- •Establish connection: ict and key sectors of society development.
- •Specify components of computer systems.
- •Specify evolution of operating systems.
- •Specify human-computer of interaction.
- •Designing.
- •Implementing
- •Testing
- •Design and development of database.
- •Specify local and wide area networks.
- •Specify End devices, data transfer devices, transmission medium.
- •Specify Cyber security and control of the Internet
- •Describe Internet protocols: ip, tcp, dmp
- •11.Specify web service in a cloud technology
- •Specify design and organization of e-learning
- •12.Specify Design and organization of e-learning.
- •Elements of information infrastructure of electronic business.
- •Design and implementation of the electronic government.
- •Describe the modern it trends in the professional sphere.
- •Exchange of information in office programs.
- •Specify the data representation stages in computer systems.
- •Specify concepts of mobile technologies.
- •Specify information processing in tabular processor
- •Entering Excel Formulas and Formatting Data
- •AutoSum
- •Perform Advanced Mathematical Calculations
- •Copy, Cut, Paste, and Cell Addressing
- •Show properties of operating systems.
Specify Cyber security and control of the Internet
Cyber security or information technology security are the techniques of protecting computers, netwoks , programs and data from unauthorized access or attacks that are aimed for exploitation.Ensuring cybersecurity requires coordinated efforts throughout an information system.Elements of cybersecurity include:
Application security
Information security
Network security
Disaster recovery\ business continuity planning
End- user education
Computer security is the protection of computing systems and the data that they store or access.In a computing context ,the term security implies cybersecurity.One of the most problematic elements of cybersecurity is the quickly and constantly evolving nature of security risks.
Describe Internet protocols: ip, tcp, dmp
. Describe Internet protocols: IP, TCP, DMP.
The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet. This may be either an IPv4 or IPv6 address, but either way it uniquely defines a device on the Internet.
The Internet Protocol also provides basic instructions for transferring packets between devices. However, it does not actually establish the connection or define the ordering of the packets transmitted. These aspects are handled by the Transmission Control Protocol.
Transmission Control Protocol, which works in conjunction with the Internet Protocol to transfer data between systems on the Internet.
Transmission Control Protocol (TCP)
TCP is a connection oriented protocol and offers end-to-end packet delivery. It acts as back bone for connection.It exhibits the following key features:
Transmission Control Protocol (TCP) corresponds to the Transport Layer of OSI Model.
TCP is a reliable and connection oriented protocol.
TCP offers:
Stream Data Transfer.
Reliability.
Efficient Flow Control
Full-duplex operation.
Multiplexing.
TCP offers connection oriented end-to-end packet delivery.
TCP ensures reliability by sequencing bytes with a forwarding acknowledgement number that indicates to the destination the next byte the source expect to receive.
It retransmits the bytes not acknowledged with in specified time period.
TCP Services
TCP offers following services to the processes at the application layer:
Stream Delivery Service
Sending and Receiving Buffers
Bytes and Segments
Full Duplex Service
Connection Oriented Service
Reliable Service
What is a data management platform ? In simple terms, a data management platform is a data warehouse. It’s a piece of software that sucks up, sorts and houses information, and spits it out in a way that’s useful for marketers, publishers and other businesses.
This sounds like a database. Is it more? In theory, DMPs can be used to house and manage any form of information, but for marketers, they’re most often used to manage cookie IDs and to generate audience segments, which are subsequently used to target specific users with online ads. With the rise of ad tech, advertisers now buy media across a huge range of different sites and through various middlemen, including DSPs, ad networks and exchanges. DMPs can help tie all that activity and resulting campaign and audience data together in one, centralized location and use it to help optimize future media buys and ad creative. It’s all about better understanding customer information.
