Program and questions. Linux teacher training
The author of the following text is Aichi Academy.
These are excerpts from the document.
It is published at the request of readers of this topic about strange questions .
Personally, I was most surprised by the questions on the topic "Creating and editing Internet applications." It seems to mean something like Quanta Plus.
OC Linux for users
1. Indicate for what purpose a particular boot disk image is needed:
1 This boot image provides support for less common drivers such as NET and SCSI. It should be used if the other options have not passed. A cdrom.img
2 For installation from repositories accessible via NFS, FTP, HTTP. Network settings for the machine can be manual or automatic. B hd.img
3 Used if the installation source is accessible through a PCMCIA card (network, CD-ROM). C network.img
4 For installation from a local IDE or SCSI CD-ROM device. Used when it is not possible to directly boot from the CD-ROM. D other.img
5 This image is used if the installation from the CD-ROM failed. You just need to copy the contents of the CD to the hard drive (to the FAT, ext2fs or ReiserFS partition) and boot from the diskette with this image. E pcmcia.img
2. Specify how long Linux and file names can be.
3. If you logged in as a regular user and try to access files outside your home directory, you will often receive this error message: Access denied. Indicate what you need to do to get access to all files (select all correct answer options):
a. you must log in as administrator
b. this happens when locking the file system - you need to reboot
c. You must be logged in as root
d. need to log in
e. you must log in as another user with the same rights
4. Check what the question mark “?” means When specifying search criteria for files and folders:
a. exactly one
b character is missing . any number of characters is missing
5. Note which printing system is used in the Linux Wizard:
a. CUPS
b. Lpr
c. NetPrint
d. Printer
6. Indicate which of the following utilities searches for files and folders in KDE.
a. Kdefind
b. Ksearch
c. Ksch
d. Kfind
7. Indicate which file systems can be created during formatting (select all valid answer options).
a. MS-DOS
b. Linux
c. Ext2
d. Ext3
e. Minix
f. Swap
8. Which of the services can be used to configure network access to shared directories (select all the correct answer options).
a. AutoFS
b. Samba
c. Standard system settings
d. NFS
e. None of the above
9. Indicate the keyboard control module.
10. Specify the username of the user who is allowed to execute any commands in the system.
OpenOffice.org for users
Text editor OpenOffice.org Writer
11. Relate the formatting elements to their functions.
1 It is used for typing A Style
2 It is used to emphasize the text B Inscription
3 It is used to arrange the text in certain positions C Alignment
4 It is used to save time when formatting and to maintain uniformity in the design of the document D Font
12. To remove the table from the text, use:
a. Delete key
b. Backspace key
c. menu command Table / Delete / Table
d. Delete button on the toolbar Table
13. Specify the default extension for files saved in OpenOffice.org Writer.
a. .doc
b. .rtf
c. .odt
d. .txt
14. Using the wizard, you can create (select all valid answer options):
a. letter
b. fax
c. Address data source
d. new text document
Spreadsheets OpenOffice.org Calc
15. Relate the number formats and their descriptions.
1 The number + the text “rub” is
displayed A Dates 2 The number and the percent sign are displayed B Numeric
3 The year, month, day is
displayed C Money 4 The number with three decimal places is displayed D Percent
16. The criteria in the advanced filter from different lines are interconnected by condition:
a. And
b. OR
c. TRUE
d. FALSE
17. A cell may contain (select all valid answer options):
a. number
b. text
c. formula
d. Note
18. Filters come in (select all valid answer options):
a. standard
b. advanced
c. truncated
d. Autofilter
Presentations OpenOffice.org Impress
19. Specify which mode is most convenient for moving slides.
a. note mode
b. slide sorter
c. drawing mode
d. outline mode
20. Specify how to set text alignment.
a. Format> Symbols
b. Format> Position and Size
c. Format> Paragraph
d. Format> Markers and numbering
21. Specify with which toolbar you can create graphic objects.
a. Painting
b. Image
c. Standard
d. Circles and ovals
22. Mark what the Hide slide operation is for.
a. operation Hide slide is equivalent to deleting a slide
b. so that this slide does not appear on the screen while working with the presentation
c. so that you can avoid printing
d. so that this slide does not appear during the presentation presentation.
