Content: Информационные технологии в управлении человеческими ресурсами.doc (501.50 KB)
Uploaded: 08.04.2020

Positive responses: 0
Negative responses: 0

Sold: 0
Refunds: 0

$2.86
Test
(some test questions suggest a few correct answers)

Information about the world that reduces the existing degree of uncertainty, incompleteness of knowledge, alienated from its creator - this ...

a. knowledge;
b. information; in. data;
d. signals.

The process of saturation of production and all spheres of life and human activity with information:

a. informatization; b. computerization; in. automation;
d. globalization.

The set of documents drawn up according to uniform rules is called:

a. document flow; b. documentation;
in. information; d. data.

The supporting subsystems of an automated information system do not include:

a. Information Support; b. software;
in. support software; d. technical support.

A subjective indicator characterizing the measure of sufficiency of the evaluated information for solving objective problems:

a. completeness of information; b. tolerance;
in. relevance; d. reliability.
A system of means and methods for collecting, transmitting, accumulating, processing, storing, presenting and using information:

a. information process;
b. information technology; in. Information system;
d. information activities.

Information technology refers to operations performed with information:

a. only using computer equipment; b. on a paper basis only;
in. both automated and traditional paper operations; d. only automated operations.

An automated information system (AIS) providing information support for the targeted collective activity of an enterprise is:

a. AIS process control; b. AIS personnel management;
in. local AIS;
Corporate AIS.

Type of handwritten signature analogue, which is a means of protecting information:

a. password;
b. authorization; in. cipher;
d. electronic digital signature.
Legal methods for protecting programs and databases include ... a. licensing agreements and contracts;
b. hardware (electronic) keys;
in. password protection of programs at their launch; d. antivirus programs.

Software tools protect information on computer host carriers ...

a. using encryption (cryptography); b. physical barrage method;

in. using security alarm; using pate
No feedback yet