MEBIK test Fundamentals of State and Municipal Administ

  • USD
    • RUB
    • USD
    • EUR
Affiliates: 0,48 $how to earn
i agree with "Terms for Customers"
Sold: 0
Uploaded: 08.04.2020
Content: Информационные технологии в управлении человеческими ресурсами.doc 501,5 kB

Product description

(some test questions suggest a few correct answers)

Information about the world that reduces the existing degree of uncertainty, incompleteness of knowledge, alienated from its creator - this ...

a. knowledge;
b. information; in. data;
d. signals.

The process of saturation of production and all spheres of life and human activity with information:

a. informatization; b. computerization; in. automation;
d. globalization.

The set of documents drawn up according to uniform rules is called:

a. document flow; b. documentation;
in. information; d. data.

The supporting subsystems of an automated information system do not include:

a. Information Support; b. software;
in. support software; d. technical support.

A subjective indicator characterizing the measure of sufficiency of the evaluated information for solving objective problems:

a. completeness of information; b. tolerance;
in. relevance; d. reliability.
A system of means and methods for collecting, transmitting, accumulating, processing, storing, presenting and using information:

a. information process;
b. information technology; in. Information system;
d. information activities.

Information technology refers to operations performed with information:

a. only using computer equipment; b. on a paper basis only;
in. both automated and traditional paper operations; d. only automated operations.

An automated information system (AIS) providing information support for the targeted collective activity of an enterprise is:

a. AIS process control; b. AIS personnel management;
in. local AIS;
Corporate AIS.

Type of handwritten signature analogue, which is a means of protecting information:

a. password;
b. authorization; in. cipher;
d. electronic digital signature.
Legal methods for protecting programs and databases include ... a. licensing agreements and contracts;
b. hardware (electronic) keys;
in. password protection of programs at their launch; d. antivirus programs.

Software tools protect information on computer host carriers ...

a. using encryption (cryptography); b. physical barrage method;

in. using security alarm; using pate


1 month 3 months 12 months
0 0 0
0 0 0
In order to counter copyright infringement and property rights, we ask you to immediately inform us at the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)

This website uses cookies to provide a more effective user experience. See our Cookie policy for details.