Cloud Computing Basics

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Listen to an AI-generated conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Technology which distributes information from the server to the client, used on mobile devices is _____

mobile push-notification messages

A model of providing cloud computing for access to use of operating systems and database management system is _____

Platform as a Service

To create profiles in the cloud use _____

forms

To work with one Google Document in online mode it is necessary for a group of users to _____

<p>open shared access</p>
Signup and view all the answers

To create a Google Presentation in the cloud it is necessary to _____

<p>have a Google account</p>
Signup and view all the answers

The place where various information on the user is stored is _____

<p>account</p>
Signup and view all the answers

A defect of cloud computing is _____

<p>not controllability of data</p>
Signup and view all the answers

The convenient environment for processing and storage of various formats of information with user support of the Internet is _____

<p>cloud technologies</p>
Signup and view all the answers

Technology which distributes information from the server to the client, used on mobile devices is _____

<p>mobile push-notification messages</p>
Signup and view all the answers

It is possible to change a profile photo, entering in service _____

<p>google</p>
Signup and view all the answers

To work with the documents of GOOGLE you need to enter in service _____

<p>disk</p>
Signup and view all the answers

To create questionnaires, Google documents _____ are used

<p>forms</p>
Signup and view all the answers

A mobile application is _____

<p>software</p>
Signup and view all the answers

Portable multi-function device of mobile communication is _____

<p>smartphone</p>
Signup and view all the answers

The international organization defining recommendations in the field of telecommunications and radio is _____

<p>ITU</p>
Signup and view all the answers

The largest software developer, the creator of the web service Elastic Computer Cloud (EC2): _____

<p>Amazon</p>
Signup and view all the answers

How many levels of cloud technologies exist: _____

<p>3</p>
Signup and view all the answers

Level of cloud technologies. Platform as a Service is _____

<p>intermediate level of a platform</p>
Signup and view all the answers

Global system of coordinates determination is _____

<p>GPS</p>
Signup and view all the answers

The system which allows making calls and sending messages is _____

<p>GSM</p>
Signup and view all the answers

Google services include _____

<p>Google+, My account</p>
Signup and view all the answers

In GOOGLE.com it is possible to create _____

<p>documents, presentations</p>
Signup and view all the answers

Cybersecurity. Information security from illegal access is _____

<p>each user of the system shall have the personal password</p>
Signup and view all the answers

Cybersecurity. The main types of computer viruses are _____

<p>program, load, macro viruses</p>
Signup and view all the answers

Cybersecurity. Antivirus programs include _____

<p>AidsTest, Kaspersky Kav</p>
Signup and view all the answers

Cybersecurity. Formats of executed files are _____

<p>.exe,.com,.bat</p>
Signup and view all the answers

Cybersecurity. Depending on the habitat, computer viruses are divided as _____

<p>network, file, loading, file and loading</p>
Signup and view all the answers

Cybersecurity. On a way of infection, computer viruses are divided as _____

<p>harmless, dangerous, very dangerous</p>
Signup and view all the answers

Cybersecurity. MS Windows file characteristics include _____

<p>file name, creation date and time, file size and attributes</p>
Signup and view all the answers

Cybersecurity. Stealth viruses _____

<p>hide their presence</p>
Signup and view all the answers

Cybersecurity. The way of virus detection includes _____

<p>scanning</p>
Signup and view all the answers

Cybersecurity. A computer can be infected with a virus _____

<p>when executing the infected program</p>
Signup and view all the answers

Cybersecurity. Detector programs _____

<p>treat the infected files</p>
Signup and view all the answers

Cybersecurity. Doctor programs _____

<p>treat the infected files</p>
Signup and view all the answers

Cybersecurity. A computer virus is _____

<p>specially written program of small volume which spoils them</p>
Signup and view all the answers

Cybersecurity. The main two groups of viruses are _____

<p>resident, non-resident</p>
Signup and view all the answers

Cybersecurity. The viruses using errors and inaccuracies in a complex of software are _____

