, laser printers are available in two versions - for monochrome (black and white) and color printing. Color printers have four sequentially located transfer nodes for primary subtractive CMYK colors.

Printer resolution is measured in dots per inch horizontally and vertically. The horizontal resolution is determined mainly by the accuracy of the positioning of the laser beam and the particle size of the toner. Among office-class printers, the best models have a resolution of up to 1200 dpi. Professional printers achieve a physical resolution of 1800 dpi.

Vertical resolution is determined by the capabilities of the drum rotation mechanism. It also obtained a resolution of 1200 dpi. Inexpensive mass models have a resolution of 600x600 dpi. The high resolution allows not only more accurately reproducing thin graphic elements, but also expanding the tonal range of raster images. Grayscale images during printing are necessarily rasterized, and the density of the raster (and, thus, the number of reproduced halftones) has a direct dependence on resolution. A range of 256 levels is reproduced on 1200 dpi class printers with a lineature of 75 lpi, which roughly corresponds to newspaper quality.

The allowable load on the printer is indicated by the manufacturer and is measured by the number of continuously printed pages. For cheap models, the load is 75-150 pages, for more expensive ones - up to 500 pages.

The resource of printers of combined design is usually 300-500 thousand sheets, but is really limited by the service life of 5-6 years at medium load. For printers of a separate design, the resource is determined by the wear resistance of the drum and is usually 100,000 sheets for younger and 300,000 sheets for older models.

An important advantage of laser printers is the low cost of the print (expressed in cents). This indicator is calculated as the sum of specific depreciation (printer cost divided by resource) and toner consumption per sheet at five percent coverage.

Most laser printers are based on the electrophotographic printing principle, borrowed from xerography, which uses the property of photosensitive materials to change their surface charge depending on the light. A pioneer in the field of laser printer manufacturing is Xerox. In 1984, Canon USA (USA) proposed the LBP-CX laser printer, which has a radically new design. The main innovation was the placement of all that is subject to frequent replacement in a removable cartridge. In addition to this, optics have been improved. This device cost significantly cheaper, but it also had noticeably worse performance compared to Xerox products. It was the LBP-CX printer that was the first laser printer available for PCs. Its design formed the basis of the currently popular LaserJet printers from HP, LaserWriter from Apple Computer and Imagen's 8/300.

The laser printer contains a rotating drum (less commonly a ribbon) coated with photosensitive (photosensitive) material. In the initial state, the surface of the drum is electrically neutral or has an electric charge evenly distributed over it (depending on the type of printer). In the process, the device using a scanning mirror is a raster scan of the beam from the laser diode on the surface of the drum. After many short flashes of this diode, performed in accordance with the displayed image, all the required sections are illuminated on the drum and their electric charge changes. After exposure to the drum, a powder of a certain color is applied, called a toner, the particles of which have a given electric charge. As a result of the electrostatic interaction, the toner particles adhere to the drum only in places that have been lit or not lit, which depends on the ink system (type of printer). Then the pattern is transferred to the paper by pressing it against the drum and then applying an electric field. Finally, the toner is fixed on paper (most often with a heated roller). Sometimes fixation is carried out due to exposure to vapors of any solvent.

The image is formed by points, however, due to the high resolution of laser printers, the typographic quality of text printing and the ability to reproduce high-quality drawings are ensured, which allows you to place both graphic images and text information on a single page with a wide range of letter sizes and many different fonts.

For laser, and some other types of printers, various page description languages \u200b\u200bhave been developed and are used, among which the PostScript language is most famous. It was created several years ago by Adobe Systems. This language can be implemented both software and hardware by printer equipment. Of course, hardware implementation is more expensive, but it is also more efficient. HP uses its own PCL language for its laser printers, which is also very popular, and at the same time provides the ability to work in the language.

Laser printers are notable for their high speed, resolution and print quality, as well as excellent graphic capabilities and low noise. Low-speed devices provide printing at a speed of 6-8 pages / min., And high-speed - 20 or more pages / min. In the near future it is planned to bring their performance to 50 pages / min. Automatic paper feed is provided. The disadvantages of laser printers include low reliability due to their high complexity and high cost.

To output a color image, it is enough to pass through the laser printer the same page four times, ensuring a change of toner, so that different areas of the page get turquoise, bright red, yellow and black.

The main technical characteristics of printers are:

  • 1. principle of action (in accordance with the classification just considered);
  • 2. color capabilities (black and white or color printers);
  • 3. graphic capabilities or their absence;

resolution;

  • 4. print quality, closely related to the previous indicator and summarizing it;
  • 5. print speed (speed).

Laser printers print according to the principle of Xerox, based on powder toner. Their advantages are that the image does not “leak”, does not smear, the print speed is several times faster than that of inkjet printers. In addition, the cost of each copy is less than when using a matrix counterpart. The laser printer can be black and white or color. The latter will cost significantly more.

A significant difference between the types of printers is in the cartridges. Laser is noticeably more expensive, but they are enough for a longer period, and if desired, the cartridge can be refilled, although this is a very dubious enterprise.

printer information printing computer

Ministry of Transport of the Russian Federation

Federal Railway Agency

State educational institution

higher professional education

Omsk State Transport University

OmGUPS (CPMM)

Department of World Economy

Printers: their characteristics and functionality.

Thematic Abstract

on discipline "Informatics"

Student gr. 50b

Melnichenko K.L.

1. Introduction …………………………………………………………………………… 3

2. Characteristics of printers ………………………………………………… .4

3. Classification of printers ………………………………………………… ..6

3.1. Dot matrix printer …………………………………………………… .8

3.2. Inkjet printer …………………………………………………………… .9

3.3. Laser printer ………………………. ……………. …… .. ………… .10

3.4. Sublimation printer …………………. …………. ………. ……… 11

3.5. Other printers ……………………………………. ………………… .12

4. History and principle of work ………………………………………………… .14

5. Conclusion ………………………………………………………………… ... 18

6. Bibliographic list ………………………………………………… 19

Introduction

A printer is a computer peripheral device designed to output information to a solid medium, usually paper. The word is borrowed from English. printer, from to print ("print") + -er ("the one who performs the action").

The printing process is usually called “print output”, and the resulting document is called “printout” or “hard copy” (tracing paper with English hard copy).

Printers are designed for output on paper (creating a “hard copy”) of numerical, textual and graphic information. According to their principle of operation, printers are divided into matrix, inkjet and laser.

Characteristics of printers.

The main characteristics of printers include indicators such as:

· Resolution is one of the most important characteristics of a printer, measured in dots per inch (dpi).

· Print speed - for inkjet printers usually does not exceed 3-8 pages of text per minute. If you print illustrations, the time spent on the page increases several times, from 1 to 5 minutes per page. For laser printers, print speeds range from 7 to 20 standard pages per minute.

· Photo printing in color - the ability of an inkjet printer to print color illustrations. To do this, a photo cartridge should be provided in the printer. There are printers, originally designed to print photos, and very often - directly from a digital camera, without a computer. Currently, special photo paper is on sale, the quality of photographs printed on it and it is "several times" higher than usual.

· The amount of internal (operational) memory - for laser printers. The more memory, the faster the printing of texts and graphics. The typical value is from 4 to 8 MB, it is not always enough, but in some printers it is possible to increase the memory.

· Connecting printers to a personal computer. Every modern computer is equipped with a USB port, so the printer must be selected with the same connection. Data is transferred faster via the USB bus - this increases print speed.

· Compatibility of printers (laser) is an Esperanto language for printers of different manufacturers. Historically, professional-class printers have supported PostScript, while personal printers (home) have full support for PostScript instructions — a rarity. Basically, they can only partially emulate PostScript, which is enough. But there is another language, PCL, which is the standard for most laser printers.

· Paper feed method. In modern printers, paper from the tray is loaded either from above - this is the vertical feed, or from the lower tray - horizontal feed.

Classification of printers.

It is proposed to classify printers in five main positions:

· The principle of operation of the printing mechanism,

· Maximum paper size,

· The use of color printing,

· The presence or absence of hardware support for the PostScript language,

By the principle of printing, matrix, ink-jet and laser (page) printers are distinguished. There are a number of other printing technologies, such as sublimation, thermal transfer printing, which are used much less frequently. Laser and LED technology (in the latter case, a line of LEDs is used instead of the laser and the laser deflecting laser beam) in many cases, from the point of view of the end user, they are indistinguishable. The parameter that determines the print quality of laser printers is resolution.

The most common models are A3 and Legal (i.e., designed for a sheet of paper slightly larger than A4). Models working with A3 paper cost a bit more. The ratio of the number of sales for "narrow" and "wide" printers is gradually changing towards the former. Most A3 printer models use dot matrix or inkjet printing.

According to the gamut of reproducible colors, printers are divided into black and white, black and white with the option of color printing (such models are among the matrix and inkjet) and color. For color printers within the same type (inkjet), print quality varies greatly from model to model. As a result, they are positioned on the market in different ways. Printers with the option of color printing, as a rule, poorly reproduce pages on which color graphics are adjacent to a black background. The latter is obtained by mixing ink of several primary colors. As a result, the black color is not saturated enough, and the cost of printing such a page is very high.

For high-quality reproduction of illustrations stored in vector formats, it is important to have a built-in interpreter of the PostScript language. Formally, models that support the PostScript language are approximately 25% more expensive than similar models that do not include this option. However, in order to take advantage of the PostScript language in practice, you have to purchase additional memory and the price difference can be very significant.

Four groups can be distinguished according to printing speed: dot-matrix printers without auto-feed; printers with print speeds up to 4 ppm. and intended for individual use; printers with print speeds up to 12 ppm, serving working groups; powerful network printers with a productivity of more than 12 p./min. Printer performance is an essential factor for organizations where several people use one printer at once, and the indicator practically does not affect consumer preferences when it comes to individual operation of the printing device.

Color printing speed is usually much lower than when printing in black.

Matrix printer.

In dot matrix printers, an image is formed by a print head, which consists of a set of needles (a needle matrix) driven by electromagnets. The head moves line by line along the sheet, with the needles striking the paper through the ink ribbon, forming a dotted image.

The print quality of dot-matrix printers is determined by the number of needles in the print head. Some models of 24-needle dot matrix printers have the ability to print in color through the use of multi-color ink ribbon, while the printer microprocessor generates signals for controlling the needles of the print head of the printer in accordance with the color table. The achieved quality of color printing is significantly inferior to the print quality of an inkjet printer, but is quite acceptable for printing business graphics (tables, charts, and so on).

Among the undoubted advantages of dot-matrix printers is the ability to print multiple copies of a document simultaneously using carbon paper. The advantages of dot matrix printers are:

· Low cost of consumables;

· Durability of work;

· Low cost of printing;

· Relative cheapness of matrix printers of the A3 format

Dot matrix printers provide print speeds of up to 400 characters per second, have a resolution of 360 x 360 dpi, and are equipped with small-sized RAM - about 64 - 128 KB.

