c# programming – part i teamwork assignment – english version name: martin shoylev team :...
TRANSCRIPT
C# Programming – Part I
Teamwork assignment – English Version
Name: Martin Shoylev
Team : Redcurrant
Computer SystemsHardware Questions
Computer Systems (hardware)
The questions from this chapter include the following topics: Computer systems
Main components of the computer systems, characteristics, interaction
Basic work components
Basic input-output interfaces and standards
3
Question
1. Which of the following is not a network device?
a) Router
b) Switch
c) Modem
d) Network Protocol
e) LAN card
4
Answer The network protocol is not a device. The protocol just shows the right way for the devices to function and perform.
Information: http://computernetworkingnotes.com/c
omptia-n-plus-study-guide/network-devices-hub-switch-router.html
http://compnetworking.about.com/od/networkprotocols/
5
Software systemsComputer software
Computer programs (Software)
The questions from this chapter include the following topics: Computer programs (software)
What are they? Functions. Classification.
Creation
Ways of use (installing, starting, uninstalling)
7
Question
2. Which of the following is the owner of Skype?
a) VMware
b) Telerik
c) Microsoft
d) Oracle
e) Google
8
Answer Written by Estonian and Swedish developers in 2003, the program was sold to Microsoft for $8.5 billions at 2011.
Information: http://en.wikipedia.org/wiki/Skype
http://www.skype.com/en/about/
9
Working with computers and
computer systems
Installing, Usability
Working with computer programs
The questions from this chapter include the following topics Start up and Shut down
Diagnostics
Finding problems
Support
Testing
11
Question
3. Which of the following is not a thread to the computer security?
a) Trojans
b) Kockster
c) Bomb
d) Worm
e) Droppers (Containers)
12
Answer There is not virus named Kockster. Droppers – hides in the computer systems until certain criteria is met, and then infects the system with the virus. It works like a container with viruses.
Information: http://virusdefence.org/computer-virus
es-types-and-definitions-page-1.html
13
Data transfer and Numeral
systemsData transfer channels, measurement units, using the
numeral systems
Data Transfer. Numeral Systems
The questions from this chapter include the following topics:
Different ways for data transfer
Basic measurement units for data width different sizes.
Basic binary calculations
Calculations in different numeral systems
15
Question
4. What would be the result in the following Bitwise XOR operation - 10111011 XOR 01010101?
a) 11101110
b) 11111111
c) 00010001
d) 10101010
16
Answer Bitwise operator XOR If both values are the same– false (0)
If both values are different– true(1)
Information: http://www.introprogramming.info/intr
o-csharp-book/
17
Operation SystemsArchitecture, process, users, user
interface, file systems
Operation Systems The questions from this chapter
include the following topics Operational systems – basics, main
tasks and functions , types. User interface– basics, types. Graphic interface– basics, main objects, basic operations, organization, options. File – basics, characteristics. Filing systems– basics, types, logical and physical organization, main objects, multitasking.
19
Question
5. Which of the following is not an operating system?
a) Android
b) iOS
c) Windows
d) AT&T
e) BSD
20
AnswerAT&T is a mobile services provider in USA.
BSD – Berkley Software Distribution
BSD is one of the first UNIX based O.S.
Information:
http://www.bsd.org/
21
Software Engineering
Analysis, Specifications, projecting, prototypes, implementation, testing,
support..
Software Engineering The questions from this chapter
include the following topics:
Main phases in the project creating– analysis, modeling, projection, creating a prototype, implementation, checking (testing and quality assurance), improving and developing, documentation, support. Modeling methods. UML. Planning and management of projects.
23
Question 6. What does the UML abbreviation means?
a) Unified Music License
b) User Micro Language
c) Unsigned Metro Long
d) Unified Modeling Language
e) Unidentified Multipack Load
24
Answer UML
Unified Modeling Language
Graphical language for documentation of all the elements in a software construction
Information http://www.uml.org/
25
Data ClassificationCompression algorithms, archiving
software
Data Compression The questions from this chapter
include the following topics:
Compression and decompression of data. Lossless and Lossy compression. Arithmetic coding. Shannon – Fano and Huffman’s algorithm’s. Dictionary coding: LZ-77 and LZW. JPEG coding. Archiving programs – working with WinZip and WinRAR. Creating and principles of work between self-extracting and installation archives. 27
Question
7. Which one of the following data compression methods uses the so called “dictionaries”?
a) LZW
b) Huffman Coding
c) Arithmetic
d) Shannon-Fano
e) DPCM
28
Answer Lempel - Ziv - Welch
Lossless encryption method
Uses dictionaries that include the number of every meaning in certain database. Information:
http://www.cs.cf.ac.uk/Dave/Multimedia/node214.html
29
Working with text programs
File formats, encoding, text, tables, figures …
Working with text programs
The questions from this chapter include the following topics:
Computer text
Types of file formats(TXT, DOC, DOCX, RTF), Convertion.
Coding text information(coding tables and standards Unicode, Windows-1251, ASCII)
Problems with the use of multi-language platforms
31
Question 8. How many symbols does the extended ASCII table includes?
a) 128
b) 148
c) 256
d) 255
e) 204
32
Answer
The ASCII table includes 256 symbols.
It reaches the only the 255, because it starts from 0 (null)
Information: http://www.asciitable.com/
33
Computer GraphicsRaster and vector graphics, graphic file formats, graphic redactors, color
range
Computer graphics The questions from this chapter
include the following topics: Computer graphics. Graphic file
formats(JPG, GIF, PNG, TIFF, EPS, PSD, AI, CDR). Compression of images. Vector and graphic images. Different format conversions. Applications (creating graphical images, analysis and recognition of images, computer art). Graphic redactors for images. Filters and effects. Color scales: RGB, CMYK, Panton, 16-bit colors.
35
Question 9. Which of the following is not a graphics redactor?
a) Media Monkey
b) GIMP
c) Artweaver
d) Pixia
e) PhotoFiltre
f) Paint.NET
36
Answer Media Monkey is an audio file program. It works as an Mp3 player, CD
player, audio manager, scanner, encoder, decoder, convertor and etc.
Information: http://www.mediamonkey.com/
37
Data basesData models, tables, relations, SQL
Data bases The questions from this chapter include the following topics :Bases of data. Systems that work with databases. Logical and physical organization. Data models Data base relations. Tables and
relations. Objects and the databases. Data types
SQL Language. Types of SQL commands and queries.
39
Question 10. Which type of relation between two tables with data cannot be applied without the use of a third table?
a) One to one
b) Many to many
c) One to many
d) All of the above
e) None of the above
40
Answer The relation between two data tables in a database relation is working with the use of a security key. The key has the same value in both tables which allows them to find a record in the first table that corresponds to a record in the second table.
Information: http://office.microsoft.com/en-us/access-help/g
uide-to-table-relationships-HA010120534.aspx41
Information SystemsERP, CRM, BI, BPM, FMIS, CAD/CAM,
CMS, software architectures
Information Systems The questions from this chapter include
the following topics :Information systems.Classification (for management and organization ERP, for management and creation, for customer and distributor service– CRM, for analysis and researches – Bi, for solving problems, and so on). Life cycle ( the basic stages in creation and exploration). Main functions and tasks. System architectures – two layered(client/server), three layered, N-layered, cloud computing.
43
Question
11. What is the meaning of the abbreviation DSS?
a) Database Management System
b) Decision Support System
c) Executive Informational System
d) Manager Information System
e) Expert System
44
Answer
DSS is shortened for Decision Support System.
Decision Support System (DSS) is a computer-based information system that supports business or organizational decision-making activities
Information: http://fbm.uni-ruse.bg/d/uis/L-1.pdf
45
Protection and informational
security.Symmetric and asymmetric encryption algorithms, cryptographic hashing,
electronic signature, digital certificates
Protection and informational security
The questions in this theme, include the following topics: Security and protection of the
information. Methods and algorithms for coding: symmetric cryptographic coding– DES, 3DES; asymmetric cryptographic algorithms (public and private key) – RSA, DSA. Cryptographic hashing algorithms – SHA-1, MD5. Electronic signatures. Public key(PKI). Digital certificates.
47
Question
12. Which numbers are used by the encryption methods?
a) Prime numbers
b) Odd numbers
c) Even numbers
d) Binary numbers
e) None of the above
48
Answer Encryption methods use prime numbers because it take more time for prime numbers to be found if they are big, than other types of numbers and that makes the data harder to decrypt.
Information: http://www.claymath.org/posters/
primes/
49
Presentational Systems
Presentation software, presentation preparations, slides,effects, notes,
colors, images, sound, video
Presentation Systems The question from this chapter include the following topics: Presenting information, with the
helps of the presentation software. Computer presentations – slides, effects, notes, footnotes, color systems, templates.
Presentation materials design– use of color, text, images, visualizations and sound.
Presentation software51
Question
13. One of the following presentation software’s is web based. Which one is it?
a) Prezi
b) Apple Keynote
c) Microsoft Power Point
d) Impress
e) All of the above
f) None of the above52
Answer Information: Prezi is used from couple of people
online, so they can maintain simultaneous work on the project.
53
MultimediaSoftware creation/ multimedia
enhancement: sound, video, media formats
Multimedia The questions from this chapter, include the following topics Multimedia. Technologies for
multimedia creation. Software tools for media creation. Generation of movies and animation (including text, sounds, images). Compression of multimedia files. Convertion of multimedia file types. Multimedia software development tools, animation and movies.
55
Question
14. Which graphic format supports animation and it’s limited to 256 colors?
a) GIF
b) TIFF
c) JPEG
d) GPEG
e) PNG
f) BMP56
Answer Information: The format supports up to 8 bits per pixel for each image, allowing a single image to reference its own palette of up to 256 different colors chosen from the 24 bit RGB color space
57
Computer networkOSI model, network models,
protocols, standards, hardware equipment
Computer Networks This chapter includes:
Computer networks. OSI model networks and network protocols.
Local networks – basics, organization and management types, basic standards, hardware components.
Global computer networks – basics, ways of connection, main advantages. Users and recourses.
59
Question
15. Which of the following layers is not part of the OSI model?
a) Trade layer
b) Transport layer
c) Network layer
d) Session layer
e) Channel layer
f) Physical layer
60
Answer
Information: The layers of the OSI model:
Physical layer, Data link layer, network layer, transport layer, session layer, presentation layer, application layer.
61
Internet Internet, Protocols, services, WWW,
HTTP, FTP, SMTP, POP3, IMAP, WebDAV, IP, DNS, …
Internet The questions from this chapter include: Internet – basics, technical and
technological aspects.
Basic services and protocols– HTTP, FTP, POP3, SMTP
Types of internet connections– dial-up, ISDN, LAN, DSL/ADSL, Wi-Fi
Internet addresses– IP addresses, DNS services, first level domains, Hosting. 63
Question
16. What is IEE 802.11 ?
a) Internet Explorer ver. 8.00
b) Wireless networks standard
c) IP address version
d) Connection trough the internet via phone cable
e) None of the above
64
Answer Information: EEE 802.11 is a set of media access control (MAC) and physical layer(PHY) specifications for implementing wireless local area network (WLAN) computer communication
65
Electronic CommunicationE-mail, Skype, ICQ, IRC, MSN
Messenger, Yahoo Messenger, social networks, forums, …
Electronic communications
The questions from this chapter include: Electronic communication
Electronic mail– e-mail clients and web based platforms and protocols
Real time communications– IRC, ICQ, Skype, MSN Messenger, Yahoo Messenger – principles of work and protocols
Social networks67
Question
17. Which of the following is not an e-mail client?
a) Lotus Notes
b) Adobe Premiere Pro
c) Thunderbird
d) Eudora
e) Evolution
f) Microsoft Outlook
68
Answer Adobe Premier Pro
Video montage program
Part of the Adobe creative suite
Information: http://www.adobe.com/en/products/
premiere.html
http://en.wikipedia.org/wiki/Adobe_Premiere_Pro
69
World Wide Web (WWW)How does the WWW work? Protocols
HTTP, GET, POST, URL, web browser, web page, web site, …
World Wide Web (WWW)
The questions from this article include: Global informational system - World
Wide Web (WWW) – functionality
Web servers and web browsers. Protocol HTTP, methods GET and POST. Hyperlink technology Web page – meaning, URL address and elements
Website hosting71
Question
18. What HTTP method is used in order to send a query to a web form?
a) POST
b) HEAD
c) LINK
d) PRINT
e) SAVE
72
Answer Post – allows the client to sent data to the web server. This query usually generates when web form is sent.
Information: http://en.wikipedia.org/wiki/POST_(HTT
P)
73
Web design, HTML, CSS
Web design, HTML, CSS, text, graphics, tables, forms…
Web design, HTML, CSS The questions from this chapter include: Website development, testing and
design
Basic HTML tags: inserting formatted text, images, links, tables
Websites styling language - CSS
Alignment of the webpage
75
Question 19.Which HTML tag is deprecated although it might work with some of the modern browsers
a) <b>…</b>
b) <center>… </center>
c) <i>…</i>
d) <sup>…</sup>
76
Answer
This tag is abandoned in HTML 4.01 and it is not supported in HTML 5.0
This is because of the block formation titles, paragraphs etc. The style creators decided to move the formatting styles in CSS. Информация:
https://developer.mozilla.org/en-US/docs/Web/HTML/Element/center
http://www.w3schools.com/tags/tag_center.asp
77
JavaScript
Creating scripts with JavaScript, basic JavaScript constructions, operators,
objects, manipulation of the DOM tree
JavaScript In this chapter you will find the
following topics: Scripting languages for coding in
internet: JavaScript, Perl, VBScript. Common thoughts on JavaScript. Data types. Operators and expressions Conditional operators. Operators for cycle. JavaScript functions. Objects in JavaScript. Arrays. Classes Date, Math. Objects document, window, navigator. Events in JavaScript. Object model DOM and its manipulation with JavaScript.
79
Question
20. The section <div id="myDiv"><b>Bold </b> <i>Italic </i> <span> other</span></div> is operated with the Java Script function for red color and the lastElementChild option. What is the result?
a) Bold italic other
b) Bold italic other
c) Bold italic other
d) Bold italic other80
Answer Last child is a CSS selector that interprets the last part of the whole (word, phrase, element of a list/array).
Information: http://www.developphp.com/view_less
on.php?v=903
http://www.w3schools.com/cssref/sel_last-child.asp
81
Telerik Academy
Questions?
Redcurrant team Facebook pagehttps://www.facebook.com/groups/462500253859043
/
??
? ? ??
??
?
http://schoolacademy.telerik.com