Визирование рпд для исполнения в очередном учебном году


Скачать 0.68 Mb.
Название Визирование рпд для исполнения в очередном учебном году
страница 5/9
Тип Документы
rykovodstvo.ru > Руководство эксплуатация > Документы
1   2   3   4   5   6   7   8   9

Модуль 5.

Прочитайте текст и письменно переведите его на русский язык. Прореферируйте текст на английском языке.

Information

a. State informational sources

Formation of state informational sources is carried out by citizens, state authorities, organizations and social unions. Documents, which belong to a person, can be included in the state structure of informational sources, of course, if the person wishes. State informational sources are open and generally available. Documented information with limited access is divided into state secret and confidential information.

b. Citizen information (personal information)

Personal data refers to confidential information. The collection, storage, use and distribution of private information are not allowed. The information, which breaks personal and family secret, secret of correspondence, telephone, postal, telegraph talks and other messages of a person without his/her permission, is also confidential

Personal data may not be used with purpose of causing damage to person's property and reputation, difficulties of realization its right. Collected data must be limited to necessary information. The information, which carries strong probability of causing damage to a citizen's interests shouldn't be collected.

There are some categories of personal information:

• secret documents;

• official department rules and instructions;

• information, which is not to be made public in accordance with legislative acts;

• confidential business information;

• information, which touches private life of a person;

• information of financial institutions.

c. Development and production of informational systems

All types of informational systems and networks, technologies and means of their providing compose a special branch of economic activity, whose development is defined by the state scientific, technological and industrial policy of informatization.

State and non-state organizations and, of course, the citizens have equal rights in terms of access to the development and producing of informational systems, technologies.

Owner of informational systems

The informational systems, technologies and means of their providing can be the property objects of juridical person, non-juridical person and state. The owner of informational system is a person, who purchased these objects or got as a gift, heredity or by any other legal way.

The informational systems, technologies and means of their providing can be considered as a good (product), if the producer rights are not broken. The owner of informational system determines the using conditions of this product.

Copyrights and property rights

Copyrights and property rights on informational systems, technologies and means of their providing can be belong to different persons. The owner of informational systems has to protect copyrights in accordance with legislation.

Informational systems and databases, intended for citizens' and organizations' in formational service, are subjected to certification according to the established custom.

The organizations, which work in the field of making design, producing the means of information protection and personal data treatment, must obtain licensees to conduct such activity. The steps for obtaining license are defined by the legislation.
Модуль 6.

Прочитайте текст и переведите его письменно на русский язык. Прореферируйте текст на английском языке.
Computer systems and protection of information

a. Problem of information protection

The problem of information security is relatively new. Not all problems, connected with it have been figured out and solved up to now. The fact of great number of computer systems users means the definite risk to security because not all clients will carry out the requirements of its providing.

The order of storage mediums should be clearly defined in legal acts and en-visage the complete safety of mediums, control over the work with information, responsibility for unsanctioned access to mediums with a purpose of copying, changing or destroying them and so on.

b. legal aspects

There are some legal aspects of information protection, which can appear due to not carefully thought or ill-intentioned use of computer technics:

• legal questions of protection of informational massifs from distortions;

• security of stored information from the unsanctioned access;

• setting juridical fixed rules and methods of copyrights protection and priorities of software producers;

• development of measures for providing the juridical power to the documents, which are given to the machines;

• legal protection of the experts' interests, who pass their knowledge to the databases;

» setting of legal norms and juridical responsibility for using electronic computer means in personal interests, which hurt other people and social interests and can harm them. The lack of appropriate registration and control, low level of work and production personnel discipline, the access of an unauthorized persons to the computing sources create conditions for abusing and cause difficulties to their detection. In every computing center it is usual to set and strictly follow the regulations of the access to different official rooms for employees of any categories.

c. Purposes

The main purpose of information protection is preventing from the leak, theft, distortion, counterfeit of information; preventing the threat to person's life and social safety, protection of the constitution and so on. The information is subjected to protection, when it may cause the harm for its owner, user or other person.

Computer crimes

a. Definition

The development of computer technology and its wide use have lead to appearance and spread of computer crimes. Such situation causes alarm among those organizations and legislative institutions that use computer technologies and, of course, people, who use new informational services at homes.