<p>viruses interceptors</p>
Signup and view all the answers

Cybersecurity. Anti-virus programs are _____

<p>AidsTest, Doctor Web, Kaspersky KAV</p>
Signup and view all the answers

Cybersecurity. In what case the computer can be infected with a virus _____

<p>during the work with the infected program</p>
Signup and view all the answers

Reason for creation of medical information systems is _____

<p>need of use of large volumes of information for the decision of medical tasks</p>
Signup and view all the answers

Subdivisions on the scope of information systems include _____

<p>decision making support systems</p>
Signup and view all the answers

The medical information system realizing the Salamatty Kazakhstan program is _____

<p>medical information system Paragraph 'Medicine'</p>
Signup and view all the answers

The main objective of medical information systems of basic level is _____

<p>computer support of doctors' activity of different specialties</p>
Signup and view all the answers

The main objective of information systems of treatment and prevention facilities is _____

<p>information support of administrative processes of MPI</p>
Signup and view all the answers

Flashcards

Mobile push-notification messages

It distributes information from the server to the client, used on mobile devices.

Platform as a Service (PaaS)

A cloud computing model for accessing operating systems and database management systems.

Forms (Google Docs)

Used to create profiles in clouds using Google Docs.

Open shared access

Necessary for group users to work with one Google Document in online mode.

Signup and view all the flashcards

Have a Google account

Required to create Google Presentation in the cloud.

Signup and view all the flashcards

Account

The location where user information is stored.

Signup and view all the flashcards

Not controllability of data

A disadvantage where cloud computing data is not easily controlled by the user.

Signup and view all the flashcards

Cloud technologies

A convenient environment for processing and storing information with user support over the Internet.

Signup and view all the flashcards

Applied Science

A branch of science dealing with the application of scientific knowledge to practical problems.

Signup and view all the flashcards

Google

Accessing this to change profile photo.

Signup and view all the flashcards

Disk

Necessary for working with documents in Google's service.

Signup and view all the flashcards

Forms

Used to create questionnaires using Google documents.

Signup and view all the flashcards

Software

Fundamental component of any mobile application.

Signup and view all the flashcards

Smartphone

A portable multi-function mobile communication device.

Signup and view all the flashcards

ITU

International telecom standards organization.

Signup and view all the flashcards

Amazon

The largest software developer, the creator of a web service Elastic Computer Cloud (EC2).

Signup and view all the flashcards

3

The number of levels within the Cloud Technology stack.

Signup and view all the flashcards

Intermediate level of a platform

Level of cloud technologies. Specifically an intermediate level of a platform.

Signup and view all the flashcards

GPS

Global system for determining coordinates.

Signup and view all the flashcards

GSM

The system which allows to make calls and send messages.

Signup and view all the flashcards

Google+, My Account

A collection of service from the tech giant.

Signup and view all the flashcards

Documents, Presentations

Functionality in Google.com related to files.

Signup and view all the flashcards

each user of system shall have the personal password

Critical step for computer security.

Signup and view all the flashcards

program, load, macro viruses

Threats that are programmed that are embedded into common documents.

Signup and view all the flashcards

Antivirus programs

AidsTest, Kaspersky Kav

Signup and view all the flashcards

.exe, .com, .bat

Formats of executed files.

Signup and view all the flashcards

network, file, loading, file and loading

A way that computer viruses are categorized.

Signup and view all the flashcards

harmless, dangerous, very dangerous

The way computer viruses are categorized.

Signup and view all the flashcards

file name, creation date and time, file size and attributes

File characteristics in MS Windows.

Signup and view all the flashcards

hide their presence

Action performed by Stealth viruses.

Signup and view all the flashcards

scanning

A way of detecting viruses.

Signup and view all the flashcards

when executing the infected program

The conditions under which a computer can be infected with a virus

Signup and view all the flashcards

treat the infected files

Cybersecurity measure: treating the infected files

Signup and view all the flashcards

specially written program of small volume which spoils them

What a computer virus is

Signup and view all the flashcards

resident, non-resident

Groups which hackers separate viruses via.

Signup and view all the flashcards

during the work with the infected program

How a computer can be infected with a virus.

