ICT Quiz Questions and Answers
Document Details

Uploaded by WieldyHeliotrope4973
Tags
Related
Summary
This document contains multiple-choice questions and answers covering various topics in Information and Communication Technology (ICT). It includes questions on cloud computing, cybersecurity, internet technologies, HTML, and medical information systems. It is a practice quiz for computer science students.
Full Transcript
67 *!Technology which distributes information from the server to the client, used on mobile devices *virtualization *online conference *computing clouds *+mobile push-notification messages *micronuclear architecture of a hypervisor #68 *!A model of providing cloud computing for access to use of op...
67 *!Technology which distributes information from the server to the client, used on mobile devices *virtualization *online conference *computing clouds *+mobile push-notification messages *micronuclear architecture of a hypervisor #68 *!A model of providing cloud computing for access to use of operating systems and database management system *Software as a Service *Infrastructure as a Service *+Platform as a Service *Storage as a Service *Management as a Service #69 *!To create profiles in the cloud use Google Docs *documents *tables *presentations *+forms *my cards #70 *!To work with one Google Document in online mode it is necessary for group of users *remove the restriction *create a conference *open online chat *create "circles friends" *+open shared access #71 *!To create Google Presentation in the cloud it is necessary *create mail.ru *+have a Google account *be a Google Hangout User *have access to social networks *know the programming language #72 *!The place where various information on the user is stored *cloud *browser *+account *mailservice *questionnaire #73 *!Defect of a cloud computing is *flexibility *renting *economyy *availability and mobility *+not controllability of data #74 *!The convenient environment for processing and storage of various formats information with user support of the Internet *social networks *development environment *mobile services *operating system *+cloud technologies #75 Information and communication technologies are *social science *+applied science *medical science *humanity *fundamental science #76 *!Technology which distributes information from the server to the client, used on mobile devices *virtualization *online conference *computing clouds *+mobile push-notification messages *micronuclear architecture of a hypervisor #77 *!It is possible to change a profile photo, entering in service *play *disc *email *+google *translator #78 *!To work with the documents of GOOGLE you need to enter in service *email *search *+disk *calendar *my account #79 *!To create questionnaires are used Google documents *+forms *tables *my cards *documents *presentations #80 *!To work with one Google document in online mode group of users has to: *lift a limit *open an online chat *create a conference *+open shared access *create "circles friends" #81 *!Mobile application is: *service *+software *data storage *cloud calculation *developing environment #82 *!Portable multi-function device of mobile communication *netbook *tablet (pad) *bluetooth *monoblock *+smartphone #83 *!The international organization defining recommendations in the field of telecommunications and radio *+ITU *LTE *APPLE *GPS *IES #84 *!The largest software developer, the creator a web - service Elastic Computer Cloud (EC2): *Kcell *Apple *Gmail *+Amazon *EPAM Systems #85 *!How many levels of cloud technologies are exist: *2 *4 *5 *+3 *6 #86 *!Level of cloud technologies. Platform as a Service - PaaS) *auxiliary level *infrastructure level *top level of appendices *the lowest level of a platform *+intermediate level of a platform #87 *!Global system of coordinates determination *+GPS *GSM *LTE *Gmail *FTP #88 *!The system which allows to make calls and send messages *GPS *+GSM *Symbian *Tizen *iOS #89 *!Google services *ICQ, Internet *Cloud *Mailing, E-services *+Google+, My account *Documents #90 *!In GOOGLE.com it is possible to create *report, schemes *queries, reports *catalogs, books *programs, documents *+documents, presentations 91 *!Cybersecurity. Information security from illegal access *installation of the anti-virus program *+each user of system shall have the personal password *assignment of responsible persons for information output *to define an information access only for a manual of MPI *each user shall have the