MEBIK test Fundamentals of State and Municipal Administ

Reviews 0
0 000 X
There are no such quantities in stock
By clicking the button, you agree to terms for buyers
Secure deal
Instant delivery

Product description

Test
(some test questions suggest a few correct answers)

Information about the world that reduces the existing degree of uncertainty, incompleteness of knowledge, alienated from its creator - this ...

a. knowledge;
b. information; in. data;
d. signals.

The process of saturation of production and all spheres of life and human activity with information:

a. informatization; b. computerization; in. automation;
d. globalization.

The set of documents drawn up according to uniform rules is called:

a. document flow; b. documentation;
in. information; d. data.

The supporting subsystems of an automated information system do not include:

a. Information Support; b. software;
in. support software; d. technical support.

A subjective indicator characterizing the measure of sufficiency of the evaluated information for solving objective problems:

a. completeness of information; b. tolerance;
in. relevance; d. reliability.
A system of means and methods for collecting, transmitting, accumulating, processing, storing, presenting and using information:

a. information process;
b. information technology; in. Information system;
d. information activities.

Information technology refers to operations performed with information:

a. only using computer equipment; b. on a paper basis only;
in. both automated and traditional paper operations; d. only automated operations.

An automated information system (AIS) providing information support for the targeted collective activity of an enterprise is:

a. AIS process control; b. AIS personnel management;
in. local AIS;
Corporate AIS.

Type of handwritten signature analogue, which is a means of protecting information:

a. password;
b. authorization; in. cipher;
d. electronic digital signature.
Legal methods for protecting programs and databases include ... a. licensing agreements and contracts;
b. hardware (electronic) keys;
in. password protection of programs at their launch; d. antivirus programs.

Software tools protect information on computer host carriers ...

a. using encryption (cryptography); b. physical barrage method;

in. using security alarm; using pate

Main features

  • Content type File
  • Content description 501,5 kB
  • Added to the site 08.04.2020

Reviews

No reviews yet

0 000 X
There are no such quantities in stock
By clicking the button, you agree to terms for buyers
MEBIK test Fundamentals of State and Municipal Administ
0 000 X
Secure deal
Instant delivery

You viewed