Signup and view all the flashcards

Finds the infected files and treats them

What "Doctor" Program finds

Signup and view all the flashcards

Turning on the computer with busy floppy

Infection with loading viruses occurs at

Signup and view all the flashcards

Boot-Strap program

Cybersecurity. Loading viruses can infect

Signup and view all the flashcards

Transfer a virus

A Cybersecurity replicator threat.

Signup and view all the flashcards

Remember data on a condition of programs

Cybersecurity. Remember data on a condition of programs that are..

Signup and view all the flashcards

Study Notes

  • Technology that distributes information from the server to the client primarily used on mobile devices, including virtualization, online conferences, and computing clouds, mobile push-notification messages, and micronuclear architecture of a hypervisor.
  • Cloud computing provides access to operating systems and database management systems through models such as Software as a Service, Infrastructure as a Service, Platform as a Service, Storage as a Service, and Management as a Service.
  • To create profiles using Google Docs to create profiles in the cloud, one should use forms.
  • To work with one Google Document in online mode it is necessary for group of users to have open shared access.
  • To create Google Presentation, it is necessary to have a Google account.
  • The place where various information of the user is stored is an account.
  • A defect of cloud computing is not controllability of data.
  • The environment for processing and storing various formats information with user support on the Internet is cloud technologies.
  • Information and communication technologies are applied science.
  • Technology that distributes information from the server to the client on mobile devices includes virtualization, online conferences, computing clouds, mobile push-notification messages, and micronuclear architecture of a hypervisor.
  • To change a profile photo, one option may be through Google.
  • To work with Google documents you need to enter in disk.
  • Google documents uses forms to create questionnaires.
  • To work with one Google document in online mode group of users has to have open shared access.
  • A mobile application is software.
  • A portable multi-function device of mobile communication is a smartphone.
  • The international organization defining recommendations in the field of telecommunications and radio is the ITU.
  • The largest software developer, the creator a web - service Elastic Computer Cloud (EC2) is Amazon.

Cloud Technology Levels

  • There are three levels of cloud technologies.
  • Platform as a Service (PaaS) is at the intermediate level of a platform.
  • GPS is the global system of coordinates determination.
  • The system that allows you to make calls and send messages is GSM.
  • Google services include Google+, My account.
  • In Google.com, it is possible to create documents and presentations.

Cybersecurity Information

  • In cybersecurity, to maintain information security from illegal access each user should have personal passwords.
  • The main types of computer viruses are program, load, macro viruses
  • Some antivirus programs include AidsTest, Kaspersky Kav.
  • Formats of executed files in cybersecurity include .exe, .com, .bat.
  • Computer viruses are divided by habitat into network, file, loading, file and loading types.
  • Computer viruses are divided by way of infection into harmless, dangerous, very dangerous types.
  • A file characteristic in cybersecurity is file name, creation date and time, file size and attributes.
  • Stealth viruses hide their presence.
  • The way of virus detection includes scanning.
  • A computer can be infected with the virus when executing the infected program.
  • Detector programs treat the infected files.
  • Doctor programs also treat the infected files.
  • A computer virus is a specially written program of small volume which spoils them.
  • The main two groups of viruses are resident, non-resident.
  • Viruses that use errors and inaccuracies in complex software are viruses interceptors.
  • Antivirus programs can include AidsTest, Doctor Web, and Kaspersky KAV.
  • A computer can be infected with a virus during the work with the infected program.
  • Doctor Programs find the infected files and treats them.
  • Infection with loading viruses occurs on turning on the computer with busy floppy.
  • Loading viruses can infect Boot-Strap Program.
  • Replicators transfer a virus.
  • Auditor programs remember data on a condition of programs.
  • Macro viruses are macros.
  • AVP is an anti-virus program.
  • A computer virus is the program damaging computer programs and data.
  • Distinctive features of a computer virus include the small volume ability to independent start and repeated copying of a code, to creation of noise to correct operation of the computer.
  • A computer can be infected with a virus in case of execution of the infected program.
  • The computer virus is the program which breeds itself and does harm to the computer of the user and other objects located in network.
  • The text "SYRYECUMT SSTEI" deciphered by the method of simple swap will look as follows: SECURITY SYSTEM
  • The text ciphered by method of simple swap of "INTEGRITY INFORMATION SYSTEMS" will look as follows "SMETSYS NOITAMRONF YTIRGETNI."