The main disadvantages of dot matrix printers are monochrome (although there were color dot matrix printers at a very high price), low speed and high noise level, which reaches 25 dB.

Jet printer.

The principle of inkjet printers is similar to dot-matrix printers in that the image on the medium is formed from dots. But instead of heads with needles, inkjet printers use a nozzle matrix (the so-called head), which prints with liquid dyes. The print head can be integrated into dye cartridges, or it can be a part of the printer, and replaceable cartridges contain only dye.

There are two ways to implement the method of spraying the dye:

Piezoelectric - a piezocrystal with a diaphragm is located above the nozzle. When an electric current is supplied to the piezoelectric element, it bends and pulls the diaphragm along with it - a drop forms, which is subsequently pushed onto the paper.

Thermal - a microscopic heating element is located in the nozzle, which instantly heats up to a temperature of about 500 ° C when electric current passes, when heated, gas bubbles form in the ink, which push liquid droplets out of the nozzle onto the carrier.

The printheads of inkjet printers are created using the following types of ink supply:

Continuous feed - a continuous stream is formed of small droplets that are charged and, flying through an electric field, are deflected in a vertical plane in proportion to their charge. Drops, which should not make a point on the paper, are deflected into a special trough, through which the paint is returned to the tank for subsequent use.

On-demand supply - the supply of dye from the nozzle of the print head occurs when the dye really needs to be applied to the corresponding nozzle area of \u200b\u200bthe printed surface. It is this method of supplying dye that is most widely used in modern inkjet printers.

Inkjet printers are characterized by low noise and power consumption, graphics capabilities, affordable cost and fairly high print quality.

Laser printer.

Laser printers form an image by creating dots on paper. Initially, the page is formed in the printer’s memory and only then transferred to the printing mechanism. Such image formation is performed under the control of the printer controller. Each image is formed by the corresponding arrangement of points in the cells of the grid or matrix, as on a chessboard. This type of image formation is called raster.

Laser printers use photocopying technology, also called electrophotographic, which consists in accurately positioning a point on a page by changing the electric charge on a special film of a photoconductive semiconductor. A similar printing technology is used in photocopiers.

The most important element of a laser printer is a rotary drum, with which the image is transferred to paper. The drum is a metal cylinder covered with a thin film of a photoconductive semiconductor. An electric charge is distributed on the surface of the drum. Using a thin wire or mesh called a corona wire. High voltage is applied to this wire, causing a luminous ionized region to appear around it, called the corona.

A laser controlled by a microcontroller generates a thin light beam reflected from a rotating mirror. This ray, incident on the photodrum, illuminates points on it, and as a result, the electric charge changes at these points.

Laser printers provide the highest quality printing with a resolution of up to 50 dots / mm (1200 dpi) and a print speed of 1000 characters / s.

Conclusion

We examined the main types of printers and see that each of the types is convenient in operation and also suitable for certain types of activities. So let's say, inkjet printers are most suitable for home use and not for large companies, if the main task is to print texts, since high print quality is not required here. Laser printers are a better solution to the same problems that inkjet printers solve (except for working with color, where the quality of inkjet printers is higher). Dot matrix printers are used where quality is not required, but reliability and the lowest cost of use are needed.

But still, in general, all printer manufacturers have such goals as:

· Maximize print quality

· Increase print speed

· Reduce the cost required for printing

The main technical characteristics of printers are:

· Principle of action (in accordance with the classification just considered);

· Color capabilities (black and white or color printers);

· Graphic capabilities or their absence;

· resolution;

· Print quality, closely related to the previous indicator and summarizing it;

· Print speed (speed);

Bibliographic list:

1. http://de.ifmo.ru/bk_netra/page.php?index\u003d99&layer\u003d2&tutindex\u003d28

2. http://www.apostrof-print.ru/news/news1372.aspx

3.http: //ru.wikipedia.org/wiki/Printer

4.http: //a-nomalia.narod.ru/rInform/93.htm

Mouse

The mouse is a control device, which is a small device with two or three buttons. Moving the mouse on a flat surface is synchronized with the movement of the graphic object (mouse pointer) on the monitor screen. This device needs the support of a special system program - the mouse driver.

The driver is installed either the first time you connect the mouse, or when installing the computer operating system. The mouse driver is designed to interpret signals received through the connection port. In addition, it provides a mechanism for transmitting information about the position and condition of the mouse to the operating system and running programs. The computer is controlled by moving the mouse along the plane and short-term pressing of the right and left buttons. Unlike a keyboard, a mouse cannot be directly used to enter symbolic information - its control principle is event-driven. Mouse movements and clicks of its buttons are events from the point of view of its driver program. By analyzing these events, the driver determines when the event occurred and in which place on the screen at that moment was the pointer. This data is transferred to the application program that the user is currently working with. A standard mouse has only two buttons, although there are non-standard mice with three buttons or with two buttons and one rotary knob. The adjustable parameters of the mouse include: sensitivity (expresses the amount of movement of the pointer on the screen for a given linear movement of the mouse), the functions of the left and right buttons, and sensitivity to double-clicking (the maximum time interval during which two clicks of the mouse button are regarded as one double click ) In modern computers that use a window interface built on event processing, the absence of this device can lead to complete blocking of work on the computer.

According to the principle of action, matrix, laser, LED and inkjet printers are distinguished. Dot matrix printers - simple printing devices. The principle of their action is that data is printed on paper in the form of a print formed upon impact of cylindrical rods (“needles”) through the ink ribbon. The print quality of dot-matrix printers directly depends on the number of needles in the print head. The most common are 9-needle and 24-needle matrix printers. The latter allow you to get prints of documents that are not inferior in quality to documents executed on a typewriter. The performance of dot matrix printers is estimated by the number of characters printed per second, cps (characters per second). The usual operating modes of dot-matrix printers are: draft — draft printing mode, normal — regular printing mode and NLQ (Near Letter Quality) mode, which provides print quality close to the quality of a typewriter.



Laser printers provide high quality printing, not inferior, and in many cases superior to printing. They also have a high print speed, which is measured in pages per minute, ppt (page per minute) As in dot-matrix printers, the final image is formed from individual points. The principle of laser printers is as follows:

in accordance with the incoming data, the laser head emits light pulses that are reflected from the mirror and fall on the surface of the photosensitive drum;

portions of the surface of the photosensitive drum that received a light pulse acquire a static charge;

the drum during rotation passes through a container filled with a coloring composition (toner), and the toner is fixed in areas with a static charge;

with further rotation of the drum, its surface contacts the paper sheet, as a result of which the toner is transferred to the paper;

a sheet of paper coated with toner is pulled through the heating element, as a result of which the toner particles are sintered and fixed on the paper.

The main parameters of laser printers include:

resolution, dpi (dots per inch, dots per inch);

performance (pages per minute);

paper size used;

amount of own RAM.

When choosing a laser printer, it is also necessary to take into account the parameter of the cost of the print, that is, the cost of consumables for obtaining one printed sheet of a given format. Consumables include toner and drum, which after printing a certain number of prints loses its properties. Currently, the theoretical limit for this indicator is about 0.3-0.4 rubles. per page. In practice, laser printers of mass application provide values \u200b\u200bfrom 0.6 to 1.5 rubles. per page. The main advantage of laser printers is the ability to produce high quality prints. Middle-class models provide print resolutions up to 600 dpi, and professional models - up to 1200 dpi.

Operating principle led printers similar to the principle of laser printers. The difference is that the light source is not a laser head, but a line of LEDs. Since this line is located across the entire width of the printed page, there is no need for a mechanism for forming a horizontal scan and the whole structure is simpler, more reliable and cheaper. Typical print resolution for LED printers is around 600 dpi. The cost of a copy for LED printers is slightly cheaper than 0.4 rubles. per page. The disadvantage of these printers is the lower speed and reliability of these devices.

IN inkjet printers the image on paper is formed from spots that form when droplets of dye get on paper. Droplet droplets are ejected under pressure, which develops in the print head due to vaporization. In some models, a drop is ejected by a click as a result of the piezoelectric effect - this method allows for a more stable drop shape that is close to spherical. The print quality of the image largely depends on the shape of the droplet and its size, as well as on the nature of absorption of liquid dye by the surface of the paper. Under these conditions, the viscosity properties of the dye and the properties of paper play a special role. The positive properties of inkjet printing devices include a relatively small number of moving mechanical parts and, accordingly, the simplicity and reliability of the mechanical part of the device and its relatively low cost. The main disadvantage, in comparison with laser printers, is the instability of the resolution obtained, which limits the possibility of their use in black and white grayscale printing. At the same time, today inkjet printers are very widely used in color printing. Due to their simplicity of design, they are far superior to color laser printers in terms of quality / price. At resolutions above 600 dpi, they allow you to get color prints that are superior in quality to color prints obtained by photochemical methods.

When choosing a printer, you should always bear in mind the parameter of the cost of printing one print and take into account that the cost of printing one print on them can be several times higher on laser printers (Fig. 18).

Fig. 18. Comparative efficiency of various printers

Peripheral devices perform the function ... a) control the operation of the computer according to a given program b) input / output of information c) operational storage of information d) processing of data input into the computer.
The correct answer is: b.


The correct answer is semiconductor.

The main parameters of laser printers include: a) carriage width, maximum print speed b) data buffer, noise level c) resolution, print buffer d) productivity, paper size.
The correct answer is: c.

Parameters such as pixel response time and viewing angle are characteristic of the following devices: a) LCD monitor b) TFT monitor c) plotter d) scanner.
The correct answer is: a, b.

The integrated Microsoft Office package includes: a) an application for working with business graphics b) a database management system c) a vector graphics editor d) a raster graphics editor.
The correct answer is: a, b.

The information quality characteristics include: A) completeness, B) cyclicality, C) expressiveness, G) reliability, D) relevance, E) focus
The correct answer: A, G, D

The “missed semicolon” \u200b\u200berror can be detected at the stage of semantic analysis / code optimization / parsing / lexical analysis.
Lexical analysis - analysis of the program into a sequence of lines (tokens), convenient from the point of view of the compiler. Parsing is the process of comparing a linear sequence of language tokens with its formal grammar. Semantic analysis - analysis of the internal model (database) of the set of named objects with which the program works, with a description of their properties, characteristics and relationships. In other words, this is semantic analysis. The code optimizer does not deal with error search at all. Correct answer: parsing.

What type of variable is written in the program as 1.00E02?
Real.

The logical programming language is Prolog / LISP / BASIC / ADA.
Logical programming is a programming paradigm based on automatic proof of theorems. Logical programming is based on the theory and apparatus of mathematical logic using the mathematical principles of resolutions. The most famous logical programming language is Prolog.

