Aspects of the application of information and computer technologies in educational processes to assess their effectiveness in European universities. Requirements of European educational standards that affect the structure and methods of teaching.
Modern requirements for the athlete in game sports. The search for effective means and methods of teaching basketball. Creation of a computer system for accounting and analysis of training loads. Control over the level of physical fitness of the players.
In the scientific article, the author analyzed the time of illegal crossing of the Polish-Czechoslovak border by Ukrainians, the forms of participation of volunteers in the life of Carpathian Ukraine, and the number of people killed in confrontations.
The purpose of the this paper is to highlight the development of information- psychological warfare, its history, concepts, technologies and methods, which are one of the most important areas of work in the field of modern international relations.
The features of using information as a weapon in modern society. As of today, information legal relations are rapidly developing, which is due to scientific progress, the use of innovative technologies and the emergence of new information resources.
The importance of information competence as a necessary component of professional training of a modern foreign language teacher; as the ability of a teacher to work effectively with information, use information technologies to achieve educational goals.
- 667. Information competence formation in international medical students: motivation-targetive criterion
Determination of indicators of the level of information competence, which include cognitive interest in information activity, attitude to the acquisition of competence. Awareness of the need for lifelong learning, the desire to perceive new information.
Modern library activity as information engineering. Sorting, systematization, protection, promotion and use of information in the classical library. Introduction of modern information technologies for the formation, storage and use of library funds.
The relevance of the study is determined by the high risks of legalization of funds and financing of terrorism in the Ukrainian economy and the risks of conducting financial transactions related to states that carry out armed aggression against Ukraine.
The basis for effects of electromagnetic radiation on microorganisms. Specific effects on microorganisms by the Apparatus "KSK-BARS". The treatment of participants in space missions as an to antibacterial and antiviral therapy by non-pharmaceutic means.
- 671. Information Hiding
Steganographic communication with quantum information. Software integrity checking expressions for robust tamper detection. Exposing digital forgeries through specular highlights on the eye. Imaging sensor noise as digital X-ray for revealing forgeries.
Goals and characteristics of the areas of cognitive linguistics. Analysis of the interaction of the information subsystem of the language with other communication systems of the environment. Language unit as a type of information and virtual objects.
Shifting liability for trust. Literacy research. Feature of vertical and side reading. Impact of fake news on the audience. Using web search during a validation task. Applying of lateral reading by respondents with a high level of information literacy.
Suggestion information model of environment of computer-aided design, consisting of a сontrol processor, thematic coprocessors and executing processors. The scheme of processors control in the information model. Interaction of thematic coprocessors.
Theory and implementation on automatic adaptive metadata generation for image retrieval. Query optimisation as part of distribution design for complex value databases. Conceptual modelling and problem solving techniques for complex narrative events.
Research tasks for the modernization of the site of the enterprise. Determination of critical areas in the development of the enterprise as a diversified structure. Methodical support of high-tech business management in the field of information portal.
The use firewalls to create a demilitarized zone to protect the servers from unauthorized access. The versions of creation of virtual private networks that can combine some geographically distant networks in one network using global information space.
The role of intermediaries in search the information of private. Revealed to uninformed parties. Strategic manipulation of certification. The choice a monopoly intermediary. Capture a large share of the surplus. The competition among intermediaries.
Finding Boolean functions with maximum algebraic immunity based on univariate polynomial representation. Algebraic techniques in differential cryptanalysis revisited. An efficient rational secret sharing scheme based on the chinese remainder theorem.
The importance and role of information security in the context of ensuring the national security of the state. Analysis of the main threats to information security, such as cyber attacks, consideration of strategic approaches to their neutralization.
The structure of an information security program. Creation and implementation of policies and standards. Activity of federal sentencing guidelines for criminal convictions. System and network access control. Conducting a business impact analysis.
Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.
The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.
The tasks of information provision of public authorities. Role in securing the state apparatus of information management for the adoption and resolution of state, local and district current issues. Legal and informational aspects of the indicated issues.
The need for management decisions to ensure information security. Consideration of the comprehensive policy aimed at preventing and combating cybercrime. Implementation of the official line of information security in the context of digitalization.
Crypto applications of combinatorial group theory. Generating rooted trees of nodes uniformly at random. Designs, strongly regular graphs and codes constructed from some primitive groups. Quantum jump codes and some related combinatorial designs.
Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.
It was the determined that the definition of the management process, mode of operation and monitoring of the relevant industry is also relevant to the issue of information openness in the field of civil protection. The latter should be based on.
The category of "information space of controlling". Such an approach made it possible to identify the main centres of its production and specific features of different types of controlling information, their role in the process of enterprise management.
Comparison - a means to overload, confuse and puzzle the recipient in order to block easy ways to solve the riddle. Analysis of the main reasons for violation of the canonical principle of information structure in comparisons of old english riddles.