
- •Передмова
- •1. Лексичний мінімум загальнонаукового або загальнотехнічного характеру – ііі семестр
- •1.1. Моя майбутня професія. Знайомство з лексикою за фахом. Професійні терміни, їх скорочення.
- •Граматика
- •Теперішній неозначений час
- •Минулий неозначений час.
- •Майбутній неозначений час.
- •Vocabulary
- •1.2. 1.3. Вивчення тексту за фахом. Комп’ютер як інструмент постіндустріального суспільства. Сфери використання (частина 1, частина 2)
- •Граматика
- •Computers
- •1.4. 1.5. Вивчення тексту за фахом. Історія виникнення комп’ютера (частина 1, частина 2)
- •History of computers
- •1.6. Вивчення тексту за фахом. Типи і види комп’ютерів.
- •Kinds of Computer
- •10 Types of Computers
- •2: Desktop
- •3: Laptop
- •4: Netbook
- •6: Workstation
- •7: Server
- •8: Mainframe
- •9: Supercomputer
- •10: Wearable Computer
- •1.7. Вивчення тексту за фахом. Апаратне забезпечення. Пристрої вводу інформації (клавіатура, мишка, сканер).″
- •Граматика
- •Computer hardware
- •H ardware: input devises
- •1.8. Вивчення тексту за фахом. Апаратне забезпечення. Пристрої виводу інформації (монітор, принтер)
- •Hardware and software
- •Computer display
- •Technologies
- •1.9. Семінар за темами
- •2. Лексичний мінімум загальнонаукового або загальнотехнічного характеру – іv семестр
- •2.1. Вивчення тексту за фахом. Коди комп’ютера
- •Computer Codes
- •2.2. Вивчення тексту за фахом. Центральний процесор
- •Пасивний стан дієслова. Passive voice.
- •Central processing unit
- •2.3. Вивчення тексту за фахом. Жорсткий диск
- •Hard disk
- •Mechanics
- •Performance
- •From Wikipedia, the free encyclopedia.
- •How it works
- •Capacity
- •Writing to and reading from cd-rom
- •Copyright Issues
- •Data Formats
- •Manufacture
- •Capacity
- •Exercises
- •Server hardware
- •Computer hardware
- •2.4. Вивчення тексту за фахом. Розвиток комп’ютерної пам’яті
- •Computer storage
- •Different types and different purposes
- •2.5. Вивчення тексту за фахом. Комп’ютерна пам'ять. Сучасність
- •Computer storage
- •Different types and different purposes
- •Primary vs. Secondary Storage
- •A list of storage devices
- •Random Access Memory
- •Overview
- •2.6. Вивчення тексту за фахом. Зовнішні накопичувачі інформації
- •Exercises
- •Manufacture
- •Capacity
- •2.7. Вивчення тексту за фахом. Комп’ютерна графіка.
- •Computer graphics
- •Computer graphics, 2d
- •Computer graphics, 3d
- •2.8. Вивчення тексту за фахом. Операційні системи
- •3.2. Вивчення тексту за фахом.“Прикладні програми. Майкрасофт Офіс” Частина 2
- •3.3. Вивчення тексту за фахом.“Excel як інструмент обробки інформаційних масивів.” Частина 1
- •3.4. Вивчення тексту за фахом.“Excel як інструмент обробки інформаційних масивів.” Частина 2 ……………………………… Microsoft Excel
- •3.5. Вивчення тексту за фахом.“Операційна система ms-dos” Частина 1 …………………………………………………….
- •3.6. Вивчення тексту за фахом.“Операційна система ms-dos” Частина 2 ……………………………………………………. Command.Com
- •Variables. Batch files for command.Com can be said to have 4 kinds of variables:
- •Other commands
- •Command.Com
- •Programming language
- •Features of a programming language
- •History of programming languages
- •Classifications of programming languages
- •Major languages
- •Technical overview
- •List of computer term etymologies
- •"Pc motherboard"
- •10. “The hard disk”. History of the computers with a hard disk drive
- •Computer security
- •Techniques for creating secure systems
- •Notable persons in computer security
- •12. “Input-output devices”
- •Computer display
- •Technologies
- •13. Operating systems
- •14. “Microsoft Windows”
- •Interface
- •Popularity
- •С.Р.№14: Переклад та переказ тексту “Microsoft company” Microsoft
- •History
- •Products and organization
- •The future of Microsoft
- •Filesystem commands
- •Other commands
- •Control structures
- •Variables
- •16. The founder of the Microsoft.
