Information technology in our society
Universal device for the processing, transmission, exchange and storage of information. Role of computer in modern life. The spread of the Internet and its using in common life. Embodiment of achievements of modern information technologies in real life.
Подобные документы
- 101. The bias of the initial information flows intensities estimates of the global cyber-physical network
Forecasting the development of the statistical reporting network. Improving the accuracy of predicting the development of the Internet of things in the context of the dynamics of primary information flows. Deterministic models of mathematical programming.
статья, добавлен 07.09.2022 The development of the document "functional requirements" for an automated system of monitoring program execution in company related to oil industry. The process of implementation of information system. The importance of proper writing of such a paper.
статья, добавлен 13.02.2016Consideration of various information security standards in the Russian commercial organizations. Methods of data protection. Potential application of international standards in information security activities of the Russian commercial organization.
статья, добавлен 13.02.2016Вatch generation of web pages, local interaction. Non-linear structure: blocks of text, links between pages create a mesh or network, users follow their own path through information. Delivery technology: on the computer, on the web, on the move.
презентация, добавлен 28.12.2013Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.
статья, добавлен 29.09.2016This history on key moments of evolution electronic digital computer: the transformation of the computer from a specialized scientific instrument to a commercial product; the beginning of personal computing and the spread of networking after 1980s.
книга, добавлен 25.11.2013Методика формирования межкультурной компетенции на основе технологии трехмерной визуализации. Философский анализ понятия "виртуальная реальность". Обучение иностранным языкам в виртуальном мире, методические рекомендации по использованию SECOND LIFE.
статья, добавлен 11.05.2022Search for opportunities to ensure the security of the state in view of the formation of a new field of confrontation - cyberspace. Consideration of factors influencing the country's cybersecurity situation and protection of information objects.
статья, добавлен 18.09.2020Building a full map of the mental activity of the human brain. Various sensors detect the pressure pulses, temperature. Mind reading machine - a coordination of human psychology and computer techniques. Extract safe and confidential information.
презентация, добавлен 30.05.2015Basic protocols and Internet search them. Search Tools in WWW. Thematic catalogs. Characteristics of automatic indexes. World Wide Web Worm. Review of Russian search engines. Features search through directories and search engines in a pure form.
реферат, добавлен 30.06.2014Cyberspace as a medium through which people engage in more complex processes. The history and development of information security principles in the World Wide Web, an assessment of their effectiveness in practice, the prospects for further development.
реферат, добавлен 24.03.2015- 112. The computer technology of expert rules constraction for the technical objects diagnosis systems
Description of the methods of organizing expert rules for the diagnosis of electrical machines using and without expert information. Correction of rules according to the results of causal observations. Using the intellectual potential of an expert.
статья, добавлен 18.11.2018 Analysis of the model of dynamic classification software applications included in the business critical systems for security access. Information technology, allowing to distinguish three basic classes of safety-critical access software applications.
статья, добавлен 22.12.2016- 114. Anonymous
Usage of the term Anonymous on imagebords, particularly the board of chan, dedicated to random content. Idea of exposing corruption within the system. Limiting information and enlarging author rights. Hacked many oil companies servers in order.
презентация, добавлен 19.12.2014 An integrated approach to the study of different kinds of virus attacks that are launched against wireless networks and computer systems. Characteristics of certificate programs provide protective mechanisms and practical tools for information security.
книга, добавлен 08.03.2014Investigation of a person's ability to work with information. Study of the neural executive mechanisms of the brain. Creation of a multicomponent model of short-term memory of Russian students, the development of their creative and intellectual abilities.
статья, добавлен 07.04.2021The possibilities of the MS Excel spreadsheet processing system for visualization of large data sets in an easy-to-understand form. Development of tools for practical implementation for visualization of large data arrays by selecting the required range.
статья, добавлен 29.09.2023Analysis of data mining systems, development of document management systems. Development of an integrated system for intelligent information analysis. A model for using various statistical data of any format in the source of a digital organization.
статья, добавлен 01.02.2024Problems of security of biometric authentication systems and analysis of the author's approach to increasing their reliability. Features and conditions of use of these systems for the security of information resources, their advantages and disadvantages.
статья, добавлен 06.05.2018Explanation of theoretical insights between Boolean logic and modern Boolean logic. An additional method of investigation is the demonstration of the role of Boolean logic in informatics through the development of a design scheme and cryptography.
статья, добавлен 17.12.2022Theoretical information on personal computers, the structure of Windows XP as the operating system. Examples of projects in C ++ Builder to calculate complex mathematical formulas and solving problems with the branch. Programming in C ++ Builder.
методичка, добавлен 11.10.2014The challenges of supply chain, which can be solved using Internet of Things technologies. The use of IoT devices makes it possible to reduce costs caused by processes which involve a high amount of involved actors in transportation and tracking of goods.
дипломная работа, добавлен 27.08.2016- 123. Computer networks
Internet multimedia: media element such as sound, animation and video. File transfers: downloading (process of transferring the file from remote computer to your computer) and uploading (sending a copy of files from your computer to remote computer).
лекция, добавлен 15.04.2014 Analysis on the Geographic Information System. Monitoring of the environment in the vicinity of the airport. Modeling control air pollution, noise. Operation of aircraft in the conditions of the implementation of intelligent transport management systems.
статья, добавлен 12.08.2016The study and practice information Illustration of simple cipher. Cryptography as to encryption, the process of converting ordinary information into unintelligible gibberish. Decryption is the reverse, moving from unintelligible ciphertext to plaintext.
книга, добавлен 08.03.2014