Vajad kellegagi rääkida?
Küsi julgelt abi LasteAbi
Logi sisse
Ega pea pole prügikast! Tõsta enda õppeedukust ja õpi targalt. Telli VIP ja lae alla päris inimeste tehtu õppematerjale LOE EDASI Sulge

"security" - 452 õppematerjali

thumbnail
14
docx

Misusing and Abusing the IoT ( Ingliskeelne referaat andmeturve ITX0040 jaoks)

the internet of things is constantly on the rise, making it innately more secure and protecting those devices from abuse, in a sense of unwanted access , manipulation by third parties and other scenarios, is rapidly turning into a pressing issue. According to some sources there were about 13.4 billion connected devices back in 2015 and the projections show there might be up to 38.5 billion such devices in 2020 [2]. As the number of devices increases, the necessity for a proper security mechanism concerning those devices becomes a priority in order to safely adopt the evergrowing internet of things into every aspect of a persons daily life. Privacy One of the most discussed issues concerning the security of the internet of things is the issue of privacy. According to a study done by HP, 70 percent of the most frequently used IoT devices containt vulnerabilities. One of the most common security issue was privacy related. It appears that 90%

Informaatika → Andmeturbe alused
6 allalaadimist
thumbnail
7
doc

GMES (Global Monitoring for Environment and Security)

EUROÜLIKOOL Keskkonnakaitse teaduskond Teema: GMES (Global Monitoring for Environment and Security) Referaat Eliko Roomet Keskkonnakaitse teaduskonna II kursuse üliõpilane Juhendaja: Peep Krusberg 2008 GMES (Global Monitoring for Environment and Security) Sissejuhatus "Ühised suured kosmoseprojektid on olulised, kui Euroopa tahab jääda majanduslikuks ja poliitiliseks suurjõuks," kinnitas Euroopa Komisjoni tööstusvolinik Günter Verheugen. GMES-I eesmärk on pakkuda pidevalt keskkonna ja julgeolekuga seotud usaldusväärseid ja õigeaegseid teenuseid, mis rahuldaks poliitikakujundajate vajadusi. 30 tehiskaaslasest koosnema hakkav GMES võimaldab k...

Politoloogia → Eurointegratsioon
7 allalaadimist
thumbnail
3
docx

URO Security Council kriis, United nations Legitimacy crisis

Legitimacy! AND UNITED NATIONS CRISIS In this article, we examine the current debate regarding the legitimacy crisis facing the UNSC. We consider its most usual manifestation, namely that the Council faces a crisis of legitimacy because of its inability to constrain the unilaterally inclined hegemonic United States. But we also examine the converse argument that it is the whole UN collective security mechanism (rather than just the Council) that is in crisis. According to this, it is the failure to recognize the unique dangers immanent within the contemporary security environment and the inability of the UN security system to tackle these which is the cause of the current crisis of legitimacy. International society, this position continues, must acknowledge these, and vest in the hegemon the powers it requires in order to meet its global responsibilities

Keeled → Inglise keel
4 allalaadimist
thumbnail
16
docx

Social media information and data collection and security

New Media Economy Social media information and data collection and security In this brief essay, i would like to focus on the social media platforms in our moren society. How people use them, what kind of information we give away, what companies will do with this. Information sharing and data protection has become very popular theme in the recent few years. People care more about their privacy and avoid „big brother“ foreshadowing. It is important to know what social media platforms promise and are they really going to keep it.

Keeled → Inglise keel
2 allalaadimist
thumbnail
18
docx

Rahvusvaheline julgeolek konspekt

Sõna julgeolek (security): latina keeles secure/securus= vaba rünnakust või ohust, olla kaitstud. Vana-kreeka kirjanduses tähendas nt sõda ja rahu, liitlust. Keskajal tähendas secure- veidrat MEEST. G. Washington hüvastijätu kõne (Peetakse Monroe doktriini eelseks kõneks, jutt USA julgeoleku) kasutab sõna security. Vanemad terminid: 1920-1930 julgeoleku termin- sõda ja rahu. Lisaks tuli juurde kolmas- desarmeerimine. Külmasõja ajal: 1945- ÜRO (julgeoleku organisatsioon oma loomult) ja Julgeoleku Nõukogu- ainus institutsioon, millel on siduvad otsused (UN security council resolutions). USA admiral James Forestall USA julgeoleku defneerimine (1945): “Julgeolek on oluliseim asi USA jaoks, mis tähendab suurt ja kvaliteetset sõjaväge, head majandust ja häid suhteid teiste riikidega

Politoloogia → Rahvusvaheline julgeolek...
22 allalaadimist
thumbnail
13
docx

Andmeturbe alused

*korraldatakse regulaarseid turvaülevaatusi? Turvaprobleemi skeemielemendid Vara on süsteemi osad, millel on organisatsiooni jaoks väärtus. Oht on süsteemi või organisatsiooni kahjustada võiva soovimatu intsidendi potentsiaalne põhjus. Nõrkus on vara või vararühma nõrk koht, mida saab vaadeldav oht ära kasutada. Risk on võimalus, et oht kasutab ära mingi vara või vararühma nõrkuse ja põhjustab varale kahju. Turvamudel Turvaülesande skeemielemendid Turvameede- (safeguard, security control) on riski kahandava tegevus, protsedur, protsess või mehhanism. Jääkrisk- risk, mis säilib pärast turvameetmete rakendamist. Infoturbe komponendid Turvalisus on infovarade kolme omaduse tagamine: Käideldavus- varade takistusteta kättesaadavus volitatud kasutajatele (isikud ja alamsüsteemid). Varade kasutuskõlblikus. Terviklus- varasid ei ole volitamatult muudetud. Varad pärinevad autentsest allikast.