computer for operation with system #92 *!Cybersecurity. The main types of computer viruses *hardware, file *load, resident *non-resident, not dangerous *+program, load, macro viruses *file - load, not dangerous, resident #93 *!Cybersecurity. Antivirus programs *Eset, MS Access *MS Word, MS Excel *ZIP, MS Power Point *+AidsTest, Kaspersky Kav *MS DOS, DoctorWeb, RAR #94 *!Cybersecurity. Formats of executed files *.doc,.bat *.jpg,.txt,.doc *.bmp, rar, html *+.exe,.com,.bat *xls, zip,.doc,.bat #95 *!Cybersecurity. Depending on the habitat computer viruses are divided as *resident, non-resident *harmless, dangerous, very dangerous *+network, file, loading, file and loading *detectors, doctors, auditors, filters, vaccines *parasitic, replicators, invisible beings, mutants, trojan #96 *!Cybersecurity. On a way of infection computer viruses are divided as *resident, non-resident *+harmless, dangerous, very dangerous *network, file, loading, file and loading *detectors, doctors, auditors, filters, vaccines *parasitic, replicators, invisible beings, mutants, trojan #97 *!Cybersecurity. MS Windows. File characteristics *changing, moving and deleting the file *copying, moving, deleting file and attributes *date of moving of the file, creation date and time *renaming, moving, deleting file and time of creation *+file name, creation date and time, file size and attributes #98 *!Cybersecurity. Stealth viruses *infect drivers *infect boot sectors *+hide their presence *destroy all information *display the graphic drawing #99 *!Cybersecurity. The way of virus detection includes *+scanning *copying files *heuristic analysis *record of all files volume *checking of executing files #100 *!Cybersecurity. Computer can be infected with the virus *on incorrect loading *when loading drivers *when text program is working *+when executing the infected program *when inserting a floopy disk into the disk drive #101 *!Cybersecurity. Detector programs *modify programs *find the infected files *find changes and treat *+treat the infected files *only find changes in files #102 *!Cybersecurity. Doctor programs *modify programs *find the infected files *find changes and treat *+treat the infected files *only find changes in files #103 *!Cybersecurity. The computer virus is *the program providing compression of files *the program intended for creation of the presentation *the program used for increase in speed of operation of a disc *the program for coercion of the archived file to an initial look *+specially written program of small volume which spoils them #104 *!Cybersecurity. The main two groups of viruses *network, file *macro, micro *loading, dangerous *+resident, non-resident *dangerous, not dangerous #105 *!Cybersecurity. The viruses using errors and inaccuracies in a complex of software *worms *trojan horses *propagandists *logical bombs *+viruses interceptors #106 *!Cybersecurity. Anti-virus programs *MS DOS, NC *ARJ, RAR, ZIP *AutoCAD, CorelDraw *MS Word, MS Excel, MS Access *+AidsTest, Doctor Web, Kaspersky KAV #107 *!Cybersecurity.In what case the computer can be infected with virus *when formatting a disk *when testing the computer *when loading of the computer *at start of the DoctorWeb program *+during the work with the infected program #108 *!Cybersecurity. Doctor Program *Finds suspicious actions *Prevents infection of files *+Finds the infected files and treats them *Looks for viruses with the known signature *Compares an initial condition of the file to current #109 *!Cybersecurity. Infection with loading viruses occurs at *Closing of the file *Opening of the file *Data recording in the file *Reading of information from the file *+Turning on the computer with busy floppy #110 *!Cybersecurity. Loading viruses can infect *еxe-files *OBJ-files *batch-files *COM-files *+Boot-Strap program #111 *!Cybersecurity. Replicators *Find a virus *Delete a virus *+Transfer a virus *Destroy a virus program *Warning infection with a virus #112 *!Cybersecurity. Auditor programs *Treat a disk *Use vaccines *Treat all computer *Delete only the infected files of Windows *+ Remember data on a condition of programs #113 *!Cybersecurity. Macro viruses are *Network files *Package files *Dialogue files *Loading files *+Macros #114 *!Cybersecurity. AVP is *graphics editor *+anti-virus program *the program spreading virus *program of defragmentation *the program, the pressing the file for saving of the place on a disk #115 *!Cybersecurity. The computer virus is *text editor *graphic