- •17. Ввчення професійної лексики. Computer jargon
- •18. “Programming languages”
- •History of Programming Languages
- •Programming language
- •From Wikipedia
- •Features of a programming language
- •Data types
- •Data structures
- •Instruction and control flow
- •Design philosophies
- •History of programming languages
- •Classifications of programming languages
- •Major languages
- •19. Basic programming language. Basic programming language From Wikipedia, the free encyclopedia.
- •History Background
- •Birth and early years
- •Explosive growth
- •Maturity
- •The language Syntax
- •Procedures and flow control
- •Data types
- •Relational and logical operators
- •Availability and dialect variants
- •Hello World
- •Examples
- •Dialects
- •20. “Pascal programming language” Pascal programming language From Wikipedia, the free encyclopedia.
- •Overview
- •Hello World
- •Major languages
- •Prehistory and specification
- •Defining features
- •21. C programming language. Pascal and c
- •Implementations
- •Publicly available compilers
- •Past criticism
- •22. “Delphi programming language”
- •23. “Microsoft Word” Word 1990 to 1995
- •The Present
- •Versions
- •Word processor From Wikipedia, the free encyclopedia.
- •Characteristics
- •Origin of word processing
- •Word processing programs Programs still available and in use Proprietary
- •Free software
- •Freeware
- •Historically important programs
- •Microsoft Excel From Wikipedia, the free encyclopedia.
- •Versions
- •Competitors
- •External links
- •Versions
- •Text editor From Wikipedia, the free encyclopedia.
- •History
- •Types of text editors
- •Computer hardware From Wikipedia, the free encyclopedia.
- •See also
- •External links
- •24. “Computer graphics” From Wikipedia, the free encyclopedia.
- •Computer graphics, 2d
- •Computer graphics, 3d
- •Related topics
- •Toolkits and apIs
- •Graphics processing unit From Wikipedia, the free encyclopedia.
- •History
- •Current gpu capabilities
- •Gpu manufacturers
- •The Beginning
- •25. “Databases”
- •26. “The history of the Internet” History of the Internet
- •Motivation for the Internet
- •Early Internet work
- •Commercialization and privatization
- •Early applications
- •27. Computer viruses and piracy”
- •Introduction
- •Internet Technical Evolution
- •Related Networks
- •The Development of the Computer
- •First Generation Computers
- •Second Generation Computers
- •Third Generation Computers
- •Fourth Generation Computers
- •28. “The origin of www” Origin of www
- •29. “World Wide Web”
- •Basic terms
- •The three standards
- •Pronunciation of "www"
- •30. “Web server”
- •Common features
- •Server operating systems
- •31. “Web site”
- •Overview
- •Viewing a webpage
- •Creating a webpage
- •Saving a webpage
- •32. Підготовка тез доповіді по курсовому проекту.
- •6. "Computer systems: software” Computer Discussion Forums (http://www.Tech-Computer software From Wikipedia, the free encyclopedia. (Redirected from Software)
- •System and application software
- •Users see three layers of software
- •Software in operation
- •Software creation
- •Software patents
- •4. "Parts of the computer”
- •Display fdis'pleij дисплей modem [mo'dem] модем figure Пир] 'Цифра number [ плтЬэ] номер
- •Computer mouse
- •History of mouse engineering
- •Hard disk
- •Mechanics
- •Performance
- •Computer display
- •Technologies
- •From Wikipedia, the free encyclopedia.
- •How it works
- •Capacity
- •Writing to and reading from cd-rom
- •Copyright Issues
- •Data Formats
- •Manufacture
- •Capacity
- •Exercises
Early applications
E-mail had existed as a message exchanging service on early time sharing mainframe computers connected to a number of terminals. In about 1971 it developed into the first system of exchanging addressed messages between different, networked computers; in 1972 Ray Tomlinson introduced the "name@computer" notation that is still used today. E-mail turned into the internet "killer application" of the 1980s.
The second most popular application of the early internet was usenet, a system of distributed discussion groups which is still going strong today. Usenet had existed even before the internet, as an application of Unix computers connected by telephone lines via the UUCP protocol.
It wasn't until the early to mid 1980s that the services we now use most on the Internet started appearing. The concept of "domain names" (like "wikipedia.org") requiring "Domain Name Servers" wasn't even introduced until 1984. Before that all the computers were just addressed by their IP addresses (numbers) or used a central "hosts" file maintained by the Network Information Centre (NIC). Most protocols used for email and other services were significantly enhanced after this.
27. Computer viruses and piracy”
Computer Security
It is important to protect computer systems against intrusion, damage and theft. Keeping copies of data and programs prevents information from being lost or deleted.
Passwords and user identification TOdeS can limit the number of people who have access to the system. These are codes that have to be input intu the computer before certain data can be seen or worked on. They are important to safeguard confidential information, such as medical records. They are also used to prevent access to a company's records by unauthorized people and therefore lessen the chance of someone altering them with the intention of causing trouble, or defrauding the company by instructing the computer to pay them large sums of money.
Hacking is unauthorized entry into somebody else's computer system. It is usr Mydone for the purpose of gaining information, but it is also done sometimes for fun. In some countries hacking is illegal.
A virus is a program that alters data and programs in the computer so that they no longer function properly or are lost. The virus usually gets into the computer from a program that has been loaded into the compuv.T. It may remain inactive for some time until triggered off by some preset event or on a particular date such as Friday the 13th.
С.Р.№21: Переклад та складання анотації до тексту “Standards and control in the Internet”
Standards and control in the Internet
The Internet has developed a significant subculture dedicated to the idea that the Internet is not owned or controlled by any one person, company, group, or organization. Nevertheless, some standardization and control is necessary for anything to function.Many people wanted to put their ideas into the standards for communication between the computers that made up this network, so a system was devised for putting forward ideas. One would write one's ideas in a paper called a "Request for Comments" (RFC for short), and let everyone else read it. People commented on and improved those ideas in new RFCs.
With its basis as an educational research project, much of the documentation was written by students or others who played significant roles in developing the network (as part of the original Network Working Group) but did not have official responsibility for defining standards. This is the reason for the very low-key name of "Request for Comments" rather than something like "Declaration of Official Standards".
The first RFC (RFC1) was written on April 7th, 1969. As of 2004 there are over 3500 RFCs, describing every aspect of how the Internet functions. The liberal RFC publication procedure has engendered confusion about the Internet standardization process, and has led to more formalization of official accepted standards. Acceptance of an RFC by the RFC Editor for publication does not automatically make the RFC into a standard. It may be recognized as such by the IETF only after many years of experimentation, use, and acceptance have proven it to be worthy of that designation. Official standards are numbered with a prefix "STD" and a number, similar to the RFC naming style. However, even after becoming a standard, most are still commonly referred to by their RFC number.
The Internet standards process has been as innovative as the Internet technology. Prior to the Internet, standardization was a slow process run by committees with arguing vendor-driven factions and lengthy delays. In networking in particular, the results were monstrous patchworks of bloated specifications. The fundamental requirement for a networking protocol to become an Internet standard is the existence of at least two existing, working implementations that inter-operate with each other. This makes sense in retrospect, but it was a new concept at the time. Other efforts built huge specifications with many optional parts and then expected people to go off and implement them, and only later did people find that they did not inter-operate, or worse, the standard was completely impossible to implement. In the 1980s, the International Organization for Standardization (ISO) documented a new effort in networking called Open Systems Interconnect or OSI. Prior to OSI, networking was completely vendor-developed and proprietary. OSI was a new industry effort, attempting to get everyone to agree to common network standards to provide multi-vendor interoperability. The OSI model was the most important advance in teaching network concepts. However, the OSI protocols or "stack" that were specified as part of the project were a bloated mess. Standards like X.400 for e-mail took up several large books, while Internet e-mail took only a few dozen pages at most in RFC-821 and 822. Most protocols and specifications in the OSI stack, such as token-bus media, CLNP packet delivery, FTAM file transfer, and X.400 e-mail, are long-gone today. Only one, X.500 directory service, still survives with significant usage, mainly because the original unwieldy protocol has been stripped away and effectively replaced with LDAP. Some formal organization is necessary to make everything operate. The first central authority was the NIC (Network Information Centre) at SRI (Stanford Research Institute in Menlo Park, California).
A Brief History of the Internet and Related Networks