Informaatika → Andmeturbe alused
39 allalaadimist
thumbnail
7
doc

Turkey and the European Union

Tallinn University TURKEY AND THE EUROPEAN UNION Tallinn 2013 INTRODUCTION The accession negotiations and the forthcoming Turkish accession present challenges to both Turkey and the EU. It is widely accepted that Turkey's accession would be different from previous enlargements because of the combined impact of Turkey's population, size, geographical location, economic, security and military potential. The case of Turkey will be different and more challenging from previous accessions for a number of reasons, some of them are presented below. Turkey is a country with a large population and geographic area. With a population of 74 million today, it is projected that it could be the largest member state at the time of accession. As a Moslem secular country, Turkey will also add a new demographic and religious dimension to the EU

Keeled → Inglise keel
5 allalaadimist
thumbnail
12
ppt

Firma esitlus

Juhiabi III 2010 Overview Values Services Market Corporate structure Products Our mission Main competitors About ... Designs products and sales access and security systems. Offers solutions for large and sophisticated systems, as well as for smaller and simpler ones; History of company OÜ ...started its activities in the field of manufacturing and installing of access and security systems in the year 1994. By now ... has developed into a company that is able to offer most different solutions for access and security systems, starting from preparing the initial task to the installation of the equipment. Values Customer Focus Flexible Technical support Quality Profesional emloyees Skills Innovation Services Technical support 24H Security system installation Security system sales Security system production Security system design Market Estonia

Keeled → Inglise keel
25 allalaadimist
thumbnail
8
doc

Syria (Helimun)

French is the second-most- common language. However, it has started to be rivaled by English. The majority religion in Syria is Islam: 85 percent of the population is Muslim. Other groups include Christians, Druze, Jews, Baha'is, and others. Syria is not a wealthy country; most people have a mediocre standard of living at best. City dwellers live in apartments. Those who are wealthy enough build villas or large vacation homes in the mountains or on the sea coast. 3. Security policy and alliances Syria is a founding member of the UN, having joined on 24 October 1945, and belongs to ESCWA and all the nonregional specialized agencies except WIPO. It is a charter member of the Arab League, set up in 1945 to foster cooperation in foreign and domestic affairs. Syria also belongs to G-77 and OAPEC. Iran and Syria -Since 1979, the alliance between Syria and Iran has had significant impact in both shaping Middle East politics and thwarting the regional

Keeled → Inglise keel
7 allalaadimist
thumbnail
7
pdf

Sotsiaalne tarkvara ja võrgukogukonnad wiki

http://www.informationweek.com/security/attacks/sony-data-breach-cleanup-to-cost-171-mil/229625379 The details of the users of the worldwide PlayStation Network ­ used by owners of Sony Playstation 3s and PlayStation Portables ­ include names, addresses, dates of birth, email addresses, and passwords to the network. http://www.guardian.co.uk/technology/2011/apr/27/playstation-users-identity-theft-data-leak Sony has not said how the hackers broke in. But Rik Ferguson, a computer security consultant at Trend Micro, said: "This has all the hallmarks of commercial criminal activity going for a saleable commodity. It doesn't look as though they would have broken in directly through the PlayStation Network. Far more likely is that they breached the corporate systems and then moved through them to access this valuable data." http://www.guardian.co.uk/technology/2011/apr/27/playstation-users-identity-theft-data-leak

Informaatika → Informaatika
9 allalaadimist
thumbnail
1
doc

Report - how to make buildings more crime-proof

To: The Crime Prevention Officer From: - Date: 28 October 2010 Subject: Increase in crimes Introduction The purpose of this report is to suggest reasons why criminals target the area and give some advice on how to make buildings more crime-proof. 1 Inveiglement Firstly, people keep their valuable items in the visible places like on the window sill and that entices the criminals. Recommendation: Valuable items should be put away, where it is impossible to see them from the window. 2 Security systems Another thing to mention is that people do not give much attention to the security of their houses. That decreases dread of being caught and criminals are getting more and more impudent. Recommendation: Security systems and security cameras should be installed in the buildings. That increases the chance that the criminals will be caught or they dare not to commit the crime. 3 Dogs Finally, burglars can easily hide themselves behind the trees and other objects in the garden

Keeled → inglise teaduskeel
15 allalaadimist
thumbnail
17
ppt

PP esitlus FBI

· As per operations jurisdiction. Governing body · United States Congress Constituting instrument · United States Code Title 28 Part II Chapter 33 General nature · Federal law enforcement · Civilian agency 4 Edgar Hoover Building 5 The Federal Bureau of Investigation (FBI) is unique in having a dual responsibility : · to prevent harm to national security as a member of the United States Intelligence Community · to enforce federal laws as part of the Department of Justice. The Bureau reports to both the Attorney General and the Director of National Intelligence. 6 The Core Values Rigorous obedience to the Constitution of the United States; Respect for the dignity of all those we protect Compassion; Fairness;

