
- •Передмова
- •1. Лексичний мінімум загальнонаукового або загальнотехнічного характеру – ііі семестр
- •1.1. Моя майбутня професія. Знайомство з лексикою за фахом. Професійні терміни, їх скорочення.
- •Граматика
- •Теперішній неозначений час
- •Минулий неозначений час.
- •Майбутній неозначений час.
- •Vocabulary
- •1.2. 1.3. Вивчення тексту за фахом. Комп’ютер як інструмент постіндустріального суспільства. Сфери використання (частина 1, частина 2)
- •Граматика
- •Computers
- •1.4. 1.5. Вивчення тексту за фахом. Історія виникнення комп’ютера (частина 1, частина 2)
- •History of computers
- •1.6. Вивчення тексту за фахом. Типи і види комп’ютерів.
- •Kinds of Computer
- •10 Types of Computers
- •2: Desktop
- •3: Laptop
- •4: Netbook
- •6: Workstation
- •7: Server
- •8: Mainframe
- •9: Supercomputer
- •10: Wearable Computer
- •1.7. Вивчення тексту за фахом. Апаратне забезпечення. Пристрої вводу інформації (клавіатура, мишка, сканер).″
- •Граматика
- •Computer hardware
- •H ardware: input devises
- •1.8. Вивчення тексту за фахом. Апаратне забезпечення. Пристрої виводу інформації (монітор, принтер)
- •Hardware and software
- •Computer display
- •Technologies
- •1.9. Семінар за темами
- •2. Лексичний мінімум загальнонаукового або загальнотехнічного характеру – іv семестр
- •2.1. Вивчення тексту за фахом. Коди комп’ютера
- •Computer Codes
- •2.2. Вивчення тексту за фахом. Центральний процесор
- •Пасивний стан дієслова. Passive voice.
- •Central processing unit
- •2.3. Вивчення тексту за фахом. Жорсткий диск
- •Hard disk
- •Mechanics
- •Performance
- •From Wikipedia, the free encyclopedia.
- •How it works
- •Capacity
- •Writing to and reading from cd-rom
- •Copyright Issues
- •Data Formats
- •Manufacture
- •Capacity
- •Exercises
- •Server hardware
- •Computer hardware
- •2.4. Вивчення тексту за фахом. Розвиток комп’ютерної пам’яті
- •Computer storage
- •Different types and different purposes
- •2.5. Вивчення тексту за фахом. Комп’ютерна пам'ять. Сучасність
- •Computer storage
- •Different types and different purposes
- •Primary vs. Secondary Storage
- •A list of storage devices
- •Random Access Memory
- •Overview
- •2.6. Вивчення тексту за фахом. Зовнішні накопичувачі інформації
- •Exercises
- •Manufacture
- •Capacity
- •2.7. Вивчення тексту за фахом. Комп’ютерна графіка.
- •Computer graphics
- •Computer graphics, 2d
- •Computer graphics, 3d
- •2.8. Вивчення тексту за фахом. Операційні системи
- •3.2. Вивчення тексту за фахом.“Прикладні програми. Майкрасофт Офіс” Частина 2
- •3.3. Вивчення тексту за фахом.“Excel як інструмент обробки інформаційних масивів.” Частина 1
- •3.4. Вивчення тексту за фахом.“Excel як інструмент обробки інформаційних масивів.” Частина 2 ……………………………… Microsoft Excel
- •3.5. Вивчення тексту за фахом.“Операційна система ms-dos” Частина 1 …………………………………………………….
- •3.6. Вивчення тексту за фахом.“Операційна система ms-dos” Частина 2 ……………………………………………………. Command.Com
- •Variables. Batch files for command.Com can be said to have 4 kinds of variables:
- •Other commands
- •Command.Com
- •Programming language
- •Features of a programming language
- •History of programming languages
- •Classifications of programming languages
- •Major languages
- •Technical overview
- •List of computer term etymologies
- •"Pc motherboard"
- •10. “The hard disk”. History of the computers with a hard disk drive
- •Computer security
- •Techniques for creating secure systems
- •Notable persons in computer security
- •12. “Input-output devices”
- •Computer display
- •Technologies
- •13. Operating systems
- •14. “Microsoft Windows”
- •Interface
- •Popularity
- •С.Р.№14: Переклад та переказ тексту “Microsoft company” Microsoft
- •History
- •Products and organization
- •The future of Microsoft
- •Filesystem commands
- •Other commands
- •Control structures
- •Variables
- •16. The founder of the Microsoft.
- •17. Ввчення професійної лексики. Computer jargon
- •18. “Programming languages”
- •History of Programming Languages
- •Programming language
- •From Wikipedia
- •Features of a programming language
- •Data types
- •Data structures
- •Instruction and control flow
- •Design philosophies
- •History of programming languages
- •Classifications of programming languages
- •Major languages
- •19. Basic programming language. Basic programming language From Wikipedia, the free encyclopedia.
- •History Background
- •Birth and early years
- •Explosive growth
- •Maturity
- •The language Syntax
- •Procedures and flow control
- •Data types
- •Relational and logical operators
- •Availability and dialect variants
- •Hello World
- •Examples
- •Dialects
- •20. “Pascal programming language” Pascal programming language From Wikipedia, the free encyclopedia.
- •Overview
- •Hello World
- •Major languages
- •Prehistory and specification
- •Defining features
- •21. C programming language. Pascal and c
- •Implementations
- •Publicly available compilers
- •Past criticism
- •22. “Delphi programming language”
- •23. “Microsoft Word” Word 1990 to 1995
- •The Present
- •Versions
- •Word processor From Wikipedia, the free encyclopedia.
- •Characteristics
- •Origin of word processing
- •Word processing programs Programs still available and in use Proprietary
- •Free software
- •Freeware
- •Historically important programs
- •Microsoft Excel From Wikipedia, the free encyclopedia.
- •Versions
- •Competitors
- •External links
- •Versions
- •Text editor From Wikipedia, the free encyclopedia.
- •History
- •Types of text editors
- •Computer hardware From Wikipedia, the free encyclopedia.
- •See also
- •External links
- •24. “Computer graphics” From Wikipedia, the free encyclopedia.
- •Computer graphics, 2d
- •Computer graphics, 3d
- •Related topics
- •Toolkits and apIs
- •Graphics processing unit From Wikipedia, the free encyclopedia.
- •History
- •Current gpu capabilities
- •Gpu manufacturers
- •The Beginning
- •25. “Databases”
- •26. “The history of the Internet” History of the Internet
- •Motivation for the Internet
- •Early Internet work
- •Commercialization and privatization
- •Early applications
- •27. Computer viruses and piracy”
- •Introduction
- •Internet Technical Evolution
- •Related Networks
- •The Development of the Computer
- •First Generation Computers
- •Second Generation Computers
- •Third Generation Computers
- •Fourth Generation Computers
- •28. “The origin of www” Origin of www
- •29. “World Wide Web”
- •Basic terms
- •The three standards
- •Pronunciation of "www"
- •30. “Web server”
- •Common features
- •Server operating systems
- •31. “Web site”
- •Overview
- •Viewing a webpage
- •Creating a webpage
- •Saving a webpage
- •32. Підготовка тез доповіді по курсовому проекту.
- •6. "Computer systems: software” Computer Discussion Forums (http://www.Tech-Computer software From Wikipedia, the free encyclopedia. (Redirected from Software)
- •System and application software
- •Users see three layers of software
- •Software in operation
- •Software creation
- •Software patents
- •4. "Parts of the computer”
- •Display fdis'pleij дисплей modem [mo'dem] модем figure Пир] 'Цифра number [ плтЬэ] номер
- •Computer mouse
- •History of mouse engineering
- •Hard disk
- •Mechanics
- •Performance
- •Computer display
- •Technologies
- •From Wikipedia, the free encyclopedia.
- •How it works
- •Capacity
- •Writing to and reading from cd-rom
- •Copyright Issues
- •Data Formats
- •Manufacture
- •Capacity
- •Exercises
Computer security
Computer security is the effort to create a secure computing platform, designed so that agents (users or programs) cannot perform actions that they are not allowed to perform, but can perform the actions that they are allowed to. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion. Computer security can be seen as a subfield of security engineering, which looks at broader security issues in addition to computer security.
It is also important to distinguish the techniques employed to increase a system's security from the issue of that system's security status. In particular, systems which contain fundamental flaws in their security designs cannot be made secure without compromising their utility. Consequently, most computer systems cannot be made secure even after the application of extensive "computer security" measures.
Techniques for creating secure systems
The following techniques can be used in engineering secure systems. Note that these techniques, though useful, do not of themselves ensure security -- a security system is no stronger than its weakest link.
Cryptographic
techniques involve transforming information, scrambling it so it
becomes unreadable during transmission. The intended recipient can
unscramble the message, but eavesdroppers cannot.
Cryptographic techniques can be used to defend data in transit between systems, reducing the probability that data exchanged between systems can be intercepted or modified.
Strong authentication techniques can be used to ensure that communication end-points are who they say they are.
Secure cryptoprocessors can be used to leverage physical security techniques into protecting the security of the computer system.
Chain of trust techniques can be used to attempt to ensure that all software loaded has been certified as authentic by the system's designers.
Mandatory access control can be used to ensure that privileged access is withdrawn when privileges are revoked. For example, deleting a user account should also stop any processes that are running with that user's privileges.
Capability and access control list techniques can be used to ensure privilege separation and mandatory access control.
Notable persons in computer security
Dan Geer
Bruce Schneier
Edward Felten
12. “Input-output devices”
Alphanumeric keyboards include typewriter and computer keyboards. An alphanumeric keyboard is a device with many keys (usually marked with the letters of the alphabet, the numerical digits, and various extra keys.)
After punchcards and paper tape, interaction via teletype-style keyboards became the main input device for computers. During the 1980s and 1990s almost all computers came equipped with them as the main form of interaction, and most users are familiar with using them.
There are different types of keyboard technologies.
The layout of keys on the modern-day English keyboard is called the QWERTY design, based on the most popular typewriter keyboard layout. This has been further extended to the standard 101-key PC keyboard layout, with the addition of cursor keys, a calculator-style numeric keypad, and two groups of special function keys, and keys for the Windows menu (on IBM and clones) or Apple menu (on Macintoshes). In the late 1990s, computer manufacturers, such as Dell, add keys specifically related to the Internet and e-mail, but these have not yet become standard.
There is another kind of computer keyboard known as a chorded keyboard. These are rarely used.
Despite the development of alternative input devices such as the mouse, touch sensitive screens, pen devices, character recognition, voice recognition, and improvements in computer speed and memory size, the keyboard remains the most commonly used and most versatile device used for direct human input into computers.