1 / 0

C# Programming – Part I

C# Programming – Part I. Teamwork assignment – English Version. Name : Martin Shoylev. Team : Redcurrant. Computer Systems. Hardware Questions. Computer Systems (hardware ). The questions from this chapter include the following topics : Computer systems

elga
Télécharger la présentation

C# Programming – Part I

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. C# Programming – Part I

    Teamwork assignment – English Version Name:Martin Shoylev Team : Redcurrant
  2. Computer Systems

    Hardware Questions
  3. Computer Systems (hardware) The questions from this chapter include the following topics: Computer systems Main components of the computer systems, characteristics, interaction Basic work components Basic input-output interfaces and standards
  4. Question 1. Which of the following is not a network device? Router Switch Modem Network Protocol LAN card
  5. Answer The network protocol is not a device. The protocol just shows the right way for the devices to function and perform. Information: http://computernetworkingnotes.com/comptia-n-plus-study-guide/network-devices-hub-switch-router.html http://compnetworking.about.com/od/networkprotocols/
  6. Software systems

    Computer software
  7. Computer programs (Software) The questions from this chapter include the following topics: Computer programs (software) What are they?Functions.Classification. Creation Ways of use (installing, starting, uninstalling)
  8. Question 2. Which of the following is the owner of Skype? VMware Telerik Microsoft Oracle Google
  9. Answer Written by Estonian and Swedish developers in 2003, the program was sold to Microsoft for $8.5 billions at 2011. Information: http://en.wikipedia.org/wiki/Skype http://www.skype.com/en/about/
  10. Working with computers and computer systems

    Installing, Usability
  11. Working with computer programs The questions from this chapter include the following topics Start up and Shut down Diagnostics Finding problems Support Testing
  12. Question 3. Which of the following is not a thread to the computer security? Trojans Kockster Bomb Worm Droppers (Containers)
  13. Answer There is not virus named Kockster. Droppers – hides in the computer systems until certain criteria is met, and then infects the system with the virus. It works like a container with viruses. Information: http://virusdefence.org/computer-viruses-types-and-definitions-page-1.html
  14. Data transfer and Numeral systems

    Data transfer channels, measurement units, using the numeral systems
  15. Data Transfer. Numeral Systems The questions from this chapter include the following topics: Different ways for data transfer Basic measurement units for data width different sizes. Basic binary calculations Calculations in different numeral systems
  16. Question 4. What would be the result in the following Bitwise XOR operation - 10111011 XOR 01010101? 11101110 11111111 00010001 10101010
  17. Answer Bitwise operator XOR If both values are the same– false (0) If both values are different– true(1) Information: http://www.introprogramming.info/intro-csharp-book/
  18. Operation Systems

    Architecture, process, users, user interface, file systems
  19. Operation Systems The questions from this chapter include the following topics Operational systems – basics, main tasks and functions , types. User interface– basics, types. Graphic interface– basics, main objects, basic operations, organization, options. File– basics, characteristics. Filing systems– basics, types, logical and physical organization, main objects, multitasking.
  20. Question 5. Which of the following is not an operating system? Android iOS Windows AT&T BSD
  21. Answer AT&T is a mobile services provider in USA. BSD – Berkley Software Distribution BSD is one of the first UNIX based O.S. Information: http://www.bsd.org/
  22. Software Engineering

    Analysis, Specifications, projecting, prototypes, implementation, testing, support..
  23. Software Engineering The questions from this chapter include the following topics: Main phases in the project creating– analysis, modeling, projection, creating a prototype, implementation, checking (testing and quality assurance), improving and developing, documentation, support. Modeling methods. UML. Planning and management of projects.
  24. Question 6. What does the UML abbreviation means? Unified Music License User Micro Language Unsigned Metro Long Unified Modeling Language Unidentified Multipack Load
  25. Answer UML Unified Modeling Language Graphical language for documentation of all the elements in a software construction Information http://www.uml.org/
  26. Data Classification

    Compression algorithms, archiving software
  27. Data Compression The questions from this chapter include the following topics: Compression and decompression of data. Lossless and Lossy compression. Arithmetic coding. Shannon – Fano and Huffman’s algorithm’s.Dictionary coding: LZ-77 andLZW. JPEG coding. Archiving programs – working withWinZipandWinRAR. Creating and principles of work between self-extracting and installation archives.
  28. Question 7. Which one of the following data compression methods uses the so called “dictionaries”? LZW Huffman Coding Arithmetic Shannon-Fano DPCM
  29. Answer Lempel - Ziv - Welch Lossless encryption method Uses dictionaries that include the number of every meaning in certain database.Information: http://www.cs.cf.ac.uk/Dave/Multimedia/node214.html
  30. Working with text programs