Informaatika → Informaatika
20 allalaadimist
thumbnail
19
ppt

Andmeturve üldosa

potentsiaalne põhjus Nõrkus (vulnerability) on vara või vararühma nõrk koht, mida saab vaadeldav oht ära kasutada Risk (risk) on võimalus, et oht kasutab ära mingi vara või vararühma nõrkuse ja põhjustab varale kahju Sügis 2006 Tallinna Polütehnikum 11 Turvamudel Sügis 2006 Tallinna Polütehnikum 12 Turvaülesanne Sügis 2006 Tallinna Polütehnikum 13 Turvaülesande skeemielemendid Turvameede (safeguard, security control) on riski kahandav tegevus, protseduur, protsess või mehhanism Jääkrisk (remanent risk) on risk, mis säilib pärast turvameetmete rakendamist Sügis 2006 Tallinna Polütehnikum 14 Turbe kulud ja tulud Sügis 2006 Tallinna Polütehnikum 15 Lähteuuring Millised on tegevuse turvalisusele esitatavad nõuded? Milliseid tegevuse tähtsaid või väga tähtsaid tegevusi ei saa teha IT süsteemide toeta?

Informaatika → Arvutiõpetus
83 allalaadimist
thumbnail
1
doc

Ametlik kiri

Dear Sir, I am writing to response to your letter. I understand your concern about the security of your valuables, but I assure you, there is absolutely nothing to worry about. Firstly, we have the latest available security system, which includes double steel doors, bulletproof windows, audio/video communication system and other very effective facilities. Also, the safe is made of specific material and is inaccessible without the special code, which has only two of our workers ­ me and the financial manager. In case of a robbery, the FBI will response immediately. I hope this information will satisfy you and encourage you to use our secure bank in future

Keeled → Inglise keel
166 allalaadimist
thumbnail
14
ppt

Cisco sertifikaadid

Cisco sertifikaadid Sertifikaat tõendab oskuseid ja teadmisi Sertifikaadid Jagunevad kuude valdkonda: Routing ja Switching Design Network Security Service Provider Storage Networking Voice Tasemed Raskuastmelt jagunevad sertifikaadid kolmeks: Associate Professional Expert Lisaks täiendavad neid ka 37 spetsialisti sertifikaati CCNA sertifikaat CCNA ­ Cisco Certified Network Accociate Näitab teadmisi arvutivõrkude põhialustes. Serfitseeritud spetsialist on võimeline installeerima ja kasutada kohtvõrgu-, laivõrgu- ja sissehelistamise teenuseid väikestes võrkudes. CCDA sertifikaat

Informaatika → Arvutiõpetus
45 allalaadimist
thumbnail
18
pptx

Küberkaitse

COOPERATIVE CYBER DEFENCE CENTRE OF EXCELLENCE NATO KÜBERKAITSEKOOSTÖÖ KESKUS NATO COOPERATIVE CYBER DEFENCE CENTRE OF EXCELLENCE The Centre was established on 14 May 2008, it received full accreditation by NATO and attained the status of International Military Organisation on 28 October 2008. The Centre conducts Located Tallinn Filtri tee 12 , Estonia research and training on cyber security and includes a http://www.kmin.ee/et/nato-kuberkaitsekeskus- staff of approximately 40 tallinnas HISTORY • In 2003, prior to the country’s official accession to NATO, Estonia proposed the creation of a "cyber excellence center". The 2006 Riga summit listed possible cyber attacks among the asymmetric threats to the common security and acknowledged the need for programs to protect information systems over the long term. The cyber attacks on Estonia in

Ühiskond → Ühiskonnaõpetus
11 allalaadimist
thumbnail
1
txt

Infotootsioskused, arvestus internetis

soovitav kasutada teavikute otsinguks teemal alternatiivenergia Loetlege kuni 3 seotud mrksna. 3. Leidke andmebaasist ISE, millises ajakirjas on ilmunud artikkel Kruus, Oskar. Abimees nii ausale eksaminandile kui ka leidlikule spikerdajale. Vastuses esitage ajakirja nimetus, aasta, number, lehekljed, kus artikkel asub. 4. Leidke e-ajakirjade otsivahendit A-to-Z kasutades, millise andmebaasi vahendusel ja mis aastast aastani on meie likooli arvutivrgust juurdeps ajakirja Network security tistekstidele? 5. Leidke EBSCOhost andmebaasidest ks tistekstiga artikkel teemal majandusintegratsioon (economic integration) Vastuses esitage artikli autor, pealkiri, ajakirja nimetus, aastakik (Volume), number (Issue) ja artikli paiknemise lehekljed. Lisage artikli tisteksti sisaldava andmebaasi nimetus ja kasutamise kuupev. 1. Raamatu "Janno, Jaan. Arvutusmeetodid. Tallinn, 2008. 182 lk." asukoht ... , kohaviit 519.6/J-28... 3 korrus riiul 327 2

Informaatika → Infootsioskused
49 allalaadimist
thumbnail
4
docx

Constructivism theory

conventionally entrenched IR theories as neorealism and neoliberalism, or a "distinctive approach" to international relations that stresses the social, ideational and intersubjective character of world politics. The major thesis of constructivism is that the international system is "socially constructed," that is, it "consists of, "the ways in which human beings think and interact with one another." In contrast to realism, for which international relations are driven by the states' security and material interests defined in terms of power, and to liberal internationalism that concentrates upon the interdependency of international actors and their operation within institutional constraints, constructivism considers international politics as a sphere of interaction which is shaped by the actors' identities and practices and influenced by constantly changing normative institutional structures. For all theories of international relations, the world is in anarchy, and because

