Perception of information transmitted through means of communication technologies by the component elements
Study of the influence of communication technologies on the emotional and mental state of a person. Regularities of the relationship between the sender and the recipient of information. The role of language, text and virtual figures in intercourse.
Подобные документы
The concept features and nature of IT piracy and effect of information society on the emergence and spread of piracy on the Internet. Problems of the spread and speed of persistent violations, commission of acts of piracy, plagiarism in the Internet.
статья, добавлен 08.05.2018Description of technology of off-wire computer networks with the productivity 100 Mb/s in the point of output and maintenance of information. Description of parameters of middle access and determination of multiple entrance. Physical layer, radio, WLAN.
методичка, добавлен 10.08.2011- 103. Microsoft Word
Information about Microsoft Word, the application and purpose of the program. The features and functions of Microsoft Word. Characteristics of the main tools for creating lists, copying and moving sections of text. Text formatting, parameter control.
доклад, добавлен 09.03.2018 The development of the document "functional requirements" for an automated system of monitoring program execution in company related to oil industry. The process of implementation of information system. The importance of proper writing of such a paper.
статья, добавлен 13.02.2016The problem of digital inequality, imbalance in the use of digital technologies in the public sector at central and local levels is analyzed. Features of intellectual communication of power and society in the context of global informatization in Ukraine.
статья, добавлен 19.02.2021This book introduces ssl and tls, and provides the essential context for both. Web security and electronic commerce and creation of ssl. History of ssl and its transformation into tls. The relationship of ssl to other network security technologies.
книга, добавлен 08.03.2014Consideration of various information security standards in the Russian commercial organizations. Methods of data protection. Potential application of international standards in information security activities of the Russian commercial organization.
статья, добавлен 13.02.2016Designing technological processes for information support for decision-making in integrated modular avionics for modern aircraft is a complex multi-stage procedure. The implementation of which involves the cooperation of aviation industry enterprises.
статья, добавлен 11.07.2022The phenomenon of virtual reality, as a tool of achieving interactive behavior in architecture and built environment. Various possibilities for improving the quality of environment and space, both real and existing only within alternative perception.
статья, добавлен 30.07.2018One Useful Logic That Defines Its Own Truth. On Synchronous and Asynchronous Interaction in Distributed Systems. A Robust Class of Regular Languages. Deterministic Models of Communication Faults. The Maximum Independent Set Problem in Planar Graphs.
книга, добавлен 08.03.2014Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.
статья, добавлен 29.09.2016The choice of technologies for application development as an stage. The importance of the correct selection of a combination of technologies in ensuring comfortable work in the future at all stages of the program's existence. Scalable technology stack.
статья, добавлен 11.07.2022A flexible system troubleshooting and emergency operation of stepwise refinement priori probability. Ensuring reliability recognition of failure. Automatic search of breaks with step-by-step variations of parameters of tests in communication systems.
статья, добавлен 30.07.2016FSMs are widely used in various application domains such as telecommunication systems, communication protocols and other systems. Existence of a separating sequence of two FSMs depends on the number of nondeterministic transitions in these FSMs.
реферат, добавлен 20.08.2010Результаты сотрудничества компаний GEFCO и XJ Technologies в сфере логического моделирования. Применение современного метода имитационного моделирования. Направления деятельности GEFCO. Комплекс имитационных моделей обслуживания компании General Motors.
статья, добавлен 09.09.2012A concentrator intended for collect and processing signals of the origin of fire from different sensors is developed. Information from the sensors is transmitted through the system of main and remote concentrators to the fire extinguishing system.
статья, добавлен 21.06.2016Faster explicit formulas for computing pairings over ordinary curves. Secure authentication from a weak key, without leaking information. Towards a game theoretic view of secure computation. Concurrent composition in the bounded quantum storage model.
книга, добавлен 08.03.2014Cyberspace as a medium through which people engage in more complex processes. The history and development of information security principles in the World Wide Web, an assessment of their effectiveness in practice, the prospects for further development.
реферат, добавлен 24.03.2015The Internet - a global association of computer networks. E-mail - system for sending messages between users. Guaranteeing the flow of information between customers, establishment of a virtual connection - the tasks of Transmission Control Protocol.
контрольная работа, добавлен 20.05.2016- 120. Anonymous
Usage of the term Anonymous on imagebords, particularly the board of chan, dedicated to random content. Idea of exposing corruption within the system. Limiting information and enlarging author rights. Hacked many oil companies servers in order.
презентация, добавлен 19.12.2014 A comprehensive study of the suitability of computerized virtual clothing modeling programs for the development of models of men's climbing pants. Comparative methods of virtual dressing, determination of pressure points, assessment of appearance.
статья, добавлен 05.04.2023Peculiarities of the reception of the figure of M. Hrushevsky in cyberspace, the frequency of searching for information about him in the search engine Google, in the largest digital encyclopedia Wikipedia. Analysis of requests regarding M. Hrushevskyi.
статья, добавлен 28.07.2023The recent application of the principles of quantum mechanics to cryptography. Now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a guarantee of no eavesdropping.
учебное пособие, добавлен 15.09.2012The terminology and requirements for safe, reliable operation of critical IT infrastructure were defined. The generalized structure of critical information technology infrastructure, by its basic level, sub levels and functionality were described.
статья, добавлен 07.12.2016The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.
статья, добавлен 15.04.2024