OpenOffice.org Draw
23 graphic editor . Note that the objects are:
a. rectangle
b. gradient
c. scale
d. fill
24. Check the box by which fill can be implemented (select all correct answer options):
a. hatching
b. texture
c. gradient
d. Material
25. Indicate what functions can be applied to the figures (select all the correct answer options):
a. addition
b. difference
c. intersection
d. multiplication
26. Indicate what operations are used to combine the figures into one (select all the correct answer options):
a. grouping
b. association
c. morphing
d. Duplication
Email and personal contact management. Work on the Internet
27. Mark what network protocols are for.
a. record connection errors
b. block the spread of viruses
c. Define network rules
d. filter incoming e-sweat messages
28. Note what needs to be done for subsequent distribution in the Mozilla Thunderbird program.
a. enter the addresses of the mailing recipients manually in the Compose Message window
b. Group cards in the address book
c. create a mailing list in the address book
d. this option is not available in the program
29. Check if you can designate a web page that will open when the browser starts.
a. no
b. yes
30. Indicate whether multiple accounts can be created in Mozilla Thunderbird.
a. yes
b. no
Compressing and archiving files
31. Specify what actions will be performed when the bzip2 note2 command is run:
a. the note2 file called note2.bz2 will be compressed
b. note2 archive will be checked for errors
c. the note2 file will be decompressed to the current folder
32. Specify which option allows you to extract files from the archive when using tar.
a. -c
b. -f
c. -t
d. -x
e. -z
Installing and administering Linux Wizard
33. Specify which keyboard shortcut you can call up the graphical console.
34. Indicate which command creates the new file.
35. Write which command you can add the user to the system.
36. You configure the logs. The severity level is encoded with a number from 0 to 7. Identify incorrect matches (select all valid answer options).
a. 0 - EMERG (system is down, the old name is PANIC)
b. 7 - DEBUG (debug printing)
c. 6 - ALERT (immediate intervention required)
d. 2 - CRIT (critical condition)
e. 3 - ERR (error, old name ERROR)
f. 1 - WARNING (warning, old name WARN)
37. Indicate with what utilities you can configure the kernel.
a. Make config
b. Make install
c. Make menuconfig
d. Make xconfig
e. Make reconfigure
38. Notice how you can manage printers connected to Linux Master (select all the correct answer options).
a. via the web interface
b. modifying configuration files
c. via ftp
39. Write which command is used to mount the file systems.
40. Note with which utilities you can copy the file to a remote computer (select all correct answer options).
a. ssh
b. centersh
c. rcp
d. scp
e. telnet
f. rlogin
41. Write with which command you can display complete information about the processes running in the system.
42. Note with which utility you can make a backup copy.
a. tar
b. dump
c. rar
d. tcpdump
43. Note what the main dangers are when using NFS.
a. the server does not work correctly with the NFS protocol on other OS
b. the client cannot always mount the resource, and sometimes a reboot is required
c. a trust relationship is established between the client and the server
44. Indicate which of the records for DNS points to the DNS servers for this domain.
a. MX
b. PTR
c. CNAME
d. SOA
e. NS
45. Write which command displays the list of users who are currently registered in the system (logged in).
46. Write which command creates the new directory.
47. Write which command you can add a group to the system.
48. Choose the correct order of configuration and installation of packages from the source code.
a. make; make install; ./configure
b. ./configure; install make; make
c. ./configure; make; make install
d. make install; make; ./ configure
49. Specify the main file responsible for the server configuration.
a. /etc/syslogd.conf
b. /etc/syslog.conf
c. / etc / default / syslog
d. / etc / syslog
50. The description of each installed printer (corresponding PPD file) is located in the directory:
a. / etc / cups / conf / ppd /
b. / etc / cups / ppd /
c. / var / spool / lp / ppd /
51. Match the device names with their description:
1 / dev / console A Pseudo-terminal support files. Used for remote working sessions using telnet
2 / dev / pty B Special devices for working with modems
3 / dev / cua C Hard drives with SCSI interface
4 / dev / sd D Hard drives with IDE interface
5 / dev / hd E System console, i.e. a monitor and keyboard physically connected to the computer
52. Note which utilities can be used to access the remote machine in order to execute various commands on it (select all the correct answer options).