Keeled → Inglise keel
6 allalaadimist
thumbnail
4
docx

Cashflow Quadrant

Katre Semjonov Cashflow Quadrant I chose a book named "Cashflow Quadrant" written by Robert T. Kiyosaki. This book is written for people who are ready to change quadrants. This book is especially for individuals who are employees or self-employed and are contemplating becoming business owners or investors. It is for people who are ready to move beyond job security and begin to achieve financial security. It is not an easy life's path but the prize at the end of the journey is worth the journey. It is the journey to financial freedom. WHICH QUADRANT ARE YOU IN? IS IT THE RIGHT ONE FOR YOU? Are you financially free? The CASHFLOW Quadrant was written for you if your life has come to a financial fork in the road. If you want to take control of what you do today in order to

Ökoloogia → Ökoloogia ja keskkonnakaitse1
15 allalaadimist
thumbnail
5
doc

Maailma organisatsioonid

Each state needs a different approach but everyone has to be also very active itself in developing and applying a cooperation policy. Estonia's experience of joining NATO can be useful for several states. At this point of time Estonia supports Georgia, Ukraine, Serbia, Montenegro and Macedonia. Purpose of NATO The North Atlantic Treaty Organisation (NATO) is an alliance created to unite Europe and North America in matters of defence and security. The principle of NATO is that security of each member states depends on security of all its members. If there is a threat to one's security, it concerns everyone. Central and Eastern Europe, including Estonia, fell under the influence of the Soviet Union or even became part of it after the Second World War. It was the time when twelve western states from both sides of the Atlantic Ocean established the North Atlantic Treaty Organisation (NATO) on 4 April 1949

Ajalugu → Maiskonnalugu
5 allalaadimist
thumbnail
2
docx

Mail marketing letter

Mail marketing letter Dear Mary Have you ever felt that your home is a bit unsecure? Every family needs to feel confident that their home is always well-armored, even when nobody is at home. I know that you’ll agree with me that your home is as important as your family and you don’t want them to be harmed by anyone. You can count on G4S Home Security because only we provide safety guarantee for our home security service in Estonia. We guarantee you: Your home is not endangered by any thief. If we weren’t fast enough to protect your house from being harmed, we compensate you the damage. You don’t have to pay anything, it’s only our duty. Subscribe to G4S with safety guarantee to protect you home! More information at our website: www.g4s.ee Yours sincerely G4S

Keeled → Inglise keel
1 allalaadimist
thumbnail
9
rtf

Andmeturve ja viirusekaitse

potentsiaalne põhjus. Nõrkus (vulnerability) on vara või vararühma nõrk koht, mida saab vaadeldav oht ära kasutada. Risk (risk) on võimalus, et oht kasutab ära mingi vara või vararühma nõrkuse ja põhjustab varale kahju. 2 Turvamudel Turvaseadmete skeemielemendid. Turvameede (safeguard, security control) on riski kahandav tegevus, protseduur, protsess või mehhanism. Jääkrisk (remanent risk) on risk, mis säilib pärast turvameetmete rakendamist Turbe kulud ja tulud. 3 Teine tund. Lähteuuring. Millised on tegevuse turvalisusele esitatavad nõuded?

Informaatika → Arvutiõpetus
142 allalaadimist
thumbnail
12
odt

Arvutivõrgud

( ), LAN . 1) Kodulehe kataloog, index.html. 2)

. . 4.4 Häälestage ruuter nii, et kõigist ruuteri külge ühendatud arvutitest näeb koostatud veebilehte, ruuter peab olema häälestatud nii, et WAN pordis olevast arvutist ei saa LAN pordis olevat arvutit "pingida" ( ), LAN . 1) (192.168.1.1), Firewall Virtual Servers. 2) New IP address , index.html. Local Service WEB(http) (port:80). Add. 3) Start Control Panel Windows Security Center Windows Firewall . 4) Exceptions Add port... 80 (TCP). , . IP address , index.html. , LAN , , WAN ­ . ( WAN ), . ( Windows + R, cmd ping ). 4.3 4.4 , LAN . 5. Häälestage ruuter "läbipaistvaks". 5.1 Ühendage arvutid ja ruuter nii, et üks arvuti on WAN pordis. (võrgu skeem on joonisel 3.) . 5.2 Koostage ühes arvutis töötavas Apache veebiserveris lihtne veebileht oma nimedega

Keeled → Vene keel
3 allalaadimist
thumbnail
2
docx

The factors Estonian students consider important when choosing a job

The two surveys were carried out in 2005 and 2013. At the end of the report there are some possible reasons for the changes. Grow of importance To start with, the importance had grown 14% for the pay, 15% for the work atmosphere and 20% for work/life balance. The pay has stayed the same in the ranking of importance but the ranking of work/life balance has dropped from fourth to second place. Fall of importance In contrast, the importance of job security has fallen by 22% and job content by 16%. They used to be equally ranked the second, but now they have become the least important factors when choosing a job. Conclusion To sum up, the importance of the job itself has fallen, but the factors that employees get out of the job have risen. The reason behind it may be the change in economy or the fact that because of 9/11, people were more scared about their job security in 2003.

