Podcast
Questions and Answers
Technology which distributes information from the server to the client, used on mobile devices is _____
Technology which distributes information from the server to the client, used on mobile devices is _____
mobile push-notification messages
A model of providing cloud computing for access to use of operating systems and database management system is _____
A model of providing cloud computing for access to use of operating systems and database management system is _____
Platform as a Service
To create profiles in the cloud use _____
To create profiles in the cloud use _____
forms
To work with one Google Document in online mode it is necessary for a group of users to _____
To work with one Google Document in online mode it is necessary for a group of users to _____
To create a Google Presentation in the cloud it is necessary to _____
To create a Google Presentation in the cloud it is necessary to _____
The place where various information on the user is stored is _____
The place where various information on the user is stored is _____
A defect of cloud computing is _____
A defect of cloud computing is _____
The convenient environment for processing and storage of various formats of information with user support of the Internet is _____
The convenient environment for processing and storage of various formats of information with user support of the Internet is _____
Technology which distributes information from the server to the client, used on mobile devices is _____
Technology which distributes information from the server to the client, used on mobile devices is _____
It is possible to change a profile photo, entering in service _____
It is possible to change a profile photo, entering in service _____
To work with the documents of GOOGLE you need to enter in service _____
To work with the documents of GOOGLE you need to enter in service _____
To create questionnaires, Google documents _____ are used
To create questionnaires, Google documents _____ are used
A mobile application is _____
A mobile application is _____
Portable multi-function device of mobile communication is _____
Portable multi-function device of mobile communication is _____
The international organization defining recommendations in the field of telecommunications and radio is _____
The international organization defining recommendations in the field of telecommunications and radio is _____
The largest software developer, the creator of the web service Elastic Computer Cloud (EC2): _____
The largest software developer, the creator of the web service Elastic Computer Cloud (EC2): _____
How many levels of cloud technologies exist: _____
How many levels of cloud technologies exist: _____
Level of cloud technologies. Platform as a Service is _____
Level of cloud technologies. Platform as a Service is _____
Global system of coordinates determination is _____
Global system of coordinates determination is _____
The system which allows making calls and sending messages is _____
The system which allows making calls and sending messages is _____
Google services include _____
Google services include _____
In GOOGLE.com it is possible to create _____
In GOOGLE.com it is possible to create _____
Cybersecurity. Information security from illegal access is _____
Cybersecurity. Information security from illegal access is _____
Cybersecurity. The main types of computer viruses are _____
Cybersecurity. The main types of computer viruses are _____
Cybersecurity. Antivirus programs include _____
Cybersecurity. Antivirus programs include _____
Cybersecurity. Formats of executed files are _____
Cybersecurity. Formats of executed files are _____
Cybersecurity. Depending on the habitat, computer viruses are divided as _____
Cybersecurity. Depending on the habitat, computer viruses are divided as _____
Cybersecurity. On a way of infection, computer viruses are divided as _____
Cybersecurity. On a way of infection, computer viruses are divided as _____
Cybersecurity. MS Windows file characteristics include _____
Cybersecurity. MS Windows file characteristics include _____
Cybersecurity. Stealth viruses _____
Cybersecurity. Stealth viruses _____
Cybersecurity. The way of virus detection includes _____
Cybersecurity. The way of virus detection includes _____
Cybersecurity. A computer can be infected with a virus _____
Cybersecurity. A computer can be infected with a virus _____
Cybersecurity. Detector programs _____
Cybersecurity. Detector programs _____
Cybersecurity. Doctor programs _____
Cybersecurity. Doctor programs _____
Cybersecurity. A computer virus is _____
Cybersecurity. A computer virus is _____
Cybersecurity. The main two groups of viruses are _____
Cybersecurity. The main two groups of viruses are _____
Cybersecurity. The viruses using errors and inaccuracies in a complex of software are _____
Cybersecurity. The viruses using errors and inaccuracies in a complex of software are _____
Cybersecurity. Anti-virus programs are _____
Cybersecurity. Anti-virus programs are _____
Cybersecurity. In what case the computer can be infected with a virus _____
Cybersecurity. In what case the computer can be infected with a virus _____
Reason for creation of medical information systems is _____
Reason for creation of medical information systems is _____
Subdivisions on the scope of information systems include _____
Subdivisions on the scope of information systems include _____
The medical information system realizing the Salamatty Kazakhstan program is _____
The medical information system realizing the Salamatty Kazakhstan program is _____
The main objective of medical information systems of basic level is _____
The main objective of medical information systems of basic level is _____
The main objective of information systems of treatment and prevention facilities is _____
The main objective of information systems of treatment and prevention facilities is _____
Flashcards
Mobile push-notification messages
Mobile push-notification messages
It distributes information from the server to the client, used on mobile devices.
