- •Laboratory work №1
- •Computer performance: speed, efficiency, energy costs
- •Amdahl's Law
- •Cpu time
- •Full answer
- •Cpu Time Definition - What does cpu Time mean?
- •Techopedia explains cpu Time
- •Amdahl's Law
- •Speedup:
- •Amdahl's Law Defined
- •A Calculation Example
- •Amdahl's Law Illustrated
- •Optimizing Algorithms
- •Optimizing the Sequential Part
- •Execution Time vs. Speedup
- •Measure, Don't Just Calculate
- •2.1 Architecture of computer
- •2.2 Types of memory
- •2.3 Number system
- •Memory unit.
- •Input - Output
- •Adding Binary Numbers
- •Subtracting Binary Numbers
- •Multiplying Binary Numbers
- •Dividing Binary Numbers
- •4.1 Main functions, structure and types of operating system
- •4.2 Windows os
- •4.3 Working with files and directories
- •Windows system key combinations
- •Windows program key combinations
- •1. Beginning work in word processor
- •2. Creating and editing simple text documents
- •3. Work with formula editor Equation 3.0
- •Exercise 8 - Selecting and Formatting Multiple Lines
- •Exercise 9 - Formatting Last Two Lines
- •Exercise 10 - Formatting Words using the Font Dialog box
- •Symbols
- •Structures
- •10.1. The definition and structure of database
- •10.2. Creation of a new database
- •10.3. Methods of creation new table
- •Control questions
- •6.1 The main tools for work in Power Point
- •6.2 Presentations in ms Office Power Point
- •7.1. Electronic spreadsheet ms Excel
- •7.2. Entering Excel Formulas and Formatting Data
- •7.3 Cell Addressing
- •Worksheets
- •The Formula Bar
- •Entering Excel Formulas and Formatting Data
- •Copy, Cut, Paste, and Cell Addressing
- •Exercise 2
- •Absolute Cell Addressing
- •Mixed Cell Addressing
- •What is Absolute Cell Addressing ?
- •What is Mixed Cell Addressing?
- •Using Reference Operators
- •Understanding Functions
- •Alternate Method: Enter a Function with the Ribbon
- •Fill Cells Automatically
- •Exercise 2
- •Exercise 3
- •Exercise 4
- •Chart example :
- •Exercise 10 Create a Column Chart
- •Apply a Chart Layout
- •Global and local networks. Internet
- •Bases of html
- •The internet
- •Examples of a web page
- •Html Tags
- •The start tag is often called the opening tag. The end tag is often called the closing tag. Web Browsers.
- •Example Explained
- •10.1 Software and hardware for generating key information. 10.2 Protecting programs from unauthorized use via usb-key and the software manufacturer.
- •2. Brief theoretical information
- •Information for the developer.
- •3. The order of execution of work
- •4. Contents of the report
- •5. Test Questions
- •Installation Certification Center.
- •III) Request a certificate. Processing request.
- •3. The order of execution of work
- •4. Contents of the report
- •Test Questions
- •1. Objective
- •3.The order of execution of work
- •Image 1
- •Creating a strong password→
- •Verify your account via sms or Voice Call→
- •Control what others see about you across Google services→
- •Choose the information you share with others
- •More details about your name & photo
- •Preview how your information shows up
- •Preview how your information shows up
- •About Google Accounts→
- •Common issues
- •Product-specific age requirements
- •Disabled account due to incorrect birth date
- •History
- •Technical details
- •Network structure
- •Base station subsystem[edit]
- •Gsm carrier frequencies
- •Voice codecs
- •Subscriber Identity Module (sim)[edit]
- •Phone locking[edit]
- •Gsm security[edit]
- •Standards information[edit]
- •Gsm open-source software[edit]
- •Issues with patents and open source[edit]
- •13.1 Obtaining the electronic services on the portal of e-government of kazakhstan
- •Laboratory work №14
- •Information culture.Internet culture.
Global and local networks. Internet
Web-site and web-page
Bases of html
Global
and local networks.
A
computer network consists of a collection of computers, printers and
other equipment that is connected together so that they can
communicate with each other. It is done to enable the computers to
communicate and share available resources. There are two types of
network configuration, peer-to-peer networks and client/server
networks.
Peer-to-peer networks are more commonly implemented where less thenten computers are involved and where strict security is not necessary. All computers have the same status, hence the term 'peer', and they communicate with each other on an equal footing. Files, such as word processing or spreadsheet documents, can be shared across the network and all the computers on the network can share devices, such as printers or scanners, which are connected to any one computer.
Peer to Peer Networking
Client/server networks are more suitable for larger networks. A centralcomputer, or 'server', acts as the storage location for files and applications shared on the network. Usually the server is a higher than averageperformance computer. The server also controls the network access of the other computers which are referred to as the 'client' computers. Typically, teachers and students in a school will use the client computers for their work and only the network administrator (usually a designated staff member) will have access rights to the server.
Client - Server Networking
Components of a Network
A computer network comprises the following components:
A minimum of at least 2 computers
Cables that connect the computers to each other, although wireless communication is becoming more common (see Advice Sheet 20 for more information)
A network interface device on each computer (this is called a network interface card or NIC)
A ‘Switch’ used to switch the data from one point to another. Hubs are outdated and are little used for new installations.
- Network operating system software
Network structure
Network topology is the layout or organizational hierarchy of interconnected nodes of a computer network. Different network topologies can affect throughput, but reliability is often more critical. With many technologies, such as bus networks, a single failure can cause the network to fail entirely. In general the more interconnections there are, the more robust the network is; but the more expensive it is to install.
Common layouts
Common network topologies
Common layouts are:
A bus network: all nodes are connected to a common medium along this medium. This was the layout used in the original Ethernet, called 10BASE5 and 10BASE2.
A star network: all nodes are connected to a special central node. This is the typical layout found in a Wireless LAN, where each wireless client connects to the centralWireless access point.
A ring network: each node is connected to its left and right neighbour node, such that all nodes are connected and that each node can reach each other node by traversing nodes left- or rightwards. The Fiber Distributed Data Interface (FDDI) made use of such a topology.
A mesh network: each node is connected to an arbitrary number of neighbours in such a way that there is at least one traversal from any node to any other.
A fully connected network: each node is connected to every other node in the network.
A tree network: nodes are arranged hierarchically.