The term "computer crime" was first used in the early 70s. However, the discussions concerning it are still actual. The top question of these discussions is "What unlawful actions are implied by computer crime". A rank of definitions of the computer crime has been composed. It often refers to crimes directly or indirectly connected to electronic computing machines and which includes a number of illegal acts, committed by means of electronic data processing system or against it. Others consider that computer crime is any action, which goes together with interfering with property rights and fulfilled by means of computers. The thirds think that computer crime can be defined as all intentional and unlawful actions, which lead to causing harm to possessions, with help of computers too.

b. Statistics

There are following forms of computer criminality: computer manipulations, economic espionage, sabotage, computer extortion, "hackers" activity. The main character of committing computer crimes in the business field becomes highly qualified "white collars" from the suffered organization's employees.

According to the MIS Traiding Institute (USA), they get 63 % of all causes, examining crimes and abuses. More than 36 % of law-committing employees are related to the personnel, which is not connected with computer servicing, 29 % - qualified programmers, 25 % - other workers of computing center. This tendency is reflected in official statistics too, according to which, about 40 % of computer crimes are committed for solving of financial problems, 20 % are motivated as an intellectual challenge to society, 17 % - by the willing of solving personal problems, 8 % - problems of corporation or organization, 4 % - are directed for social admitting, 3 % - for wounding somebody's rights and so on.

c. "Hackers" and "crackers"

The most dangerous individuals of computer swindle are so called "hackers", "crackers" and representatives of other groups, working in the sphere of industrial espionage. So, many security specialists advise employers to pay special attention to engaged workers-specialists in computer technologies, programming and information protection spheres.
Критерии оценки: 

 

  • оценка «отлично» выставляется студенту, если перевод выполнен полностью, оформлен стилистически верно, исходная информация передана полностью и правильно, перевод оформлен в соответствии с грамматическими и синтаксическими правилами русского/ английского языка; 

  • оценка «хорошо» выставляется студенту, если перевод выполнен полностью, оформлен в целом стилистически верно, однако допущены отдельные стилистические неточности; большая часть исходной информации передана верно, перевод оформлен в соответствии с грамматическими и синтаксическими правилами с допущением некоторых неточностей; 

  • оценка «удовлетворительно» выставляется студенту, если перевод выполнен частично, допущены некоторые стилистические неточности и погрешности, исходная информация передана лишь частично и с искажениями, также допущены грамматические и синтаксические неточности; 

  • оценка «неудовлетворительно» выставляется студенту, если перевод выполнен частично, допущены значительные стилистические неточности и погрешности; исходная информация передана частично и со значительными искажениями, также допущены существенные грамматические и синтаксические ошибки; либо отказ от выполнения перевода.



Составитель ________________________ Н.В. Рачинская

(подпись)
«24» апреля 2017 г. 

 

Министерство образования и науки Российской Федерации

Федеральное государственное бюджетное образовательное учреждение высшего образования

«Ростовский государственный экономический университет (РИНХ)»
Кафедра иностранных языков для гуманитарных специальностей
Тесты письменные
по дисциплине  Б1.Б.3 Иностранный язык



1. Банк тестов по модулям

Модуль 1.

1. Because they are relatively durable and portable, books for ___ centuries to preserve and distribute information.

A are used

B are being used

C are been using

D have been used

2. They ___ married for seven years when their first son

A have been, was born

B had been, was born

C had been, had been born

D were, had been born

3. Unless special actions ___ , the case ___.

A won't be taken, will be lost

B will be taken, is lost

C are taken, will be lost

D aren't taken, is lost

4. The first English colony in North America ___ by the

Pilgrims, who ___ from the English city of Plymouth

in the Mayflower and ___ in Massachusetts Bay in 1620.

A was founded, had sailed, had landed

B was found, sailed, landed

C had been found, sailed, landed

D was founded, sailed, landed

5. He ___ to make enemies as his business ___ and he ___ more powerful.

A began, was developing, was growing

B had begun, is developing, is growing

C has begun, had developed, had grown

D was beginning, developed, grew

6. Dictionary-making, since computers ___ the routine out of it, ___ fun.

A have taken, has been becoming

B had taken, has become

C took, has become

D are taking, had become

7. We ___to give refunds on articles of clothing that .

A can't, have been worn

B are unable, are wearing

C can't, are being worn

D are unable, have been worn

8. I felt I ___ , but there was nobody in the sight.

A had watched

B was watched

C was being watched

D had been watching

9. Look at him! He ___the same clothes for years.

A wears

B has been wearing

C had worn

D had been wearing

10. Coal plants __ one of the worst industrial polluters

since the Industrial Revolution ___ in the 19th century.

A had been, began

B were, had begun

C have been, began

D were, have begun

11. Rapid changes in technology in the last several decades ___ the nature of culture and cultural exchange.

A changed

B have changed

C had changed

D change

12. The train ___ just as he ___ the station.

A came, reached

B had come, reached

C came, had reached

D has come, reached

13. He has said that ___ me if I ___ easily to do it by myself.

A would not help, was able

B would not help, would be able

C will not help, am able

D will not help, will be able

14. I think we ___ it on the shelf for Daddy to see when he ___ home from work.

A will put, will come

B will put, comes

C put, comes

D put, will come

15. All the way home he ___ his tactics; how ___ the news to her, how in puzzles until she ___ him to' let her have the whole story.

A had been planning, would he break, would he speak, asked

B was planning, would he break, would he speak, would ask

C had been planning, he would break, he would speak, asked

D was planning, he would break, he would speak, would ask

16. The afternoon was the longest Grace ___ . She ___ for Tom.

A ever knew, was waiting

B had ever known, was waiting

C ever knew, was expecting

D had ever known, was expecting

17. Every year for sixteen years, since Ted ___ three and Caroline one, it ___ the Christmas Eve custom of the Carters' to hang up their children's stockings and fill them with inexpensive toys.

A was, was

C had been, was

B was, had been

D had been, had been

18. How ___ the citizens of Babylon or Ur actually ___ their bills, however, depended on who ___ .

A did, pay, were they

B ___, paid, they were

C did, pay, they were

D ___, paid, were they
Модуль 2.


  1. ……. characterizes the process of leading and directing all or part of an organization, often a business.

a) management b) finance c)planning

  1. Management is directed through the deployment and …… of resources (human, financial, material, etc.)

a) acceptance b) manipulation c)measuring

  1. A governing body is a term used to describe a group formed to …… an organization, such as sports league.

a) manage b) plan c) control

  1. Modern management as a discipline began as an off-shoot of …… in the 19 century.

a) accounting b) esthetics c) economics

  1. When you become a manager, you have the authority to make a huge impact upon the way in which your …… work.

a) crew b) staff c) league

  1. The manager has the …… to acquire things which no one else in team could.

a) authority b) government c) appointment

  1. In a large company your options may be limited by the exiting ……culture.

a) organizational b) ethnic c) corporate

  1. When you gain managerial ……, your first option is to do what is expected of you.

a) possibility b) responsibility c) chance

  1. A …… manager is an upper-level executive who guides and controls the overall activities of the organization.

a) middle b) top c)first-line

  1. Operating …… are not managers, they are qualified and non-qualified persons working for the organization.

a) employees b) employers c) workers

  1. An …… manager creates and manages the systems that convert resources into goods and services.

a) operations b) financial c)human

  1. A …… manager is responsible for the exchange of products between the organization and its customers or clients.

a) advertising b) research c)marketing

  1. …… includes designing the organizational structure; attracting people to the organization (staffing), and creating conditions and system that ensure everyone and everything of the organizations.

a) planning b) controlling c) organizing

  1. The …… manager is going to dictate what happens in his business. He is more interested in the production than in the needs of his employees.

a) survival b) term c) domineering

  1. A …… organization is one where specialists from different parts of the organization are brought together to work on special project designing and marketing new product ideas but still remain part of their own structure.

a) matrix b) staff c) line

  1. A number of different forms of business organization and ownership can be divided into those which are in …… sector and in public sector.

a) business b) private c) economic

  1. …… partners contribute capital to the business but do not participate in its organization and management.

a) sleeping b) limited c) shared

  1. …… is a form of business in which a product or service may be provided by people or firms who have obtained a license from the originators or owners of that product or service.

a) franchising b) companies c) cooperatives

  1. …… of human resources consists of motivating employees to remain within the firm and to work effectively.

a) maintenance b) acquisition c) hiring

  1. A job candidate is generally asked to indicate the names of …… - people who can verify background information and provide personal evaluation of the candidate.

a) interviews b) references c) applications

  1. …… markets function through the interaction of workers and employers.

a) labour b) goods c) money

  1. The …… rate is the number of people in the labor force divided by the size of the adult population.

a) anticipation b) employment c) participation

  1. The …… level is defined as the labour force minus the number of people currently employed.

a) employment b) unemployment c) employed

  1. …… variables measure a quantity over a duration of time.

a) flow b) stock c) growth

  1. …… unemployment reflects the fact that it takes time for people to and settle into new jobs.

a) frictional b) structural c) deficient

  1. Economists see the labour market as similar to any other market in that the forces of supply and …… jointly determine price and quantity.

a) requirement b) claim c) demand

  1. Households are suppliers of labour. In microeconomics theory people are assumed rational and seeking to maximize their …… .

a) workload b) utility function c) marginal product

  1. As the wage rate rises, the worker will substitute work hours for leisure hours, or in other words substitute away from leisure because of its higher opportunity …… .

a) value b) cost c) price

  1. The notion …… resources refers to the individuals within the firm and to the portion of the firm’s organization that deals with the hiring, training and other personal issues.

a) financial b) natural c) human

  1. One critique of standard economic analysis of labour markets is that it does not account for the importance of …… networks in the employment process.

a) economic b)social c) political

  1. The …… of the data set is the value that occurs most frequently.

a) number b) mode c) sum

  1. A prime number is a positive …… that has exactly two different positive divisors, 1 and itself.

a) fraction b) multiplication c) integer

  1. All …… numbers except zero are either positive or negative.

a) real b) unreal c) common

  1. The simplest measure of dispersion is the …… , which is defined as the greatest value in the numerical data minus the least value.

a) fraction b) range c) remainder

  1. In mathematics a …… is a collection of numbers or other objects.

a) set b) collection c) sum

  1. …… is concerned with experiments that have a finite number or outcomes.

a) variability b) probability c) possibility

  1. The word …… is derived from the Italian word stato, which means “state”.

a) linguistics b) cosmetics c) statistics

  1. Certain percentiles break down the distribution of the data into four groups are called …… .

a) median b) quartiles c) magnitude

  1. The …… is based on information contained in all the observations in the data set.

a) mean b) meal c) meat

  1. A …… is just a convenient way of plotting the frequencies of grouped data.

a) histogram b) pictogram c) cryptogram

  1. Among numerous forms of computer criminality, the most dangerous individuals of computer swindle are so called ……, working in the sphere of industrial espionage.

a) killer b) theft c) hacker

  1. A …… is a segment of program code that implants itself to one of your executable files and spreads systematically from one file to another.

a) virus b) disease c) infection

  1. Computer …… is the process of preventing and detecting unauthorized use of your computer.

a) safety b) security c) preservation

  1. Some form of …… is nearly everywhere in computer technology, for example, popular standalone programs, like PGP and GPG aid in securing communications.

a) photography b) cryptography c) holography

  1. Most PCs are held not only by the speed of their main processor, but also by memory …… .

a) cache b) software c) data

  1. The most popular tool used in data mining is artificial …… .

a) intelligence b) mind c) intellect

  1. Speech will become a major component of user …… , and applications will be completely redesigned to incorporate speech input.

a) interact b) interface c) intercom

  1. If your …… disk is packed to bursting point, the IY department is far too busy to fix your email problems.

a) heavy b) large c) hard

  1. There is a wide variety of applications available for use via ASPs, such as …… , payroll and accounting systems.

a) SUP b) PAS c) SAP

  1. An MP3 file can store a minute of sound per …… .

a) kilos b) kilometers c) megabytes
1   2   3   4   5   6   7   8   9

Похожие:

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование фос для исполнения в очередном учебном году
Перечень компетенций, с указанием этапов их формирования в процессе освоения образовательной программы
Визирование рпд для исполнения в очередном учебном году icon Визирование фос для исполнения в очередном учебном году
Перечень компетенций, с указанием этапов их формирования в процессе освоения образовательной программы
Визирование рпд для исполнения в очередном учебном году icon Визирование фос для исполнения в очередном учебном году
Перечень компетенций, с указанием этапов их формирования в процессе освоения образовательной программы
Визирование рпд для исполнения в очередном учебном году icon Визирование фос для исполнения в очередном учебном году
Перечень компетенций, с указанием этапов их формирования в процессе освоения образовательной программы

Руководство, инструкция по применению




При копировании материала укажите ссылку © 2024
контакты
rykovodstvo.ru
Поиск