Professional Documents
Culture Documents
DərsVəsaiti IT
DərsVəsaiti IT
SHAHBAZOVA
INFORMATION TECHNOLOGIES
(Text book for higher education institution)
1
MINISTRY OF EDUCATION OF AZERBAIJAN REPUBLIC
AZERBAIJAN TECHNICAL UNIVERSITY
__________________________________________________________
SHAHNAZ N. SHAHBAZOVA
INFORMATION TECHNOLOGIES
(Text book for higher education institution)
BAKU - 2021
2
Reviewers:
1. Corresponding member of ANAS, professor Mammadova M.H., Head of
department No. 15, Institute of Information Technologies of ANAS
2. Associate professor chair of “Computer Technologies and Cyber
security” J.I.Mammadov
Shahnaz N. Shahbazova
“Information Technologies”, Study book, Publishing house “Çaşıoglu”, 2021, 160
pages.
This study book was prepared based on the materials of lecture courses on
the basics of Information technologies, including lectures: human information
activity, information and information processes, the maximum rate of information
transmission on the communication channel is called the bandwidth of the
channel, analog devices, presentation of information in various number systems,
algorithms for converting numbers, storage of information objects of various types
on various digital media, search and transfer of information using a computer,
means of information and communication technologies, telecommunication
technologies, transfer of information.
The textbook fully complies with the requirements of the standard for the
discipline "Information Technologies" for bachelors in the specialties 050655 -
"Information technology" and 050656 - "System engineering".
3
CONTENT
INTRODUCTION
6.1. Algorithms for converting numbers from one number system to another
6.2. Binary arithmetic
4
CHAPTER 7. PRINCIPLES OF INFORMATION PROCESSING BY A
COMPUTER
9.1. Search for information: basic concepts, types and forms of organization
9.2. Finding information in windows
9.3. Software search services
9.4. Wired and wireless communication
11.1. Ergonomics
11.2. Information protection, anti-virus protection
11.3. Encryption method
5
CHAPTER 12. TECHNOLOGIES OF CREATION AND
TRANSFORMATION OF INFORMATION OBJECTS
12.1. Desktop publishing capabilities. General terms and concepts.
12.2. Basic functionality of text editors
12.3. Formatting, building tables, graphic images
6
CHAPTER 17. TELECOMMUNICATION TECHNOLOGIES
17. Network software capabilities for organizing collective activities in global and
local computer networks.
17.1. Types of global internet services
17.2. Features of the organization of Teleconferences on the internet
REFERENCE
7
CHAPTER 1. HUMAN INFORMATION ACTIVITY
8
1.2. THE MAIN FEATURES OF THE INFORMATION SOCIETY
9
1.3. TYPES OF PROFESSIONAL INFORMATION HUMAN ACTIVITY
USING TECHNICAL MEANS AND INFORMATION RESOURCES.
10
The second information revolution (mid-16th century) is associated with the
invention of printing, which changed human society, culture and organization of
activities in the most radical way. Man not only received new means of
accumulation, systematization, and replication of information. The mass distribution
of printed materials made cultural values available, opened up the possibility of
independent and purposeful development of the individual. From the point of view
of computer science, the significance of this revolution is that it brought forward a
qualitatively new way of storing information.
The third information revolution (the end of the 19th century) is associated
with the invention of electricity, thanks to which the telegraph, telephone, radio
appeared, allowing to quickly transmit and accumulate information in any volume.
This stage is important for informatics, primarily because it marked the emergence
of information communication tools.
The fourth information revolution (70s of the twentieth century) is
associated with the invention of microprocessor technology and the emergence of a
personal computer. The final transition from mechanical and electrical means of
converting information to electronic ones took place, which led to the
miniaturization of all units, devices, machines and the emergence of software-
controlled devices and processes. Computers, computer networks, data transmission
systems (information communications) and so on are created on microprocessors
and integrated circuits.
5. Questions of self-control
11
MEASUREMENT OF INFORMATION
People got used to the word "information" for a long time. If you ask you
what information is, then, probably, first of all, you will remember newspapers,
radio, television, that is, everything that is called mass media. It is here that such
expressions as "information message" or "operational information" are most often
used. The purpose of such messages is to inform readers or listeners about certain
events. Before receiving the message, we did not know about this event, but as a
result, we became aware.
Everything that we know with you, we once learned from parents, teachers,
from books, from personal practical experience and preserved in our memory. In
turn, everything that is written in books, magazines, newspapers reflects the
knowledge of the authors of these texts, and therefore it is also information.
Information for a person is knowledge that he receives from various
sources.
Studying at university is a purposeful process of acquiring knowledge, which means
obtaining information. The more you learn, the more information your memory
contains.
The term "information" comes from the Latin word "informatio", which
means information, explanation, presentation.
Information is such a general and deep concept that it cannot be explained in
one phrase. This word has different meanings in technology, science and in
everyday situations.
In everyday life, information is any data or information that interests anyone.
For example, a message about any events, about someone's activities, etc. "To
inform" in this sense means "to communicate something previously unknown."
Information is information about objects and phenomena of the
environment, their parameters, properties and state, which are perceived by
information systems (living organisms, control machines, etc.) in the process of
life and work.
One and the same information message (newspaper article, advertisement,
letter, telegram, help, story, drawing, radio broadcast, etc.) may contain a different
amount of information for different people - depending on their previous
knowledge, on the level of understanding of this message and interest in it.
In cases when they talk about automated work with information through any
technical devices, usually they are primarily interested not in the content of the
message, but in how many characters this message contains.
Information (as applied to computer data processing) is a certain
12
sequence of symbolic designations (letters, numbers, encoded graphics and
sounds, etc.), which carries a semantic load and is presented in a computer-
understandable form.
Each new character in such a sequence of characters increases the
information volume of the message.
Information can exist in a wide variety of forms:
smells and tastes gestures and facial magnetic records chromosomes, etc.
expressions
13
The written text contains letters, punctuation marks, numbers and other
symbols. Oral speech also consists of signs. Only these signs are not written, but
sound - phonemes. From phonemes, words are formed, from words - phrases.
There is a direct connection between written signs and sounds. First, speech
appeared, and then - writing. Writing for this is needed to fix human speech on
paper. Individual letters or letter combinations denote the sounds of speech, and
punctuation marks denote pauses, intonation.
Human speech and writing are closely related to the understanding of
language. Of course, this does not mean the organ of speech, but the form of
communication between people. Each nation has its own national spoken
language. These languages - Russian, English, Chinese, French - are called
natural languages. Natural languages are spoken and written.
In addition to spoken (natural) languages, there are formal languages. As a
rule, these are the languages of some profession or field of knowledge. For
example, mathematical symbolism can be called the formal language of
mathematics; musical notation is the formal language of music.
Language is a sign system for representing information.
Communication in languages is the process of conveying information in a
symbolic form.
You can give examples of different ways of sign information exchange,
replacing speech. For example, deaf people replace speech with gestures. The
conductor's gestures convey information to the musicians. The referee on the
playground uses a certain sign language that the players can understand.
However, smells, gustatory and tactile sensations cannot be conveyed using
signs. Of course, they carry information, since we remember them, we recognize
them. Such information will be called figurative information. The figurative also
includes information perceived by sight and hearing: wind noise, birdsong,
pictures of nature, painting.
1 byte = 8 bits
14
Let a small book contain 150 pages; each page contains 40 lines, each line
contains 60 characters. This means that the page contains 40 x 60 = 2400 bytes of
information. The amount of all information in the book:
This example shows that a byte is a "small" unit. Imagine that you need to
measure the information volume of a scientific library. What a huge number in
bytes that would be! In any system of units of measurement, there are basic units
and their derivatives. The latter are needed to measure either very large or very
small quantities.
Byte-derived units are used to measure large amounts of information.
15
CHAPTER 3. THE MAXIMUM INFORMATION TRANSFER RATE OVER
A COMMUNICATION CHANNEL IS CALLED THE CHANNEL
BANDWIDTH.
16
Currently, the term information has a deep and multifaceted meaning. In
many ways, while remaining intuitive, he receives different semantic content in
different branches of human activity:
• in the everyday aspect, information is understood as information about the
surrounding world and the processes occurring in it, perceived by a person or
special devices;
• in technology, information is understood as messages transmitted in the form
of signs or signals;
• in information theory (according to K. Shannon), not any information is
important, but only those that completely remove or reduce the existing
uncertainty;
• in cybernetics, according to N. Wiener's definition, information is that part of
knowledge that is used for orientation, active action, control, ie. in order to
preserve, improve, develop the system;
• in semantic theory (the meaning of the message) - this is information with
novelty, and so on ...
Such a variety of approaches is not an accident, but a consequence of the
fact that the need for a conscious organization of the processes of movement and
processing of what has a common name - information - has emerged.
According to the way of perception, information is divided into the
following types: visual, auditory, gustatory, olfactory and tactile.
A person creates devices that allow him to receive information that is not
available to him in direct sensations. Microscopes, telescopes, thermometers,
speedometers - the list goes on and on. Different sensors correspond to analogs of
human sense organs in technical devices. Receiving information is called input. In
a personal computer, special input devices are responsible for entering
information: keyboard, scanner, digitizer, microphone, mouse, and much more.
A person perceives information using the senses. Perceived information
comes in the form of energy signals (light, sound, heat) and radiation (taste and
smell), and the process of receipt of these signals occurs continuously.
A person needs information not in general, but specifically at the right time
to navigate in the world around him and make decisions about further actions.
17
With a qualitative assessment of the information received, one speaks of its
following properties:
Information properties:
QUESTIONS OF SELF-CONTROL
18
1. What is the difference between a continuous signal and a discrete one?
2. What is sampling rate and what does it affect?
3. Explain the concept of information
4. List the main forms of information presentation
5. What is the difference between positional and non-positional number systems?
6. What is a number system?
7. What is the radix?
8. What is a non-positional number system?
9. What is a positional number system?
10. What characters are in the decimal and binary alphabet?
11. Why is the binary number system taken as a basis in computing?
19
The discrete information is based on a series of fixed representations of the
set parameters, taken in certain time intervals. If these levels are many, it is possible
to talk about the digital representation of information, that is, when in certain
discrete moments they assume specific discrete values. Fortunately, analog
information can be easily converted to digital. As carriers of analog information can
use different physical values, taking different values at some interval, for example,
electric current, radio wave, etc. When sampling, that is, when converting
uninterrupted images and sounds into a set of discrete values in the form of codes,
the basis is given some specific meaning, and any other, differentiating.