a. ssh
b. centersh
c. rcp
d. scp
e. telnet
f. rlogin
53. Match the names of the protocols with their description:
1 nfs A Serves to prevent different clients from simultaneously changing data
2 mountd B Serves to create, read / write, search files. Also manages authentication and statistics
3 nsm C Monitors the current state of the computer (server or client) to inform
4 nlm D Responsible for connecting external systems for access through NFS
54. Specify what is necessary to determine the security policy on the network.
a. identify the services used
b. determine in which file passwords are stored
c. Determine which font is installed on the computer
d. Determine which services which groups should have access
e. deny access to all users except those registered in the system
55. Check which of the entries for DNS points to the mail server for this domain.
a. MX
b. PTR
c. CNAME
d. SOA
e. NS
56. Write with which command you can check the file system for errors.
Using antivirus software. Protection against hacker attacks and spam
57. Your student is very pleased with a new friend whom he met in one of the chats. Choose a sign by which you can determine that this new buddy is an adult:
a. he uses as a pseudonym the name of a famous literary hero
b. his messages contain almost no spelling errors
c. he asks your student to send his photo
d. he invites your student to arrange a personal meeting
58. Choose a function that ClamAV antivirus does not perform without additional modules:
a. On-demand file scanning
b. updating anti-virus databases
c. verification of mail attachments
d. automatic scanning of files on access
59. Choose the most effective method of protecting students from targeted actions by cybercriminals on the Internet:
a. Keep students away from computers
b. prohibit the use of the Internet at school
c. conduct outreach to students with specific examples
d. use filtering programs on the Internet gateway
60. Indicate which program updates ClamAV antivirus databases:
a. clamdscan
b. freshclam
c. sigtool
d. clamav-milter
Exclusion of student access to online resources incompatible with the tasks of their education
61. Indicate which of the Squid proxy logs (logs) contains information about user requests:
a. /var/log/squid/store.log
b. /var/log/squid/cache.log
c. /var/log/access.log
d. /var/log/squid/access.log
62. Check out the name of the ICF configuration file, which contains user roles.
a. c-icap.conf;
b. custom_roles
c. users;
d. generic_roles
63. Select the option that indicates the correct path to the Squid proxy server configuration file:
a. /etc/squid/squid.conf;
b. /etc/squid.conf;
c. /usr/etc/squid/squid.conf;
d. /etc/squid/cachemgr.conf.
64. Note what role will be assigned to the teacher user working on the computer with the IP address 192.168.1.100 if the users file has the following contents:
user @ Pupils
@ 192.168.0.0 / 24 Class_25
teacher @ 192.168.1.100 / 32 Informatika
a. none of the roles
b. Class_25
c. Informatika
d. Pupils
Database Management Using OpenOffice.org Base
65. Specify a metacharacter when using which all columns of this table will be displayed in the query designer.
a. %
b. ^
c. #
d. *
e. @
f.!
66. Indicate whether a query can be executed that retrieves data not from a physical table, but from another query.
a. no can't
b. maybe if this other (basic) query itself extracts data from table
c. maybe in any case
d. maybe if this other (basic) query retrieves no more than 5,000 rows of data
67. Indicate the name of the element, which is guaranteed to distinguish one row of the table from another.
a. primary record
b. primary row
c. primary key
d. key entry
e. the key value is
68. Note whether we can indicate at the time of creating a new table that when inserting a new row into it, filling in the field of this column is a prerequisite.
a. can, but only for the primary key column
b. can, but only for a column of numeric types
c. we cannot, information input is always optional
d. we can for any column
Create and edit Internet applications
69. Note what needs to be done to upload the site to the server.
a. click on the “Transfer project file” button in the “Basic” panel
b. in the Tools menu, select the Download Site command
c. in the File menu, select the command “Transfer Site to Server”
d. in the "Project" menu, select the "Transfer Project to Server" command
70. Specify how you can display both the web page and its html code (select all the correct answer options).
a. this is not possible
b. in the menu "Tools" select the command "Display html-code and page"
c. on the “Navigation” toolbar, click the “Visual and Code Editor” button
d. in the “View” menu, select the “Visual and Code Editor” command
71. Specify how to view the web page whose html code is displayed on the screen.
a. Click the View button on the Navigation toolbar
b. click the "Convert html code" button on the "View" toolbar
c. in the "Edit" menu, select the "View Web Page"
72 command . Specify how to save the current document as a template.
a. in the Tools menu, select the Convert to Template command
b. in the File menu, select the Save As Template command
c. on the "Basic" toolbar, click the "Save Template" button
d. in the menu "Project" select the command "Convert to project template"
These are excerpts from the document.
WORKING PROGRAM №3
Use of free software in the professional work of computer science teachers List of
students: computer science teachers
It is published at the request of readers of this topic about strange questions .
Personally, I was most surprised by the questions on the topic "Creating and editing Internet applications." It seems to mean something like Quanta Plus.
OC Linux for users
1. Indicate for what purpose a particular boot disk image is needed:
1 This boot image provides support for less common drivers such as NET and SCSI. It should be used if the other options have not passed. A cdrom.img
2 For installation from repositories accessible via NFS, FTP, HTTP. Network settings for the machine can be manual or automatic. B hd.img
3 Used if the installation source is accessible through a PCMCIA card (network, CD-ROM). C network.img
4 For installation from a local IDE or SCSI CD-ROM device. Used when it is not possible to directly boot from the CD-ROM. D other.img
5 This image is used if the installation from the CD-ROM failed. You just need to copy the contents of the CD to the hard drive (to the FAT, ext2fs or ReiserFS partition) and boot from the diskette with this image. E pcmcia.img
2. Specify how long Linux and file names can be.
3. If you logged in as a regular user and try to access files outside your home directory, you will often receive this error message: Access denied. Indicate what you need to do to get access to all files (select all correct answer options):
a. you must log in as administrator
b. this happens when locking the file system - you need to reboot
c. You must be logged in as root
d. need to log in
e. you must log in as another user with the same rights
4. Check what the question mark “?” means When specifying search criteria for files and folders:
a. exactly one
b character is missing . any number of characters is missing
5. Note which printing system is used in the Linux Wizard:
a. CUPS
b. Lpr
c. NetPrint
d. Printer
6. Indicate which of the following utilities searches for files and folders in KDE.
a. Kdefind
b. Ksearch
c. Ksch
d. Kfind
7. Indicate which file systems can be created during formatting (select all valid answer options).
a. MS-DOS
b. Linux
c. Ext2
d. Ext3
e. Minix
f. Swap
8. Which of the services can be used to configure network access to shared directories (select all the correct answer options).
a. AutoFS
b. Samba
c. Standard system settings
d. NFS
e. None of the above
9. Indicate the keyboard control module.
10. Specify the username of the user who is allowed to execute any commands in the system.
OpenOffice.org for users
Text editor OpenOffice.org Writer
11. Relate the formatting elements to their functions.
1 It is used for typing A Style
2 It is used to emphasize the text B Inscription
3 It is used to arrange the text in certain positions C Alignment
4 It is used to save time when formatting and to maintain uniformity in the design of the document D Font
12. To remove the table from the text, use:
a. Delete key
b. Backspace key
c. menu command Table / Delete / Table
d. Delete button on the toolbar Table
13. Specify the default extension for files saved in OpenOffice.org Writer.
a. .doc
b. .rtf
c. .odt
d. .txt
14. Using the wizard, you can create (select all valid answer options):
a. letter
b. fax
c. Address data source
d. new text document
Spreadsheets OpenOffice.org Calc
15. Relate the number formats and their descriptions.
1 The number + the text “rub” is
displayed A Dates 2 The number and the percent sign are displayed B Numeric
3 The year, month, day is
displayed C Money 4 The number with three decimal places is displayed D Percent
16. The criteria in the advanced filter from different lines are interconnected by condition:
a. And
b. OR
c. TRUE
d. FALSE
17. A cell may contain (select all valid answer options):
a. number
b. text
c. formula
d. Note
18. Filters come in (select all valid answer options):
a. standard
b. advanced
c. truncated
d. Autofilter
Presentations OpenOffice.org Impress
19. Specify which mode is most convenient for moving slides.
a. note mode
b. slide sorter
c. drawing mode
d. outline mode
20. Specify how to set text alignment.
a. Format> Symbols
b. Format> Position and Size
c. Format> Paragraph
d. Format> Markers and numbering
21. Specify with which toolbar you can create graphic objects.
a. Painting
b. Image
c. Standard
d. Circles and ovals
22. Mark what the Hide slide operation is for.
a. operation Hide slide is equivalent to deleting a slide
b. so that this slide does not appear on the screen while working with the presentation
c. so that you can avoid printing
d. so that this slide does not appear during the presentation presentation.
OpenOffice.org Draw
23 graphic editor . Note that the objects are:
a. rectangle
b. gradient
c. scale
d. fill
24. Check the box by which fill can be implemented (select all correct answer options):
a. hatching
b. texture
c. gradient
d. Material
25. Indicate what functions can be applied to the figures (select all the correct answer options):
a. addition
b. difference
c. intersection
d. multiplication
26. Indicate what operations are used to combine the figures into one (select all the correct answer options):
a. grouping
b. association
c. morphing
d. Duplication
Email and personal contact management. Work on the Internet
27. Mark what network protocols are for.
a. record connection errors
b. block the spread of viruses
c. Define network rules
d. filter incoming e-sweat messages
28. Note what needs to be done for subsequent distribution in the Mozilla Thunderbird program.
a. enter the addresses of the mailing recipients manually in the Compose Message window
b. Group cards in the address book
c. create a mailing list in the address book
d. this option is not available in the program
29. Check if you can designate a web page that will open when the browser starts.
a. no
b. yes
30. Indicate whether multiple accounts can be created in Mozilla Thunderbird.
a. yes
b. no
Compressing and archiving files
31. Specify what actions will be performed when the bzip2 note2 command is run:
a. the note2 file called note2.bz2 will be compressed
b. note2 archive will be checked for errors
c. the note2 file will be decompressed to the current folder
32. Specify which option allows you to extract files from the archive when using tar.
a. -c
b. -f
c. -t
d. -x
e. -z
Installing and administering Linux Wizard
33. Specify which keyboard shortcut you can call up the graphical console.
34. Indicate which command creates the new file.
35. Write which command you can add the user to the system.
36. You configure the logs. The severity level is encoded with a number from 0 to 7. Identify incorrect matches (select all valid answer options).
a. 0 - EMERG (system is down, the old name is PANIC)
b. 7 - DEBUG (debug printing)
c. 6 - ALERT (immediate intervention required)
d. 2 - CRIT (critical condition)
e. 3 - ERR (error, old name ERROR)
f. 1 - WARNING (warning, old name WARN)
37. Indicate with what utilities you can configure the kernel.
a. Make config
b. Make install
c. Make menuconfig
d. Make xconfig
e. Make reconfigure
38. Notice how you can manage printers connected to Linux Master (select all the correct answer options).
a. via the web interface
b. modifying configuration files
c. via ftp
39. Write which command is used to mount the file systems.
40. Note with which utilities you can copy the file to a remote computer (select all correct answer options).
a. ssh
b. centersh
c. rcp
d. scp
e. telnet
f. rlogin
41. Write with which command you can display complete information about the processes running in the system.
42. Note with which utility you can make a backup copy.
a. tar
b. dump
c. rar
d. tcpdump
43. Note what the main dangers are when using NFS.
a. the server does not work correctly with the NFS protocol on other OS
b. the client cannot always mount the resource, and sometimes a reboot is required
c. a trust relationship is established between the client and the server
44. Indicate which of the records for DNS points to the DNS servers for this domain.
a. MX
b. PTR
c. CNAME
d. SOA
e. NS
45. Write which command displays the list of users who are currently registered in the system (logged in).
46. Write which command creates the new directory.
47. Write which command you can add a group to the system.
48. Choose the correct order of configuration and installation of packages from the source code.
a. make; make install; ./configure
b. ./configure; install make; make
c. ./configure; make; make install
d. make install; make; ./ configure
49. Specify the main file responsible for the server configuration.
a. /etc/syslogd.conf
b. /etc/syslog.conf
c. / etc / default / syslog
d. / etc / syslog
50. The description of each installed printer (corresponding PPD file) is located in the directory:
a. / etc / cups / conf / ppd /
b. / etc / cups / ppd /
c. / var / spool / lp / ppd /
51. Match the device names with their description:
1 / dev / console A Pseudo-terminal support files. Used for remote working sessions using telnet
2 / dev / pty B Special devices for working with modems
3 / dev / cua C Hard drives with SCSI interface
4 / dev / sd D Hard drives with IDE interface
5 / dev / hd E System console, i.e. a monitor and keyboard physically connected to the computer
52. Note which utilities can be used to access the remote machine in order to execute various commands on it (select all the correct answer options).
a. ssh
b. centersh
c. rcp
d. scp
e. telnet
f. rlogin
53. Match the names of the protocols with their description:
1 nfs A Serves to prevent different clients from simultaneously changing data
2 mountd B Serves to create, read / write, search files. Also manages authentication and statistics
3 nsm C Monitors the current state of the computer (server or client) to inform
4 nlm D Responsible for connecting external systems for access through NFS
54. Specify what is necessary to determine the security policy on the network.
a. identify the services used
b. determine in which file passwords are stored
c. Determine which font is installed on the computer
d. Determine which services which groups should have access
e. deny access to all users except those registered in the system
55. Check which of the entries for DNS points to the mail server for this domain.
a. MX
b. PTR
c. CNAME
d. SOA
e. NS
56. Write with which command you can check the file system for errors.
Using antivirus software. Protection against hacker attacks and spam
57. Your student is very pleased with a new friend whom he met in one of the chats. Choose a sign by which you can determine that this new buddy is an adult:
a. he uses as a pseudonym the name of a famous literary hero
b. his messages contain almost no spelling errors
c. he asks your student to send his photo
d. he invites your student to arrange a personal meeting
58. Choose a function that ClamAV antivirus does not perform without additional modules:
a. On-demand file scanning
b. updating anti-virus databases
c. verification of mail attachments
d. automatic scanning of files on access
59. Choose the most effective method of protecting students from targeted actions by cybercriminals on the Internet:
a. Keep students away from computers
b. prohibit the use of the Internet at school
c. conduct outreach to students with specific examples
d. use filtering programs on the Internet gateway
60. Indicate which program updates ClamAV antivirus databases:
a. clamdscan
b. freshclam
c. sigtool
d. clamav-milter
Exclusion of student access to online resources incompatible with the tasks of their education
61. Indicate which of the Squid proxy logs (logs) contains information about user requests:
a. /var/log/squid/store.log
b. /var/log/squid/cache.log
c. /var/log/access.log
d. /var/log/squid/access.log
62. Check out the name of the ICF configuration file, which contains user roles.
a. c-icap.conf;
b. custom_roles
c. users;
d. generic_roles
63. Select the option that indicates the correct path to the Squid proxy server configuration file:
a. /etc/squid/squid.conf;
b. /etc/squid.conf;
c. /usr/etc/squid/squid.conf;
d. /etc/squid/cachemgr.conf.
64. Note what role will be assigned to the teacher user working on the computer with the IP address 192.168.1.100 if the users file has the following contents:
user @ Pupils
@ 192.168.0.0 / 24 Class_25
teacher @ 192.168.1.100 / 32 Informatika
a. none of the roles
b. Class_25
c. Informatika
d. Pupils
Database Management Using OpenOffice.org Base
65. Specify a metacharacter when using which all columns of this table will be displayed in the query designer.
a. %
b. ^
c. #
d. *
e. @
f.!
66. Indicate whether a query can be executed that retrieves data not from a physical table, but from another query.
a. no can't
b. maybe if this other (basic) query itself extracts data from table
c. maybe in any case
d. maybe if this other (basic) query retrieves no more than 5,000 rows of data
67. Indicate the name of the element, which is guaranteed to distinguish one row of the table from another.
a. primary record
b. primary row
c. primary key
d. key entry
e. the key value is
68. Note whether we can indicate at the time of creating a new table that when inserting a new row into it, filling in the field of this column is a prerequisite.
a. can, but only for the primary key column
b. can, but only for a column of numeric types
c. we cannot, information input is always optional
d. we can for any column
Create and edit Internet applications
69. Note what needs to be done to upload the site to the server.
a. click on the “Transfer project file” button in the “Basic” panel
b. in the Tools menu, select the Download Site command
c. in the File menu, select the command “Transfer Site to Server”
d. in the "Project" menu, select the "Transfer Project to Server" command
70. Specify how you can display both the web page and its html code (select all the correct answer options).
a. this is not possible
b. in the menu "Tools" select the command "Display html-code and page"
c. on the “Navigation” toolbar, click the “Visual and Code Editor” button
d. in the “View” menu, select the “Visual and Code Editor” command
71. Specify how to view the web page whose html code is displayed on the screen.
a. Click the View button on the Navigation toolbar
b. click the "Convert html code" button on the "View" toolbar
c. in the "Edit" menu, select the "View Web Page"
72 command . Specify how to save the current document as a template.
a. in the Tools menu, select the Convert to Template command
b. in the File menu, select the Save As Template command
c. on the "Basic" toolbar, click the "Save Template" button
d. in the menu "Project" select the command "Convert to project template"