Keeled → British culture (briti...
25 allalaadimist
thumbnail
1
docx

How terrorism has changed the world

How terrorism has changed the world? Over the decades millions of people have died innocently and lost their homes and beloved ones. Many countries have been attacked by the terrorists. As a result it all affects world politics and global relationships. It can be said that after the 9/11 disaster in the United States we have extremely strict security control system. The traveling is much more proctected by plane. Moreover there is no hitchhiking anymore due to stricting the security checks. Even though it can't be said to the other types of transportation. Terrorism in the Internet has also decreased, whereas computer specialists develop better hardwares to avoid crimes in electronically. Furthermore people are more aware of the jeopardies in the Internet. Terrorism in religious countries is fairly nonsense

Keeled → Inglise keel
6 allalaadimist
thumbnail
24
pptx

My dream home

A few empty rooms • A man cave • A garage • A gym STYLE • Futuristic • White • Glass walls • Big • Lit • Roomie APPLIANCES • A ton of screens • Kitchen appliances • Flying and driving simulator • Holographic projectors • A huge TV • Consoles of any kind and type • Home security system. • A stereo system • Smart windows and tables • A secure VPN server. • A home cinema • Multiple gaming PCs SERVICES • Internet (1Gbps). • Wifi. • Personal helicopter. • Satellite TV. • Security. • Cleaner. • Gardener. • Personal assistent

Arhitektuur → Sisekujundus
3 allalaadimist
thumbnail
28
odt

Inseneriinformaatika 3.ülesanne

........... lektor Külli Hovi Tartu 2014 SISUKORD Sissejuhatus............................................................................................................................ 3 1. ÜLEVAADE KASUTATUD VAHENDITEST ..............................................................4 1.1. Viirusetõrjeprogrammid : AVG, Avira,Avast .............................................................4 1.2. Programm AVG Internet Security 2014 .....................................................................5 1.3. Avira Free Antivirus 2014 ..........................................................................................5 1.4. Avast! Antivirus Free 8 ..............................................................................................5 1.5 Programm ,,Windows Virtual PC" ..............................................................................6 2. VIIRUSTE EEMALDAMINE ............................

Informaatika → Inseneriinformaatika
12 allalaadimist
thumbnail
14
docx

Euroopa Liit

- New policy areas to the Union - European citizenship - Single currency - European Monetary Union Inter-governmental conference IGC - Formal procedure for negotiating amendments to the founding treatis of EU - Called into being by the EC, composed of representatives of ,MS, with the commission and to a lesser degree the parliament Treaty of Amsterdam - Signed in 97 in force 99 - Implementation of common foreign and security policy CFSP - New office of high representative - EU competencies extended to health and consumer protection - More legislative powers to the EP - Enhanced cooperation Codecision procedure Europe a la carte Enhanced cooperation – a procedure of flexibility allowing those member states that wish to proceed more rapidly in a specific policy area to do so Treaty of Nice - 2003 - Cosmetic changes only - Increase of EP seatus

Politoloogia → Euroopa liit
19 allalaadimist
thumbnail
42
pptx

Nutitelefonid töökohal

мобильная платформа Android OS - 81,5% от рыночной доли смартфонов • Первое  вредоносные программы на эту платформу было обнаружено в 2010 году •  Вредоносные программы могут подвергнуть опасности вашу личную информацию • Популярные антивирусы: Dr.Web Mobile Security, Kaspersky Internet Security for Android,ESET NOD32 Mobile Security Установка и проверка приложений • При скачивании с Google Play вам укажут, к какой информации имеет доступ приложение, и если что-то вызывает сомнение, от скачивания приложения следует отказаться • Устанавливая непроверенные

Keeled → Vene keel
2 allalaadimist
thumbnail
6
docx

Võrdlev tööõigus - inglisekeelne

- Improved living and working conditions - Proper social protection - Dialogue between management and labour - The development of human resources with a view to lasting high employment and the combating of exclusion. Treaty of Rome: belief that improved working and living conditions would arise from the functioning of the common market – cooperation in the areas of employment, labour law and working conditions, vocational training, social security, occupational health and safety, and social dialogue. Improved mobility and professional opportunities of employees and introduced the equal pay for men and women – directly applicable. Single European Act: harmonisation of health and safety conditions at work; possibility for social partners at European level to negotiate collective agreements + Community policy for economic and social cohesion.

Õigus → Tööõigus
24 allalaadimist
thumbnail
1
doc

People these days are thinking less and drinking more

whom they can rely on. Another suggestion is that the media should not promote drinking. Commercials are very effective with teenagers because commercials are very colourful and memorable. Also, when teenagers see some beautiful advertisement with lots of people who are having a party with drinks they want to be like them. What is more, these commercials teach them that a party is more fun with different alcoholic drinks. Finally, different clubs and pubs security guards should ask more effectively for documents to prove the age of the visitors. Too many teenagers are visiting clubs because they can get in easily. When security guards ask for documents then youngsters are not able to get any alcohol because shops are also closed by the time. All things considered, media should not promote drinking and people have to think more carefully before they take their alcohol bottle. When commercials are banned and people have

Keeled → Inglise keel
12 allalaadimist
thumbnail
38
docx

European Union Exam

– New competencies for Communities (envi, r&d, reg.) 1987 Turkey formally applies to join. Entry into force of Single European Act 1990 European Council held in Rome launches two Intergovernmental Conferences, one on Economic and Monetary Union, the other on Political Union. 1992 February: Maastricht Treaty on the European Union is signed, leading to creation of the euro, and the "pillar" structure of the European Union: the European Community (EC) pillar, the Common Foreign and Security Policy (CFSP) pillar, and the Justice and Home Afairs (JHA) pillar. 1993 Single European Market enters into force. 1994 European Economic Area (EEA) 1995 January: Austria, Finland and Sweden join the Union, bringing membership to 15. Shengen agreement läks käiku 1997 Amsterdam Treaty signed, emphasising citizenship and the rights of individuals, more powers for the European Parliament, the beginnings of a common foreign and security policy (CFSP).