editor *programming language *+the program damaging computer programs and data *the program which is carrying out start of the computer #116 *!Cybersecurity. Distinctive features of a computer virus are *ease of recognition *considerable volume of a program code *need of start of the program from the user *ability to increase in a noise stability of an operating system *+small volume ability to independent start and repeated copying of a code, to creation of noise to correct operation of the computer #117 *!How the computer can be infected a virus *when loading drivers *when opening the internet *in case of the wrong loading *+in case of execution of the infected program *when inserting the disc with the infected program #118 *!The computer virus is *the hidden programs which erase, but they aren't removed *the program which protects the computer from harmful files *not readable data which are kept on rigid or on a floppy disk *programs which don't give the chance to open data with the password *+the program which breeds itself and does harm to the computer of the user and other objects located in network #119 !*The text "SYRYECUMT SSTEI" deciphered by method of simple swap will look as follows *«SEQURITY RISK» *«STORAGE DEVICE» *+«SECURITY SYSTEM» *«INFORMATION SYSTEM» *«SECONDARY STORAGE » #120 !*The text ciphered by method of simple swap "INTEGRITY INFORMATION SYSTEMS" will look as follows *"RIGENTY SSYETSMFORMIONN" *"IRIGENTY SSYETSO MFORMIONN" *"SYETSMS NUITANIONF IYRIGETNI" *+"SMETSYS NOITAMRONF YTIRGETNI" *"YTIRGETNI NOITAMROFNI YTIRGETNI" 121 *!Main stages of e-government in the Republic of Kazakhstan *+Information, interactive, transactional *Democratic society, the information society *Bridging Digital Divide, information society *E-government portal, a single transport medium *Payment gateway, a national identification system #122 *!Program of forming «E-government» in Republic of Kazakhstan on 2005-2007 *25.10.2005, №991 *13.10. 2006, №995 *11.10. 2004, №1459 *18.08. 2003, №1166 *+10.11.2004, №1471 #123 *!The number of information services on web-portal of «E-government» *999 *900 *145 *300 *+933 #124 *!Citizens, government agencies, organizations and other economic entities utilizing the services of e-government *E- service *E-banking *E-government *E-service providers *+Consumers of e-services #125 *!State bodies, organizations and other economic entities providing services ict tools *E-service *E-banking *E-government *+E-service providers *Consumers e-services #126 *!The law "About the Electronic Document and the Digital Signature" was adopted *10th January 2005, № 37 *1st January 2007, № 370 *7th January 2002, № 37-2 *7th January 2000, № 70-2 *+7th January 2003, № 370-2 #127 *!The abbreviation designating interaction of government with citizens *consumer-to-consumer *government -to-business *consumer-to- government *+government-to-consumer *government-to- government #128 *!The abbreviation designating interaction of the state with government *business-to-consumer *consumer-to-consumer *government -to-business *consumer-to- government *+government-to- government #129 *!The abbreviation designating interaction of the state with private sectors *consumer-to-consumer *business-to-government *+government -to-business *consumer-to- government *government-to- government #130 *!The abbreviation designating interaction of business with the state *business-to- business *consumer-to-business *business-to-consumer *government -to-business *+business-to-government #131 *!The abbreviation designating interaction of citizens with the state *consumer-to-business *business-to-consumer *consumer-to-consumer *+consumer-to- government *government-to- government #132 *!Method how to obtain digital signature: *to register on Population service center website *to register on the website www.egov.kz *to enter a private office through e-mail *to set JavaScript and to get permission for registration *+it is necessary to submit the application for obtaining the electronic digital signature (EDS) on www.egov.kz #133 *!For authorization on the Web portal of "Electronic government" the following data are necessary: *marriage certficate *e-mail address (e-mail) *number of the identity card *e-mail address (e-mail) and password of the user *+personal identification number and password of the user #134 *!E-mail address of the electronic government web portal of Kazakhstan: *+www.e.gov.kz *www.e.kz *www.aic.gov.kz *www.aic.kz *www.aik.gov.kz #135 *!Web