???????? ????????? ??????????? ?????????? ?? ?????? ?????????? ??????????????? ????????????? (BIM-??????????)
???????????? ???????? ?????? Building information modeling, ?????? ???????????? ??????? ??????? ??? ???????? ?? ????? ??????????. ?????????????? ?????? ? ????????? ??????????? Building information modeling, ?????????????? ?? ????????????? ????????.
Подобные документы
The concept of e-learning, its advantages, flexibility of time and place in comparison with formal learning. Creation of a hybrid information system that integrates computer vision and machine learning technologies for visual and interactive systems.
??????, добавлен 10.05.2018Problems of security of biometric authentication systems and analysis of the author's approach to increasing their reliability. Features and conditions of use of these systems for the security of information resources, their advantages and disadvantages.
??????, добавлен 06.05.2018Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.
???????????? ??????, добавлен 17.03.2016Components, priority areas for capital investment in the information and communication technologies market were determined. The relativity of relationship between the placement of supercomputers in the countries and their level of innovation was revealed.
??????, добавлен 28.12.2017- 105. CompTIA Security+
Familiarity with the basics of computer science and computer security. CompTIA Security + as an international, independent of vendor certification for information security professionals. General characteristics of the functions of the data-link layer.
?????, добавлен 08.03.2014 Implementing IT technologies in university libraries of Ukraine in the context of foreign experience. The retrospective of development of library information systems and problematic issues related to the transition of library staff to work with them.
??????, добавлен 13.04.2023The main peripheral and internal devices of the personal computer. Purpose mouse, keyboard and joystick. Recording information of the disk drive to the hard drive. Sound media files. Scan and copy documents. Types of monitors, projectors and speakers.
???????????, добавлен 13.09.2015Computer science as the theory of representation, processing and use of the information, main directions of development of science, its subject, ikomponenty. Properties and coding information. Rules of conversion from binary to decimal number system.
???????????, добавлен 18.11.2015The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.
???????, добавлен 20.03.2016Fake news and motives for their spread on the Internet. Fake news as one of the tools of warfare using information technology, a growing threat to the internal governance of the country or the destruction of its external and international relations.
??????, добавлен 21.01.2022The study and practice information Illustration of simple cipher. Cryptography as to encryption, the process of converting ordinary information into unintelligible gibberish. Decryption is the reverse, moving from unintelligible ciphertext to plaintext.
?????, добавлен 08.03.2014Learning English for working with the computer and other information technology. Working with computer programs, discussion of problems and project planning. Use for intermediate level students and above. Using software: useful verbs, the control panel.
??????? ???????, добавлен 28.05.2015- 113. Providing access to information systems of higher education in the case of loss of key information
Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.
??????, добавлен 06.05.2018 The problem of information and communication technologies and electronic learning tools and their impact on student achievement is considered. Subjects related to the use of technology in performing tasks with the help of a computer are described.
??????, добавлен 24.08.2022Consideration of methods of information coding. Use of coded pages for the improvement of design objects. Study of the functional purpose of barcode and QR-code. Analysis of the engineering sequence of the artistic and graphic process of code creation.
??????, добавлен 03.07.2023Reducing the amount of required memory, reducing the time for data processing and reducing the number of copies of documents when updating information in the automation process. Analysis of the choice of technologies for application development.
??????, добавлен 31.08.2022The study of the sequence of stages of reconstruction of graphical images on a computer using decoding dual vectors of the tuple. Decoding code values in software components. Ways of coding information. Methods of the decrypting computer codes cost.
??????, добавлен 25.03.2016Statistics increase in the total amount of information. Creating a storage cloud. Key features of its use. Consideration of the main advantages and disadvantages. Characteristic encryption and data protection. Recommendations file protection in the cloud.
???????????? ??????, добавлен 29.11.2014Concept and prototype for an "assembling" IT intergration portal to be used in higher education. Solution, to use Elgg as an information portal and social media platform. The gap between the closed nature of university IT infrastructure and user-friendly.
??????, добавлен 30.08.2016The description of the mechanisms of learning and assessment of the quality of the classifier of the developed system of the automated processing of large amounts of information. The classifier based on the LibSVM library and the support vector machine.
??????, добавлен 25.12.2016The basic ways of education informatization are examined; the requirements for educational ICT and presented. The basic information technologies used in the teaching process are summarized: interactive; computer-based learning; telecommunication means.
??????, добавлен 04.10.2022Development of software and algorithm of the information system for monitoring fires. Possibilities detecting fire from sensor, predicting its spread and assessing the source of ignition. Realization of information through sound and visual signals.
??????, добавлен 22.12.2016Review digital communication and traditional computer-based technologies. The European Telecommunications Standards Institute. Computer and network hardware and software. Features of use of information and communication technologies in modern society.
???????????, добавлен 06.02.2017Tools for Security and Insecurity. Unbiasing a Biased Coin. Combining Weak Sources of Entropy. Pseudorandom Number Generators. Random Permutation Generation. Sound Approach to Random Number Generation and Use. Computationally Secure Information Stealing.
?????, добавлен 08.03.2014The Internet as a revolutionary phenomenon that enables millions of individuals across the globe to access, exchange and create vast amounts of information. The Internet as a practical problem. A new means for empowerment. A new form of oppression.
??????, добавлен 15.06.2012