The concept of “class hierarchy” is inherent in the methodology of dynamic / heuristic / object-oriented / structural programming.
The class hierarchy in computer science means the classification of object types, considering objects as the implementation of classes (a class is similar to a workpiece, and an object is what is built on the basis of this workpiece) and linking various classes with relationships like “inherits”, “extends”. The correct answer: object-oriented programming.

In a structural approach to programming, concepts can be used: a) alternative choice, b) cycle, c) subprogram, d) inheritance.
Structural programming is a software development methodology based on the presentation of a program in the form of a hierarchical block structure. In accordance with it 1) any program is a structure built of three types of basic structures: sequential execution, branching, loop; 2) repeating fragments are executed in the form of subprograms; 3) the development of the program is carried out step by step. Therefore, the correct answers are: a, b, c.

When designing software, approaches are used: a) from top to bottom, b) from bottom to top, c) from left to right, d) from right to left.
The answers a and b are correct. Honestly, I do not have a rigorous justification, but, as I understand it, at first it is required to reduce the problem to specific tasks (analysis), come up with a solution to them and implement them from small to large (synthesis).

A description of a cycle with a precondition is the expression: a) while the condition is true, execute the operator; b) if the condition is true, execute the operator, otherwise stop; c) execute the statement while the condition is false; d) execute the operator a specified number of times.
The correct answer is a.

The means of writing the algorithm are NOT: flowcharts, programming languages, translators, pseudo-codes.
Translators. They only translate the program from one language to another. For example, from a programming language to machine code.

Representation of a relational data model in a DBMS is implemented as ...
... tables. The relational model is focused on organizing data in the form of two-dimensional tables. Each relational table is a two-dimensional array and has the following properties: each table element is one data element, all cells in the table column are homogeneous, that is, all elements in the column are of the same type (numeric, character, etc.), each column has a unique name, there are no identical rows in the table, the order of rows and columns can be arbitrary.

In vector graphics editors, you can use perspective / orthogonal / polygon / virtual projections.
Perspective and orthogonal.

The cell number 1.1E + 11 is written in the cell of the spreadsheet. What does it look like in decimal?
110000000000.

Text in an MS Word document between two ¶ characters.
Paragraph.

The system recognizes the file format by its ...
... extension.

To complete or start processes and get an idea of \u200b\u200bthe current system load, the program is used ...
...Task Manager.

Data output devices: a) CD-ROM drive, b) hard drive, c) monitor, d) scanner, e) laser printer.
Correct answer: c and d.

A device in which data storage is possible only when the computer is turned on.
RAM.

The number of bits simultaneously processed by the processor.
Bit depth.

Indicate the true statements.
1. The appearance of the second generation of computers was due to the transition from electronic tubes to transistors.
2. In the computer of the first generation there was no control device.
3. In the computer of the first generation there was no RAM.
4. Third-generation machines are a family of machines with a single architecture, that is, software compatible.
5. A computer with an Intel Pentium III processor belongs to the fourth generation of computers.

True statements: 1, 4, 5. For those interested, I recommend a wonderful the blogdedicated to computer literacy.

The least significant bit of a binary notation of a multiple of 2 is ...
0 ! The binary notation of a number consists of zeros and ones, which are the factors before the powers of two. For example, the binary number 1101 in the decimal number system: 13 (1 · 2 3 + 1 · 2 2 +0 · 2 1 +1 · 2 0). The least significant digit is 0 or 1, standing in the rightmost place in the record, in our case, the factor in front of 2 0. For the number to be even (a multiple of 2), this factor must be equal to 0.

Order logical operations — disjunction, inversion, conjunction — by priority.
Inversion (logical negation), conjunction (logical multiplication), disjunction (logical addition).

The amount of information that contains a message that reduces the uncertainty of knowledge by 2 times is called ...
A unit of information quantity is such an amount of information that contains a message that halves the uncertainty of knowledge. This unit is named bit.

The totality of formulas reflecting certain properties of an object / original or its behavior is called a physical / statistical / mathematical / dynamic model.
This is a mathematical model.

FTP protocol is designed for
a) file transfers
b) downloading newsgroup posts
c) web browsing
d) chatting.

The correct answer is a.

As a result of the execution of the algorithm fragment
input X, A, B, C
Y \u003d X ^ A + B * sin (C)
pin Y

when you enter the values \u200b\u200bof X, A, B, C equal to 5.2.467.0, respectively, the value of Y will be ...

25.

Program snippet
S: \u003d 0
nts for i from 1 to 10
input a
S: \u003d S + a
kts
S: \u003d S / 10
pin S

displays ...
1) a tenth of the last number out of 10 entered from the keyboard
2) the sum of 10 numbers entered from the keyboard
3) the remainder of dividing by 10 a given number
4) the average of 10 numbers entered from the keyboard.

We will deal with the notation first. The operator: \u003d means assigning a value to a variable. SC and SC - the beginning and end of the cycle, in our case from 1 to 10. This means that the actions between SC and SC are repeated 10 times. input - input of the variable value from the keyboard
It turns out that first we start a variable with a value of 0. Then 10 times we enter numbers from the keyboard and sum them up. Divide the result by 10. This is the average. The correct answer is 4.

The Bat program allows you to ... upload Web pages / upload and edit email / archive email / transfer files using FTP.
The correct answer: download and edit email.

Network worms are ... programs that modify files on disks and spread within a computer / programs that do not modify files on disks, but spread on a computer network, penetrate the computer’s operating system, find the addresses of other computers or users, and send them via these addresses have their own copies / programs that are distributed only by e-mail / malware, the effect of which is to create failures when the computer is powered from the electric network.
The category of network worms includes malware, whose main purpose is as widespread as possible. The mechanism of their distribution in general is constructed in the following way: 1) a network worm enters the computer (via an email attachment, an Internet link, a file-sharing network, etc.) 2) a copy (copies) of the worm is created and launched 3) copies try to go to the following devices (computers) on the Internet, local area network.
The correct answer, as often happens, is the longest - programs that do not modify files on disks, but spread on a computer network, penetrate the computer’s operating system, find the addresses of other computers or users, and send their copies to these addresses.

Compared to other types of cables, fiber optic ...
a) has the lowest cost
b) has a high speed information transfer
c) has no radiation
d) not affected by electromagnetic fields
e) allows wireless data transmission.

Correct answers: b, c, d.

An object-oriented programming object is called 1) a set of state variables and related methods (operations); 2) a group of data and methods (functions) for working with this data; 3) a function or procedure that performs certain actions; 4) the characteristic assigned to the class element
The correct answer is 1.

For an object-oriented programming technology, the statement is true that 1) classes form a hierarchy on the principles of inheritance; 2) procedures that implement some algorithms are used as the main elements of the program; 3) the behavior of objects of the same class is very different; 4) the external description of the class (interface) reflects the structure of the object
The correct answer is 1.

For an object-oriented programming technology, it is true that 1) classes and objects are used as the main elements of a program; 2) the internal description of the class (implementation) describes the abstraction of the behavior of all objects of this class, but hides the features of the behavior of the object; 3) procedures that implement some algorithms are used as the main elements of the program; 4) the external description of the class (interface) reflects the structure of the object
The correct answer is 1.

One of the fundamental concepts of object-oriented programming “encapsulation” means 1) combining data and processing algorithms of this data into a single whole; 2) the property of various objects to perform the same action in different ways; 3) the ability of an object to maintain the properties and methods of the parent class; 4) conclusion in a separate module of all procedures for working with the object
The correct answer is 1.

For an object-oriented programming technology, it is true that inheritance is 1) the ability of an object to retain the properties and methods of the parent class; 2) hiding information and combining data and methods within an object; 3) the ability to set various actions in the hierarchy of objects in a method with the same name; 4) conclusion in a separate module of procedures for working with the object
The correct answer is 1.

In object-oriented programming, a user-defined data type that has internal data and methods for working with them in the form of procedures or functions is called 1) a class; 2) attribute; 3) by field; 4) property
The correct answer is 1.

Viruses can be: a) boot, b) mutants, c) invisible, d) defective, e) logical.
The correct answer is a, c, d.

Software tools for protecting information in a computer network are: 1) Firewall, 2) Antivirus, 3) Sniffer, 4) Backup.
The correct answer is 1, 2.

An electronic digital signature establishes _____ information. 1) consistency 2) authenticity 3) volume 4) inconsistency
The correct answer is 2.

The electronic digital signature of the document allows you to resolve the issue of ____ document (s). 1) access mode to 2) values \u200b\u200b3) authenticity 4) secrecy
The correct answer is 3.

A compressed source image is commonly used ... 1) as a key for encrypting text 2) for creating an electronic digital signature 3) as a public key in symmetric algorithms 4) as a result of encrypting text for sending it through an insecure channel
The correct answer is 2.

Network worms are ... 1) Programs that do not modify files on disks, but are distributed on a computer network, penetrate the computer’s operating system, find the addresses of other computers or users, and send their copies to these addresses 2) Malicious programs whose operation is to create power failures in the computer from the electric network 3) Programs that are distributed only by e-mail 4) Programs that modify files on disks and are distributed within the computer
The correct answer is 1.

The authenticity of the document can be verified ... 1) by the author’s secret key 2) by reconciling the handwritten signature image 3) by his electronic signature 4) by his secret key
The correct answer is 3.

To destroy ("bite") the virus after its recognition is used ... 1) phage programs 2) auditor programs 3) filter programs 4) vaccine programs
The correct answer is 1.

An email must be sent to the remote destination. In this case, the recipient must know that this is exactly the same message. To do this ... 1) use a digital signature 2) close the message with a password 3) send a message via a secret communication channel 4) archive the message
The correct answer is 1.

The malicious program ________________ penetrates the computer under the guise of another program (known and harmless) and has hidden destructive functions. 1) “Trojan horse” 2) stealth virus 3) macro virus 4) “computer worm”
The correct answer is 1.

The essence of compromising information 1) making changes to the database, as a result of which the user is deprived of access to information 2) unauthorized access to transmitted information through communication channels and destroying the content of transmitted messages 3) making unauthorized changes to the database, as a result of which the consumer is forced to refuse it, or make additional efforts to identify changes and restore true information
The correct answer is 3.

Key threats to information availability 1) unintentional user errors 2) malicious data modification 3) hacker attack 4) software and hardware failure 5) destruction or damage to premises 6) data interception
The correct answers are 1,4,5.

The concept of an information weapon protection system should not include ... 1) signs indicating a possible attack 2) procedures for assessing the level and characteristics of an attack against the national infrastructure as a whole and individual users 3) means of launching a counterattack using information weapons 4) mechanisms for protecting users from various types and levels of threats to the national information infrastructure
The correct answer is 3.

Information leakage means ... 1) the unauthorized process of transferring information from the source to the attacker 2) the process of information destruction 3) the inadvertent loss of the information carrier 4) the process of disclosing classified information
The correct answer is 1.