Politoloogia → Euroopa liidu põhikursus
9 allalaadimist
thumbnail
2
docx

Taxation

Do not declaring your income, or reporting it inaccurately(ebatäpselt). Money laundering is the process of creating the appearance that large amounts of money obtained (hangitud) from serious crimes, such as drug trafficking or terrorist activity, originated from a legitimate source.[1] It is a crime in many jurisdictions with varying definitions. It is a key operation of the underground economy. Loopholes in law- A loophole is a weakness or exception that allows a system, such as a law or security, to be circumvented(mööda hiilida) or otherwise avoided. Loopholes are searched for and used strategically in a variety of circumstances, including taxes, elections, politics, the criminal justice system, or in breaches of security. Tax burdens- the amount of tax you have to pay. Off-shore country- is a tax haven. Usually a small countries where income tax for foreign companies are low. Such as Liechestein, Monaco, the Cayman Islands, the Bahamas.

Keeled → Inglise keel
13 allalaadimist
thumbnail
1
doc

Motivation essay

The main question would be: What are the thing that will motivate myself at job? What are the aspects that makes me to do the work? What could be better? What are the benefits and drawbacks ? If I were a manager in a large production company I would motivate people at first by job security. But there are a lot of other aspects to motivate a workforce. I think that giving a secutity at work is the main aspect that will motivate workforce. Saying job security I mean healthy environment, good labuor relations and confidence which means that worker do not have to worry about losing the job. A good healthy environment is the main motivator, because when you work somewhere you do not feel yourself comfortable, you aint do work with maximum input. Good labour relations at work create a challenging and creative job, because if you do not communicate others with respect and friendliness, it is hard to make progression. And this is

Keeled → Inglise keel
28 allalaadimist
thumbnail
24
pptx

Arvutiviirused ja nende eest kaitsmine

Kuidas kaitsta arvutit viiruste eest? Uuenda oma Windowsi Kasuta viirusetõrjet Kasuta nuhkvaratõrjet Kasuta tulemüüri Kasuta Temp/ebavajalike failide puhastajat Kasuta paroole ja loo piiratud õigustega kasutaja Ole ettevaatlik Eemaldada programmid, mida sa ei kasutata Uuenda oma programme Arvuti viirusetõrjed Tasuta: • Avira AntiVir Personal • avast! Free Antivirus • Comodo Internet Security • AVG Anti-Virus Free • Microsoft Security Essentials Arvuti viirusetõrjed Tasulised • Kaspersky AntiVirus • ESET NOD32 AntiVirus • G-Data Anti-Virus • F-Secure Anti-Virus • Norton AntiVirus • McAfee AntiVirus Plus • a-squared Anti-Malware • BitDefender AntiVirus Kokkuvõte Arvutiviirus on programm, mis on võimeline end iseseisvalt kopeerima ning arvutit nakatama. Viirus levib ühest arvutist teise

Informaatika → Arvuti
3 allalaadimist
thumbnail
11
odt

The Relations Between The USA and Iraq

a farmhouse in ad-Dawr near Tikrit in Operation Red Dawn. In 2005, the Central Intelligence Agency released a report saying that no weapons of mass destruction had been found in Iraq. Saddam Hussein was hanged on the first day of Eid ul-Adha, 30 December 2006, despite his wish to be shot. In late February 2009, newly elected U.S. President Barack Obama announced an 18- month withdrawal window for combat forces, with approximately 50,000 troops remaining in the country "to advise and train Iraqi security forces and to provide intelligence and surveillance". In a speech at the Oval Office on 31 August 2010 Obama declared: "The American combat mission in Iraq has ended. Operation Iraqi Freedom is over, and the Iraq's people now have responsibility to assure the security of their country." United States Support for Iraq Diplomatic relations with Iraq had been severed shortly after the 1967 Arab-Israeli Six-Day War

Geograafia → Geograafia
8 allalaadimist
thumbnail
8
doc

Essee-Ohud nutitelefoni turvalisusele ja kasutaja andmete privaatsusele

Tallinna Tehnikaülikool Infotehnoloogia teaduskond ESSEE Aines ,,Väljendusoskus" Teemal ,,Ohud nutitelefonide turvalisusele ja kasutaja andmete privaatsusele" Üliõpilane: Õpperühm: IASB10 Matrikli nr: Õppejõud: dots. Boris Gordon Tallinn 2013 Sissejuhatus Kaasajal on väga levinud erinevate elektrooniliste seadmete kasutamine, mis abistab meid igal sammul ning üheks populaarseimaks selliseks abimeheks on nutitelefon. Uuringufirma Gartner andmetel moodustas nutitelefonide müük 2013 aasta kolmandas kvartalis 51,8% müüdud telefon...