portal of the electronic government of Kazakhstan was created in *+12.04.2006 *17.11.1997 *12.04.2007 *14.04.2007 *20.07.2007 #136 *!Second stage of the electronic government development in Kazakhstan *+Interactive * Transaction * Information society * Democratic society * Information #137 *!First stage of the electronic government development in Kazakhstan * Interactive * Transaction * Information society * Democratic society *+Information #138 *!Third stage of the electronic government development in Kazakhstan * Interactive *+Transaction * Information society * Democratic society * Information #139 *!External contour of the electronic government of Kazakhstan *+G2C, G2B * G2B, G2G * G2G * G2C, G2G * B2G #140 *!Internal contour of the electronic government of Kazakhstan *+G2C, G2B * G2B, G2G * G2G * G2C, G2G * B2G #141 *!The service which is rendered by means of information communication tools *+E-service * E-government * E-banking * Suppliers of Ґ-services * Consumers of Ґ-services #142 *!An e-business that allows consumer to name their own price for products and services is following which e-business model * B2B * B2G * C2C *+C2B * G2B #143 *!E-Commerce is not suitable for * Sale/Purchase of expensive jewelers and antiques * Sale/Purchase of mobile phones * Sale/Purchase of branded clothes *+Online job searching * None of these #144 *!National Program for Building up e-Government in the Republic of Kazakhstan for 2005-2007 was approved with Presidential Decree *+No.1471 of November 10, 2004 * No.995 of October 13, 2006 * No. 991 ofOctober25, 2005 * No. 1166 ofAugust18, 2003 * No. 1459 of October 11, 2004 #145 *!Program for bridging digital divide in the Republic of Kazakhstan for 2007-2009 was approved with Government Resolution * No.1471 of November 10, 2004 *+No.995 of October 13, 2006 * No. 991 of October 25, 2005 * No. 1166 of August 18, 2003 * No. 1459 of October 11, 2004 146 *!Е-learning system is *credit system *pedagogical way *operating system *traditional teaching *+innovative approach #147 *!Basic elements of distance learning *evening courses *pedagogical education *correspondence conference *+information transfer environment *international scientific and practical conference #148 *!Distance learning occupations forms are *discussion, debate *open lesson, master class *traditional lesson, conference *seminar, practical and laboratory classes *+chat occupation, web occupation, teleconference #149 *!System Internet of training E-learning *credit system *operating system *traditional training *pedagogical method *+innovative approach #150 *!Basic elements of distance learning *evening course *pedagogical education *correspondence conference *+information transmission medium *international scientific and practical conference #151 *!Law of Healthcare was accepted *March, 2009 *October, 2009 *February, 2010 *September, 2008 *+September, 2009 #152 *!Composition of a health care system *only state organizations *organizations of public sector *+state and non-state health sector *state and private medical organizations *public sector of health care and insurance companies #153 *! Beginning of implementation of a uniform national health care system *1st July, 2010 *1st March, 2011 *1st January, 2011 *1st February, 2011 *+1st January, 2010 #154 *!Advantages of distant education *well without the Internet *constant presence at a lecture *constant presence at a conference *constant presence on practical occupations *+it is available to all segments of the population #155 *!Distance learning. Privileges of e-learning *high cost *+mobility *response in writing *geographical limitation *the response in the oral form 1 *!Internet. The process of converting analog signals into digital signals so they can be processed by a receiving computer is referred to as *Digitizing *Computing *Modulation *Synchronizing *+Demodulation #2 *!Internet. Rules of an exchange of information between computers through a network *+Protocol *Text editor *Spreadsheet *Standard programs *The executed program #3 *!Internet. What is the difference between a switch and a hub *None of these *+Switches operate at data link while hubs operate at physical layer *Switches operate at data link layer while hubs operate at transport layer *Switches operate at transport layer while hubs operate at physical layer *Switches operate at physical layer while hubs operate at data link layer #4 *!Internet. Which of the following performs modulation and demodulation *Satellite *+Modem *Flashcard *Fiber optics *Coaxial cable #5 *!One of the internet services *hypertext *mail network *+world wide web *local network of users *connection of telephones networks #6 *!Internet. A network model where there is no server computer is *Client Network *Server Network *Centralized Network *+Peer to Peer Network *Client /Server Network #7 *!Internet. The name of data receiver in computer science *Server *Store *+Client *Storehouse *Work station #8 *!Internet. Language for creating web pages *Basic, С *Pascal, Delphi *Assembler language *Lisp, Prolog, Basic *+HTML, MS Front Page #9 *!The tag defining an underlined font *… *+ … * … * … * … #10 *!Internet. Special language of formatting of text documents *Ada *Basic *Pascal *+Html *Fortran #11 *!Internet The geometrical scheme of computer association is called *Tire topology *Local network *Ring topology *Local topology *+Network topology #12 *!The tag defining the crossed font * … * … *… * … *+ … #13 *!Html. Tag is *typing *markup language *+character set *hypertext set *markup language hyper Tex #14 *!Html. Writing of the text between tags and makes text *bold *+italic *interlinear *overlined *underlined #15 *!Html. Bgcolor attribute gives *page color *+background color *frame color *font color *background picture #16 *!Tags including picture in html-document * * * * *+ #17 *!Html. Each new element of the list begins with a tag * * * * *+ #18 *!Html. and tags are used for *line *filter *table *+running line *the running column #19 *!Internet technologies. A tag by means of which transition from one fragment of the text to another is carried out * the selected text fragment * the selected text fragment * the selected text fragment * the selected text fragment *+ the selected text fragment #20 *!Html. Tag which defines the background of the screen * * * * *+ #21 *!The menu containing a command of viewing Html code of Web page *stop *+view *refresh *browse *favorites #22 *!WWW Internet service is based on *Pascal, Delphi *HTML, MS Excel *+HTML, hypertext *WordPad, hypertext *HTML, Turbo Pascal #23 *!Html. Tags of marking paragraph * * * * *+ #24 *!Html. Tags which contain the main part of the document *_ *_ *_ *_ *+_ #25 *!Html. Тэг includes attributes *head, alt, title *title, head, height *noshade, align, width *+align, valign, bottom *frameset, color, checkbox #26 *!Html. Tag which is used to create horizontal rules *TD *TR *OL *LI *+HR #27 *!Formats of Html document *.txt and.xls *.exe and.htl *.doc and.txt *.mht and.xml *+.htm and.html #28 *!Html. Heading tags *_ *_ *_ *_ *+_ #29 *!Html. The tag defining the color of the row *hr *table *align *+color *method #30 *!Html. Command for refresh the Web-site *F11 *+F5 *F10 *F2 1 *!Internet. Network telecommunication systems *MS Word *MS Excel *Norton Commander *+Windows NT Server, Novell Netware *Windows, MS DOS, UNIX. Windows NT Server #2 *!Definition of the Internet *database *text editor *spreadsheet *+worldwide global computer network *the universal tool for preparation and design of the presentation #3 *!Internet. World Wide Web is *Internet *hyperlink *+world wide web *separate document *information space #4 *!Internet. Program for web browsing *tags *+browser *hypertext *Web-surfing *hypertext link #5 *!Internet. The form of direct communication in Internet in Online mode *+chat *filter *host-computer *line of the message *electronic textbook #6 *!Internet. The program for operation with e-mail *MS Word *Clipboard *+Outlook Express *Windows, MS DOS, UNIX *Windows NT Server, Novell Netware #7 *!Internet. The rule of data exchange between computers by means of the network *+protocol *text editor *accessories *spreadsheet *executed program #8 *!The address of Web-site on world wide web, for instance, http://www.microsoft.com *IP address *locator *MRL address *TCP/IP protocols *+uniform resource locator #10 *!Html. Which filter converts the text horizontally *Glow *FlipV *+FlipH *Shadow *DropShadow #11 *!Html. Filter which creates the negative image *Blur *Gray *Invert *Alpha *+Xray #12 *!Html. Tag which opens hyperlink in a new window of the browser *target=top *target=self *target=radio *target=parent *+target= blank #13 *!Html. Which input type would allow a reader to select several options from a list of possibilities *type=reset *type=hidden *type=submit *type= password *+type=checkbox #14 *!Html. What is the HTML feature that divides a web page into two or more scrollable parts * and * and * and * and *+ and #16 *!Html. Tag