When setting an electronic password, a number of precautions must be observed, in particular 1) use jargon words, as it’s more difficult to guess the cracker 2) it is necessary to write down the password so as not to forget it, and keep the record in a safe place 3) change the password if you for any reason tell it to your relatives 4) use one the same password for various purposes, for example, to access both the mailbox and the protected drive, so as not to get confused
The correct answer is 3.

The most effective way to protect the local computer from unauthorized access when it is turned on is ... 1) use of hardware and software protection 2) set a password on the BIOS 3) use the latest operating system 4) set a password on the operating system
The correct answer is 1.

1) archiving systems 2) antivirus programs 3) RAID disks 4) passwords, ID cards and keys
The correct answer is 4.

Internet proxy server 1) used for the exchange of electronic signatures between network subscribers 2) allows you to encrypt electronic information 3) provides the user with a secure communication channel 4) provides anonymization of access to various resources
The correct answer is 4.

Automatic encryption-decryption of information when writing to media provides the file system ... 1) DFS 2) FAT-64 3) NTFS 4) FAT-32
The correct answer is 3.

The Trojan program is ... 1) a program, the malicious action of which is expressed in the removal and / or modification of system files of a computer 2) a program that infects a computer regardless of a user's actions 3) a program that penetrates a user's computer via the Internet 4) a malicious program that does not reproduce itself, but gives itself away for something useful, thereby trying to encourage the user to rewrite and install the program on their computer
The correct answer is 4.

Causes of data errors: 1) measurement error 2) error when writing measurement results to an intermediate document 3) incorrect interpretation of data 4) errors when transferring data from an intermediate document to a computer 5) using invalid data analysis methods 6) unrecoverable causes of a natural nature 7) intentional distortion of data 8) errors in identifying an object or business entity
The correct answers are 1,2,4,7,8.

The threat of remote administration in a computer network means the threat ... 1) unauthorized control of a remote computer 2) the introduction of aggressive program code within the active objects of Web pages 3) interception or substitution of data on the means of transportation 4) interference with privacy 5) interference with privacy 6) delivery of inappropriate content
The correct answer is 1.

Security Services: 1) identification and authentication 2) encryption 3) password inversion 4) integrity control 5) conflict management 6) shielding 7) secure recovery 8) write caching
The correct answers are 1,2,4,6,7.

The fundamental difference between firewalls (MEs) and attack detection systems (SOW): 1) MEs were developed for active or passive protection, and COBs for active or passive detection 2) MEs were developed for active or passive detection 3) MEs were developed for active or passive 3) MEs work only at the network level, and COBs - also on physical
The correct answer is 1.

The information security of an automated system is the state of an automated system in which it, ... 1) on the one hand, is able to withstand the effects of external and internal information threats, and on the other, its presence and functioning does not create information threats for elements of the system and external environment 2) on the one hand, it is able to withstand the effects of external and internal information threats, and on the other hand, the costs of its functioning are lower than the estimated damage from leakage of protected information 3) it can only withstand information threats, both external and internal 4) it can withstand only external information threats
The correct answer is 1.

In accordance with the norms of Russian law, information protection is the adoption of legal, organizational and technical measures aimed at ... 1) ensuring the protection of information from unauthorized access, destruction, modification, blocking, copying, provision, distribution, as well as from other illegal actions regarding such information 2) exercise of the right to access information 3) compliance with international law in the field of information security 4) identification of violators and holding them accountable 5) confidentiality of restricted information 6) development of methods and improvement of information security tools
The correct answers are 1.2.5.

The type of threat of an action aimed at the unauthorized use of information resources that does not have an impact on its functioning is ... a threat 1) active 2) passive 3) secret 4) indifferent
The correct answer is 2.

File system object protections are based on ... 1) determining user rights for operations with files and directories 2) specifying attributes of files and directories that are independent of user rights
The correct answer is 1.

Elements of a copyright mark: 1) the letters C in a circle or parentheses 2) the letters P in a circle or parentheses 3) the name (name) of the copyright holder 4) the name of the protected object 5) the year of the first release of the program
The correct answers are 1,3,5.

A document identifying the most important security services and proposing a method for classifying information systems according to security requirements 1) X.800 recommendations 2) orange book 3) the law “On information, information technologies and information protection” 4) GOST 153.84 T
The correct answer is 2.

Sections of modern cryptography: 1) symmetric cryptosystems 2) cryptosystems with a public key 3) cryptosystems with duplication of protection 4) data transfer control
The correct answers are 1, 2.

Information constituting a state secret cannot have a signature stamp ... 1) “for official use” 2) “secret” 3) “top secret” 4) “of special importance”
The correct answer is 1.

The most effective tool to protect against network attacks 1) use of firewalls 2) use of anti-virus programs 3) visit only “reliable” Internet sites 4) use only certified browser programs when accessing the Internet
The correct answer is 1.

It does not apply to information protection forms ... 1) analytical 2) legal 3) organizational and technical 4) insurance
The correct answers are 1.4.

1) digital 2) analog 3) combined 4) electronic 5) tube 6) transistor 7) microprocessor 8) specialized 9) universal
The correct answer is 1, 2, 3.


The correct answer is 1.


The correct answer is 1.


The correct answer is 1.

Parameters such as resolution and performance are characteristic of ...1) flatbed scanners 2) laser printers 3) touch screens 4) TFT monitors
The correct answers are 1, 2.

Printers use ________- color representation model 1) CMYK 2) JPEG 3) BMP 4) PSD
The correct answer is 1.

The main parameters of flatbed scanners include ... 1) resolution 2) dynamic range 3) number of nozzles 4) data buffer capacity
The correct answers are 1, 2.

The ASCII code table refers to the international standard ... 1) first 128 2) first 64 3) last 128 4) all 256
The correct answer is 1.

An email must be sent to the remote destination. In this case, the recipient must know that this is exactly the same message. To do this, you need ... 1) use a digital signature 2) send a message over a secret communication channel 3) archive the message 4) close the message with a password
The correct answer is 1.

The standard code for exchanging information is the code ...
The correct answer is 1.


The correct answer is 1.

Cyrillic encodings: 1) KOI-8R 2) CP-1251 3) RADIX-50 4) ISO 8859-5
The correct answers are 1, 2, 4.


The correct answer is 1.

For 5 letters of the Latin alphabet their binary codes are given: a - 000, b - 110, c - 01, d - 001, e - 10. Then a binary string 1100000100110 encodes a set of letters: 1) bacde 2) baade 3) badde 4) bacdb
The correct answer is 1.


The correct answer is 1.


The correct answer is 1.

28 triggers can store ___ bytes of information 1) 3,5 2) 28 3) 7 4) 2,5
The correct answer is 1.

If the average reading speed is 160 words per minute (one word is an average of 6 characters), then for four hours of continuous reading you can read _______ Kbytes of text (accept a single-byte character code) 1) 225 2) 255 3) 256 4) 4096
The correct answer is 1.

To memorize 8 bytes of information, a ___ trigger (s) is required 1) 64 2) 8 3) 1 4) 16
The correct answer is 1.

The maximum number of pages of a book (32 lines of 64 characters, 1 character takes 8 bits), which is placed in a file of 640 KB, is ... 1) 320 2) 640 3) 540 4) 12801
The correct answer is 1.

In the auditorium there are two rectangular areas of the seats: one is 6 by 12, and the other is 8 by 4. The minimum number of bits that will be required to encode each place in an automated system is: 1) 7 2) 2 3) 104 4) 128
The correct answer is 1.

The code table CP-1251 (Windows Cyrillic) is used. A file in simple text format, if there are 200 pages in a text, there are 32 lines per page, and an average of 48 characters in a line, it will occupy __________ kilobyte (s) 1) 300 2) 307.2 3) 384 4) 2400
The correct answer is 1.

A 2 33-bit message contains ______ gigabytes (s) of information. 1) 1 2) 4 3) 3 4) 33
The correct answer is 1.

A message of 50 characters was recorded in 8-bit encoding Windows-1251. After pasting into a text editor, the message was transcoded into 16-bit Unicode code. The amount of memory occupied by the message increased by ... 1) 50 bytes 2) 100 bits 3) 400 bytes 4) 50 bits
The correct answer is 1.

Morse code allows you to encode characters for radio communications by setting combinations of dots and dashes. Using a Morse code with a length of at least three and no more than four signals (dots and dashes), you can encode _______ different character (s) 1) 24 2) 12 3) 128 4) 64
The correct answer is 1.

The sound quality digitized by the sound card is determined by such parameters as ...1) sampling rate 2) coding depth 3) sound level 4) sound duration
The correct answers are 1, 2.


The correct answer is 1.

In the mode of creating sound in a sound card, methods are used ... 1) frequency modulation 2) wave tables 3) logical synthesis 4) pulse modulation
The correct answers are 1, 2.

In the number system with the base ____, the decimal number 26 is written in the form of 101. 1) 5 2) 2 3) 8 4) 16
The correct answer is 1.

The value of the sum 7779 16 +887 16 in the hexadecimal notation is equal to ...1) 8000 16 2) 8FFF 16 3) 7FFF 16 4) 7000 16
The correct answer is 1.

The value of the sum 100 2 +11 8 +10 16 in the decimal system is equal to ... 1) 29 2) 121 3) 28 4) 111
The correct answer is 1.

Decimal 63389 10 corresponds to hexadecimal ...1) F79D 2) 1397 16 3) 13970 16 4) ED7F
The correct answer is 1.

The difference in hexadecimal numbers 7777 16 -887 16 is equal to ...1) 6EF0 16 2) 6890 16 3) 6458 16 4) 6DB0 16
The correct answer is 1.

The value of the sum of numbers 1110101 2 +1011011 2 in the octal number system is 1) 320 2) 2110 3) 298 4) 318
The correct answer is 1.

The degree of conformity of the model to the real phenomenon (object, process) for which it is being constructed is called ___________ of the model. 1) adequacy 2) stability 3) flexibility 4) identity
The correct answer is 1.

1) a model of the university building 2) a formula for solving quadratic equations 3) an electric circuit diagram 4) a map of the area
The correct answer is 1.

The system usually consists of ... 1) several objects 2) one object 3) independent objects 4) object and model
The correct answer is 1.

The material model is ... 1) airplane layout 2) map 3) drawing 4) diagram
The correct answer is 1.

A visual means of representing the composition and structure of the system is called ... 1) column 2) table 3) text 4) the formula
The correct answer is 1.

The family tree is the ____________ information model. 1) hierarchical 2) tabular 3) network 4) verbal
The correct answer is 1.

Conducting research on a real object with subsequent processing of the experimental results is _____________ modeling. 1) full-scale 2) simulation 3) evolutionary 4) mathematical
The correct answer is 1.

Visual, easy-to-manage representation of spatial data is one of the main tasks of __________ modeling. 1) geoinformational 2) logical 3) physical 4) imitation
The correct answer is 1.

Genetic algorithms and genetic programming are _____________ modeling tools. 1) evolutionary 2) full-scale 3) imitative 4) physical
The correct answer is 1.

The iconic model is ... 1) pie chart 2) anatomical model 3) building model 4) scale model of the ship
The correct answer is 1.

Of the proposed requirements for all models, the _________________ model is not common. 1) static 2) flexibility 3) completeness 4) adequacy
The correct answer is 1.

The circuit diagram is an _____________ information model. 1) graphic 2) tabular 3) hierarchical 4) verbal
The correct answer is 1.

To forecast the economic development of the region, it is applied (s) ... 1) simulation modeling 2) full-scale modeling 3) fuzzy logic algorithms 4) exhaustive search of possible solutions
The correct answer is 1.

A network information model may be represented ... 1) regional computer network 2) file system of the computer 3) periodic system of chemical elements 4) technical description of the computer
The correct answer is 1.

The correct order of the stages of mathematical modeling of the process is as follows: 1) determination of modeling goals - building a mathematical model - conducting research - analyzing the result 2) building a mathematical model - determining modeling goals - conducting research - analyzing the result 3) determining modeling goals - building a mathematical model - analyzing the result - conducting research 4) determining modeling goals - conducting research - building a mathematical model - analyzing the result
The correct answer is 1.

Models, which are a combination of useful and necessary information about an object, are called ... 1) informational 2) material 3) subject 4) dynamic
The correct answer is 1.

The basis for the classification of models for material and information is ... 1) presentation method 2) area of \u200b\u200buse 3) field of knowledge 4) time factor
The correct answer is 1.

A model is a substitution of the studied object by another object, which reflects ... 1) material aspects of a given object 2) all sides of a given object 3) always the appearance of an object 4) non-material aspects of a given object
The correct answer is 1.

The search for the optimal path from the input to the result is used in the model ... 1) “labyrinth search” 2) “black box” 3) “material point” 4) “structure of the human brain”
The correct answer is 1.

Artificial intelligence is a scientific field related to machine modeling of human intellectual functions, which is based on the provisions of science ... 1) cybernetics 2) computer science 3) mathematics 4) logic
The correct answer is 1.

The result of the formalization process is the ___________ model. 1) mathematical 2) descriptive 3) strategic 4) subject
The correct answer is 1.

The model of absolutely elastic collision of two bodies, written in the form of formulas, is ... 1) symbolic mathematical 2) formal logical 3) structural information 4) descriptive information
The correct answer is 1.

General properties of all models:1) dynamism 2) finiteness 3) adequacy 4) informativeness
The correct answers are 2, 3, 4.

The written or oral presentation of the information model by means of the spoken language is called the _______________ model. 1) verbal 2) simple 3) linguistic 4) logical
The correct answer is 1.

Earthquake computer simulation allows ... 1) determine the strength of buildings in order to ensure the safety of people 2) conduct a field study of the processes occurring in nature during an earthquake 3) get the full cost of damage as a result of a possible earthquake 4) take measures to prevent an earthquake
The correct answer is 1.

In the modeling process, the formation of ideas about the components of the source object is carried out at the stage ... 1) development of the model 2) statement of the problem 3) computer experiment 4) analysis of the simulation results
The correct answer is 1.

A simplified representation of a real object is called ... 1) model 2) original 3) prototype 4) system
The correct answer is 1.

Hovering over a menu item with a small black arrow pointing to the right ...

1) opens a submenu 2) opens an application 3) opens a dialog box for entering additional information 4) opens a folder “My documents”
The correct answer is 1.

The highlighted part of the Taskbar is called ...

1) notification area 2) quick launch bar 3) toolbar 4) status bar
The correct answer is 1.

There is no _______________ menu in this window.

1) contextual 2) systemic 3) pictographic 4) horizontal
The correct answer is 1.

Some menu items on the right are marked with ellipses. Choosing such an item ...

1) opens a dialog box for entering additional information 2) opens a submenu 3) launches the program for execution 4) opens the application
The correct answer is 1.

In the figure below ...

1) changing the order of the slides in the presentation 2) assigning transition effects from slide to slide 3) copying the slide 4) inserting autofigures on the slide
The correct answer is 1.

1) apply one of the standard design themes to the presentation 2) select a layout for the layout of the slide 3) select a presentation template 4) configure the transition from slide to slide
The correct answer is 1.

Slide Sorter mode is designed to ...

1) adjusting the logical sequence of slides 2) viewing slides in full screen 3) viewing the presentation structure 4) animation settings
The correct answer is 1.

If in the situation shown in the figure, release the left mouse button, then ...

1) Slide3 and Slide4 will swap 2) a copy will be added Slide3 3) an empty slide will be added without a name 4) Slide4 will be deleted
The correct answer is 1.

For this slide, the statement that ...

1) gradient fill is applied to the background of the slide 2) texture fill is applied to the background of the slide 3) there are no non-standard characters on the slide 4) there is no footer on the slide
The correct answer is 1.

Using the Insert - Symbol command on the next slide

In the above window, the user selects ...

1) transition effect when changing slides 2) transition sound when changing slides 3) transition speed when changing slides 4) presentation template
The correct answer is 1.

Using the window shown in the figure, you can ...

1) adjust the transition from slide to slide 2) apply one of the standard design themes to the presentation 3) select a presentation template 4) configure the animation of the slide objects
The correct answer is 1.

The presentation structure mode allows you to ...

1) enter new text on the slide or edit the existing one 2) assign transition effects from slide to slide 3) change the color scheme of the slide 4) change the overall presentation design
The correct answer is 1.

The file name extension created in the Paint graphical editor is ... 1) .bmp 2) .cdr 3) .ppt 4) .psd
The correct answer is 1.

On the local drive H: the sequence of actions is performed: 1) create folder A; 2) open folder A; 3) create folder 1; 4) close folder A; 5) create folder B; 6) create a folder 2. Draw a folder structure created as a result of these actions.
Correct answer

The teacher worked in folder D: Materials for classesGroup 11 Laboratory work. Then he went up one level in the folder tree, went down to the Lectures folder and deleted the Introduction file from it. The full name of the file that the teacher deleted will be ... 1) D: Materials for classes Group 11 Lectures Introduction 2) D: Materials for classes Group 11 Introduction 3) D: Materials for classes Lectures Introduction 4) D: Introduction Materials for classes Group 11 Lectures
The correct answer is 1. Solution. The teacher worked in the Labs folder, which is located in the Group 11 folder. Therefore, going to the next level, the teacher got into the Group 11 folder, from which he went down to the Lectures folder and deleted the Introduction file from the Lectures folder. Thus, the full name of the remote file Introduction will be as follows: D: Class materials Group 11 Lectures Introduction


The correct answer is 1.

A common feature is the group of file name extensions: 1) .bmp, .jpeg, .cdr, .png 2) .txt, .doc, .rtf, .bat 3) .zip, .com, .ppt, .mp3 4) .bmp, .jpeg, .mpeg, .wav
The correct answer is 1.

The file name newgames666.exe does not match the file name mask ... 1) * game?. * X? 2) * g? Me *.? X? 3) * game *.? X * 4) * g? Me *. * X *
The correct answer is 1.

A sequence of characters cannot be used as a file name ... 1) Laboratory work: coding of information. Doc 2) Laboratory work. Coding of information.doc 3) Laboratory_work_coding_information.doc 4) Laboratory-work-coding-information-.doc
The correct answer is 1.


The correct answer is 1.

Files are stored in a folder:

The names of all these files satisfy the mask:1) p * a _ ??. C * 2) p * a _ ??. C ?? 3) p? A _ ??. C * 4) p * a _ ?. c *
The correct answer is 1.

The user, moving from one folder to another, sequentially visited the folders ACADEMY, COURSE, GROUP, E :, PROFESSOR, LECTIONS. With each move, the user either went down one level or went up one level. The full name of the folder from which the user started moving will be ... 1) E: GROUPCOURSEACADEMY 2) E: PROFESSORLECTIONSACADEMY 3) E: ACADEMYCOURSEGROUP 4) E: ACADEMY
The correct answer is 1.

A folder contains a list of files originally ordered by date:

Sorts files by name in ascending order. The file will be the last in the list ... 1) 6A. Doc 2) 2B.doc 3) 10B.doc 4) 11A. Doc
The correct answer is 1.

On some hard drive, the cluster size is 4096 bytes. Four files with sizes of 500, 10000, 8000 and 5000 bytes are recorded on this disc. To store all four files, you need _________ clusters (s). 1) 8 2) 6 3) 7 4) 5.75
The correct answer is 1.

Parameters such as pixel response time and viewing angle are characteristic of the following devices:1) LCD monitor 2) TFT monitor 3) plotter 4) scanner
The correct answers are 1, 2.

Without loss of quality, ____________ images are scaled. 1) vector 2) any 3) black and white 4) raster
The correct answer is 1.

You cannot use ... to enter point (raster) images ... 1) mouse 2) keyboard 3) graphics tablet 4) scanner
The correct answers are 1, 2.

The “staircase” effect appears when ___________ images are enlarged. 1) raster 2) vector 3) any 4) fractal
The correct answer is 1.

An additional color to the RGB + red + green color combination is ... 1) yellow 2) brown 3) purple 4) khaki
The correct answer is 1.

On the monitor screen, any color is represented as the intensity of the glow (brightness) of the three basic colors: red, green and blue, each of which can take a value from "no glow" to "maximum glow". The corresponding RGB color model has _____ possible states for each color. 1) 256 3) 255 3) 3072 4) 16 million
The correct answer is 1.

Graphic files that allow you to store animated images have the extension ... 1) .gif 2) .tiff 3) .jpeg 4) .png
The correct answer is 1.

To display point (bitmap) images created by the user, you cannot use ... 1) touch screen 2) graphics tablet 3) printer 4) plotter
The correct answers are 1, 2.

To build a circle in the Paint graphical editor, select the _______ element and hold down the Shift key during construction. 1) Ellipse 2) Rounded rectangle 3) Circle 4) Oval
The correct answer is 1.

To build a diagonal line (at an angle of 45 degrees) in the Paint editor, hold down the _______ key during construction. 1) Shift 2) Ctrl 3) Tab 4) Alt
The correct answer is 1.

For the graphical object in the given text fragment, text wrap is selected ...

1) along the contour 2) around the frame 3) in the text 4) above and below
The correct answer is 1.

A fragment of the spreadsheet is given in the display mode of formulas and in the display mode of values:

The value in cell B3 is ... 1) 15 2) 17 3) 28 4) 24
The correct answer is 1.

The table shows data on the number of winners of the Olympiad in computer science (I), mathematics (M) and physics (F) in three cities of Russia:

In column E, the number of winners in each city is calculated, and in row 5, the number of winners in each subject. Diagram

built by ... 1) row 5 2) column E 3) cells B3, C3, D3 4) range B2: B4
The correct answer is 1.

Given a fragment of a spreadsheet. For this fragment of the table, the statement that the cell ...

1) C4 the formula entered \u003d MIN (A2; A3; C2) 2) D1 the formula entered \u003d MAX (A1: C1) 3) B4 the formula entered \u003d SUM (B1: B3) * 5 4) D4 the formula entered \u003d AVERAGE (A1; B2; C3)
The correct answer is 1.

Automate the input operation in related tables allows ...

1) a lookup list 2) a pattern 3) a condition for a valid value 4) a default value
The correct answer is 1.

Given a fragment of a spreadsheet:

The number of records that meet the conditions of the next user autofilter,

Equally...

1) 4 2) 7 3) 3 4) 0
The correct answer is 1.

Given a fragment of a spreadsheet.

The number of records satisfying the autofilter condition

equals ... 1) 2 2) 3 3) 4 4) 0 The correct answer is 1. A fragment of the spreadsheet in the display mode of the formulas looks like:

After sorting by conditions

information about Landau L. will begin with a cell 1) A7 2) A6 3) A8 4) A10
The correct answer is 1.

Dan spreadsheet fragment

Number of records matching the advanced filter

equals ... 1) 4 2) 5 3) 6 4) 3 The correct answer is 1. Given a fragment of the spreadsheet in the display mode of the formulas:

When copying the contents of cell A2 to cells B2 and A3, formulas appeared in them

In cell A2, the formula is written ... 1) \u003d $ A1 + B1 2) $ A1 + B1 3) \u003d $ A $ 1 + B1 4) \u003d $ A1 + $ B1
The correct answer is 1.

Dan spreadsheet fragment

After sorting by conditions

in cell A9 there will be a surname ... 1) Berg P. 2) Landau L. 3) Becker G. 4) Bekesi D. The correct answer is 1. The diagram shows the number of winners of the Olympiad in computer science (I), ...

Teachers of mathematics, physics and computer science take part in the teleconference. Teachers have different skill levels: without category (BC), II, I, or higher (VK) category. Figure 1 shows the number of teachers with different skill levels, and figure 2 shows the distribution of teachers in subjects.

From the analysis of both diagrams, the statement follows that all teachers ... 1) I categories can be teachers of mathematics 2) I categories can be teachers of physics 3) computer scientists can have the highest category 4) mathematicians can have II category
The correct answer is 1.

In a text editor MS Word, a fragment of text

converted to a table using the “;” character as a delimiter. The third column of the resulting table has the form ...

Correct answer -

The next piece of text is ...

1) multilevel list 2) hierarchical list 3) structured list 4) table of contents
The correct answer is 1.

Typed text in MS Word

After executing a sequence of commands from left to right: Select a word. Cut out. Highlight a word. Cut out. Highlight a word. Cut out. Highlight a word. Cut out. Paste. Paste. Paste. Paste. the text will take the form ...
1) the river the river the river the river 2) the Greek traveled across the river the river the river 3) The Greek traveled the Greek through the river the river 4) the river through the Greek Passed
The correct answer is 1.

There is a table of 4 rows and 5 columns created in MS Word. After selecting the 3rd and 4th columns, the Combine Cells command was executed. Then the first and second cells of the first column are selected and the command is executed:

The new table will contain _____ cells.
1) 15 2) 16 3) 13 4) 19
The correct answer is 1.

The footer is 1) data repeated on each page of a text document 2) heading of a text document 3) first page of a text document 4) first chapter of a text document
The correct answer is 1.

The document displays dots instead of spaces, arrows instead of tabs, and other unexpected characters. These characters become visible on the screen if MS Word is turned on 1) display hidden formatting characters 2) document structure 3) cross-references 4) document review
The correct answer is 1.

A piece of text typed in a MS Word text editor is given:

If in the given situation to press the specified button on the toolbar, the changes will be affected ...
1) the whole paragraph 2) only the highlighted word 3) the line with the highlighted word 4) the whole text
The correct answer is 1.

Typed text with errors in the MS Word text editor (shown in bold italics):

The “Find and Replace All” command to fix all errors may look like ...
find ECON, replace with ESTN 2) find the EU, replace with ECT 3) find the UST, replace with ESTN 4) find the CH, replace with STN
The correct answer is 1.

They threw a hexagonal dice. The amount of information in the message about what number fell on the cube is ... 1) 3 bits 2) 6 bits 3) 1 bit 4) 1/6 bytes
The correct answer is 1.

The maximum number of pages of a book (32 lines of 64 characters, 1 character takes 8 bits), which is placed in a file of 640 KB, is 1) 320 2) 640 3_ 540 4) 12801
The correct answer is 1.

In the vocabulary of Ellochka the Ogre, as you know, there were 30 words. She pronounces a phrase consisting of 50 words. In this case, the amount of information that Ellochka reports is ______ bits. To consider that the choice of any of the 30 words is equally probable 1) 250 2) 1500 3) 5.3 4) 2
The correct answer is 1.

If the average reading speed is 160 words per minute (one word - an average of 6 characters), then for four hours of continuous reading you can read _______ Kbytes of text (accept a single-byte character code). 1) 225 2) 255 3) 256 4) 4096
The correct answer is 1.

Amount of information: 2 10 bytes; 20,000 bits 2001 bytes; 2 Kbytes, sorted in descending order, correspond to a sequence of 1) 20,000 bits; 2 kb; 2001 bytes; 2 10 bytes 2) 2 10 bytes; 20,000 bits 2001 bytes; 2 KB 3) 20,000 bits; 2 10 bytes; 2001 bytes; 2 Kbytes 4) 2 Kbytes; 2 10 bytes; 2001 bytes; 20,000 bits
The correct answer is 1.

Automatic encryption-decryption of information when writing to media provides the file system 1) NTFS 2) FAT-32 3) FAT-64 4) DFS
The correct answer is 1.

On some hard drive, the cluster size is 512 bytes. Four files with sizes of 100, 200, 1000 and 2500 bytes are recorded on this disc. To store all four files, ___________ cluster (s) are required. 1) 9 2) 7 3) 8 4) 7.5
The correct answer is 1.

The analog audio signal was sampled first using 65,536 signal strength levels (audio CD audio quality), and then using 256 signal strength levels (broadcast sound quality). Information volumes of codes will vary by ____ times. 1) 2 2) 8 3) 16 4) 256
The correct answer is 1.

Signals that determine the nature of the exchange of information (input or output) are transmitted over the bus ... 1) control 2) data 3) address 4) exchange
The correct answer is 1.

A message of 50 characters was recorded in 8-bit encoding Windows-1251. After pasting into a text editor, the message was transcoded into 16-bit Unicode code. The amount of memory occupied by the message increased by ... 1) 50 bytes 2) 100 bits 3) 400 bytes 4) 50 bits
The correct answer is 1.

Morse code allows you to encode characters for radio communications by setting combinations of dots and dashes. Using a Morse code with a length of at least three and no more than four signals (dots and dashes), you can encode _______ different characters (s). 1) 24 2) 12 3) 128 4) 64
The correct answer is 1.

In the code table __________, 65536 different characters can be encoded. 1) Unicode 2) KOI-8P 3) ASCII 4) CP-1251
The correct answer is 1.

The standard code for exchanging information is ... 1) ASCII 2) ACCESS 3) ANSI 4) BIOS
The correct answer is 1.

Of the proposals presented, a simple and true statement is ... 1) A or not A or not B 2) A and not B or not A 3) not (A and B) and A 4) not A and B or A and not B
The correct answer is 1.

In the complex statement “The number 12 is even and divisible by 3 without remainder”, a logical operation (bundle) is used: 1) conjunction 2) disjunction 3) implication 4) dividing disjunction
The correct answer is 1.

To search the Internet for information about holidays in Sochi or Adler, you need to use the condition _______________ (to indicate the logical operation "OR", use the symbol |, and for the operation "AND" - the symbol &). 1) Rest & (Sochi | Adler) 2) Rest | Sochi | Adler 3) Rest & (sea | Sochi | Adler) 4) Rest & Sochi & Adler
The correct answer is 1.

The logical expression NOT (A\u003e B) AND NOT (A \u003d C) will be true for the following values \u200b\u200bof the variables A, B, C: 1) A \u003d 0, B \u003d 0, C \u003d -2 2) A \u003d 4, B \u003d 3, C \u003d 5 3) A \u003d -2, B \u003d -4, C \u003d -2 4) A \u003d -2, B \u003d 0, C \u003d -2
The correct answer is 1.

The statement "Point X belongs to the segment" corresponds to a logical expression: 1) (X≥A) AND (X≤B) 2) (X≤A) OR (X≥B) 3) (X≥A) OR (X≤B) 4) (X≤A) AND (X≥ B)
The correct answer is 1.


The correct answer is 1.

The basis of building most computers is based on the following principles formulated by John von Neumann: the principle of program control, the principle of uniformity of memory, and the principle ... 1) targeting 2) translation 3) systematic 4) structural
The correct answer is 1.

The principle of "open architecture" in the development of personal computers, mass production of which was begun in the 80s. XX century., Implemented by ... 1) IBM 2) MicroSoft 3) Intel 4) Pentium
The correct answer is 1.

The success of the IBM PC family of machines is primarily driven by ... 1) building on the principle of open architecture 2) the presence of a powerful microprocessor 3) the presence of a modern video system 4) a large amount of RAM
The correct answer is 1.

The main components of a personal computer architecture are ... 1) processor 2) internal memory 3) video system 4) input / output devices 5) external memory 6) computer case 7) drivers 8) controllers
The correct answers are 1-5.


The correct answer is 1.

28 triggers can store ___ bytes of information. 1) 3,5 2) 28 3) 7 4) 2,5
The correct answer is 1.

In 1896, ___________ founds a tabulation machine company, which in 1924, after a series of mergers and renaming, turned into the famous IBM company (IBM, International Business Machines Corporation). 1) Herman Hollerith 2) Conrad Zuse 3) Claude Shannon 4) Alan Turing
The correct answer is 1.


The correct answer is 1.

The first domestic computer was developed under the guidance of ... 1) S.A. Lebedeva 2) M.V. Lomonosov 3) S.P. Queen 4) A.N. Popova
The correct answer is 1.

The main parameters of laser printers include: 1) carriage width 2) maximum print speed 3) data buffer 4) noise level 5) resolution 6) print buffer 7) productivity 8) paper size.
The correct answer is 5-8.

Microprocessors differ among themselves ... 1) clock frequency and bit depth 2) multitasking 3) a set of arithmetic instructions 4) time counters
The correct answer is 1.

Of these types of memory, the greatest information capacity has ... 1) RAM 2) cache 3) microprocessor memory 4) CMOS
The correct answer is 1.

The performance of the information storage device is characterized by ... 1) average access time and transfer rate 2) clock frequency and bit depth 3) the amount of recorded information 4) the number of bits of information that the drive perceives as a whole
The correct answer is 1.

IBM was originally involved in ... 1) the release of electrical equipment 2) the statistical processing of data 3) the development of devices capable of performing arithmetic operations with binary numbers 4) the creation of mechanical computing devices capable of solving complex differential equations
The correct answer is 1.

An electronic computer (computer) is ... 1) a set of hardware designed for automatic processing of information 2) a complex of hardware and software for processing information 3) a model that establishes the composition, order and principles of interaction of its components 4) a device for working on a given program
The correct answer is 1.

One of the parameters of a hard drive is the form factor, which means ... 1) diameter of disks in inches 2) number of cylinders 3) diameter of disks in centimeters 4) number of surfaces
The correct answer is 1.

The first mainframe in continental Europe was called ... 1) MESM 2) MARK-1 3) COLOSS 4) Z1
The correct answer is 1.

Small in size, high-speed buffer memory for storing commands and data is ... 1) cache memory 2) CMOS memory 3) ROM 4) flash memory
The correct answer is 1.

Automatic encryption-decryption of information when writing to media provides the file system ... 1) NTFS 2) FAT32 3) DFS 4) FAT64
The correct answer is 1.

On some hard drive, the cluster size is 512 bytes. Four files with sizes of 100, 200, 1000 and 2500 bytes are recorded on this disc. To store all four files, ___________ cluster (s) are required. 1) 9 2) 7 3) 8 4) 7.5
The correct answer is 1.

Peripherals perform the function of ... 1) input-output of information 2) computer operation control for a given program 3) operational storage of information 4) processing of data input into a computer
The correct answer is 1.

According to the principles of action, computer facilities are divided into ... 1) digital, analog, combined 2) digital, analog, electronic 3) tube, transistor, microprocessor 4) universal and specialized
The correct answer is 1.

Information on magnetic disks is recorded ... 1) on concentric tracks and sectors 2) in special magnetic windows 3) on index holes 4) in disk registers
The correct answer is 1.

Of the listed types of computer memory, the fastest is ... 1) microprocessor memory 2) cache memory 3) RAM 4) CMOS memory
The correct answer is 1.

The electronic chip EPROM is ... 1) ROM with the possibility of reprogramming 2) non-reprogrammable ROM 3) part of the RAM 4) a variety of DVD-ROM
The correct answer is 1.

Utility software includes ... 1) diagnostic tools 2) computer security tools 3) browsers 4) video editing systems
The correct answers are 1, 2.

The composition of a multimedia computer necessarily includes ... 1) CD-ROM drive 2) projection panel 3) modem 4) network card
The correct answer is 1.

Flash drives use ____________ memory. 1) semiconductor 2) magnetic 3) magneto-optical 4) optical
The correct answer is 1.

The basic concepts of a hierarchical structure are ... 1) level, node, communication 2) relation, attribute, tuple 3) table, column, row 4) table, field, record
The correct answer is 1.

To increase the speed of performing mathematical operations in a PC, ... 1) coprocessor 2) cache 3) RAM 4) system bus
The correct answer is 1.

The disadvantage of public key encryption systems is ... 1) low productivity 2) low reliability of encryption 3) the difficulty of using the encryption system by an untrained user 4) the high cost of equipment necessary for encryption
The correct answer is 1.

The architecture of a personal computer, the main features of which are the presence of a common information bus, modular construction, compatibility of new devices and software with previous versions on the principle of "top-down", is called ... 1) open 2) modular 3) hierarchical 4) backbone
The correct answer is 1.

In 1974, Edward Roberts created the Altair microcomputer, which was, in fact, the first commercially available personal computer. In 1975, Bill Gates and ___________ created for him a BASIC language interpreter, the earned money from which became the starting capital of Microsoft Corporation. 1) Paul Allen 2) Edward Roberts 3) John von Neumann 4) Stephen Jobs
The correct answer is 1.

Dynamic memory serves as the basis for building ... 1) RAM modules 2) cache memory 3) microprocessor memory 4) read-only memory
The correct answer is 1.

The highest speed of information exchange among the listed devices is ... 1) RAM 2) DVD drive 3) hard disk drive (HDD) 4) floppy drive
The correct answer is 1.

A visual means of representing the composition and structure of the system is called ... 1) column 2) table 3) text 4) the formula
The correct answer is 1.

Among the architectures of computers distinguish ... 1) uniprocessor, multiprocessor, superscalar 2) digital, analog, electronic 3) star, bus, ring 4) tube, transistor, microprocessor
The correct answer is 1.

A device is used to interface a computer with one communication channel ... 1) adapter 2) hub 3) repeater 4) bridge
The correct answer is 1.

CCD arrays (charge-coupled devices) designed to convert an optical image into an analog electrical signal are used in peripheral devices such as ... 1) a scanner 2) a digital camera 3) an optical mouse 4) a touch screen
The correct answers are 1, 2.

When the computer is turned off, the information is not saved in the memory device ... 1) RAM 2) HDD 3) ROM 4) Flash USB Drive
The correct answer is 1.


The correct answer is 1.

When solving a problem on a computer at the programming stage, it is not performed ... 1) syntax debugging 2) selection of a programming language 3) clarification of the methods of organizing data 4) writing an algorithm in a programming language
The correct answer is 1.

1) classes and objects are used as the main elements of the program 2) the internal class description (implementation) describes the abstraction of the behavior of all objects of this class, but hides the features of the object’s behavior 3) the procedures that implement some algorithms are used as the main elements of the program 4) the external description of the class (interface) reflects the structure of the object
The correct answer is 1.

When solving a task on a computer at the stage of debugging, the program is not executed ... 1) write the algorithm in a programming language 2) translate the source code of the program 3) build the program 4) test the program
The correct answer is 1.

Assignment Operators in Programming Languages \u200b\u200b... 1) set the values \u200b\u200bof the variables 2) change the values \u200b\u200bof the constants 3) enter the values \u200b\u200bof the variables 4) determine the internal representation of the data in the computer's memory
The correct answer is 1.

It is true that ... 1) the concept of “translator” is more general in comparison with the concept of “compiler” 2) the concepts of “translator” and “compiler” are synonyms 3) the concept of “compiler” is more general in comparison with the concept of “compiler” 4) the concept of “translator” and the "compiler" are independent of each other
The correct answer is 1.

An object-oriented programming object is called ... 1) a set of state variables and associated methods (operations) 2) a group of data and methods (functions) for working with this data 3) a function or procedure that performs certain actions 4) a characteristic assigned to an element of the class
The correct answer is 1.

Converting an entire program presented in one of the programming languages \u200b\u200binto machine codes is called ... 1) compilation 2) interpretation 3) layout 4) code generation
The correct answer is 1.

For an object-oriented programming technology, it is true that ... 1) classes form a hierarchy on the basis of inheritance 2) procedures that implement certain algorithms are used as the main elements of the program 3) the behavior of objects of one class is very different 4) the external description of the class (interface) reflects the structure of the object
The correct answer is 1.

One of the fundamental concepts of object-oriented programming, "encapsulation" means ... 1) combining data and processing algorithms of this data into a single whole 2) the property of various objects to perform the same action in different ways 3) the ability of the object to save the properties and methods of the parent class 4) the conclusion in a separate module of all procedures for working with the object
The correct answer is 1.

For an object-oriented programming technology, it is true that inheritance is ... 1) the ability of an object to save the properties and methods of a parent class 2) hiding information and combining data and methods within an object 3) the ability to specify various actions in a hierarchy of objects in a method with the same name 4) enclosing procedures for working with an object in a separate module
The correct answer is 1.

BASIC was created for ... 1) learning programming 2) performing scientific and technical calculations 3) replacing Assembler 4) performing economic calculations
The correct answer is 1.

The logical programming language is ... 1) PROLOG 2) LISP 3) PASCAL 4) C ++
The correct answer is 1.

In object-oriented programming, a user-defined data type that has internal data and methods for working with them in the form of procedures or functions is called ... 1) class 2) attribute 3) field 4) property
The correct answer is 1.

The discrete property of the algorithm means that ... 1) the algorithm is divided into a number of separate completed teams (steps), each of which must be executed before the executor proceeds to the next 2) each team of the algorithm must be understood by the executor unambiguously - there should be no double interpretation of the team 3) each team should be included in the executor’s command system 4) in a finite number of steps, the algorithm must either lead to a solution to the problem, or stop due to the inability to obtain a solution
The correct answer is 1.

It is required to transport 30 chairs and 10 tables. They can be loaded into a truck in three ways. The first way is 5 tables and 5 chairs. The second way is only 7 tables. The third way - 2 tables and 10 chairs. The minimum number of car trips for furniture transportation will be equal to ... 1) 4 2) 3 3) 2 4) 5
The correct answer is 1.

In the auditorium there are two rectangular areas of the seats: one is 6 by 12, and the other is 8 by 4. The minimum number of bits that will be required to encode each place in an automated system is ... 1) 7 2) 2 3) 104 4 ) 128
The correct answer is 1.

A cashier serves one customer in 21 minutes. At the beginning of the bank, one person appeared. For some time, the work of the two cashiers came another 7 people at intervals of 7 minutes. The number of people in the queue after 50 minutes from the beginning of the bank is ... 1) 2 2) 3 3) 4 4) 5
The correct answer is 1.

The tourist was at 10:20 at the station of the city of G. The minimum time in minutes through which he can get to station B is ... 1) 528 2) 554 3) 451 4) 472
The correct answer is 1.

The store delivers household appliances. It is necessary to transport 32 refrigerators and 35 washing machines. There are three options for loading in a truck. The first option - 0 refrigerators and 13 washing machines; the second option - 6 refrigerators and 4 washing machines; The third option is 8 refrigerators and 1 washing machine. The minimum number of truck trips for the transportation of all household appliances is ... 1) 7 2) 6 3) 5 4) 8
The correct answer is 1.

If the server address is www.academia.edu.ru, then the top-level domain name in it is ... 1) ru 2) www 3) edu 4) edu.ru
The correct answer is 1.

Local Area Network hardware includes ... 1) workstations, server, communication equipment 2) workstations, communication equipment, personal computers 3) communication equipment, server 4) computers connected to the network and providing users with certain services
The correct answer is 1.

A personal computer connected to the network and providing user access to its resources is called ... 1) workstation 2) server 3) host 4) domain
The correct answer is 1.

A device that provides the connection of administratively independent communication networks: 1) router 2) host 3) domain 4) hub
The correct answer is 1.


The correct answer is 1.

An e-mail address on the Internet was set - [email protected]. The name of the mail service in it is ...
The correct answer is 1.


The correct answer is 1.


The correct answer is 1.

The network protocol is ... 1) PPP 2) WWW 3) ECP 4) URL
The correct answer is 1.
Indication PPP (Point to Point Protocol) is a data link protocol that allows you to use regular modem lines to access the Internet. ECP (Enhanced Capability Port) - port with advanced features. URL (Uniform Resource Locator) - A uniform locator for a resource. This is a standardized way to record the address of a resource on the Internet. WWW (World Wide Web) is a distributed system that provides access to related documents located on various computers connected to the Internet.