E-government in the Republic of Kazakhstan

  • Main stages include: Information, interactive, transactional.
  • The Program of forming «E-government» in Republic of Kazakhstan on 2005-2007 was approved on 10.11.2004, â„–1471.
  • The number of information services on web-portal of «E-government» is 933.
  • Citizens, government agencies, organizations, and other economic entities utilizing the services of e-government are Consumers of e-services.
  • State bodies, organizations and other economic entities providing services ICT tools are E-service providers.
  • The law "About the Electronic Document and the Digital Signature" was adopted on 7th January 2003, â„– 370-2.
  • The abbreviation that designates interaction of government with citizens is government-to-consumer.
  • The abbreviation designating interaction of the state with government is government-to-government.
  • The abbreviation designating interaction of the state with private sectors is government -to-business.
  • The abbreviation designating interaction of business with the state is business-to-government.
  • The abbreviation designating interaction of citizens with the state is consumer-to- government.
  • The way to get a digital signature: it is necessary to submit the application for obtaining the electronic digital signature (EDS) on www.egov.kz.
  • To get authorization on the Web portal of "Electronic government", you need the personal identification number and password of the user.
  • The e-mail address of the electronic government web portal of Kazakhstan is www.e.gov.kz.
  • The Web portal of the electronic government of Kazakhstan was created in 12.04.2006.
  • The second stage of the electronic government development in Kazakhstan is Interactive.
  • The first stage of the electronic government development in Kazakhstan is Information.
  • The third stage of the electronic government development in Kazakhstan is Transaction.
  • The external contour of the electronic government of Kazakhstan is G2C, G2B.
  • The internal contour of the electronic government of Kazakhstan is G2C, G2B.
  • The service which is rendered by means of information communication tools E-service
  • An e-business that allows a consumer to name their own price for products and services is the C2B e-business model.
  • E-Commerce is suitable for Online job searching.
  • The National Program for Building up e-Government in the Republic of Kazakhstan for 2005-2007 was approved with Presidential Decree No.1471 of November 10, 2004.
  • The program for bridging the digital divide in the Republic of Kazakhstan for 2007-2009 was approved with Government Resolution No.995 of October 13, 2006.
  • E-learning system is the innovative approach.
  • Basic elements of distance learning include the information transfer environment.
  • Distance learning occupations forms are chat occupation, web occupation, teleconference.
  • The System Internet of training E-learning has an innovative approach.
  • Basic elements of distance learning is information transmission medium.
  • Law of Healthcare was accepted in September 2009.
  • The composition of a health care system state and non-state health sector.
  • Implementation of a uniform national health care system began 1st January, 2010.
  • Advantages of distant education it is available to all segments of the population.
  • Distance learning. Privileges of e-learning are mobility.
  • The process of converting analog signals into digital signals so they can be processed by a receiving computer is called Demodulation.
  • Rules of an exchange of information between computers through a network is called Protocol.
  • Switches operate at data link while hubs operate at the physical layer.
  • The Modem performs modulation and demodulation.
  • The World Wide Web is one of the internet services.
  • A network model where there is no server computer is called Peer to Peer Network.
  • The name of data receiver in computer science is Client.
  • The language for creating web pages is HTML, MS Front Page.
  • ... is the tag defining an underlined font.
  • A special language of formatting of text documents in the internet is known as Html.
  • The geometrical scheme of computer association in the internet is called Network topology.
  • Tag defining the crossed font is
  • Html Tag is for character set.
  • Html. Writing of the text between tags * and * makes the text italic.
  • Html. Bgcolor attribute gives background color.

HTML

  • The tag for including a picture in an html document is .

  • Each new element of the list begins with the tag

  • Tags and are used for the running line.

  • A tag by means of which transition from one fragment of the text to another is carried out like this the selected text fragment .

  • The Html. Tag which defines the background of the screen is .

  • The menu containing a command of viewing Html code of Web page is view.

  • WWW Internet service is based on HTML, hypertext.

  • Tags of marking paragraph is

  • Html Tags which contain the main part of the document _

  • Html. Tag <tr...> includes attributes align, valign, bottom.

  • Html. Tag which is used to create horizontal rules **

  • Formats of Html document .htm and .html.

  • Html. Heading tags involves _

  • Html. The tag defining the color of the row involves color

  • The Html command to refresh the Web-site is F5.

  • The Internet. Network telecommunication systems is Windows NT Server, Novell Netware.

  • The definition of the Internet is a worldwide global computer network.

  • The Internet. World Wide Web is the world wide web

  • The Internet. Program for web browsing browser

  • The form of direct communication on the Internet in Online mode is chat.

  • The Internet. The program for operation with e-mail involves Outlook Express

  • The Internet. The rule of data exchange between computers by means of the network is protocol

  • The address of a Web-site on the world wide web, for instance, http://www.microsoft.com is more commonly known as the uniform resource locator

  • HTML uses FlipH to converts text horizontally

  • Html filter which creates the negative image is called Xray.

  • The tag which opens a hyperlink in a new window of the browser is target= blank

  • Html input type that would allow a reader to select several options from a list of possibilities is the type=checkbox

  • The HTML feature that divides a web page into two or more scrollable parts is and

  • Html Tag <select...> which contains attributes is option, multiple

  • Html Tag defining the column of a table:

  • Besides <B>, another way to make text bold involves

  • Html Attributes of tag is href, target, title

  • Html Attributes of <marquee.....> tag: scroll, slide, alternate

  • Html tag uses cellspacing to set the distance between frames of cells of the table in pixels.

  • The Html tag defining "Range" of cell across uses colspan.

  • The Html tag defining the place of the form processor is action.

  • The Html tag defining a radiobutton type=radio

  • Html Attributes of < tag involves top, blank, self, parent.

  • Html Attributes of < form.....> tag includes action, method, enctype

  • Html Insertion of the upper and lower index of the text is sub, sup.

  • The internet components of search engines include program indexing, database of search engines

  • The main types of internet search engines is the the universal search engine, search engine on meta data.

  • Types of networks in the internet include peer-to-peer, client-server.

  • Browsers on the internet involves the use of Mozilla Firefox, Internet Explorer

  • HTML uses glow, mask filters used for the text.

  • HTML elements of Internet Explorer window are the tool bar, address line

  • HTML. Tag ** has a vertical alignment attribute valign.

  • Computer viruses spread based on types like resident, non-resident.

  • Software issues are caused by viruses interceptors.

  • Algorithm computer viruses are divided on: parasitic, replicators, invisible beings, mutants, trojan

  • Types of antivirus programs includes detectors, doctors, auditors, filters, vaccines

  • Antivirus programs can be divided into the groups detectors, doctors, auditors.

  • Some common antivirus programs are Doctor Web.

  • Programs used for search and treatment of computer viruses include Dr Web.

  • A computer virus can create own copies.

  • Programs auditors modify programs.

  • Polymorphic viruses are capable of changing the code.

  • Programs auditors of disks find the latent viruses.

  • The resident virus is kept in random access memory after completion of work of the program.

  • To improve the reliability of anti-virus programs operation of base updating are applied.

  • The programs that can be a revisor are Adinf

  • Medical Informaton*

  • The reason of creating medical information systems is to need of use of large volumes of information for the decision of medical tasks.

  • Subdividings on the scope of information systems include decision making support systems.

  • The medical information system realizing the Salamatty Kazakhstan program is the medical information system Paragraph "Medicine".

  • The main objective of medical information systems of basic level is to help computer support of doctors' activity of different specialties

  • The main objective of information systems of treatment and prevention facilities is information support of administrative processes of MPI

  • Signs of the clinical information description are qualitative.

  • Medical information systems specialize on integration of administrative, medical and financial information

  • In case of survey of the patient the attending physician does him notes out of chamber.

  • The operating doctor tells results of operation to relatives

  • the nation is the core concept for health worker

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser