Information and communication technologies for professionals

Replenishment date: 06.11.2023
Contents: Information and communication technologies for professional activities.docx (40.22 KB)
️Automatic issue of goods ✔️
Sales:
10
Refunds:
1
Reviews:
0
Views:
543
Seller
Seller:
alevtina_sar
Rating:
3,21
Ask a Question
Report a violation
Description
You have a need to implement a DBMS in your enterprise. To simplify the consolidation of reporting in electronic format. Which of the following programs will allow you to create and manage a database of company activities (if you have the appropriate equipment)
You have received a message to your work email containing information that you have won a large sum in the lottery. However, you don’t remember buying lottery tickets. What would be the correct sequence of actions?
You need to fill out a sales report in MS Excel. In the columns of the spreadsheet you have the following information: A - name of the product B - number of goods sold in pieces C - cost of one product when selling D - purchase cost of one product You need to enter in column G a formula that will calculate how much profit (fixed costs and the tax burden is not taken into account in this report) brought by each item (consider that you are entering the formula in cell G2:
You need to fill out a report on the occupancy of full-time positions in MS Excel. In the columns of the spreadsheet you have the following information: A – position name B – number of staffing units C – number of vacant units You need to enter in column D a formula that will calculate the percentage of staff currently filled for each position. (think of yourself as entering the formula in cell D2):
You have a need to implement a DBMS in your enterprise. To simplify the consolidation of reporting in electronic format. Which of the following programs will allow you to create and manage a database of company activities (if you have the appropriate equipment)
You have received a message to your work email containing information that you have won a large sum in the lottery. However, you don’t remember buying lottery tickets. What would be the correct sequence of actions?
A large company leaked data from clients it served. The data itself was not damaged, and additional measures were taken to protect it to prevent this from happening in the future, but the company’s reputation was damaged, and all customer contact information is now known to the attacker. What type of threat is the company facing?
The employee’s initial training at the enterprise has been completed, and he begins to perform his first tasks at the enterprise. He has been tested and is fully familiar with all the necessary regulatory documents. However, senior colleagues still continue to advise him on some issues and share their professional experience with him. What type of knowledge does the employee receive as part of this interaction?
It is necessary to implement an information system in the enterprise. After consulting with an information systems implementation specialist, you received information that. Based on the current technical availability, it would be most logical to use a client-server information system. It means that:
You need to fill out a sales report in MS Excel. In the columns of the spreadsheet you have the following information: A - name of the product B - number of goods sold in pieces C - cost of one product when selling D - purchase cost of one product You need to enter in column G a formula that will calculate how much profit (fixed costs and the tax burden is not taken into account in this report) brought by each item (consider that you are entering the formula in cell G2:
You need to fill out a report on the occupancy of full-time positions in MS Excel. In the columns of the spreadsheet you have the following information: A – position name B – number of staffing units C – number of vacant units You need to enter in column D a formula that will calculate the percentage of staff currently filled for each position. (think of yourself as entering the formula in cell D2):
You have a need to implement a DBMS in your enterprise. To simplify reporting consolidation
Additional Information
A large company leaked data from clients it served. The data itself was not damaged, and additional measures were taken to protect it to prevent this from happening in the future, but the company’s reputation was damaged, and all customer contact information is now known to the attacker. What type of threat is the company facing?
... is a set of sequential actions performed on information to obtain a result
Establish a correspondence between the principles of information technology and their characteristics:
Establish the correct sequence of actions of information processes:
Match the type of information with its definition:
... is the ability of society to effectively use information resources and means of information communications.
Personal interaction between ... and the applicant is minimized through maximum use of information technology
Place the stages of information processing in the correct order:
Match the file extension with the program designed to process it:
Text information processing technology includes three methods, such as: ...
... is a function in MS Word that allows you to combine two or more separate documents into one document.
An MS Excel file that contains one or more sheets for organizing data is called...
Match the spreadsheet functions with their names:
Put the elements of the formula for MS Excel in the correct sequence:
Arrange the levels of the three-level database organization system in ascending order (from first to third):
... is a search engine that aggregates and displays search results from multiple search engines simultaneously.
Establish a correspondence between search types and their purpose:
Match interface elements with their definitions:
... is a flexible document search tool that uses known document details and keywords.
... – these technologies are used to transmit information using electronic communications; they are currently based on computer technology
... are specialized programs for detecting computer viruses or unwanted, malicious programs.
... is a potential opportunity to violate information security in a certain way.
Technologies related to telecommunications include: ... (list 3 answer options)
...bombs are a type of malware that only activate under a certain condition.
Match the types of threats with their descriptions:
Establish a correspondence between the state of information and its definition:
List the definitions in the correct order. Phishing, Cryptography, Spam,
Similar items
Information and communication technologies of the state
Seller:
alevtina_sar
Rating:
3,21
Sales:
2
price:
2,72 $
Information and analytical systems
Seller:
alevtina_sar
Rating:
3,21
Sales:
0
price:
3,27 $
Management in information and communication technologies
Seller:
alevtina_sar
Rating:
3,21
Sales:
3
price:
5,45 $
Modern HR technologies
Seller:
alevtina_sar
Rating:
3,21
Sales:
0
price:
3,81 $
Information Technology
Seller:
alevtina_sar
Rating:
3,21
Sales:
4
price:
0,87 $