The correct answer is 1.


The correct answer is 1.


The correct answer is 1.


The correct answer is 1.


The correct answer is 1.


The correct answer is 1.

The most effective means of monitoring data on the network are ...
The correct answer is 1.

Bridge% ndash; this device connecting ...
The correct answer is 1.

In order to establish the exchange of digitally signed electronic messages, it is necessary to transfer to the message recipient ... 1) the public encryption key 2) the private encryption key 3) the type of your digital signature 4) the encryption algorithm you use
The correct answer is 1.


The correct answer is 1.

The most effective way to protect the local computer from unauthorized access when it is turned on is ... 1) using software and hardware protection tools 2) setting a password on the BIOS 3) setting a password on the operating system 4) using the latest operating system
The correct answer is 1.


The correct answer is 1.

The Internet uses various services: e-mail, newsgroups, Internet pager, online store, etc. A service system with which you can communicate with other people over the Internet in real time is called 1) IRC 2) Windows Chat 3) Slideshare 4) FTP
The correct answer is 1.

1) ICQ 2) IRC 3) URL 4) GPS
The correct answer is 1.


The correct answer is 1.

The most effective way to protect the local computer from unauthorized access when it is turned on is ... 1) using software and hardware protection tools 2) setting a password on the BIOS 3) setting a password on the operating system 4) using the latest operating system
The correct answer is 1.


The correct answer is 1.


The correct answer is 1.

In order to establish the exchange of digitally signed electronic messages, it is necessary to transfer to the message recipient ... 1) the public encryption key 2) the private encryption key 3) the type of your digital signature 4) the encryption algorithm you use
The correct answer is 1.


The correct answer is 1.


The correct answer is 1.


The correct answer is 1.


The correct answer is 1.


The correct answer is 1.

1) commercial system 2) research prototype 3) current prototype 4) industrial system
The correct answer is 1.

Expert systems are used when ...
The correct answer is 1.


The correct answer is 1.


The correct answer is 1.


The correct answer is 1.


The correct answer is 1.


The correct answer is 1.


The correct answers are 1, 2.

The system software includes ... 1) programs responsible for interacting with specific devices 2) programs responsible for interacting with a user 3) means of ensuring computer security 4) means of automating the work of checking, adjusting, and setting up a computer system
The correct answers are 1, 2.

1) computer-aided design systems 2) expert systems 3) magnetic disk maintenance programs 4) system recovery programs
The correct answers are 1, 2.

The core software features are ... 1) checking the composition and performance of the computing system 2) displaying diagnostic messages on the screen 3) providing a user interface 4) expanding the functions of the operating system
The correct answers are 1, 2.

The application software includes ... 1) Web editors 2) desktop publishing systems 3) antivirus software 4) data compression tools
The correct answers are 1, 2.

BIOS (Basic Input Output System) is ... 1) a group of programs in read-only memory 2) a standard code table 3) part of the RAM 4) the base part of the microprocessor
The correct answer is 1.

A device that connects administratively independent communication networks is ... 1) router 2) host 3) domain 4) hub.
The correct answer is 1.

Network operating systems are a set of programs that ... 1) provide simultaneous operation of a group of users 2) users transfer to the network from one computer to another 3) provide processing, transmission and storage of data on a computer 4) expand the capabilities of multitasking operating systems
The correct answer is 1.

An e-mail address on the Internet was set - [email protected]. The name of the mail service in it is 1) mail 2) pochta 3) mail.ru 4) ru
The correct answer is 1.

Internet proxy server ... 1) provides anonymization of access to various resources 2) provides the user with a secure communication channel 3) allows you to encrypt electronic information 4) is used to exchange electronic signatures between network subscribers
The correct answer is 1.

A gateway is a device that ... 1) allows you to organize data exchange between two networks using different interaction protocols 2) allows you to organize data exchange between two networks using the same interaction protocol 3) connects networks of different types, but using the same operating system 4) connects workstations
The correct answer is 1.

The network protocol is ... 1) PPP 2) WWW 3) ECP 4) URL
The correct answer is 1.
Remarks. PPP (Point to Point Protocol) is a data link protocol that allows you to use regular modem lines to access the Internet. ECP (Enhanced Capability Port) - port with advanced features. URL (Uniform Resource Locator) - A uniform locator for a resource. This is a standardized way to record the address of a resource on the Internet. WWW (World Wide Web) is a distributed system that provides access to related documents located on various computers connected to the Internet.

An internet service provider is ... 1) provider 2) computer connected to the Internet 3) browser 4) modem connected to the Internet
The correct answer is 1.

In accordance with the standard, the speed of information transmission over a network can be measured in ... 1) Kbps 2) Kb / min 3) Kbps 4) Kb / s
The correct answer is 1.

To quickly switch from one www-document to another ... 1) hyperlink 2) browser 3) website 4) tag
The correct answer is 1.

The document is requested from the university website at the following address: http: //university.faculty.edu/document.txt. The domain name of the computer in which the document is located is ... 1) university.faculty.edu 2) university 3) faculty 4) university.faculty
The correct answer is 1.

A computer connected to the Internet must definitely ... 1) get an IP address 2) have an installed web server 3) get a domain name 4) have a website hosted on it
The correct answer is 1.

To view web pages are used ... 1) browsers 2) Internet portals 3) firewalls 4) hash programs
The correct answer is 1.

The most effective means of monitoring data on the network are ... 1) passwords, ID cards and keys 2) archiving systems 3) RAID disks 4) antivirus programs
The correct answer is 1.

A bridge is a device connecting ... 1) two networks using the same data transfer methods 2) two networks having the same server 3) workstations of the same network 4) local area network subscribers
The correct answer is 1.

In order to establish the exchange of digitally signed electronic messages, it is necessary to transfer to the message recipient ... 1) the public encryption key 2) the private encryption key 3) the type of your digital signature 4) the encryption algorithm you use
The correct answer is 1.

Local area network topologies are ... 1) star, bus, ring 2) daisy, sphere, star 3) server, domain, terminal 4) corporate, administrative, mixed
The correct answer is 1.

The most effective way to protect the local computer from unauthorized access when it is turned on is ... 1) using software and hardware protection tools 2) setting a password on the BIOS 3) setting a password on the operating system 4) using the latest operating system
The correct answer is 1.

A computer connected to the Internet can have the following two addresses: 1) digital and domain 2) digital and user 3) character and domain 4) forward and reverse
The correct answer is 1.

The Internet uses various services: e-mail, newsgroups, Internet pager, online store, etc. A service system with which you can communicate with other people over the Internet in real time is called ... 1) IRC 2) Windows Chat 3) Slideshare 4) FTP
The correct answer is 1.

An instant messaging system over the Internet is called ... 1) ICQ 2) IRC 3) URL 4) GPS
The correct answer is 1.

FTP network service is designed to ... 1) moving data between different operating systems 2) conducting video conferences 3) browsing web pages 4) “downloading” messages and attached files
The correct answer is 1.

The most effective way to protect the local computer from unauthorized access when it is turned on is ... 1) using software and hardware protection tools 2) setting a password on the BIOS 3) setting a password on the operating system 4) using the latest operating system
The correct answer is 1.

As you know, the IP address of a computer consists of four numbers separated by dots. Each of the numbers of the IP address can take decimal values \u200b\u200bfrom 0 to ... 1) 255 2) 256 3) 999 4) 192
The correct answer is 1.

An email must be sent to the remote destination. In this case, the recipient must know that this is exactly the same message. To do this, you need ... 1) use a digital signature 2) send a message over a secret communication channel 3) archive the message 4) close the message with a password
The correct answer is 1.

In order to establish the exchange of digitally signed electronic messages, it is necessary to transfer to the message recipient ... 1) the public encryption key 2) the private encryption key 3) the type of your digital signature 4) the encryption algorithm you use
The correct answer is 1.

To search for information on the Internet using search engines (for example, Google, Rambler, Yandex, Yahoo!), users set ... 1) keywords 2) tags 3) search words 4) dictionary words
The correct answer is 1.

The e-mail address on the Internet is set - [email protected]. The name of the owner of this email address is ... 1) postbox 2) yandex 3) yandex.ru 4) postbox @
The correct answer is 1.

Information about 25 types of goods has been entered into the table of the warehouse database containing 5 columns of product information (name, supplier, quantity, expiration date, price). The number of entries in the table is ... 1) 25 2) 5 3) 125 4) 30
The correct answer is 1.

The foundation of any intelligent expert system is ... 1) knowledge base 2) mathematical model 3) system of rules for solving the problem 4) control system
The correct answer is 1.

Expert systems need subject areas: medicine, pharmacology, chemistry, geology, economics, law, etc., in which most of the knowledge ... 1) is the personal experience of high-level specialists 2) can be reduced to a machine command system and implemented on computer 3) has already been received and it is possible to refuse the direct participation of a person and transfer the possibility of making decisions to computer 4) requires finding optimal indicators for a specific task in this industry
The correct answer is 1.

The final stage of the existence of an expert system is ... 1) commercial system 2) research prototype 3) current prototype 4) industrial system
The correct answer is 1.

Expert systems are used when ... 1) the initial data are well formalized, but special extensive knowledge is required for making a decision 2) the initial data are compact and convenient for implementation on a computer 3) it is necessary to find the optimal indicators (for example, finding the minimum costs or determining the maximum profit) 4) objects, processes or phenomena by building and studying models to determine or refine the characteristics of the original
The correct answer is 1.

The similarity of expert systems with other application programs is that they ... 1) designed to solve a certain range of problems 2) use heuristic methods as the main methods for solving the problem 3) at the stage of solving the problem form certain facts and conclusions 4) model the thinking of a person, not the specific nature of the subject
The correct answer is 1.

The use of an expert system is advisable if ... 1) it is necessary to solve the problem in an environment hostile to humans 2) the problem needs to be solved a limited number of times 3) there are enough experts to solve this range of tasks 4) solving the problem with the help of an expert person is less time-consuming and more comprehensive in scope
The correct answer is 1.

The core of the expert system is not implemented on ... 1) hypertext markup languages \u200b\u200b2) declarative programming languages \u200b\u200b3) imperative programming languages \u200b\u200b4) ontology presentation languages
The correct answer is 1.

A characteristic feature of any expert system that distinguishes it from other computer information systems is ... 1) the ability to self-development 2) sorting, data sampling at the request of users 3) the use of methods that allow you to reduce the solution of any problem to a specific set of machine instructions 4 ) providing multiple access to information
The correct answer is 1.

The main classes of expert systems are ... 1) fault diagnosis systems 2) meteorological systems 3) database management systems 4) geolocation systems
The correct answer is 1.

The composition of the software (software) computing systems includes ... 1) system software 2) utility software 3) functional software 4) information software
The correct answers are 1, 2.

What we will do with the received material:

If this material is useful to you, you can save it to your page on social networks: