Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 5

first rewind previous Page / 1 next fast forward last

Search results

help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
The first part of the artlcle deals with main concepts connocted with the data bank, and more precisely with its two elements i.o, data base and data base management system. In the second and main part of the article, the author presents her comments on propositions concrning designing of the data bank as described in the literature of th subject. and presents her own approach to the problem. Th entire designing process is divided into two stages: information designing and technological designing. Information designing aims at construction of the data base model. Which can be done according to two methods deseribed in the article: modelling and selecting.
EN
That paper presents stages in the implementation of Polish regulations concerning chartered auditor's profession and chartered auditors' self-government. The authors made reference to the Eighth EU Directive, discussing analogies and differences between Polish and EU regulations.
PL
W referacie przedstawiono etapy wprowadzania w Polsce regulacji prawnych dotyczących zawodu biegłego rewidenta oraz samorządu biegłych rewidentów. Odniesiono się przy tym do zapisów w Ósmej Dyrektywie UE, prezentując podobieństwa i różnice między przepisami polskimi a przepisami unijnymi.
PT
Šis pranešimas pristáto jgyvendinimo lygius lenkij reguliavimo dél privilegijuotos auditorio profesijos ir del auditorią savivaldos. Remdamiesi astuntąja EU direktyva, autoriai paruošé svarstymą, panaśumy ir skirt umy tarp Lenky ir EU reguliavimo.
EN
The article discusses the problem of threats connected with introduction of informatics to data processing. There are analyzed typical deliberate and non-deliberate threats (computer offences) and ways of counteracting them.
EN
The article contains a review of the methods of controlling the functioning of information systems. The use of these methods guarantees correctness of data contained in files, which is an indispensable condition for effective management of an enterprise. There have been presented two groups of control methods: system software, application software.
EN
The article deals with problems concerning the control of the process of designing information systems and of the design documentation connected with it. Such controls aim at increasing the reliability of information systems. There have been described, among others, the following methods: source code review, comparison of a program with on attested version, program tracing, reprocessing, parallel simulation.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.