Informaatika → Väljendusoskus
13 allalaadimist
thumbnail
4
doc

ÜRO, WTO, IMF, NATO - Rahvusvahelised organisatsioonid

globaalne organisatsioon, millesse kuulub 47 liikmesriiki Euroopast ja Aasiast. Euroopa Nõukogu põhilised tegevusvaldkonnad on: · inimõigused · sotsiaalõigused · keelelised õigused · haridus · kultuur Euroopa Nõukogu aetakse pidevalt segamini Euroopa Liidu Nõukoguga, mida kindlasti teha ei tohiks, kuna tegemist ei ole sama organisatsiooniga. EUROOPA JULGEOLEKU- JA KOOSTÖÖORGANISATSIOON e. OSCE (inglise k. Organization for Security and Co-operation in Europe) OSCE on globaalne organisatsioon, mis asutati 1975. aastal NATO ja Varssavi Lepingu Organisatsiooni riikide poolt. OSCE-sse kuulub 56 liikmesriiki. Eesmärgid: Julgeoleku- ja Koostööorganisatsioon püüab ennetada konflikte ja kriise Ohjata ja aidata kaasa konfliktijärgsele sotsiaalsele taastustööle, sealhulgas ka inimõiguste tagamisele. OSCE missioon Eestis: Tegutses Eestis aastail 1993-2001 ja Julgeoleku- ja Koostööorganisatsiooni esinduse eesmärk

Ühiskond → Ühiskonnaõpetus
56 allalaadimist
thumbnail
4
docx

Monoloogid

You can not see the product, you can only hear what people are talking about it. On the other hand, nowadays the popularity of TV commercials is getting smaller because of the Internet. More and more people use Internet more than they watch TV. In conclusion, Allthough advertising on TV is the easyest way to advertise, it might me a bit too expencive for some companies and they shouls consider advertising on the Internet. The role of social security Social security is a government program that provides economic security to people who are retired, unemployed or unable to work. First of all, social security gives a secure feeling for people that when something happens and they are not able to work, then government will help them to manage Secondly, there are different kind of social securities to help people who need it. For example Money paid to unemployed people is called dole, money paid to retired people is called pension and money paid for students

Keeled → Inglise keel
39 allalaadimist
thumbnail
12
pdf

aadresse vahemikus (skoobis) 192.168.10.100-192.168.10.200 Network and sharing center --- change adapter settings --- ethernet2 properties --- ipv4 properties --- use the following ip address ning sisestada vahemik --- Use the following DS server address -- OK 4. Luua domeeni 4-5 kasutajat (Nimed vabalt valitud) o Lisainfo: http://technet.microsoft.com/en-us/library/cc754661.aspx 5. Luua domeenis 3 security gruppi (Nimed vabalt valitud) o 2 tk global o 1 tk domain local o Jaotada kasutajad global gruppidesse o Lisada global grupid domain local gruppi o Lisainfo: http://technet.microsoft.com/en-us/library/cc771069.aspx 6. Luua domeeni OU'd (Nimed vabalt valitud) o 1 tk firma jaoks o 2 tk alamüksuste jaoks, ühes masinad, teises kasutajad o Lisainfo: http://technet.microsoft.com/en-us/library/cc753063.aspx 7. Käivitada (või restartida) ja konfigureerida Desktop

Varia → Kategoriseerimata
14 allalaadimist
thumbnail
13
doc

Soome välis - ja julgeolekupoliitika

mises ja lahenduseks mitmetele globaalsetele probleemidele ning rahumeelsele arengule. Glo- baalsed probleemid ja uued piirideülesed turvalisuse ohud, nagu näiteks massihävitusrelvade levik, terrorism ja piirkondlikud konfliktid mõjutavad Soome julgeolekut rohkem kui kunagi varem.Soome rõhutab Atlandi-ülese koostöö tähtsust soodustab oma suhteid USA-ga ka kahe- poolselt läbi Rahupartnerlus programmi (Partnership for Peace) ja NATO. (Finnish Security and Defence Policy, Government Report, 2009) Rahvusvahelise julgeoleku -ja kaitsealane poliitiline koostöö Soome toetab Euroopa Liidu, kui ühtse julgeolekuühenduse ja globaalse osaleja tugevdamist läbi EL-i ühise välis ­ja julgeolekupoliitika (CFSP) ja Euroopa julgeoleku ­ja kaitsepoliitika (ESDP). Tuginedes Rahupartnerlus programmile, teeb Soome NATO-ga tihedat koostööd. NATO liikmeks saamise taotlus jääb Soomes üheks peamiseks tuleviku otsuseks ja võimalu-

Politoloogia → Võrdlev välispoliitika
62 allalaadimist
thumbnail
4
docx

EU COOPERATION WITH RUSSIA AND EASTERN

Which side is more interested? The main cornerstones of the EU and Russia relations are the trade and energy relations. One biggest breakthrough has been gas pipeline Nord Stream. Russia is the third biggest trade partner of the EU and is the main importer of gas and crude oil. The economic benefits are the biggest cornerstones of the relations. Cooperation between Russia and the European Union progressively strengthens in foreign policy and security issues, in combating illegal migration, organised crime and terrorism. The main achievement of recent years, which can be hardly overestimated, is the understanding increasingly gaining ground that partnership between Russia and the EU is one of the cornerstones of maintaining stability and prosperity not only in Europe, but world-wide. Joint Russian-EU program called "A Partnership for Modernization" was launched. The main

Politoloogia → Rahvusvahelised suhted
7 allalaadimist
thumbnail
23
pptx

INVESTBULGARIA AGENCY

utilities European Union / EFTA Russia Turkey/Middle East 5. Government incentives 5. Government incentives Social Social security security benefits benefits 4. Educated & skilled workforce 4. Educated & skilled workforce .80 Tax Tax benefits benefits . 80 000 students abroad