Analog devices are:
• TV - the beam of the picture tube continuously moves across the screen, the
stronger the beam, the brighter the point at which it hits; the change in the glow of
the points occurs smoothly and continuously;
• turntable - the greater the height of the irregularities on the sound track, the louder
the sound sounds;
• telephone - the louder we speak into the handset, the higher the current flowing
through the wires, the louder the sound that the interlocutor hears.
20
transformed in the body from a discrete form into a continuous one, and the
information is stored not in individual neurons of the brain, but is distributed
throughout it. The continuity of presentation, for example, of visual information
allows a person to confidently perceive the dynamics of the world around him.
Discrete values take not all possible values, but only certain values, and they can be
recalculated.
In technology, continuous information is called analog. Many human-made
devices work with analog information. The beam of the TV picture tube moves
across the screen, causing the dots to glow. The stronger the beam, the brighter the
glow. The glow changes smoothly and continuously. A turntable, mercury
thermometer, and pressure gauge are examples of analog devices. Some home
appliances are available in both analog and digital designs. For example, a
tonometer is a device for measuring blood pressure. A significant difference is that
an analog device can give an absolutely arbitrary value of readings (slightly more or
less than a division), and the set of readings for a digital device is limited by the
number of digits on the indicator. The computer works exclusively with discrete
(digital) information. Computer memory consists of individual bits, which means it
is discrete. The sensors, through which information is perceived, measure mainly
continuous characteristics - temperature, load, voltage, etc. The problem of
converting analog information into discrete form arises.
The idea behind sampling a continuous signal is as follows. Let there be some
continuous signal. It can be assumed that for small intervals of time the value of the
characteristics of this signal is constant and changes instantly at the end of each
interval. "Cutting" the entire time interval into these small pieces and taking the
value of the characteristics on each of them, we get a signal with a finite number of
values. Thus, it will become discrete. A continuous value is often associated with a
graph of a function, and a discrete value is often associated with a table of its
values.
This process is called digitalization of an analog signal, and the conversion of
information is called analog-to-digital conversion. The conversion accuracy
depends on the discreteness value - the sampling frequency: the higher the sampling
frequency, the closer the digital information is to the analogue quality. But the more
calculations a computer has to do and the more information is stored and processed.
21
Sampling is the transformation of continuous images and sound into a set of
discrete values in the form of codes.
When transmitting discrete data over communication channels, two main
types of physical coding are used - based on a sinusoidal carrier signal and based on
a sequence of rectangular pulses. The first method is often referred to as modulation
or analog modulation, emphasizing the fact that coding is performed by changing
the parameters of an analog signal. The second method is commonly referred to as
digital coding. These methods differ in the width of the spectrum of the resulting
signal and the complexity of the equipment required for their implementation.
Nowadays, more and more data, initially having an analog form (speech,
television image), are transmitted via communication channels in a discrete form,
that is, in the form of a sequence of ones and zeros. The process of representing
analog information in discrete form is called discrete modulation. Analog
modulation is used to transmit discrete data over narrow bandwidth channels,
typical of which is a voice frequency channel (telephone network).
In simple computers, such as digital electromechanical or analog computers,
reconfiguration for various tasks was carried out by changing the system of
connections between elements on a special patch panel. In modern universal
computers, such changes are made by storing in a special device that accumulates
information, one or another program of its work.
Unlike analog machines operating on continuous information, modern
computers deal with discrete information, at the input and output of which any
sequence of decimal digits, letters, punctuation marks and other symbols can act as
such information. Within the system, this information is encoded as a sequence of
signals that take on only two different values.
While the capabilities of analog machines are limited to converting strictly
limited types of signals, modern computers have the property of versatility, in other
words, a computer can convert any alphanumeric data thanks to a program compiled
to perform a particular task. This ability of a computer is achieved due to the
universality of its command system, that is, elementary information
transformations.
The property of the versatility of a computer is not limited to the ability to operate
with alphanumeric information alone. Any discrete information can be represented
(encoded) in this form, as well as - with any given degree of accuracy - arbitrary
continuous information. Thus, computers can be considered as universal converters
of information. The versatility of modern computers makes it possible to use them
22
to simulate any other information converters, including any thought processes.
Technologies for digital processing of acoustic signals and images are
increasingly being used in various fields, in particular for user identification or for
building multi-level protection systems. At the same time, in the list of the main
requirements for the corresponding systems, the first place is given to the
versatility, speed and efficiency of various processing procedures based on the use
of standard inexpensive technical means included in the set of traditional office
equipment and computer telephony: PC, scanner, printer, sound card , modem. To
implement such systems, approaches are needed that allow processing acoustic
signals and speech.
A person receives almost 80% of information through sight, which means the
dominance of visual receptors in human life. All information in a person's thinking
apparatus is stored in the form of images, and in this image the information received
by all human receptors is concentrated. It can be concluded that information in
human memory is stored in the form of graphic objects. Developing the hypothesis
that any information received by a person from the outside goes through the stage of
transformation into images with their subsequent purposeful processing, it is
possible to derive a sequence of procedures suitable for implementation in
automated data processing systems of various kinds, including speech:
• preprocessing, when, regardless of the type of information received, it is
converted to the general form of primary descriptions in the form of two-
dimensional data matrices with non-negative values, which can be considered as
images, images;
• processing assumes that on the basis of some general principles, methods and
algorithms, transformations of the received primary data are carried out in order
to achieve the set goals (compression, “noise reduction”, comparison,
recognition, etc.);
• obtaining new knowledge and making decisions are based on the conclusion
from the nature and type of information received from the outside world, as
well as the results of its processing to perform specific actions in accordance
with the general strategy of human behavior.
The practical significance of this hypothesis is that the intellectual capabilities
of a person in the analysis and processing of visual information, as well as the
accumulated scientific potential in the field of restoration, recognition and
processing of images can be extended today to existing technologies for processing
information of a different kind, including acoustic signals and speech.
People perceive space as “depth”, and the images formed by the mind's eye
23
appear to them three-dimensional. However, in the exact disciplines, processing of
three-dimensional images is rarely used, which is explained by the obvious
technical difficulties of working with them, as well as a lack of understanding of the
nature of the process of perception of images. In most practical applications,
researchers deal with quasi-three-dimensional images, when a two-dimensional
matrix is constructed using two known parameters, for example, frequency and
time, the values of which are determined by the values of the third known
parameter, for example, the power and amplitude of the calculated instantaneous
spectrum.
QUESTIONS OF SELF-CONTROL
24
The concept of number is fundamental to both mathematics and computer
science. There is another important concept associated with numbers - the number
system.
A number system is a way of representing numbers and the corresponding
rules for actions on numbers.
The various number systems that existed before and which are used in our
time can be divided into nano-positional and positional.
In ancient times, when people began to count, there was a need to write
numbers. Initially, the number of objects was displayed with an equal number of
some icons: notches, dashes, dots.
A study by archaeologists of Paleolithic notes on bone, stone, wood showed
that people tried to group marks by 3, 5, 7, 10 pieces. This grouping made it easier
to count. People learned to count not only by ones, but also by threes, fives, etc.
Since the first computing instrument of a person was the fingers, therefore, the
count was most often carried out in groups of 5 or 10 objects.
In the future, tens of tens (one hundred), tens of hundreds (one thousand) and
so on received their name. For convenience of writing, such nodal numbers began to
be designated with special symbols - numbers. If, when counting objects, there were
2 hundred, 5 tens and 4 more objects, then when recording this value, they repeated
the sign of a hundred twice, five times the sign of tens and four times the sign of
one.
In such number systems, the value that it denotes does not depend on the position
of the sign in the number record; therefore, they are called non-positional
number systems.
Non-positional systems were used by the ancient Egyptians, Greeks, Romans
and some other peoples of antiquity.
In Russia, up to the 18th century, a non-positional system of Slavic numbers
was used. The letters of the Cyrillic (Slavic alphabet) had a numerical meaning if a
%
special sign ~ titlo was placed above them. For example à — 1, Д — 4, Р%— 100.
Non-positional number systems were more or less suitable for performing addition
and subtraction, but not at all convenient for multiplication and division.
The idea of a positional number system first appeared in ancient Babylon.
In positional number systems, the value denoted by a digit in a number
recording depends on its position.
The number of digits used is called the base of the positional number
system.
25
The number system used in modern mathematics is the positional
decimal system. Its base is ten, since any numbers are written using ten digits:
0,1, 2, 3, 4, 5, 6, 7, 8, 9.
333 = 3x100 + 3 x 1 0 + 3.
Another example:
This shows that any decimal number can be represented as the sum of the
products of its constituent digits by the corresponding powers of tens. The same is
true for decimal fractions.
26
5.2. NUMBER SYSTEMS USED IN COMPUTERS
Obviously, the number "ten" is not the only possible basis for a positional
system. The well-known Russian mathematician NN Luzin put it this way: “The
advantages of the decimal system are not mathematical, but zoological. If we had
not ten fingers on our hands, but eight, then humanity would use the octal system. "
Any natural number greater than 1 can be taken as the base of the positional
number system. The above-mentioned Babylonian system had a base of 60. Traces
of this system have survived to this day in the order of time units (1 hour = 60
minutes, 1 minute = 60 s).
To write numbers in a positional system with base n, you need to have an
alphabet of n digits. Usually for this, for n <10, the first n Arabic digits are used,
and for n> 10, letters are added to the ten Arabic numerals.
Here are examples of alphabets from several systems:
n=2 binary 01
n=3 ternary 01 2
n=8 octal 01234567
n=16 hexadecimal 0123456789ABCDEF
27
Computers use the binary system because it has several advantages over other
systems:
• for its implementation, technical devices with two stable states are needed (there is
current - no current, magnetized - not magnetized, etc.), and not, for example, with
ten, as in decimal;
• presentation of information by means of only two states is reliable and noise-
resistant;
• it is possible to use the apparatus of Boolean algebra to perform logical
transformations of information;
• binary arithmetic is much simpler than decimal.
The disadvantage of the binary system is the rapid increase in the number of
digits required to write numbers.
It is much easier to design a processor that operates in binary rather than decimal.
A binary system, convenient for computers, is inconvenient for humans because of
its cumbersomeness and unusual recording.
Converting numbers from decimal to binary and vice versa is done by the
machine. However, in order to use a computer professionally, you must learn to
understand the word machine. For this, the octal and hexadecimal systems have
been developed.
Numbers in these systems are read almost as easily as decimal ones, they
require three (octal) and four (hexadecimal) times less digits, respectively, than in
the binary system (after all, the numbers 8 and 16 are, respectively, the third and
fourth powers of 2) ...
The conversion of octal and hexadecimal numbers to the binary system is
very simple: it is enough to replace each digit with an equivalent binary triad (three
digits) or a tetrad (four digits).
For instance:
To convert a number from binary to octal or hexadecimal, it must be split to the left
and right of the comma into triads (for octal) or tetrads (for hexadecimal) and
replace each such group with the corresponding octal (hexadecimal) digit.
28
For instance,
QUESTIONS OF SELF-CONTROL
29
CHAPTER 6. ALGORITHMS FOR CONVERTING NUMBERS
30
This task is already more difficult than converting to the decimal system. For
example, try to convert the number 157 to the binary system in this way. Of course,
it is possible, but difficult!
However, there is a procedure that makes this translation easy. It consists in
the fact that the given decimal number is divided with the remainder on the basis of
the system. The resulting remainder is the least significant digit of the desired
number, and the resulting quotient is again divided with the remainder, which is
equal to the second digit on the right, etc. This continues until the quotient becomes
less than the divisor (base of the system). This quotient is the most significant digit
of the required number.
Let's demonstrate this method using the example of converting 3710to the
binary system. Here, symbols are used to denote numbers in a number record:
а5а4а3а2а1а0.
You are familiar with the rules for performing arithmetic operations with
multidigit decimal numbers. In elementary school, you learned to add, subtract,
multiply, and divide with a corner. Ultimately, you need to know how to add and
multiply single-digit numbers to perform calculations. Many first-graders memorize
the multiplication table for decimal numbers for a long time and with great
difficulty. But if at school they studied not decimal, but binary arithmetic, no one
would have any problems and all students would be excellent students! Now you
will see that binary arithmetic is really very simple.
31
You are already familiar with the binary number system. There are only two
numbers in it: 0 and 1. Here are all the variants of their addition:
0 + 0 = 0, 0 + 1 = 1, 1 + 1 = 10.
It should already be clear to you that 102 = 210 (recall that the subscript
denotes the base of the number system and is always written in decimal). It is easy
to write a series of binary natural numbers, getting each next number by adding one
to the previous one.
Table 1 shows how quickly the number of digits in binary numbers grows. But this
shortcoming of the binary system is compensated by the simplicity of arithmetic.
Here is an example of adding two multi-digit binary numbers in a column:
101101110 1
+
111010110
10010110011
111
х
11__
111
+
111___
10101
32
QUESTIONS OF SELF-CONTROL
33
CHAPTER 7. PRINCIPLES OF INFORMATION PROCESSING BY A
COMPUTER
34
According to the first, all parts and devices are manufactured in the form of
separate blocks, information between which is transmitted through a set of
connections, combined into a trunk. In this case, the general scheme of the PC can
be represented as follows:
CPU RAM
Logic as a science has been developing since the 4th century. BC e. starting
with the writings of Aristotle. It was he who analyzed human thinking, such forms
as concept, judgment, inference.
Logic - (from the Greek. "Logos", meaning "word" and "meaning") - the
science of the laws, forms and operations of correct thinking. Its main task is to find
and organize the correct ways of reasoning.
Form of thinking
35
Concept
general and singular; theoretical
and empirical; concrete and
abstract; the formation of con-
automation
Inference
Based on several judgments, a certain conclusion is made deductive
(from society to particular); inductive (from particular to general); by
analogy (based on similarities between objects); analysis, synthesis,
comparison
Judgment
affirmation or denial of
something; true or false;
finding connections and
relationships
A B F
1 1 1
1 0 1
0 1 1
0 0 0
37
4) Logical follow-up or implication:
Implication is a complex logical expression that is true in all cases, except
from the truth follows false. That is, this logical operation connects two simple
logical expressions, of which the first is a condition (A), and the second (B) is a
consequence.
Truth table for implication
A B F
1 1 1
1 0 0
0 1 1
0 0 1
Questions of self-control
39
CHAPTER 8. STORAGE OF INFORMATION OBJECTS OF VARIOUS
TYPES ON VARIOUS DIGITAL MEDIA. DETERMINATION OF THE
VOLUME OF VARIOUS MEDIA. ARCHIVE OF INFORMATION.
8. 1. INFORMATION OBJECT
40
8.2. ELECTRONIC INFORMATION OBJECTS
Removable digital media are used to store and transfer electronic information
objects. These include:
removable hard disk - information storage device based on the principle of
magnetic recording, information is recorded on hard (aluminum or glass) plates
covered with a layer of fibroma genetic material,
floppy disk - a portable information carrier used for multiple recording and
storage of data, which is a flexible magnetic disk placed in a protective plastic
case, covered with a ferromagnetic layer,
compact disc - an optical information carrier in the form of a plastic disc with a
hole in the center, the process of writing and reading information of which is
carried out using a laser (CD-ROM and DVD-disc - intended for reading only;
CD-RW and DVD-RW information can recorded multiple times),
memory card or flash card - compact electronic storage device used to store
digital information (they are widely used in electronic devices, including digital
cameras, cell phones, laptops, MP3 players and game consoles),
USB flash drive (slang. Flash drive) - a storage device that uses a flash
memory as a carrier and is connected to a computer or other reader via the USB
interface.
One of the most widespread types of service programs are programs designed
for archiving, packing files by compressing the information stored in them.
Compression of information is the process of converting information stored
in a file into a form in which redundancy in its representation is reduced and,
accordingly, less memory is required for storage.
Compression of information in files is performed by eliminating
redundancy in various ways, for example, by simplifying codes, eliminating
constant bits from them, or representing repeating symbols or a repeating sequence
of symbols in the form of a repetition factor and corresponding symbols. Various
algorithms for such information compression are used.
One or several files can be compressed, which are placed in a compressed
form in a so-called archive file or archive.
An archive file is a specially organized file containing one or several files in
compressed or uncompressed form and service information about the file names,
date and time of their creation or modification, sizes, etc.
42
The purpose of packing files is usually to provide a more compact placement
of information on a disk, to reduce the time and, accordingly, the cost of
transmitting information through communication channels in computer networks. In
addition, packing a group of files into one archive file greatly simplifies their
transfer from one computer to another, reduces the time for copying files to disks,
helps protect information from unauthorized access, and helps protect against
infection by computer viruses.
The amount of compression depends on the program used, the compression
method and the type of source file. The files of graphic images, text files and data
files for which the compression ratio can reach 5 - 40% are compressed the best,
files of executable programs and load modules are compressed less - 60 - 90%.
Archive files are hardly compressed. Programs for archiving differ in the
compression methods used, which accordingly affects the compression ratio.
Archiving (packing) - placing (loading) source files into an archive file in
compressed or uncompressed form. Unpacking (unpacking) is the process of
restoring files from the archive exactly as they were before loading into the archive.
When unpacking, the files are extracted from the archive and placed on disk or in
RAM;
The programs that pack and unpack files are called archiving programs.
Archive files that are large in size can be located on multiple disks (volumes). Such
archives are called multivolume. A volume is an integral part of a multivolume
archive. By creating an archive of several parts, you can write parts of it to multiple
floppy disks.
43
• adding comments to files in the archive;
• creation of multivolume archives;
• creation of self-extracting archives, both in one volume, and in the form of several
volumes;
• ensuring the protection of information in the archive and access to files placed in
the archive, protection of each of the files placed in the archive with a cyclic
code;
• testing the archive, checking the safety of information in it;
• recovering files (partially or completely) from damaged archives;
• support for types of archives created by other archivers, etc.
Archive types
Various algorithms are used for compression, which can be divided into reversible
and lossy compression methods. The latter are more effective, but are used for those
files for which partial loss of information does not lead to a significant decrease in
consumer properties. Typical lossy compression formats are:
.jpg - for graphic data;
.mpg - for video data;
.mp3 - for audio data.
44
Archiving programs also allow creating such archives, for extracting the
files from which they do not require any programs, since the archive files
themselves may contain an unpacking program. These archive files are called self-
extracting files.
A self-extracting archive file is a bootable, executable module that is
capable of self-extracting the files contained in it without using an archiver
program.
The self-extracting archive is called SFX-archive (SelF-eXtracting).
Archives of this type in MS DOS are usually created in the form of an .EXE file.
Many archiving programs unpack files by unloading them to disk, but there are also
those that are designed to create a packed executable module (program). As a result
of such packaging, a program file with the same name and extension is created,
which, when loaded into RAM, is self-extracting and immediately launched. At the
same time, the reverse conversion of the program file into the unpacked format is
also possible. These archivers include PKLITE, LZEXE, UNP programs.
The EXPAND program, which is part of the utilities of the MS DOS
operating system and the Windows shell, is used to unpack files for software
products supplied by Microsoft.
RAR and AIN archiving programs, in addition to the usual compression
mode, have a solid mode, in which archives with a high compression ratio and a
special organization structure are created. In such archives, all files are compressed
as one data stream, i.e. the search area for repeated sequences of characters is the
entire collection of files loaded into the archive, and therefore unpacking each file,
if it is not the first, is associated with processing others. Archives of such
Self-control issues
45
46
CHAPTER 9. SEARCH AND TRANSFER OF INFORMATION USING A
COMPUTER. SOFTWARE SEARCH SERVICES. WIRED
AND WIRELESS
47
"information search" as finding documents in an information array that
correspond to a user's information request.
From the point of view of using computer technology, "information
search"is a set of logical and technical operations with the ultimate goal of finding
documents, information about them, facts, data relevant to the consumer's request.
"Relevance" is the correspondence of the content of a document to an
information request or a search image of a document to a search prescription,
established during an information search.
The Windows operating system indexes the information that is located on the
hard drives of the computer, which can significantly speed up the search for files
and folders.
The Explorer program has an integrated tool for finding various information.
Each window has a search bar located in the upper right corner of the window. It is
enough to enter the search criteria (most often this is the file name), and Explorer
will display the objects that were found in the list of files.
If the search did not return any results, or if there are enough results, you can
add criteria for a more precise search. To do this, left-click in the search field and
select one of the links in the window that appears. For different files, these can be
criteria such as Size, Modified Date, View and Type.
You can search in a specific folder or on a specific drive on your computer.
To do this, under the results shown, click the Other button and in the window that
opens, select one of the computer disks for search.
To exclude any disk from this list, simply left-click on it. Click OK to start
searching.
There are standard templates for searching for files. They use special
characters: "?" (replaces any single character) and "*" (replaces any combination of
characters).
Examples of templates for searching for files in the current folder are the
following:
*.* - all files;
* .docx - all files with the .docx extension (Word documents);
o *. * - all files whose names begin with "o".
48
9.3. SOFTWARE SEARCH SERVICES
Search system is a software and hardware complex with a web interface that
provides the ability to search for information on the Internet. A search engine
usually means a site that hosts an interface (front-end) of the system. The software
part of the search engine is the search engine (search engine) - a set of programs
that provide the functionality of the search engine and is usually a trade secret of the
search engine developer.
How does a search system?
Systems usually work in stages. First, the crawler receives the content, then
the indexer generates a searchable index, and finally, the search engine provides the
functionality to search the indexed data. To update the search engine, this indexing
cycle is repeated.
When a user enters a query into a search engine (usually using keywords), the
system checks their index and returns a list of the most suitable web pages (sorted
by some criterion), usually with a short annotation containing the title of the
document and sometimes parts of the text.
The usefulness of a search engine depends on the relevance of the pages it
finds. Although millions of web pages may include a word or phrase, some may be
more relevant, popular, or authoritative than others.
Most search engines use ranking techniques to bring the “best” results to the
top of the list. Most search engines are commercial enterprises that profit from
advertising, in some search engines you can buy the first places in the SERP for the
49
given keywords for a fee. Search engines that do not charge money for the order in
which results are displayed earn from contextual advertising, while advertising
messages correspond to the user's request. Such advertisements are displayed on a
page with a list of search results, and search engines earn every time a user clicks on
advertisements.
Search system Market share in July 2014 Market share in October 2014
Google 68,69 % 58.01 %
Baidu 17,17 % 29.06 %
Bing 6.22 % 8.01 %
Yahoo! 6.74 % 4.01 %
AOL 0,13 % 0.21 %
Excite 0.22 % 0,00 %
Ask 0,13 % 0,10 %
50
The main purpose of computer networks is to provide users with shared
access to information (databases, documents, etc.) and resources (hard disks,
printers, CD-ROM drives, modems, access to the global network, etc.).
Network subscribers are objects that generate or consume information.
Network subscribers can be individual computers, industrial robots, CNC machines
(numerically controlled machines), etc. Any subscriber of the network is connected
to the station.
Station - equipment that performs functions related to the transmission and
reception of information.
To organize the interaction of subscribers and the station, a physical transmission
medium is required.
Physical transmission medium - communication lines or space in which
electrical signals propagate and data transmission equipment.
One of the main characteristics of communication lines or channels is the data
transfer rate (bandwidth).
Data transfer rate is the number of bits of information transmitted per unit
of time.
Typically, data rates are measured in bits per second (bps) and multiples of Kbps
and Mbps.
Relationships between units:
51
users in the room leads to the need to install false panels on the floor and lay cables
under the floor. This solution has some degree of stability and is suitable for a long
service life of the premises. It should be noted that such a solution can lie within a
single office network, which is quite expensive.
Wireless technologies make it possible to create local networks, independent
of the location of the switched devices inside the same room. A wireless LAN, like
a wired LAN, is connected to an external network by an ethernet switch. This
stationary device connects to wireless access points.
A router with a WiFi access function or the access point itself helps to
organize a wireless access point. This technology can be used for mobile LAN
deployment. The difference between an access point and a Wi-Fi router is the same
as between a router and a switch: an access point is an analogue of a regular
network hub (switch, switch), that it simply combines wireless computers into one
network segment, while a Wi-Fi router is an access point that includes some kind of
hardware and software solution that allows you to connect the above network
segment to the Internet, configure static and dynamic routes for different subnet
segments, organize traffic filtering and control user (or users) actions. In reality, an
access point is usually made on several independent channels, so a cheap access
point is usually 1.3 - 1.5 times more expensive than a cheap Wi-Fi router.
QUESTIONS OF SELF-CONTROL
1. What is Relevance?
2.What is a Search Engine?
3. What is the difference between wired and wireless technology?
4. How does a search engine work?
5. The most popular search engines in the world?
52
CHAPTER 10. MEANS OF INFORMATION AND COMMUNICATION
TECHNOLOGIES
COMPUTER ARCHITECTURE.
53
A). ALU - arithmetic logic unit designed to perform arithmetic and logical
operations on data and memory addresses;
B). Registers or microprocessor memory - super-operative memory operating at the
speed of the processor, ALU works with them;
B). CD - control device - control of the operation of all MP nodes by generating and
transmitting to its other components control pulses coming from a quartz clock
generator, which, when the PC is turned on, begins to vibrate at a constant
frequency (100 MHz, 200-400 MHz). These fluctuations set the pace for the
entire motherboard;
D). IS - interrupt system - a special register describing the state of the MP, which
allows interrupting the operation of the MP at any time for immediate
processing of some incoming request, or placing it in a queue; after processing
the request, the SPR ensures the restoration of the interrupted process;
D). Common bus control device - interface system.
To expand the capabilities of the PC and improve the functional characteristics
of the microprocessor, an additional mathematical coprocessor can be supplied,
which serves to expand the set of MP commands. For example, the math
coprocessor of IBM-compatible PCs expands the capabilities of the MT for
floating point computing; a coprocessor in local networks (LAN-processor)
expands the functions of the MT in local networks.
Processor specifications:
speed (performance, clock frequency) - the number of operations performed per
second.
bit depth - the maximum number of bits of a binary number, over which a
machine operation can be performed simultaneously.
The interface system is:
- control bus (CB) - designed to transmit control pulses and synchronize signals to
all PC devices;
address bus (AB) - designed to transmit the code of the memory cell address or
the input / output port of an external device;
data bus (DB) - designed for parallel transmission of all bits of the numeric code;
power bus - to connect all PC units to the power supply system.
The interface system provides three directions of information transfer:
between MP and RAM;
between MP and ports of input / output of external devices;
between the RAM and the input / output ports of external devices. Information
exchange between devices and the system bus takes place using ASCII codes.
54
Memory is a device for storing information in the form of data and programs.
Memory is primarily divided into internal (located on the motherboard) and external
(located on a variety of external storage media).
Internal memory, in turn, is subdivided into:
ROM (read only memory) or ROM (read only memory), which contains -
permanent information stored even when the power is off, which is used to test
the memory and hardware of the computer, boot the PC at startup. Recording on a
special ROM cassette takes place at the factory of the PC manufacturer and
carries the features of its individuality. The ROM size is relatively small - from
64 to 256 KB.
RAM (random access memory) or RAM (random access memory), is used for
online storage of programs and data stored only for the period of PC operation. It
is volatile, information is lost when the power is turned off. The RAM stands out
for its special functions and access specifics:
(1) the RAM stores not only data, but also the executable program;
(2) MP has the ability to directly access the RAM, bypassing the input / output
system.
The logical organization of memory is addressing, the location of data is
determined by the software installed on the PC, namely the OS.
Cache memory - has a short access time, serves for temporary storage of
intermediate results and contents of the most frequently used memory cells and MP
registers.
The amount of cache memory depends on the PC model and is usually 256
KB.
External memory. External memory devices are very diverse. The proposed
classification takes into account the type of media, i.e. a material object capable of
storing information.
The controllers are used to provide direct communication with the OP,
bypassing the MP, they are used for devices for fast data exchange with OP - floppy
disk drive, HDD, display, etc., to ensure operation in a group or network mode. The
keyboard, display, mouse are slow devices, so they are connected to the
motherboard by controllers and have their own memory areas in the memory.
Ports are input and output, universal (input - output), they serve to ensure the
exchange of information between the PC and external, not very fast devices. The
information coming through the port is sent to the MT, and then to the OP. There
are two types of ports:
55
serial - provides bit-by-bit information exchange, usually a modem is connected
to this port;
parallel - provides a byte-by-byte exchange of information, a printer is connected
to this port. Modern PCs are usually equipped with 1 parallel and 2 serial ports.
Video monitors are devices designed to display information from a PC to a user.
Monitors are monochrome (green or amber image, high resolution) and color.
Highest quality RGB monitors, have high resolution for graphics and color. It uses
the same principle of a cathode ray tube as a television. Portable PCs use
electroluminescent or liquid crystal panels. Monitors can work in text and
graphic modes. In text mode, the image consists of familiarity - special characters
stored in the video memory of the display, and in the graphic image it consists of
dots of a certain brightness and color. The main characteristics of video monitors
are resolution (from 600x350 to 1024x768 pixels), the number of colors (for color) -
from 16 to 256, the frame rate is fixed at 60 Hz.
Printers are computer output devices that convert information ASCII codes into
their corresponding graphic symbols and fix these symbols on paper. Printers are
the most developed group of external devices, there are more than 1000
modifications.
Printers are black and white or color according to the printing method, they are
divided into:
dot matrix - in these printers, the image is formed from dots in an impact manner,
the needle print head moves in the horizontal direction, each needle is controlled
by an electromagnet and hits the paper through the ink ribbon. The number of
needles determines the print quality (from 9 to 24), the print speed is 100-300
characters / sec, the resolution is 5 dots per mm;
inkjet - in the print head instead of needles there are thin tubes - nozzles through
which the smallest droplets of ink are thrown onto the paper (12 - 64 nozzles),
print speed up to 500 characters / sec, resolution - 20 dots per mm;
thermographic - matrix printers equipped with a thermal matrix instead of a
needle print head, special thermal paper is used for printing;
laser - an electrographic method of image formation is used, the laser is used to
create an ultra-thin light beam that traces the contours of an invisible point
electronic image on the surface of the photosensitive drum. After the development
of the image with a powder of dye (toner) adhering to the discharged areas,
printing is performed - transferring the toner onto the paper and fixing the image
on the paper using a high temperature. The resolution of such printers is up to 50
dots / mm, the print speed is 1000 characters / sec.
56
Scanners are devices for entering information into a computer directly from a paper
document. You can enter texts, diagrams, pictures, graphics, photographs and other
information. The file created by the scanner in the computer memory is called a
bitmap.
Manipulators - computer devices controlled by the operator's hands:
mouse - a device for determining the relative coordinates (displacement relative to
the previous position or direction) of the operator's hand movement. Relative
coordinates are transmitted to the computer and, using a special program, can
cause the cursor to move on the screen. Various types of sensors are used to track
the movement of the mouse. The most common is mechanical (a ball touched by
several rollers), there is also an optical sensor that provides a higher accuracy of
reading coordinates;
joystick - lever pointer - a device for entering the direction of movement of the
operator's hand, they are more often used for games on a computer;
digitizer or digitizing tablet - a device for accurate input of graphic information
(drawings, graphs, maps) into a computer. It consists of a flat panel (tablet) and an
associated hand-held device - a pen. The operator draws a pen along the graph,
while the absolute coordinates are sent to the computer.
Keyboard is a device for entering information into the computer's memory. There
is a microcircuit inside, the keyboard is connected to the motherboard, pressing any
key produces a signal (the character code in the ASCII system is a hexadecimal
serial number of the character in the table), in the computer memory a special
program by code restores the appearance of the pressed character and transfers its
image to the monitor .
A specific set of components included in a given computer is called its
configuration. The minimum PC configuration required for its operation includes
a system unit (there are MP, RAM, ROM, HDD, floppy disk drive), a keyboard (as
an input device) and a monitor (as an output device).
57
Program - a complete and accurate description of the sequence of actions
(instructions) of a computer for processing information, written in a language that
the computer can understand.
Software (SW) - a set of special programs that facilitate the process of
preparing tasks for execution on a computer and organizing their passage through
the machine, as well as procedures, descriptions, instructions and rules, along with
all documentation associated with these components used in the operation of a
computer system.
Purpose of software:
ensuring the performance of the computer;
facilitating user interaction with the computer;
shortening the cycle from setting a task to obtaining a result;
improving the efficiency of using computer resources.
The software allows:
to improve the organization of the computing system in order to maximize
the use of its capabilities;
to increase the productivity and quality of the user's work;
to adapt user programs to the resources of a specific computing system;
expand the software of the computing system.
Software classification:
58
Self-control issues
59
CHAPTER 11. SAFETY, HYGIENE, ERGONOMICS, RESOURCE
SAVING. INFORMATION PROTECTION, ANTI-VIRUS
PROTECTION.
11.1. ERGONOMICS
60
For normal operation, you need to place the monitor so that the user's eyes are
located at a distance equal to one and a half diagonals of the visible part of the
monitor:
not less than 50-60 cm for a 15 "monitor;
not less than 60-70 cm for a 17 "monitor;
not less than 70-80 cm for a 19 "monitor;
not less than 80-100 cm for a 21 "monitor.
If your vision does not allow you to maintain this distance, then reduce the
image resolution and increase the fonts.
The optimal screen diagonal for working with text documents is 15 "-17"
with a resolution of 1024x768. For graphic work, a 19 "-21" monitor is required
with a resolution of 1280x1024 and higher. For games, 17 "-19" is recommended. It
is not recommended to purchase monitors with large diagonals, because from
working at too large monitors, according to users, "the eyes become square."
It is necessary to sit further from a large monitor than from a small one. As a
result, the angular area of the monitor remains the same. But it becomes more
difficult to focus the eye on a small image located 1-1.5 meters from the eye, which
leads to overstrain of the visual apparatus. The larger the object on the monitor
screen, the less fatigue. Therefore, computer games with their drawn figures are less
tiring than numbers and letters.
The monitor screen must be absolutely clean. Wipe it periodically and if
necessary, with special napkins. The fatigue from working with the monitor is less,
the lower the screen brightness and the larger the objects on the screen. Set the
brightness as low as possible without stress to distinguish characters on the screen.
Please note that it is better to enlarge the font or image than move closer to the
screen or increase the brightness. Modern operating systems have special tools for
this. The fonts on the screen can be scaled, set the minimum size of the elements of
pictures, and so on.
61
A huge amount of information is stored, transmitted and processed in society,
and this is partly why the modern world is very fragile, interconnected and
interdependent. Information circulating in control and communication systems is
capable of causing large-scale accidents, military conflicts, disorganization of the
activities of scientific centers and laboratories, bankruptcy of banks and commercial
organizations. Therefore, information must be able to protect against distortion,
loss, leakage, and illegal use.
Example. In 1983, there was a flood in the southwestern United States. The
reason was a computer that was entered incorrect weather data, as a result of which
it gave an erroneous signal to the gateways that block the Colorado River.
Example. In 1971, 352 carriages disappeared on the New York Railroad. The
criminal used the information of the computer center that controls the operation of
the railway and changed the destination addresses of the cars. The damage was over
a million dollars.
The development of industrial production brought a huge amount of new
knowledge, and at the same time there was a desire to keep some of this knowledge
from competitors, to protect it. Information has long been a product and a
commodity that can be bought, sold, exchanged for something else. Like any
product, it requires the use of special methods to ensure safety.
In informatics, the main types of information protection when working on a
computer and in telecommunication networks are considered to the greatest extent.
Computers are technical devices for fast and accurate (error-free) processing
of large amounts of information of various types. But, despite the constant increase
in the reliability of their work, they can fail, break down, like any other human-
made devices. Software is also made by people who can be wrong.
Hardware and software designers and developers work hard to ensure that
information is protected:
- from equipment failures;
- from accidental loss or distortion of information stored in the computer;
- from deliberate distortion, produced, for example, by computer viruses;
- from unauthorized (illegal) access to information (its use, modification,
distribution).
To the numerous, far from harmless errors of computers, computer crime has
also been added, which threatens to develop into a problem, the economic, political
and military consequences of which can be catastrophic.
When protecting information from equipment failures, the following basic
methods are used:
62
periodic archiving of programs and data. Moreover, the word "archiving"
means both the creation of a simple backup copy and the creation of a copy
with preliminary compression (compression) of information. In the latter case,
special archiving programs are used (Arj, Rar, Zip, etc.);
automatic backup of files. If the user must take care of archiving, then when
using automatic backup programs, the command to save any file is
automatically duplicated and the file is saved on two offline media (for
example, on two hard drives). Failure of one of them does not lead to loss of
information. File backup is widely used, in particular in banking.
Protection against accidental loss or distortion of information stored in a
computer comes down to the following methods:
an automatic confirmation request for a command that changes the content of a
file. If you want to delete a file or place a new file under the name of an existing
one, a dialog box will appear on the display screen asking you to confirm the
command or cancel it;
setting special attributes of documents. For example, many editor programs
allow you to make a document read-only or hide a file by making its name
unavailable in file programs;
the ability to undo recent actions. If you are editing a document, you can use the
undo function of the last action or group of actions available in all modern
editors. If you mistakenly deleted the required file, then special programs allow
you to restore it, however, only if you did not manage to write anything over the
deleted file;
differentiation of user access to the resources of the file system, strict separation
of the system and user modes of operation of the computing system.
Protecting information from intentional corruption is often also called
protection against vandalism.
The problem of vandalism is the appearance of such disasters as computer viruses
and computer worms. Both of these terms are coined more to draw public attention
to the problem, and not to denote some of the techniques of vandalism.
A computer virus is a specially written small piece of a program that can be
attached to other programs (files) on a computer system. For example, a virus can
insert itself at the beginning of a program, so that each time that program is
executed, the virus will be activated first. During execution, the virus can produce
deliberate corruption, which immediately becomes visible, or simply look for other
programs to which it can attach copies of itself. If an "infected" program is
transferred to another computer via a network or a floppy disk, the virus will begin
63
infecting programs on the new machine as soon as the transferred program is
launched. In this way, the virus passes from machine to machine. In some cases,
viruses slowly spread to other programs and do not manifest themselves until a
certain event occurs, for example, a given date comes, from which they will
“destroy” everything around. There are many types of computer viruses. Among
them there are both invisible and self-modifying.
The term "worm" usually refers to a stand-alone program that replicates itself
across the network, residing on different machines. Like viruses, these programs
can be designed to replicate and sabotage.
To protect against viruses, you can use:
general methods of protecting information, which are also useful as insurance
against physical damage to disks, malfunctioning programs or erroneous user
actions;
preventive measures to reduce the likelihood of contracting the virus;
specialized anti-virus programs.
64
name. Cryptographic systems were rapidly developed during the First and Second
World Wars. The advent of computing has accelerated the development and
improvement of cryptographic techniques.
The main areas of using these methods are the transmission of confidential
information through communication channels (for example, by e-mail), the
authentication of transmitted messages, the storage of information (documents,
databases) on media in encrypted form.
The problem of using cryptographic methods in modern information systems
is now becoming especially relevant. On the one hand, the use of
telecommunication networks has expanded, through which large volumes of
information of a state, commercial, military and private nature are transmitted,
which does not allow access to it by unauthorized persons. On the other hand, the
emergence of new powerful hardware and software, effective decryption
technologies has reduced the reliability cryptographic systems, which until recently
were considered practically undisclosed.
Another possible method of protecting information from unauthorized access
is the use of passwords.
Passwords allow you to control access both to computers and to individual
programs or files. Unfortunately, sometimes it is possible to guess the password,
especially since many users use their names, names of relatives, dates of birth as
passwords.
There are software tools for "breaking" passwords. To counter password
guessing attempts, operating systems can be designed to keep track of when
someone repeatedly uses inappropriate passwords (the first sign of someone else's
password guessing). In addition, the operating system can tell each user at the
beginning of his Session when his account was last used. This method allows the
user to detect cases where someone has worked on the system under his name. A
more sophisticated defense (called a trap) is to create the illusion of successful
access to information for the time when the attacker is being analyzed where the
attacker came from.
SELF-CONTROL ISSUES
65
4. What is "Worm"?
5. What methods are used to protect against viruses?
The term information system (IS) is used in both broad and narrow sense.
In a broad sense, an information system is a set of information contained in
databases and information technologies and technical means ensuring its
processing.
In a narrow sense, an IS is a subset of IS components in a broad sense, including
databases, DBMS and specialized applications.
Distinguish:
• desktop (local) IS, in which all components (DB, DBMS, client applications) are
located on one computer;
• distributed IS, in which the components are distributed over several computers.
Desktop publishing systems are used for professional publishing. They
allow for electronic layout of a wide range of basic types of documents such as
newsletter, color brochure, catalog, reference book. They allow you to solve
problems:
1. compose (typeset) the text;
2. use all kinds of fonts and carry out printing images;
3. carry out text editing at the level of the best word processors;
4. process graphic images;
5. output documents of printing quality;
6. work in networks on different platforms.
Examples of such packages are: Corel Ventura, Page Maker, MS Publisher.
66
12.2. BASIC FUNCTIONALITY OF TEXT EDITORS
67
To add a piece of text in Word, you need to place the cursor in the place for
entering an additional piece and enter it. To delete the character located to the right
of the cursor, press the [Delete] key. The character to the left of the cursor is deleted
using the [Backspace] key.
Ways to create documents.
In text editors, the following are used to create documents:
• wizard (produced by entering the necessary data in the sequentially appearing
dialog boxes);
• templates (empty blanks of documents for a certain purpose).
However, in most cases, to create documents, an empty New Document
template is used, which the user fills in with the content of his choice.
Selecting page parameters.
Any document consists of pages, therefore, at the beginning of work on a
document, it is necessary to set the page parameters: format, orientation and
margins.
The format of the document pages determines their size.
Orientation allows you to choose the position of the page on the monitor
screen. There are two possible page orientations - portrait and landscape. For
regular texts, the most common orientation is portrait, and for tables with a large
number of columns, landscape orientation.
On the page, you can set the required margins (top and bottom, right and
left), which determine the distance from the edges of the page to the borders of the
text.
Headers and footers and page numbers.
It is convenient to use a header or footer to display the same text on each
page of the document (for example, the author's name, document title, etc.). You
can change the distance from the page edges to the header and footer.
It is recommended to number the pages of the document, and the numbers
can be placed at the top or bottom of the page in the center, on the right or on the
left.
Insert symbols and special characters.
Symbols and special characters that are not on the keyboard (for example £, ≤, ≥, ≠,
etc.) can be inserted using the Symbol dialog (Insert / Symbol).
68
Hard page separator.
There are several ways to start a new page. Convenient to use hard page
separator insert. This can be done using the Insert / Break ...
Copying and moving text.
To copy or move the text, you must select a piece of text and perform one
of the following actions.
To move the object, click the Cut button on the Standard toolbar.
To copy an object, click the Copy button on the Standard toolbar.
To move or copy an object to another document, navigate to the desired
document, click the place to paste the object, and on the Standard toolbar, click
Paste .
To define the format of the inserted elements, select the command by
clicking the Insert button, which is displayed under the inserted element.
To copy the text, you can use the commands Edit / Copy and Edit / Paste.
Restoring a fragment of the text.
We all change our intentions sometimes. If it becomes necessary to restore
a fragment of text that was previously deleted, then you can use one of two ways:
• select the Edit / Undo command;
69
• click on the Cancel button .
The data presented in tabular form are clear. Tables have always been an
essential feature of printed documentation.
A table is an object made up of rows and columns. The main structural
element of a table is a cell, which is formed at the intersection of a column and a
row. Table cells can contain various data: text, numbers, graphics, etc. It is
convenient to format documents using tables.
Creating a table. There are two ways to create tables: creating an empty
table and then filling it in, and converting the existing text into a table.
In this case, a special button is used on the Insert – Table.
Editing a table. Editing tables means changing the width (height) of rows
(columns), merging and splitting table cells, adding or removing rows and columns.
To perform these operations, you must first select the required area of the table, and
then use the appropriate commands of the context menu or buttons on the toolbars.
When you select a table, additional Design toolbars are added to the screen.
70
Inserting graphic images.
There are two types of graphics that you can use in Word documents:
pictures and pictures. These objects can be defined as follows:
Drawings are objects of vector nature. The simplest tools for creating
them are in the word processor itself. Images are bitmap objects. The word
processor does not have the means to create them, so they are inserted as external
objects. Pictures are always embedded in the document - they can be edited directly
in place. Images are inserted into a document by linking or embedding. Editing
them using a word processor is possible, but only to a limited extent.
Creation and editing of drawings. To work with vector drawings, use the
auto shape toolbar. Here are the blanks for creating lines, geometric shapes, curly
arrows and more. When creating and editing vector objects, it is possible to change
their size, line color and thickness, fill method, as well as set rotation. To create text
elements attached to autoshapes or pictures, use the special Caption tool from the
Insert section. The label creation is applied to the ready-made autoshapes. The
required text is entered in the inscription field, after which the inscription can be
edited.
It is resized to fit 23 of the text it contains by dragging the handles. Having
created the inscription object, it can be grouped with the picture, and then they will
represent a whole composition. For autoshapes there is a special tool for creating
text design - text can be placed in the autoshape field. This operation is performed
by the command. Add text to the autoshape context menu. Working with cliparts.
Creating complex compositions with autoshapes can be very time consuming. In
such cases, ready-made collections of drawings (clipart’s) are used. Working with
images.
To add images to the document, the method of inserting from an external
source is used. This uses the Picture button on the Insert toolbar. Interaction of
images with text. The main part of the tools for setting the properties of images in a
text document is located on the Format toolbar. Typically, when you select a picture
in the text of the document, this panel opens automatically. By the way they interact
with the text, two main types of images are distinguished: embedded in a line
(inline) and free (floating).
Images of the first type can be conventionally considered as separate
symbols: when the text moves during editing, the image moves with it and remains
71
in the place of the text where it was placed. The position of the free image on the
page is not related to the input position. The image interacts with the text by
wrapping.
CONTROL QUESTIONS
72
• solving optimization problems (parameter selection, solution search, "what - if"
scenarios and other tasks);
• statistical data processing, analysis and forecasting (analysis tools from the
"Analysis Package" add-in).
Thus, Excel is not only a means of automating calculations, but also a means
of modeling various situations.
Scope of Excel: planning - financial and accounting calculations, material assets
accounting, decision support systems (DSS) and other areas of application.
Create a new workbook in Excel
Excel training should begin by exploring the Excel application window. When you
start Excel, an application window opens, displaying a new workbook - Book 1.
The Excel application window has five main areas:
• menu bar;
• toolbars;
•status bar;
• input line;
• the workbook window area.
The main data processing in Excel is carried out using commands from the
menu bar. The Standard and Formatting toolbars are built-in MS Excel toolbars that
are located below the menu bar and contain specific sets of icons (buttons). Most of
the icons are for executing the most commonly used commands from the menu bar.
73
The Excel Formula Bar is used to enter and edit values, formulas in cells or
charts. The name field is the window to the left of the formula bar that displays the
name of the active cell. Icons: X, V, fx located to the left of the formula bar are
buttons for canceling, entering and inserting a function, respectively.
The status bar of the Excel application window is located at the bottom of
the screen. The left side of the status bar indicates information about the status of
the spreadsheet work area (Done, Enter, Edit, Specify). In addition, the results of
the executed command are briefly described on the left side of the status bar. The
right side of the status bar displays the results of calculations (when performing
automatic calculations using the status bar context menu) and displays the pressed
keys Ins, Caps Lock, Num Lock, Scroll Lock.
Basic spreadsheet concepts: Column Header, Row Header, Cell, Cell
Name, Selection Marker, Fill Marker, Active Cell, Formula Bar, Name Field,
Active Sheet Area.
The working area of a spreadsheet consists of rows and columns that have
their own names.
The names of the lines are their numbers. Line numbering starts at 1 and ends
with the maximum number set for this program. Column names are letters of the
Latin alphabet, first from A to Z, then from AA to AZ, BA to BZ, etc.
The maximum number of rows and columns in a spreadsheet is determined by
the features of the program used and the amount of computer memory, for example,
in an Excel spreadsheet processor there are 256 columns and more than 16 thousand
rows. The table uses columns (256) and rows (16384).
The intersection of a row and a column forms a cell in a spreadsheet with a
unique address. References are used to indicate cell addresses in formulas (for
example, A6 or D8).
A cell is an area defined by the intersection of a column and a row in a
spreadsheet and has its own unique address.
The cell address is determined by the name (number) of the column and the
name (number) of the row at the intersection of which the cell is located, for
example, A10. Link - specifying the cell address.
The active cell is the selected cell whose name appears in the name field. A
selection marker is a bold box around a selected cell. The fill handle is the black
square in the lower right corner of the selected cell.
The active area of the worksheet is the area that contains the entered data.
The address of a block of cells is specified by indicating the links of its first
and last cells, between which a separating character is placed - a colon. If the block
74
has the form of a rectangle, then its address is set by the addresses of the upper left
and lower right cells included in the block.
The block of used cells can be specified in two ways: either by specifying the
start and end addresses of the block cells from the keyboard, or by selecting the
corresponding part of the table using the left mouse button.
An example of setting cell and block addresses in a spreadsheet:
the address of the cell located at the intersection of column F and row 9 is
expressed by reference F9;
the address of the block formed as part of line 1 - B1: E1;
the address of the block formed as a column C - C1: C21;
block address, formed in the form of a rectangle - A3: G10
Formulas are an expression that starts with an equal sign and consists of numeric
values, cell addresses, functions, names, which are connected by signs of arithmetic
operations. The signs of arithmetic operations that are used in Excel include:
addition; subtraction; multiplication; division; exponentiation.
Some operations in the formula have a higher priority and are performed in the
following sequence:
• exponentiation and expressions in brackets;
• multiplication and division;
• addition and subtraction.
75
formatting the data contained in the table;
building diagrams of the required type;
creation and maintenance of databases with the ability to select records by a
specified criterion and sort by any parameter;
transfer (insertion) into the table of information from documents created in
other applications running in the Windows environment;
printing the final document in whole or in part.
76
range starting from the cell where the MINVERSE function is located, then press
F2, then press the combination CTRL + SHIFT + ENTER (working with data
arrays);
MULTIPLE (range1; range2) - returns the matrix obtained as a result of multiplying
matrices specified in range1 and range2 (working with arrays, the selected ranges
must meet the requirements of matrix multiplication).
MIN (range), MAX (range) - return the minimum and maximum values from the
range;
AVERAGE (range) - calculates the arithmetic mean of the selected range of
values;
SRGEOM (range) - calculates the geometric mean from the selected range of
values;
COUNT (range) - counts the number of numbers in the specified range of values;
COUNT (range) - counts the number of nonblank cells in the specified data range;
COUNTIF (range; criterion) - counts the number of nonblank cells in the range
that meet the specified criterion;
FREQUENCY (data_range; interval_range) - calculates the distribution of values
from a data range over intervals of an interval range and returns a vertical array
(working with arrays); intervals are defined as follows: the first - all values up to the
first number of the range of intervals, the second - from the first value of the range
of +1 to the second value of the range of intervals ..., the last - from the last value of
the range of +1 and more.
TEST QUESTIONS
77
1. What is a spreadsheet?
2. What is called a cell?
3. What is called a cell address?
4. What is called a link?
5. What function in the formula calculates the arithmetic mean of the selected
range?
78
3. The structure of the database ensures efficient search and data processing.
Efficiency here is mainly determined by how flexibility and power of capabilities
(search and processing) compare with the cost of effort and resources.
The database management system (DBMS) is a specialized program (often
a set of programs) designed to organize and maintain a database. To create and
manage an information system, a DBMS is needed to the same extent as a translator
is needed to develop a program in an algorithmic language.
79
• Object
• Object oriented
• Object-relational
By storage technology:
• DB in secondary memory (traditional)
• DB in RAM (in-memory databases)
• DB in tertiary memory (tertiary databases)
By content:
• Geographic
• Historical
• Scientific
• Multimedia, etc.
80
• the ability to use OLE technology, which allows you to establish a connection
with objects of another application or embed any objects in the Access
database;
• WYSIWIG technology allows the user to constantly see all the results of their
actions;
• the help system is widely and clearly presented;
• There is a set of “wizards” for object design to facilitate the creation of tables,
forms and reports.
The main objects of Access are tables, queries, forms, reports, macros, and
modules.
A table is an object that is defined and used to store data. Each table contains
information about a specific type of object. As you already know, a table contains
fields (columns) and records (rows). You can work with a table in two main modes:
in design mode and in table mode.
A query is an object that allows a user to retrieve the desired data from one or
more tables. You can create queries to select, update, delete, or add data. Using
queries, you can create new tables using data from one or more existing tables.
Basically, a query is a question that a user asks Access about information stored in a
database. You can work with queries in two main modes: in design mode and in
table mode.
It should be remembered here that answers to queries are obtained by
“cutting” and “gluing” tables in rows and columns, and that the answers will also be
in the form of tables. In design mode, a question to the database is generated.
A form is an object mainly for easy input and display of data. It should be
noted that, unlike tables, forms do not contain database information (as it might
seem at first glance). A form is just a format (form) for displaying data on a
computer screen. Forms can only be built based on tables or queries. Query-based
form building allows you to present information from multiple tables.
Pictures, diagrams, audio (sound) and video (image) can be embedded in the
form.
A report is an object designed to create a document that can later be printed or
included in a document in another application. Reports, like forms, can be generated
from queries and tables, but do not allow data entry.
81
Up to 255
Text Plain text string
bytes
MEMO Up to 65,535
Multi-line text
field bytes
both integers and real both integers 1 to 8 bytes
Numeric x
and real
Date / Time
Date and / or Time 8 bytes
Monetary
Monetary amounts 8 bytes
TEST QUESTIONS
1. What is DB and DBMS?
2. List the main classifications of the database?
3. List the main functions of the database?
4. What are the main database examples?
82
CHAPTER 15. PRESENTATION OF COMPUTER GRAPHICS AND
DRAWING SOFTWARE ENVIRONMENTS, MULTIMEDIA
ENVIRONMENTS.
Raster graphics
Raster (from the English raster) is the representation of an image in the form
of a two-dimensional array of points (pixels) arranged in rows and columns
One or more memory cells are allocated for each point of the image. The
larger the bitmap, the more memory it takes up.
Properties of raster graphics:
1. Large amounts of data to be stored and processed.
83
2. The inability to enlarge the image to view the details. This effect is called
pixilation.
84
automated systems that implement information technology for performing design
functions - CAD - computer-aided design systems.
The main goal of CAD creation is to increase the efficiency of engineers'
work, including: reducing the complexity of design and planning; reducing design
time; reducing the cost of design and manufacturing, reducing operating costs;
improving the quality and technical and economic level of design results; reducing
the cost of field modeling and testing.
The most important program in the professional activity of an architect is
ArchiCAD. It is at the top of the list of similar programs, ArchiCAD is easy to use,
learn and work with.
ArchiCAD is a single object-oriented three-dimensional computer-aided
design system. It is designed to solve architectural and construction tasks. The
principle of its operation is based on the concept of a "virtual building" - a model
consisting of three-dimensional architectural and construction elements. Due to the
fact that the ArchiCAD user works with images of real objects (walls, windows,
doors, beams, furniture elements and building structures), he can create a model of a
projected or already existing building in as much detail as possible.
“Compass” is a family of computer-aided design systems with the
capabilities of design and design documentation. These standards are mainly used
in the manufacturer's homeland, and are absolutely not common outside the state.
AutoCAD is a two- and three-dimensional computer-aided design and
drafting system developed by Autodesk. Software data presents the user with the
creation of accurate and accurate drawings, basically, these types are used in
engineering, and other professions, where a 3-dimensional image is used as a visual
viewing of the result, while ArchiCAD allows at any stage of work on a project to
see it in three-dimensional form, in a section, in perspective, to select the most
suitable materials and calculate their consumption. It is even possible to create an
animated video depicting the designed building in its relation to the terrain, guide
the customer through the building, looking at each floor and into each room, as well
as walk around or fly around the building. Thus, the project will become more
visual and understandable to the customer.
Security questions
87
The Internet and Internet technologies are based on hypertext and sites placed
on the global Internet or in local computer networks.
Hypertext are texts with hyperlinks to other hypertext located on the Internet
or a local computer network.
Hypertext is written using the HTML hypertext markup language, which is
understood by all browsers on all personal computers.
HTML is an international standard, so all hypertext is perceived in a uniform
way and displayed in a uniform way on all personal computers around the world.
To prepare hypertext, visual hypertext editors are usually used, in which one
can immediately see how the hypertext will look on a computer, and it is possible to
insert hyperlinks to sites on the Internet.
The creation of computer networks is caused by the practical need of users of
computers remote from each other for the same information. Networks provide
users with the opportunity not only to quickly exchange information, but also to
collaborate on printers and other peripheral devices, and even to process documents
at the same time.
Computer network - is a system of distributed information processing, consisting
of at least two computers interacting with each other using special means of
communication.
In other words, a network is a collection of interconnected PCs and other computing
devices, such as printers, fax machines, and modems. The network enables
individuals in an organization to interact with each other and access shared
resources; allows them to access data stored on personal computers in remote
offices and communicate with suppliers.
The computers on the network perform the following functions:
• Organization of network access
• Information transfer control
• Provision of computing resources and services to network subscribers.
Any computer network is characterized by: topology, protocols, interfaces,
network hardware and software.
The topology of a computer network reflects the structure of connections between
its main functional elements.
Network hardware is a variety of devices that integrate computers into a single
computer network.
Network software - controls the operation of a computer network and provides an
appropriate interface with users.
88
16.2. LOCAL COMPUTER NETWORKS
89
of switching equipment and intermediate amplifying equipment that provides the
necessary channel bandwidth, as well as the operating costs of constantly
maintaining the scattered over a large area of network equipment.
The Internet is a global computer network that unites many local, regional
and corporate networks and includes tens of millions of computers.
Every local or corporate network usually has at least one computer that has a
persistent connection to the Internet using a high-bandwidth communication line
(Internet server). The reliability of the global network is provided by redundancy of
communication lines: as a rule, servers have more than two communication lines
connecting them to the Internet.
The Internet is based on more than one hundred million servers, constantly
connected to the network, of which there are more than three hundred thousand in
Russia (at the beginning of 2001).
Hundreds of millions of network users can connect to Internet servers using
local area networks or dial-up telephone lines.
The Internet owes its origins to the US Department of Defense and its secret
research conducted in 1969 to test methods for allowing computer networks
to survive warfare through dynamic message rerouting. The first such
network was ARPAnet, which connected three networks in California with a
network in Utah using a set of rules called the Internet Protocol (IP).
In 1972, access was opened to universities and research organizations, with
the result that the network began to unite 50 universities and research organizations
that had contracts with the US Department of Defense.
In 1973, the network expanded to an international scale, uniting networks
located in England and Norway. A decade later, IP has been extended with a suite
of communication protocols that support both local and wide area networks. This is
how TCP / IP was born. Shortly thereafter, the National Science Foundation (NSF)
opened NSFnet with the goal of linking 5 supercomputer centers. Concurrent with
the introduction of TCP / IP, the new network soon replaced ARPAnet as the
backbone of the Internet.
Well, how did the Internet become so popular and developed, and the impetus
for this, as well as for its transformation into an environment for doing business,
was given by the appearance of the World Wide Web (World Wide Web, WWW,
3W, ve-ve-ve, three double) - systems hypertext, which made surfing the Internet
fast and intuitive.
The idea of linking documents through hypertext was first proposed and
promoted by Ted Nelson in the 1960s, but the level of computer technology at that
90
time did not allow it to be implemented, although who knows how it would have
ended if this idea found application ?!
The foundations of what we mean by the WWW today were laid in the 1980s
by Tim Berners-Lee in the process of creating a hypertext system at the European
Laboratary for Particle Physics, European Center for Nuclear Research).
As a result of these works, in 1990 the scientific community was presented
with the first text browser (browser), which allows viewing text files linked by
hyperlinks on-line. This browser was made available to the general public in 1991,
but its adoption outside academia has been slow.
A new historical stage in the development of the Internet is due to the release
of the first Unix version of the Mosaic graphical browser in 1993, developed in
1992 by Marc Andreessen, an internship student at the National Center for
Supercomputing Applications (NCSA), USA.
Since 1994, after the release of the Mosaic browser versions for Windows
and Macintosh operating systems, and soon after that - the Netscape Navigator and
Microsoft Internet Explorer browsers, the explosive spread of the popularity of the
WWW began, and as a result of the Internet, among the general public, first in the
United States and then and around the world.
In 1995, the NSF transferred responsibility for the Internet to the private
sector, and since then the Internet has existed as we know it today.
SELF-CONTROL ISSUES:
1. What is a computer network?
2. What functions do the computers connected to the network have?
3. What is internet technology?
4. Where are corporate computer networks used?
5. What networks
17. NETWORK SOFTWARE CAPABILITIES FOR ORGANIZING
COLLECTIVE ACTIVITIES IN GLOBAL AND LOCAL COMPUTER
NETWORKS.
Let's consider the types of services offered by the global network, as well as
the main methods of searching for the necessary information using the Internet.
Internet service services are types of services that are provided by servers of
the global network. Throughout the short history of the Internet, there have been
91
different types of services, some of which are currently no longer in use, others are
gradually losing their popularity, and others are experiencing the dawn.
Let's list those of the services that have not lost their relevance at the moment:
* World Wide Web - the World Wide Web is a service for searching and
viewing hypertext documents, including graphics, sound and video.
* E-mail – e-mail is an electronic message transmission service.
* Usenet, News - teleconferences, newsgroups – a kind of online newspaper or
bulletin board.
* FTP is a file transfer service.
* ICQ is a service for real-time communication using the keyboard.
* Telnet - remote access service to computers.
Consider the three most popular services:
* World Wide Web – the World Wide Web
• E-mail – e-mail
* Usenet, News - teleconferences, newsgroups
92
possible to find the necessary information on them in this way. Special search
systems come to the rescue (they are also called search engine). The most common
and frequently used search engines are Google, Yahoo, Yandex, Rambler, Meta
(Ukrainian).
WWW is one of the Internet services that offers an easy-to-use interface and
allows users, even those who do not know the computer very well, to access web
resources in any part of the Internet. This service occupies a leading place on the
Internet.
93
was invented by three American students in 1979. Usenet served at that time for the
dissemination of information and news on programming. The data was sorted into
fifteen headings, which later became known as "newsgroups", "conferences" or
"teleconferences".
The news service (USENET) is built on the principle of an open conference -
a meeting of people to discuss certain topics. Moreover, the user can simultaneously
participate in countless electronic conferences without fear of missing anything.
All the information stored in USENET is organized on a thematic basis, that
is, the news service is a kind of thematic catalog containing people's opinions on a
particular topic. Messages, also referred to as articles, united by a common theme,
are placed in thematic groups called newsgroups. Newsgroups, in turn, can be
contained within other groups, forming thematic hierarchies.
Access to newsgroups is carried out through the subscription procedure,
which consists in specifying the coordinates of the news server and selecting the
newsgroups of interest to the user.
Today, Usenet has more than ten thousand discussion groups (Newsgroups)
or teleconferences, each of which is dedicated to a specific topic and is a means of
exchanging opinions.
Teleconferences are divided into several groups:
* news - issues related to the teleconferencing system;
* comp - computers and software;
* rec - entertainment, hobbies and arts;
* sci - research activities and applications;
* soc - social issues;
* talk - debates on various controversial issues;
* misc — everything else.
94
Currently, teleconferences are a large group of various Internet services and
services designed for user communication. The following types of teleconferences
are distinguished:
* asynchronous teleconferences - conferences in which information is
exchanged in a delayed mode (by e-mail);
* synchronous teleconferences - conferences in real time, providing the
opportunity to exchange both text and visual and voice information.
Asynchronous teleconferences are one of the oldest services provided to
Internet users. Their main advantage is that they do not require the presence of all
conference participants at the same time, which is very convenient if the conference
participants are in different time zones or cannot be at the computer at the same
time at the time set for the conference. Also, these conferences are convenient for
those users who need more time to think about their speeches, who want to work on
an answer, a problem raised during the conference, or if the language of
communication at the conference is not the native language of the participant (as a
rule, in these cases it takes much longer to prepare an answer or a replica).
The most common forms of asynchronous teleconferences are Mailing lists
(discussion lists)
They make it possible to send an electronic message simultaneously to several
(many) recipients according to a pre-compiled address list. Mailing lists are
convenient for organizing the work of a relatively small group of users (a study
group, a small group, two or three co-authors of an article being created, etc.). Such
mailing lists can be created both using traditional office programs (for example, in
MS Outlook 2000) and using special programs such as Listserve, Majordomo,
Listproc. As a rule, such mailing lists are maintained (moderated) by the
administrator (course teacher, coordinator) of the server on which they are created,
which protects the information circulating in them from unauthorized access.
Synchronous teleconferences are increasingly gaining popularity in the field of
distance learning. The following types of synchronous conferences differ:
* Chats - interactive communication in real time using special email programs
(such as IRC, ICQ, etc.). Intensive communication, which presents certain
difficulties for those users who do not have a good command of the keyboard. Chats
are effective for small groups of participants - from two to five people. If necessary,
if more than five people are to participate in the chat, it is necessary to clearly
specify in advance the sequence of speeches, the course of the discussion and the
rules of communication of participants with each other.
95
* Audio conferences - teleconferences that appeared due to the development of
Internet telephony. They are promising when organizing group work, as well as for
broadcasting lectures and seminars conducted by experts in a specific subject area.
* Video conferencing - combines sound and image, being the closest to a real
form of remote communication.
Self-control issues
REFERENCES
1. Information systems and technologies / Ed. Telnova Yu.F .. - M .: Unity, 2017 .--
544 p.
2. Information systems and technologies: Scientific edition / Ed. Yu.F. Telnova. - M
.: Unity, 2016 .-- 303 p.
96
3. Information technology and computing systems. Computing systems. Computer
graphics. Pattern recognition. Mathematical modeling / Ed. S.V. Emelyanov. - M .:
Lenand, 2015 .-- 100 p.
4. Information technology and computing systems: Information processing and data
analysis. Software engineering. Math modeling. Applied Aspects of Informatics /
Ed. S.V. Emelyanov. - M .: Lenand, 2015 .-- 104 p.
5. Vendeleva, M.A. Information technologies in management .: Textbook for
bachelors / M.A. Vendeleva, Yu.V. Vertakova. - Lyubertsy: Yurayt, 2016 .-- 462
p ..
I.V. Gavrilenkova. - M .: KnoRus, 2018 .-- 284 p.
6. Gavrilov, L.P. Information technologies in commerce: Textbook / L.P. Gavrilov.
- M .: Infra-M, 2018 .-- 47 p.
7. Gavrilov, M.V. Informatics and Information Technology: A Textbook for
Applied Bachelor's Degree / M.V. Gavrilov, V.A. Klimov. - Lyubertsy: Yurayt,
2016 .-- 383 p.
8. Gavrilov, M.V. Informatics and information technology: Textbook / M.V.
Gavrilov, V.A. Klimov. - Lyubertsy: Yurayt, 2016 .-- 383 p.
9. Gagarin, L.G. Information technology: Textbook / L.G. Gagarin, Ya.O. Teplova,
E.L. Rumyantseva and others - M .: Forum, 2018 .-- 144 p.
10. Gokhberg, G.S. Information technology: Textbook / G.S. Gokhberg. - M .:
Academia, 2018 .-- 474 p.
11. Gokhberg, G.S. Information technology: Textbook / G.S. Gokhberg. - M .:
Academy, 2015 .-- 368 p.
12. Darkov, A.V. Information technology: theoretical foundations: textbook / A.V.
Darkov, N.N. Shaposhnikov. - SPb .: Lan, 2016 .-- 448 p.
13. Emelyanov, S.V. Information technologies and computing systems / S.V.
Emelyanov. - M .: Lenand, 2015 .-- 96 p.
14. Zhuk, Yu.A. Information technology: multimedia: textbook / Yu.A. Bug. -
SPb .: Lan, 2018 .-- 210 p.
15. Zatonsky, A.V. Information technology: developer. inform. model .: Textbook /
A.V. Zatonsky. - M .: Rior, 2017 .-- 384 p.
16. Zakharova, I.G. Information technologies in education: / I.G. Zakharova. - M .:
Academia, 2016 .-- 543 p.
17. Zakharova, I.G. Information technologies in the management of educational
institutions: Textbook / I.G. Zakharova. - M .: Academy, 2017 .-- 384 p.
18. Zubov, A.V. Information technologies in linguistics: Textbook / A.V. Teeth. -
M .: Academy, 2019 .-- 400 p.
97
19. Skhirtladze, A.G. Information technology: Textbook / A.G. Skhirtladze. - M .:
Academy, 2015 .-- 352 p.
20. Sysoev, P.V. Information and communication technologies in linguistic
education / P.V. Sysoev. - M .: KD Librokom, 2015 .-- 264 p ..
21. Tyurin, I.V. Computing and information technology: Textbook / I.V. Tyurin. -
Rn / D: Phoenix, 2018 .-- 64 p.
22. Chernikov, B.V. Information technology management: Textbook / B.V.
Chernikov. - M .: Forum, 2017 .-- 352 p.
23. Chudnovsky, A. D. Information technology management in tourism. Textbook /
A.D. Chudnovsky, M.A. Zhukov. - M .: KnoRus, 2018 .-- 128 p.
24. Chukarin, A.V. Business processes and information technologies in the
management of a modern infocommunication company / A.V. Chukarin. - M .:
Alpina Publisher, 2016 .-- 512 p.
25. Shcherbakova, T.F. Computing and information technology: Textbook / T.F.
Shcherbakov. - M .: Academy, 2017 .-- 128 p.
26. Shcherbakova, T.F. Computing equipment and information technologies:
textbook / T.F. Shcherbakov. - M .: Academia, 2017 .-- 288 p.
98
Şahnaz Nadir qızı Şahbazova
İNFORMASİYA TEXNOLOGİYALARI
Nəşriyyatın direktoru
Tipoqrafiyanın direktoru
Texniki redaktor
“Çaşıoglu” nəşriyyatı
Bakı şəhəri, M.Müşfiq küçəsi 2a
2021
99