contains attributes *type, textare *strong, multiple *option, method *+option, multiple *enctype, multiple #17 *!Html. Tag defining the column of a table * * *+ * * #18 *!Html. Besides , another way to make text bold is what * * * * *+ #19 *!Html. Attributes of tag *body, head, title *+href, target, title *method, action, enctype *noshade, bgcolor, target *blank, checkbox, frameset #20 *!Html. Attributes of tag *+scroll, slide, alternate *noshade, alternate, slide *checkbox, submit, textarea *cellpadding, method, action *select multiple size, option value #21 *!Html. The tag setting distance between frames of cells of the table in pixels *tr *title *border *cellpadding *+cellspacing #22 *!Html. The tag defining "Range" of cell across *width *height *nowrap *rowspan *+colspan #23 *!Html. The tag defining the place of the form processor *value *+action *method *enctype *checked #24 *!Html. The tag defining a radiobutton *target=self *target =self *+type=radio *hidden= type *type=checkbox #25 *!Html. Attributes of < target …..> tag *+top, blank, self, parent *hidden, version, checkbox *text, black, link, vlink, alink *scroll, slide, alternate, vlink, parent *filter, mask color, width, height, text-align #26 *!Html. Attributes of < form…..> tag *vlink, text, alink, link *+action, method, enctype *post, get, target, hreff, kbd, code *strike, big, blink, compact, noshade *direction, marquee, dropshadow, wave #27 *!Html. Insertion of the upper and lower index of the text *tt, big *+sub, sup *small, img *bgcolor, strike *small, blink, sab #28 *!Internet. Components of search engines *news group *send files *archive files, searching of files *+program indexing, database of search engines *searching of files, send files #29 *!Internet. The main types of search engines *news groups, system control of databases *transfer protocol *medical electronic system, transfer protocol *+the universal search engine, search engine on meta data *system control of databases, transfer protocol #30 *!Internet. Types of networks *protocols, browsers *web pages, web sites *network of hyperlinks, web page *e-mail, network client-server *+peer-to-peer, client-server #31 *!HTML.Web - browsers *MіcroSoft Access, Mozilla *MіcroSoft Excel, Amigo *Word Front Page, MS Word *+Mozilla Firefox, Іnternet Explorer *MіcroSoftAccess, Іnternet Explorer #32 *!HTML. The filters used to the text *xray, mask *alpha, invert *strike, mask *+glow, mask *flipH, flipV #33 *!HTML. The filters used to the image *xray, mask *alpha, mask *strike, glow *+glow, mask *flipH, flipV, invert #34 *! Internet. Elements of Internet Explorer window: *file, template’s list *+tool bar, address line *catalogue, template *address line, scroll bar *formula row #35 *!HTML. Tag has attribute *alt *title *head *+valign *noshade #2 *!Computer viruses are divided by extent of influence on: *+resident, non-resident *harmless, dangerous, very dangerous *detectors, doctors, auditors, filters, vaccines *network, file, loading, file and loading *parasitic, replicators, invisible beings, mutants, trojan #3 *!The viruses using mistakes and inaccuracies in a complex software: *Worms *Propagandists *Trojan Horses *Logical bombs *+Virusesinterceptors #4 *!On features of an algorithm computer viruses divide on: *resident, non-resident *harmless, dangerous, very dangerous *detectors, doctors, auditors, filters, vaccines *network, file, loading, file and loading *+parasitic, replicators, invisible beings, mutants, trojan #5 *!Types of antivirus programs: *resident, non-resident *harmless, dangerous, very dangerous *network, file, loading, file and loading *+detectors, doctors, auditors, filters, vaccines *parasitic, replicators, invisible beings, mutants, trojan #6 *!Antivirus programs can be divided into following main groups: *filters, vaccines *resident, non-resident *+detectors, doctors, auditors *macros, resident, polymorphic, non-resident, network *detectors, doctors, auditors, doctors-auditors, filters, vaccines #7 *!Antivirus programs: *scanners *archives *+antivirus *brandmauers *antispammers #8 *!Antivirus program: *OutlookExpress *+Doctor Web *MS Ехсеl *MS Word *Rar #9 *!Program for search and treatment of computer viruses: *+Dr Web *Chat, Excel *Graphics, Word *E-Mail, Power Point *Use Net, Cache Man #10 *!Computer virus is the program capable to: *delete all images *infect the person *+create own copies *damage the computer hardware *destroy only the programs written on algorithmic languages #11 *!Programs auditors: *treat infected files *+modify programs *find changes and treat *find the infected files *find changes in files #12 *!Polymorphic viruses: *+are capable to change the code *contain logical bombs *can spoil disk drive heads *the viruses affecting the carried-out files *are capable to intercept the appeal to file system #13 *!Programs auditors of disks: *+find the latent viruses *check files of windows *archive the ms dos files *write down the code in the end of the file *restore the infected files in an initial state #14 *!The resident virus is: *DIR-viruses *network virus *well known viruses *the virus which isn't kept in random access memory after completion of work of the program *+the virus which is kept in random access memory after completion of work of the program #15 *!What operation is applied to reliability of work of anti-virus programs: *definition through network *operation of archive input *performance without operations *+operation of base updating *operation of archive copying #16 *!Which of the following programs can be a revisor: *Dir-I *Sherif *DrWeb *+Adinf *Aidstest 1 *!Reason of creation of medical information systems *need of the solution of problems with shortage of MPI *need of combining of databases of different clinics of the world *need of creation of a uniform medical information portal *+need of use of large volumes of information for the decision of medical tasks *enhancement of medical websites and creation medical online conferences #2 *!Subdividings on scope of information systems *systems of diagnosing *+decision making support systems *systems for carrying out difficult computation *systems of performing medical examinations *systems of laboratory clinical trials #3 *!The medical information system realizing the Salamatty Kazakhstan program *medical Medline system *medical information portal of "PubMed" *medical information system "Medialog" *+medical information system Paragraph "Medicine" *"Center of medical technologies and information systems" Kazakhstan way of 2050 #4 *!The main objective of medical information systems of basic level is *decision of medico-technological tasks *computerization of a medical equipment *+computer support of doctors' activity of different specialties *information support of doctors in case of consultation and diagnostics *information support of the state level of a health system #5 *!The main objective of information systems of treatment and prevention facilities *delivery of health care to the population *information support of scientific research *information support of certification operation *+information support of administrative processes of MPI *hardware and technical support of administrative processes of MPI #6 *!Signs of the clinical information description *sound *flavoring *color *integral *+qualitative #7 *!Medical information systems specialize *on provision of medicine news and MPI *on automation of jobs of a medical staff *at combining of databases of medical educational institutions *+on integration of administrative, medical and financial information *on provision of medical services to the population and provision of medical knowledge #8 *!In case of survey of the patient the attending physician does him notes *by phone *+out of chamber *as a reprimand *in chamber in the presence of patients *at a bed in the presence of patients #9 *!Who tells results of operation to relatives *nurse *+the operating doctor *the assisting doctor *manager of separation *service personnel #10 *!Debt of the health worker *to carry out public improving actions *a mandatory involvement in social actions *to carry out prevention and warning of diseases *+to participate in the actions directed to improvement of the nation *to provide without fail free medical care #11 *!Entity of medical instrumental and computer systems *system of diagnostics and decision-making *+computerization of a medical equipment *MIS for the decision of medico-technological tasks *automation of jobs of a medical staff *computer support of operation of doctors of different specialties #12 *!Determination of bank of information of health services *the system providing technical support of doctors *combining of all information flows in a single system *the basis containing information on the attached or observed contingent *+system of the workers and patients of MPI about qualitative and quantitative composition *the system containing data on qualitative and quantitative composition of principals of MPI