Тема 1. History of computers (История компьютеров) Тема 2. Information dependent society (Информационно-зависимое общество) Тема 3. Development of microelectronics (Развитие микроэлектроники) Тема 4. What is operating system (Что такое операционная система) Тема 5. The information management challenges (Проблемы управления информацией) Тема 6. Real time operating system (Операционная система в реальном времени)
Open the brackets, put the verb in the correct form in sentence: “LibreOffice, Firefox, Thunderbird, Transmission, and lightweight games like Sudoku and chess (include)… by default, while GNOME Files is the default file manager”
Open the brackets, put the verb in the correct form in sentence: “The transistor, which (introduce) … in the mid-1950s, made computers more reliable”
… is data that provides information about other data, but not the content of the data, such as the text of a message or the image itself
Open the brackets, put the verb in the correct form in sentence: “There was no such thing when the first computers (develop)… following WWIΓ
Open the brackets, put the verb in the correct form in sentence: “The addition of support for Linux programs, which (reveal) … in 2018, was a big advance”
Open the brackets, put the verb in the correct form in sentence: “Wireless network connectivity (also manage) … by mobile operating systems”
… computer is a type of computers that harnesses the collective properties of quantum states, such as superposition, interference, and entanglement, to perform calculations
… is the administration of an organization, whether it is a business, a non-profit organization, or a government body
… integration is giving way to very-large-scale integration (VLSI) and wafer-scale integration (WSI)
… is an electronic machine that can store, organize and find information, do processes with numbers and other data, and control other machines
Cell phones are …, making it possible to provide everyone with communication channels
… memory is a memory management technique that provides an idealized abstraction of the storage resources that are actually available on a given machine which creates the illusion to users of a very large (main) memory
… is the property of a system to handle a growing amount of work by adding resources to the system
The most significant worldwide danger is the rise in labor… when information technologies are implemented
Demand for programmers is already outstripping supply, and some analysts believe that this shortfall will limit… usage development in the next few years
The … transistor was conceived about 25 years before bipolar transistors, but mass production did not become feasible until the early 1960s
A mechanical calculator invented by Blaise Pascal in 1642 is called …
…. ensure the uninterrupted operation of vital systems, therefore, if a failure occurs or some illegal operations are performed, the OS must diagnose them, if necessary, block the program or isolate applications from each other, initiate recovery and protection of other programs or the system itself
RTOS
BOS
DOS
RTS
… latency is the time interval from the end of the execution of the last user interrupt handler instruction to the execution of the first instruction of the process that entered the state due to this interrupt
… memory is a memory management technique that provides an idealized abstraction of the storage resources that are actually available on a given machine which creates the illusion to users of a very large (main) memory
The most significant worldwide danger is the rise in labor… when information technologies are implemented
… systems are computerized systems used in manufacturing to track and document the transformation of raw materials to finished goods
Demand for programmers is already outstripping supply, and some analysts believe that this shortfall will limit… usage development in the next few years
… is an open-source Linux distribution built on the architecture and infrastructure of Debian
Cell phones are digital, it was the transition to digital that made it possible to provide everyone with communication channels, but without… in SIM cards, cellular communications could not become mass
… is the property of a system to handle a growing amount of work by adding resources to the system
The observations that apply to a common … information system also apply to a certain extent to data warehouses and data mining
integrated
real-time
distributed
embedded
The analytical engine was invented in …
1933
1833
1733
2022
There are some of the potential benefits of distributed operating systems, for example … (choose 2 correct answers)
they minimize the load on the host computer
they require a high level of expertise to maintain
they allow a faster exchange of data among users
if the primary network fails, the entire system shuts down
The …, which was introduced in the mid-1950s, made computers more reliable
photonics
transistor
microchip
vacuum tube
The type of operating system that is not directly linked to the computer is the … operating system
batch
distributed
time-sharing
multitasking
Arrange the inventions chronologically:
Тип ответа: Сортировка
1 The Stepped Reckoner
2 Atanasoff-BerryComputer
3 Markll
4 UNIVAC
Arrange the events chronologically:
Тип ответа: Сортировка
1 Calculations are done on an Abacus by sliding beads across the rods
2 Pascaline, the first gear-driven calculator, was invented
3 Mark 1 was developed for army to compute World War Two ballistic fighting tables
4 Apple Il was the first personal computer with color monitor
… was developed by Bell Labs and was the first significant operating system to be written almost entirely in high-level language
Unix
Linux
Multics
Windows 95
… created the first operating system for the IBM 701
О MIT
О Apple
О Samsung
О General Motors
The Apple Macintosh, a low-cost workstation that emerged from early Alto computer concepts, was released in …
О 1923
О 1956
О 1984
О 2001
The introduction of time-sharing systems, in particular, has long been regarded as a watershed moment in the evolution of … systems
О operating
О executing
О mediating
О monitoring
A user cannot send direct instructions to the hardware … various activities
О execute
О executes
О to execute
О to be executed
Identify the sequence of generations of computers (by their description):
Тип ответа: Сортировка
1 huge machines capable of conducting numerical calculations
2 computers were mostly utilized for scientific and technical calculations, with FORTRAN and assembly code being the most used programming languages
3 the machines shared the same architecture and instruction set, programs created for one could be run on the other
4 computers with Large Scale Integration Circuits (LSI) and silicon chips with thousands Oftransistors
… is a person who identifies and analyzes business problems, and generates system requirements
Project manager
System architect
Enterprise architect
Business systems analyst
The Apple Macintosh, a low-cost workstation that emerged from early Alto computer concepts, was released in …
1960
1984
1987
2001
The network operating system, which allows users to copy files from …
one station to another
RAM to built-in memory
RAM to Cloud memory
a station to Cloud memory
… was used in the first generation of computers
Machine language
C++ language
Punched cards
Java language
…. technologies are one of the most basic through technologies in many documents and by many experts
Augmented reality
Artificial intelligence
Photonics
Bionics
Debian is a pre-compiled software that has over… packages and is based on the Linux kernel
59 000
100 000
200 500
347 000
Identify the sequence of information management steps:
Тип ответа: Сортировка
1 the acquisition of information from one or more sources
2 the custodianship and the distribution of that information to those who need
3 ultimate disposal of information through archiving or deletion
Harvard Mark I is …
a punched wooden card
a mechanical-digital computer
a fully automatic computing machine
an automatic sequence controlled calculator
The OS-9 family of real-time operating systems has been in use for over… years, with more than 5 million installed copies
twenty
thirty
forty
fifty
A roadblock to data availability such as connectivity means that… (choose 2 correct answers)
your data is too inconvenient for me to load
your unclassified data describe company secrets
systems are not connected to the same network
users are not aware of specific data sets because metadata is not published
Transferred data might contain some important…
signs
chains
texts
information
… is a technical person who builds new software systems
System architect
Project manager
System designer
Application developer
… AE has been ported to leading high-availability CompactPCI platforms such as the CPX8000 from Motorola Computer Group
VxWorks
VRTX
CHORUS
OS-9
Match the components of QNX with their characteristics:
Тип ответа: Сопоставление
Microkernel
Process manager
Device manager
Network manager
–
it is protected by several layers of protection
responsible for creating and deleting processes, memory management, timers and coprocessor emulation, and diagnostics
a type of system process that keeps specific hardware running smoothly
a bottleneck in most operating systems and usually creates significant problems for RTOS
Match computers to their creators:
Тип ответа: Сопоставление
Mark 1
Pascaline
Napier’s bones
Personal computer
–
Howard Aikien
Blaise Pascal
John Napier
IBM
Establish a correspondence between the abbreviation and the definition:
Тип ответа: Сопоставление
ISO
CORBA
XML
SQL
–
International Standards Organization
Common Object Request BrokerArchitecture
Extensible Markup Language
Structured Query Language
Martin Timmerman formulated the necessary requirements for an RTOS. Two of them are about priorities. Why the combination of priorities is necessary?
The RTS software is a fixed set of pre-developed modules, and the choice of a program for execution is carried out by interrupts (based on the current state of the object) or in accordance with the scheduled work schedule
∣t is the opposite of “necessary”, as the combination of thread priorities can lead to problems such as priority inversion and deadlock
RTOS needs to share resources. There are a lot of real-time process and system resources for their operation must be available in advance
Most businesses don’t want to deal with non-core tasks, which include the IT infrastructure. And if it has to pay for a data center, it has to function at maximum efficiency. Crisis situations are exacerbating resource shortages. Enterprises are cutting IT budgets, investing less in long-term projects in general and in data centers in particular. It is impossible to abandon IT altogether – it is equal to giving up doing business, but phased financing and speed of commissioning come to the fore. What do today’s IT managers face while having limited budgetary resources to expand data centers?
Task of providing more services to more users, meeting ever-increasing performance expectations, storing and managing exponentially increasing amounts of data, better protecting the network, and ensuring system stability
Mail to be lost when using postal mail, and neither the sender nor the receiver would know where the letter was or whether it had been delivered
They face a lot of challenges as “hundreds of billions of dollars are spent annually on mobile phones, electronic devices, computers, and other microelectronic products, spawning an entire industry that did not exist a decade ago”
The first recognized use of the word “computer” was from 1613. What did the “computer” use to mean before this word started to refer to devices?
It was used for people who have a high level of intelligence
It was used for a device which helped ships to calculate their latitude at sea
It was used for people who performed repetitive mathematical operations
Prior to the transistor’s discovery in 1947, the only way to execute amplification of a weak current in an electronic circuit was to use a vacuum tube. What were the initial advantages transistors demonstrated over small vacuum tubes?
Transistors had longer lifespan, were smaller and many of them could be placed on a single chip
Transistors were larger, while consuming far less power. They were more reliable
Small vacuum tubes’ production cost was much higher. Tubes’ material turned out to be harmful for people’s skin
Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. What does a massive use of cryptography lead to?
О Among other things, it leads to protection of accounting for payment by subscribers of a digital communication channel
O It leads to the dissemination of obscene materials that pose a threat to the moral foundations of society, because people feel free when they can act anonymously, distribute, buy and sell illegal materials with low chance Oftracing them
O It leads to a significant improvement of the identification of people by automatic machines when crossing the borders of states
An information society is a society where the usage, creation, distribution, manipulation and integration of information is a significant activity. Which of the following statements is not true about the Information Society?
О The information society refers to the social, economic, technological, and cultural changes that have occurred as a result of the rapid development and extensive use of information and communication technologies (ICTs) in modern countries, particularly since World War Il
O According to Professor W. Martin attempted to formulate the main characteristics of the information society according to the Social and Technological criteria
O The information society has been formed decades ago, and therefore has been widely studied from different angles; experts have reached the consensus regarding the “Information Society” term
Artificial intelligence is becoming more standardized, making it more accessible to a subject-matter expert who isn’t necessarily a knowledge engineering expert. What standards are becoming more common accessible and useful today?
О International Organization for Standardization (ISO) Remote Data Access (RDA)
O American National Admissions Institute (ANSI) Structured Join Language (SQL)
O Object Management Group (OMG) – Common Object Broker Architecture (CORBA)
O Hypertext Markup Language (HTML), Extensible Markup Language (XML)
O Web Ontology Language (OWL), Knowledge Query and Manipulation Language, Win Interchange Format (KIF)
Correlate the generations of computers with their descriptions:
Тип ответа: Сопоставление
Computers of the First Generation
Computers of a New Generation
Computers of the Third Generation
Computers of the Fourth Generation
huge machines capable of conducting numerical calculations
computers were mostly utilized for scientific and technical calculations, with FORTRAN and assembly code being the most used programming languages
the machines shared the same architecture and instruction set, programs created for one could be run on the other
computers with Large Scale Integration Circuits (LSI) and silicon chips with thousands of transistors
Match the sentence with the time it was written:
Тип ответа: Сопоставление
А.BINAC and EDSAC were notable early Stored- program electronic digital computers
В. Until now, there hasn’t been any quantumcomputing platform that had the capability to program new algorithms
С. Developers have been trying to find a solution to this problem since the last century but still haven’t found one
Nowadays many smartphones have faster processor speeds and more memory than desktop PCs
still haven’t found one
Nowadays many smartphones have faster processor speeds and more memory than desktop PCs
Past Simple
Present Perfect
Present Perfect Continuous
Present Simple
Match the abbreviations and transcripts:
Тип ответа: Сопоставление
A. ICTs
B. Al
GDP
D.information and communication technologies
E.artificial intelligence
F.gross domestic product
Match the units of data measurement with their characteristics:
Тип ответа: Сопоставление
A. Bit
B. Kilobyte (kb)
Gigabyte (Gb)
is the smallest unit of measurement
is approximately 1000 bytes, or the equivalent of 1000 characters
is approximately 1000 Mb, or the equivalent of one billion characters
Match the approaches to understanding the information society and their authors:
Тип ответа: Сопоставление
A. W. Martin
В. Rakitov
С. N. Kurnosov
the information society is understood as a «developed post-industrial society» that arose primarily in the West
the transition to the information society means that the most important product of social activity is the production, operation and use of services and knowledge, and the share of knowledge in this combination is increasing
F.the information society is dominated by remote communications, remote work and leisure; new relations are formed between people in the process of production and social activity