В разделе материалов: 28
Показано материалов: 11-20
Blockchain technology
11.1.2.6 explain the function and operation of Blockchain technologies |
Validation & Verification
- Validation
- Validation methods
- Verification
- Verification methods
- Questions
- Exercises
- Exam questions
11.1.2.5 explain the difference between the terms verification and validation
|
Портал электронного правительства EGOV.KZ
- Определение/Definition
- Как получить ЭЦП
- Как получить услугу на портале
- Упражнения
12.1.3.7 use E-gov resourses |
Password
- Definition
- How to create a complex password
|
Malware
- Definition
- Signs of a computer infection
- The methods of infection used by cybercriminals.
- Types of malware
- Questions
- Exercises
- Exam questions
12.1.3.2 analyze problems arising due to malware |
Hacking & Cracking
12.1.3.1 analyse ethical problems arising due to computer system cracking |
Data backup and disk mirroring
- Data backup definition
- Advantages and diadvantages of using data backup
- Two types of backup
- How can I back up my files?
- Disk mirroring definition
- Advantages and diadvantages of using disk mirroring
- Questions
- Exercises
- Exam questions
11.1.2.3 describe data protection measures such as data backup and disk mirroring
12.1.2.2 use data protection measures such as data backup and disk mirroring |
Copyright
- Definition
- Copyright may apply to the results of intellectual creative activity
- International copyright protection
- Questions
- Exercises
- Exam questions
12.1.3.6 name copyright protection rules |
Plagiarism and antiplagiarism resources
- Definition
- How should candidates reference their sources?
- Antiplagiarism
- How do plagiarism detection tools work?
- Antiplagiarism resources
- Questions
- Exercises
- Exam questions
12.1.3.5 check documents using antiplagiarism resources |
Небольшая статья о том, какие меры можно принять, чтобы снизить риски при работе в глобальной сети.
|