Platform as a Service (PaaS)
Platform as a Service (PaaS)
A cloud computing model for accessing operating systems and database management systems.
Forms (Google Docs)
Forms (Google Docs)
Used to create profiles in clouds using Google Docs.
Open shared access
Open shared access
Signup and view all the flashcards
Have a Google account
Have a Google account
Signup and view all the flashcards
Account
Account
Signup and view all the flashcards
Not controllability of data
Not controllability of data
Signup and view all the flashcards
Cloud technologies
Cloud technologies
Signup and view all the flashcards
Applied Science
Applied Science
Signup and view all the flashcards
Google
Signup and view all the flashcards
Disk
Disk
Signup and view all the flashcards
Forms
Forms
Signup and view all the flashcards
Software
Software
Signup and view all the flashcards
Smartphone
Smartphone
Signup and view all the flashcards
ITU
ITU
Signup and view all the flashcards
Amazon
Amazon
Signup and view all the flashcards
3
3
Signup and view all the flashcards
Intermediate level of a platform
Intermediate level of a platform
Signup and view all the flashcards
GPS
GPS
Signup and view all the flashcards
GSM
GSM
Signup and view all the flashcards
Google+, My Account
Google+, My Account
Signup and view all the flashcards
Documents, Presentations
Documents, Presentations
Signup and view all the flashcards
each user of system shall have the personal password
each user of system shall have the personal password
Signup and view all the flashcards
program, load, macro viruses
program, load, macro viruses
Signup and view all the flashcards
Antivirus programs
Antivirus programs
Signup and view all the flashcards
.exe, .com, .bat
.exe, .com, .bat
Signup and view all the flashcards
network, file, loading, file and loading
network, file, loading, file and loading
Signup and view all the flashcards
harmless, dangerous, very dangerous
harmless, dangerous, very dangerous
Signup and view all the flashcards
file name, creation date and time, file size and attributes
file name, creation date and time, file size and attributes
Signup and view all the flashcards
hide their presence
hide their presence
Signup and view all the flashcards
scanning
scanning
Signup and view all the flashcards
when executing the infected program
when executing the infected program
Signup and view all the flashcards
treat the infected files
treat the infected files
Signup and view all the flashcards
specially written program of small volume which spoils them
specially written program of small volume which spoils them
Signup and view all the flashcards
resident, non-resident
resident, non-resident
Signup and view all the flashcards
during the work with the infected program
during the work with the infected program
Signup and view all the flashcards
Finds the infected files and treats them
Finds the infected files and treats them
Signup and view all the flashcards
Turning on the computer with busy floppy
Turning on the computer with busy floppy
Signup and view all the flashcards
Boot-Strap program
Boot-Strap program
Signup and view all the flashcards
Transfer a virus
Transfer a virus
Signup and view all the flashcards
Remember data on a condition of programs
Remember data on a condition of programs
Signup and view all the flashcards
Study Notes
- Technology that distributes information from the server to the client primarily used on mobile devices, including virtualization, online conferences, and computing clouds, mobile push-notification messages, and micronuclear architecture of a hypervisor.
- Cloud computing provides access to operating systems and database management systems through models such as Software as a Service, Infrastructure as a Service, Platform as a Service, Storage as a Service, and Management as a Service.
- To create profiles using Google Docs to create profiles in the cloud, one should use forms.
- To work with one Google Document in online mode it is necessary for group of users to have open shared access.
- To create Google Presentation, it is necessary to have a Google account.
- The place where various information of the user is stored is an account.
- A defect of cloud computing is not controllability of data.
- The environment for processing and storing various formats information with user support on the Internet is cloud technologies.
- Information and communication technologies are applied science.
- Technology that distributes information from the server to the client on mobile devices includes virtualization, online conferences, computing clouds, mobile push-notification messages, and micronuclear architecture of a hypervisor.
- To change a profile photo, one option may be through Google.
- To work with Google documents you need to enter in disk.
- Google documents uses forms to create questionnaires.
- To work with one Google document in online mode group of users has to have open shared access.
- A mobile application is software.
- A portable multi-function device of mobile communication is a smartphone.
- The international organization defining recommendations in the field of telecommunications and radio is the ITU.
- The largest software developer, the creator a web - service Elastic Computer Cloud (EC2) is Amazon.
Cloud Technology Levels
- There are three levels of cloud technologies.
- Platform as a Service (PaaS) is at the intermediate level of a platform.
- GPS is the global system of coordinates determination.
- The system that allows you to make calls and send messages is GSM.
- Google services include Google+, My account.
- In Google.com, it is possible to create documents and presentations.
Cybersecurity Information
- In cybersecurity, to maintain information security from illegal access each user should have personal passwords.
