1) Check the list of features that are the main features of the information society
a. Every member of this society has access to the information he or she needs, at any time of the day or night and anywhere in the country
b. The society is able to provide information technology (both computers and communications) to each member
c. in the education system, all textbooks and teaching aids are in electronic form only
d. the media is represented only by electronic media
2) Information security is defined as.
a. a state of security of the information environment of society that ensures its formation and development in the interests of citizens, organizations and the state
b. a system of organizational and technical measures aimed at countering breaches of state interests
c. a state of protection of society through implementation of information technologies in mass media
d. the state of protection of society through the open provision of information resources
3. Information threats are defined as.
a. factors or sets of factors endangering the functioning of the information environment of society
b. factors or a combination of factors adversely affecting the process of informing society
c. development and implementation of malicious information technologies in information systems
4. Objects of information security do not include
a. information resources containing confidential information (secret, restricted access or trade secret)
b. publicly available open information and scientific knowledge
c. electronic catalogs in academic libraries
d. reference systems for searching goods and services
e. Internet search engines for information resources
5. Information inequality is.
a. a problem which lies in the limited amount of information available due to the security policy of the owner of an information resource
b. the different degree of accessibility to a highly automated information environment for individuals, organizations, regions and countries, which has arisen in the process of informatization of society
c. varying degrees of accessibility to a highly automated information environment for individuals, organizations, regions and countries, which occurred in the process of ensuring information security in society
6. Mark the key features of free software
a. Free software to run for any purpose
b. Free exploration of the software
c. Free distribution of the software
d. Free transfer of the software
e. Free improvement of software
7. What laws exist in Russia in the field of computer law? Choose several of the 6 answers:
a. on state secrets
b. Copyright and related rights
c. civil liability
d. On legal protection of computer programs and databases
e. on legal liability
f. on information, informatization, protection of information
8. What is unauthorized access (UAA)? Choose one of the 5 answers:
a. A subject’s access to an object in violation of the access control rules established in the system
b. Backups in the organization
c. Rules and regulations developed in the organization to circumvent password protection
d. Logging into the system without the approval of the head of the organization
e. Deleting unnecessary information
9. What types of crimes are not punishable under the criminal code?
a. Unauthorized access to computer information;
b. Creation, use and distribution of malicious computer programs
c. Use of a computer for network games
d. Intentionally violating the rules of operation of computers and their networks.
10. What is spam?
a. E-mail;
b. Viral codes.
c. Special program
d. Unauthorized sending of emails
Answers:
- a, b
- a, b
- a, c
- b, c, d, e
- b
- c, d
- b, d, f
- a
- c
- d