Keeled → Inglise keel
1 allalaadimist
thumbnail
1
docx

Kaitseliit - Estonian Defence League

There are over 13 000 members in the Estonian Defence League. Together with affiliated organisations Women's Home Defence, Young Eagles and Home Daughters, the Estonian Defence League has more than 21 000 volunteers in action. There are also public figures in the organisation. The Estonian Defence League unites loyal citizens who wish and are able to work voluntarily and without receiving any remuneration for protecting the internal order of the state and improving the sense of security. According to the Estonian Defence League Act they co- operate with the police, local governments, border guard, rescue board and fire-fighters. Members of the Estonian Defence League have participated as a show of support in police operations, maintained order in mass events, taken part in liquidating natural disasters, such as forest fires, have helped to look for people, etc. In addition to direct military training, the

Sõjandus → Riigikaitse
2 allalaadimist
thumbnail
3
docx

Kujutlus linnast 1. peatükk

placards. But let the mishap of disorientation once occur, and the sense of anxiety and even terror that accompanies it reveals to us how closely it is linked to our sense of balance and well-being. The very word "lost" in our language means much more than simple geographical uncertainty; it carries overtones of utter disaster. A good environmental image gives its possessor an important sense of emotional security. He can establish an harmonious relationship between himself and the outside world. This is the obverse of the fear that comes with disorientation. Indeed, a distinctive and legible environment not only offers security but also heightens the potential depth and intensity of human experience. Although life is far from impossible in the visual chaos of the modern city, the same daily action could take on new meaning if carried out in a more vivid setting. Strain and

Keeled → Inglise keel
20 allalaadimist
thumbnail
10
pdf

Physical environment of ICT in use

Physical environment of ICT in our school What devices do we have at school? computers, tablets, projectors, document cameras, smartboards, screen where the security guard is, computer labs etc What is the situation of physical environment of ICT in school? •We don’t have laptops •We have tablets •45 stundents per one tablet •Mobile devices are allowed •We have wifi in our school •We have computers •12 students per one computer When do we use them? •We have computer lessons •We can use computers in library •In the breaks we use our smartphones •3 classrooms have smartboards

Keeled → Inglise keel
1 allalaadimist
thumbnail
1
docx

Minu unistuste Arvuti.

Mina kasutan HP arvutit. Mulle on seda soovitatud palju ja öeldud, et see on just kõige parem arvuti ja ma usun et see on ka kõige parem. Mul on olnud teisi arvuteid, aga ükski pole nii väga meeldinud kui see. Minu arvutil on kaasas erinevad tarkvarad mida kasutada saan. Näiteks on viirusetõrjetarkvara, muu kaasasolev tarkvara, op.süsteem ja kontoritarkvarad. Viirusetõrjetarkvarana kasutan ma Kaspersky Internet Security tarkvara, sest seda on hea lihtne kasutada ja see on turvaline. Muidu oli arvuti tarkvaraga kaasas Symantec Norton Internet Security 2009 millel oli 60päevane proovi versioon, aga selle ma vahetasin kiiresti välja. Muu tarkvara on Microsoft Internet Explorer, aga selle asemel ma kasutan Mozilla Firefoxi, sest see on lihtsam ja kiirem minu arvates. Tarkvarade hulgas on veel Windows Live Messenger, Adobe Flash Player, HP MediaSmart Suite, HP Total Care Setup, HP Total Care

Informaatika → Informaatika
10 allalaadimist
thumbnail
2
docx

Travelling and holidays

1.go on board the plane/ to board the plane- lennukireisid/ lennukisse minema 2.a passenger, the overhead locker- reisija, lennukis olev pagasiruum 3.the plane takes off, lands- lennuk tõuseb õhku, maandub 4.the departure, the arrival time- väljalend, saabumise aeg 5.the flight is cancelled, is delayed- lend tühistati, lükati edasi 6.travel business class, economy class/tourist class- reisima äriklassis, tavalises klassis 7.fasten the security belts, a gate- kinnitava turvavööd, värav 8.baggage(Am), luggage- pagas 9.hand luggage is free from charge- käsipagas on ilma rahata 10.go through a security check- minema läbi turvaväravatest 11.declare goods, a supersonic aircraft, a jet- deklareerima kaupasid, üle helikiiruse lennuk,reaktiiv le. 12.a check-in-desk, to check for the flight- läbi minema check-in-ist, lennule regristreerima 13.the luggage claim area- pagasi kätte saamis koht.

Keeled → Inglise keel
9 allalaadimist
thumbnail
9
ppt

Presentatsioon suurfirmast G4S (inglise keeles)

specialises in outsourced business processes assesses current and future risks wide range of geographic markets and business sectors risk management and protection to governments and businesses Other facts about G4S operations in over 110 countries was formed in 2004 is listed on the London Stock Exchange Values Customer Focus Expertise Performance Best People Collaboration & Teamwork Services Developing security solutions Local and international cash solutions People management Wide range of technology use Partners to many governments Investor Relations Careers & Employment Employees are the public face of G4S Over 500,000 employees around the globe Looking after you Looking after your community Thank you !

Keeled → Äriinglise keel
50 allalaadimist
thumbnail
12
doc

Viiruskaitsete tehniline dokumentatsioon

...................................................................................2 ESET NOD32..................................................................................................................... 3 Avast! Antivirus..................................................................................................................3 Avira AntiVir Personal....................................................................................................... 4 Microsoft Security Essentials..............................................................................................5 ClamWin............................................................................................................................. 6 Programmide haldamine............................................................................................................. 7 Paigaldus (Näide Avira AntiVir Personal baasil)............................................................... 7

Tehnoloogia → Tehniline dokumentatsioon
21 allalaadimist


Sellel veebilehel kasutatakse küpsiseid. Kasutamist jätkates nõustute küpsiste ja veebilehe üldtingimustega Nõustun