    File formats, encoding, text, tables, figures …
  31. Working with text programs The questions from this chapter include the following topics: Computer text Types of file formats(TXT, DOC, DOCX, RTF), Convertion. Coding text information(coding tables and standards Unicode, Windows-1251, ASCII) Problems with the use of multi-language platforms
  32. Question 8. How many symbols does the extended ASCII table includes? 128 148 256 255 204
  33. Answer The ASCII table includes 256 symbols. It reaches the only the 255, because it starts from 0 (null) Information: http://www.asciitable.com/
  34. Computer Graphics

    Raster and vector graphics, graphic file formats, graphic redactors, color range
  35. Computer graphics The questions from this chapter include the following topics: Computer graphics. Graphic file formats(JPG, GIF, PNG, TIFF, EPS, PSD, AI, CDR). Compression of images. Vector and graphic images. Different format conversions. Applications (creating graphical images, analysis and recognition of images, computer art). Graphic redactors for images. Filters and effects. Color scales: RGB, CMYK, Panton, 16-bit colors.
  36. Question 9. Which of the following is not a graphics redactor? Media Monkey GIMP Artweaver Pixia PhotoFiltre Paint.NET
  37. Answer Media Monkey is an audio file program. It works as an Mp3 player, CD player, audio manager, scanner, encoder, decoder, convertor and etc. Information: http://www.mediamonkey.com/
  38. Data bases

    Data models, tables, relations, SQL
  39. Data bases The questions from this chapter include the following topics :Bases of data. Systems that work with databases. Logical and physical organization. Data models Data base relations. Tables and relations. Objects and the databases. Data types SQL Language. Types of SQL commands and queries.
  40. Question 10. Which type of relation between two tables with data cannot be applied without the use of a third table? One to one Many to many One to many All of the above None of the above
  41. Answer The relation between two data tables in a database relation is working with the use of a security key. The key has the same value in both tables which allows them to find a record in the first table that corresponds to a record in the second table. Information: http://office.microsoft.com/en-us/access-help/guide-to-table-relationships-HA010120534.aspx
  42. Information Systems

    ERP, CRM, BI, BPM, FMIS, CAD/CAM, CMS, software architectures
  43. Information Systems The questions from this chapter include the following topics :Information systems.Classification (for management and organization ERP, for management and creation, for customer and distributor service– CRM, for analysis and researches– Bi, for solving problems, and so on).Life cycle ( the basic stages in creation and exploration). Main functions and tasks. System architectures– two layered(client/server), three layered, N-layered,cloud computing.
  44. Question 11. What is the meaning of the abbreviation DSS? Database Management System Decision Support System Executive Informational System Manager Information System Expert System
  45. Answer DSS is shortened for Decision Support System. Decision Support System (DSS) is a computer-based information system that supports business or organizational decision-making activities Information: http://fbm.uni-ruse.bg/d/uis/L-1.pdf
  46. Protection and informational security.

    Symmetric and asymmetric encryption algorithms, cryptographic hashing, electronic signature, digital certificates
  47. Protection and informational security The questions in this theme, include the following topics: Security and protection of the information. Methods and algorithms for coding: symmetric cryptographic coding– DES, 3DES; asymmetric cryptographic algorithms (public and private key) – RSA, DSA. Cryptographic hashing algorithms– SHA-1, MD5. Electronic signatures. Public key(PKI). Digital certificates.
  48. Question 12. Which numbers are used by the encryption methods? Prime numbers Odd numbers Even numbers Binary numbers None of the above
  49. Answer Encryption methods use prime numbers because it take more time for prime numbers to be found if they are big, than other types of numbers and that makes the data harder to decrypt. Information: http://www.claymath.org/posters/primes/
  50. Presentational Systems

    Presentation software, presentation preparations, slides,effects, notes, colors, images, sound, video
  51. Presentation Systems The question from this chapter include the following topics: Presenting information, with the helps of the presentation software. Computer presentations– slides, effects, notes, footnotes, color systems, templates. Presentation materials design– use of color, text, images, visualizations and sound. Presentation software
  52. Question 13. One of the following presentation software’s is web based. Which one is it? Prezi Apple Keynote Microsoft Power Point Impress All of the above None of the above
  53. Answer Information: Prezi is used from couple of people online, so they can maintain simultaneous work on the project.
  54. Multimedia

    Software creation/ multimedia enhancement: sound, video, media formats
  55. Multimedia The questions from this chapter, include the following topics Multimedia. Technologies for multimedia creation. Software tools for media creation. Generation of movies and animation (including text, sounds, images). Compression of multimedia files. Convertion of multimedia file types. Multimedia software development tools, animation and movies.
  56. Question 14. Which graphic format supports animation and it’s limited to 256 colors? GIF TIFF JPEG GPEG PNG BMP
  57. Answer Information: The format supports up to 8 bits per pixel for each image, allowing a single image to reference its own palette of up to 256 different colors chosen from the 24 bit RGB color space
  58. Computer network

    OSI model, network models, protocols, standards, hardware equipment
  59. Computer Networks This chapter includes: Computer networks. OSI model networks and network protocols. Local networks – basics, organization and management types, basic standards, hardware components. Global computer networks – basics, ways of connection, main advantages. Users and recourses.
  60. Question 15. Which of the following layers is not part of the OSI model? Trade layer Transport layer Network layer Session layer Channel layer Physical layer
  61. Answer Information: The layers of the OSI model: Physical layer, Data link layer, network layer, transport layer, session layer, presentation layer, application layer.
  62. Internet

    Internet, Protocols, services, WWW, HTTP, FTP, SMTP, POP3, IMAP, WebDAV, IP, DNS, …
  63. Internet The questions from this chapter include: Internet – basics, technical and technological aspects. Basic services and protocols– HTTP, FTP, POP3, SMTP Types of internet connections– dial-up, ISDN, LAN, DSL/ADSL, Wi-Fi Internet addresses– IP addresses, DNS services, first level domains, Hosting.
  64. Question 16. What is IEE 802.11? Internet Explorer ver. 8.00 Wireless networks standard IP address version Connection trough the internet via phone cable None of the above
  65. Answer Information: EEE 802.11 is a set of media access control (MAC) and physical layer(PHY) specifications for implementing wireless local area network (WLAN) computer communication
  66. Electronic Communication

    E-mail, Skype, ICQ, IRC, MSN Messenger, Yahoo Messenger, social networks, forums, …
  67. Electronic communications The questions from this chapter include: Electronic communication Electronic mail– e-mailclients and web based platforms and protocols Real time communications– IRC, ICQ, Skype, MSN Messenger, Yahoo Messenger – principles of work and protocols Social networks
  68. Question 17. Which of the following is not an e-mail client? Lotus Notes Adobe PremierePro Thunderbird Eudora Evolution Microsoft Outlook
  69. Answer Adobe Premier Pro Video montage program Part of the Adobe creative suite Information: http://www.adobe.com/en/products/premiere.html http://en.wikipedia.org/wiki/Adobe_Premiere_Pro
  70. World Wide Web (WWW)

    How does the WWW work?Protocols HTTP, GET, POST, URL, web browser, web page, web site, …
  71. World Wide Web (WWW) The questions from this article include: Global informational system - World Wide Web (WWW) – functionality Web servers and web browsers. ProtocolHTTP, methodsGET andPOST. Hyperlinktechnology Web page – meaning, URL address and elements Website hosting
  72. Question 18. What HTTP method is used in order to send a query to a web form? POST HEAD LINK PRINT SAVE
  73. Answer Post – allows the client to sent data to the web server. This query usually generates when web form is sent. Information: http://en.wikipedia.org/wiki/POST_(HTTP)
  74. Web design, HTML, CSS

    Web design, HTML, CSS, text, graphics, tables, forms…
  75. Web design, HTML, CSS The questions from this chapter include: Website development, testing and design BasicHTML tags: inserting formatted text, images, links, tables Websites styling language - CSS Alignment of the webpage
  76. Question 19.Which HTML tag is deprecated although it might work with some of the modern browsers <b>…</b> <center>… </center> <i>…</i> <sup>…</sup>
  77. Answer This tag is abandoned in HTML 4.01 and it is not supported in HTML 5.0 This is because of the block formation titles, paragraphs etc. The style creators decided to move the formatting styles in CSS. Информация: https://developer.mozilla.org/en-US/docs/Web/HTML/Element/center http://www.w3schools.com/tags/tag_center.asp
  78. JavaScript

    Creating scripts with JavaScript, basicJavaScript constructions, operators,objects, manipulation of the DOMtree
  79. JavaScript In this chapter you will find the following topics: Scripting languages for coding in internet: JavaScript, Perl, VBScript. Common thoughts on JavaScript. Data types. Operators and expressionsConditional operators. Operators for cycle. JavaScript functions. Objects in JavaScript. Arrays. ClassesDate, Math. Objects document, window, navigator.Events inJavaScript. Object model DOMand its manipulation with JavaScript.
  80. Question 20. The section <div id="myDiv"><b>Bold </b> <i>Italic </i> <span> other</span></div> is operated with the Java Script function for red color and the lastElementChild option. What is the result? Bolditalic other Bold italicother Bolditalic other Bolditalicother
  81. Answer Last child is a CSS selector that interprets the last part of the whole (word, phrase, element of a list/array). Information: http://www.developphp.com/view_lesson.php?v=903 http://www.w3schools.com/cssref/sel_last-child.asp
  82. Telerik Academy ? Questions? Redcurrant team Facebook pagehttps://www.facebook.com/groups/462500253859043/ ? ? ? ? ? ? ? ? ? http://schoolacademy.telerik.com
More Related