- The main types of computer viruses are program, load, macro viruses
- Some antivirus programs include AidsTest, Kaspersky Kav.
- Formats of executed files in cybersecurity include .exe, .com, .bat.
- Computer viruses are divided by habitat into network, file, loading, file and loading types.
- Computer viruses are divided by way of infection into harmless, dangerous, very dangerous types.
- A file characteristic in cybersecurity is file name, creation date and time, file size and attributes.
- Stealth viruses hide their presence.
- The way of virus detection includes scanning.
- A computer can be infected with the virus when executing the infected program.
- Detector programs treat the infected files.
- Doctor programs also treat the infected files.
- A computer virus is a specially written program of small volume which spoils them.
- The main two groups of viruses are resident, non-resident.
- Viruses that use errors and inaccuracies in complex software are viruses interceptors.
- Antivirus programs can include AidsTest, Doctor Web, and Kaspersky KAV.
- A computer can be infected with a virus during the work with the infected program.
- Doctor Programs find the infected files and treats them.
- Infection with loading viruses occurs on turning on the computer with busy floppy.
- Loading viruses can infect Boot-Strap Program.
- Replicators transfer a virus.
- Auditor programs remember data on a condition of programs.
- Macro viruses are macros.
- AVP is an anti-virus program.
- A computer virus is the program damaging computer programs and data.
- Distinctive features of a computer virus include the small volume ability to independent start and repeated copying of a code, to creation of noise to correct operation of the computer.
- A computer can be infected with a virus in case of execution of the infected program.
- The computer virus is the program which breeds itself and does harm to the computer of the user and other objects located in network.
- The text "SYRYECUMT SSTEI" deciphered by the method of simple swap will look as follows: SECURITY SYSTEM
- The text ciphered by method of simple swap of "INTEGRITY INFORMATION SYSTEMS" will look as follows "SMETSYS NOITAMRONF YTIRGETNI."
E-government in the Republic of Kazakhstan
- Main stages include: Information, interactive, transactional.
- The Program of forming «E-government» in Republic of Kazakhstan on 2005-2007 was approved on 10.11.2004, №1471.
- The number of information services on web-portal of «E-government» is 933.
- Citizens, government agencies, organizations, and other economic entities utilizing the services of e-government are Consumers of e-services.
- State bodies, organizations and other economic entities providing services ICT tools are E-service providers.
- The law "About the Electronic Document and the Digital Signature" was adopted on 7th January 2003, â„– 370-2.
- The abbreviation that designates interaction of government with citizens is government-to-consumer.
- The abbreviation designating interaction of the state with government is government-to-government.
- The abbreviation designating interaction of the state with private sectors is government -to-business.
- The abbreviation designating interaction of business with the state is business-to-government.
- The abbreviation designating interaction of citizens with the state is consumer-to- government.
- The way to get a digital signature: it is necessary to submit the application for obtaining the electronic digital signature (EDS) on www.egov.kz.
- To get authorization on the Web portal of "Electronic government", you need the personal identification number and password of the user.
- The e-mail address of the electronic government web portal of Kazakhstan is www.e.gov.kz.
- The Web portal of the electronic government of Kazakhstan was created in 12.04.2006.
- The second stage of the electronic government development in Kazakhstan is Interactive.
- The first stage of the electronic government development in Kazakhstan is Information.
- The third stage of the electronic government development in Kazakhstan is Transaction.
- The external contour of the electronic government of Kazakhstan is G2C, G2B.
- The internal contour of the electronic government of Kazakhstan is G2C, G2B.
- The service which is rendered by means of information communication tools E-service
- An e-business that allows a consumer to name their own price for products and services is the C2B e-business model.
- E-Commerce is suitable for Online job searching.
- The National Program for Building up e-Government in the Republic of Kazakhstan for 2005-2007 was approved with Presidential Decree No.1471 of November 10, 2004.
- The program for bridging the digital divide in the Republic of Kazakhstan for 2007-2009 was approved with Government Resolution No.995 of October 13, 2006.
- E-learning system is the innovative approach.
- Basic elements of distance learning include the information transfer environment.
- Distance learning occupations forms are chat occupation, web occupation, teleconference.
- The System Internet of training E-learning has an innovative approach.
- Basic elements of distance learning is information transmission medium.
- Law of Healthcare was accepted in September 2009.
- The composition of a health care system state and non-state health sector.
- Implementation of a uniform national health care system began 1st January, 2010.
- Advantages of distant education it is available to all segments of the population.
- Distance learning. Privileges of e-learning are mobility.
- The process of converting analog signals into digital signals so they can be processed by a receiving computer is called Demodulation.
- Rules of an exchange of information between computers through a network is called Protocol.
- Switches operate at data link while hubs operate at the physical layer.
- The Modem performs modulation and demodulation.
- The World Wide Web is one of the internet services.
- A network model where there is no server computer is called Peer to Peer Network.
- The name of data receiver in computer science is Client.
- The language for creating web pages is HTML, MS Front Page.
...is the tag defining an underlined font.- A special language of formatting of text documents in the internet is known as Html.
- The geometrical scheme of computer association in the internet is called Network topology.
- Tag defining the crossed font is
- Html Tag is for character set.
- Html. Writing of the text between tags * and * makes the text italic.
- Html. Bgcolor attribute gives background color.
HTML
-
The tag for including a picture in an html document is
.
-
Each new element of the list begins with the tag
-
Tags are used for the running line.
-
A tag by means of which transition from one fragment of the text to another is carried out like this the selected text fragment .
-
The Html. Tag which defines the background of the screen is
. -
The menu containing a command of viewing Html code of Web page is view.
-
WWW Internet service is based on HTML, hypertext.
-
Tags of marking paragraph is
-
Html Tags which contain the main part of the document _
-
Html. Tag <tr...> includes attributes align, valign, bottom.
-
Html. Tag which is used to create horizontal rules **
-
Formats of Html document .htm and .html.
-
Html. Heading tags involves _
-
Html. The tag defining the color of the row involves color
-
The Html command to refresh the Web-site is F5.
-
The Internet. Network telecommunication systems is Windows NT Server, Novell Netware.
-
The definition of the Internet is a worldwide global computer network.
-
The Internet. World Wide Web is the world wide web
-
The Internet. Program for web browsing browser
-
The form of direct communication on the Internet in Online mode is chat.
-
The Internet. The program for operation with e-mail involves Outlook Express
-
The Internet. The rule of data exchange between computers by means of the network is protocol
-
The address of a Web-site on the world wide web, for instance, http://www.microsoft.com is more commonly known as the uniform resource locator
-
HTML uses FlipH to converts text horizontally
-
Html filter which creates the negative image is called Xray.
-
The tag which opens a hyperlink in a new window of the browser is target= blank
-
Html input type that would allow a reader to select several options from a list of possibilities is the type=checkbox
-
The HTML feature that divides a web page into two or more scrollable parts is and
-
Html Tag <select...> which contains attributes is option, multiple
-
Html Tag defining the column of a table:
Besides <B>, another way to make text bold involves
Html Attributes of tag is href, target, title
Html Attributes of <marquee.....> tag: scroll, slide, alternate
Html tag uses cellspacing to set the distance between frames of cells of the table in pixels.
The Html tag defining "Range" of cell across uses colspan.
The Html tag defining the place of the form processor is action.
The Html tag defining a radiobutton type=radio
Html Attributes of < tag involves top, blank, self, parent.
Html Attributes of < form.....> tag includes action, method, enctype
Html Insertion of the upper and lower index of the text is sub, sup.
The internet components of search engines include program indexing, database of search engines
The main types of internet search engines is the the universal search engine, search engine on meta data.
Types of networks in the internet include peer-to-peer, client-server.
Browsers on the internet involves the use of Mozilla Firefox, Internet Explorer
HTML uses glow, mask filters used for the text.
HTML elements of Internet Explorer window are the tool bar, address line
HTML. Tag ** has a vertical alignment attribute valign.
Computer viruses spread based on types like resident, non-resident.
Software issues are caused by viruses interceptors.
Algorithm computer viruses are divided on: parasitic, replicators, invisible beings, mutants, trojan
Types of antivirus programs includes detectors, doctors, auditors, filters, vaccines
Antivirus programs can be divided into the groups detectors, doctors, auditors.
Some common antivirus programs are Doctor Web.
Programs used for search and treatment of computer viruses include Dr Web.
A computer virus can create own copies.
Programs auditors modify programs.
Polymorphic viruses are capable of changing the code.
Programs auditors of disks find the latent viruses.
The resident virus is kept in random access memory after completion of work of the program.
To improve the reliability of anti-virus programs operation of base updating are applied.
The programs that can be a revisor are Adinf
Medical Informaton*
The reason of creating medical information systems is to need of use of large volumes of information for the decision of medical tasks.
Subdividings on the scope of information systems include decision making support systems.
The medical information system realizing the Salamatty Kazakhstan program is the medical information system Paragraph "Medicine".
The main objective of medical information systems of basic level is to help computer support of doctors' activity of different specialties
The main objective of information systems of treatment and prevention facilities is information support of administrative processes of MPI
Signs of the clinical information description are qualitative.
Medical information systems specialize on integration of administrative, medical and financial information
In case of survey of the patient the attending physician does him notes out of chamber.
The operating doctor tells results of operation to relatives
the nation is the core concept for health worker
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
More Like This