- •Laboratory work №1
- •Computer performance: speed, efficiency, energy costs
- •Amdahl's Law
- •Cpu time
- •Full answer
- •Cpu Time Definition - What does cpu Time mean?
- •Techopedia explains cpu Time
- •Amdahl's Law
- •Speedup:
- •Amdahl's Law Defined
- •A Calculation Example
- •Amdahl's Law Illustrated
- •Optimizing Algorithms
- •Optimizing the Sequential Part
- •Execution Time vs. Speedup
- •Measure, Don't Just Calculate
- •2.1 Architecture of computer
- •2.2 Types of memory
- •2.3 Number system
- •Memory unit.
- •Input - Output
- •Adding Binary Numbers
- •Subtracting Binary Numbers
- •Multiplying Binary Numbers
- •Dividing Binary Numbers
- •4.1 Main functions, structure and types of operating system
- •4.2 Windows os
- •4.3 Working with files and directories
- •Windows system key combinations
- •Windows program key combinations
- •1. Beginning work in word processor
- •2. Creating and editing simple text documents
- •3. Work with formula editor Equation 3.0
- •Exercise 8 - Selecting and Formatting Multiple Lines
- •Exercise 9 - Formatting Last Two Lines
- •Exercise 10 - Formatting Words using the Font Dialog box
- •Symbols
- •Structures
- •10.1. The definition and structure of database
- •10.2. Creation of a new database
- •10.3. Methods of creation new table
- •Control questions
- •6.1 The main tools for work in Power Point
- •6.2 Presentations in ms Office Power Point
- •7.1. Electronic spreadsheet ms Excel
- •7.2. Entering Excel Formulas and Formatting Data
- •7.3 Cell Addressing
- •Worksheets
- •The Formula Bar
- •Entering Excel Formulas and Formatting Data
- •Copy, Cut, Paste, and Cell Addressing
- •Exercise 2
- •Absolute Cell Addressing
- •Mixed Cell Addressing
- •What is Absolute Cell Addressing ?
- •What is Mixed Cell Addressing?
- •Using Reference Operators
- •Understanding Functions
- •Alternate Method: Enter a Function with the Ribbon
- •Fill Cells Automatically
- •Exercise 2
- •Exercise 3
- •Exercise 4
- •Chart example :
- •Exercise 10 Create a Column Chart
- •Apply a Chart Layout
- •Global and local networks. Internet
- •Bases of html
- •The internet
- •Examples of a web page
- •Html Tags
- •The start tag is often called the opening tag. The end tag is often called the closing tag. Web Browsers.
- •Example Explained
- •10.1 Software and hardware for generating key information. 10.2 Protecting programs from unauthorized use via usb-key and the software manufacturer.
- •2. Brief theoretical information
- •Information for the developer.
- •3. The order of execution of work
- •4. Contents of the report
- •5. Test Questions
- •Installation Certification Center.
- •III) Request a certificate. Processing request.
- •3. The order of execution of work
- •4. Contents of the report
- •Test Questions
- •1. Objective
- •3.The order of execution of work
- •Image 1
- •Creating a strong password→
- •Verify your account via sms or Voice Call→
- •Control what others see about you across Google services→
- •Choose the information you share with others
- •More details about your name & photo
- •Preview how your information shows up
- •Preview how your information shows up
- •About Google Accounts→
- •Common issues
- •Product-specific age requirements
- •Disabled account due to incorrect birth date
- •History
- •Technical details
- •Network structure
- •Base station subsystem[edit]
- •Gsm carrier frequencies
- •Voice codecs
- •Subscriber Identity Module (sim)[edit]
- •Phone locking[edit]
- •Gsm security[edit]
- •Standards information[edit]
- •Gsm open-source software[edit]
- •Issues with patents and open source[edit]
- •13.1 Obtaining the electronic services on the portal of e-government of kazakhstan
- •Laboratory work №14
- •Information culture.Internet culture.
3. The order of execution of work
SOFTWARE INSTALLATION.
Insta
llation Crypton API
Go to the directory and run CryptonAPI CRYPTONAPI.EXE.
Next, create a directory in CryptonAPI run install.exe installer. The parameters of the installation select the device Crypton-4K / 16, it is the default. Installation Crypton emulator Go to the directory Emulator and run the installation program install.exe. Setting Ancud Software:Copy the files and floppy gk.db3 uz.db3, which are in diriktorii Emulator. GC (main key
- Gk.db3 file) and ultrasound (replacement unit - file uz.db3) - key elements used by the emulator to perform cryptographic functions and must be loaded into the simulator prior to performing any cryptographic functions.
Next, click Start -> Programs -> Ancund Software -> Cripton API-> run "driver support DOS configuration" and choose "Use Driver" driver simulator. (Picture 1)
Figure1. After that, insert the disk, click Start -> Programs -> Ancund Software -> Crypton Emulator run the "Download keys" (Figure 2)
Figure2. After that you are ready to perform the encryption and decryption of information. Test the encryption function can be run in the Start Menu -> Programs -> Ancund Software -> Cripton API-> "Crypton API function testing program" (Figure 3)
Figure 3.
After running "Crypton API function testing program" Driver on the menu -> Open, select the "Driver Emulator" (Figure 4)
fail Key2.exe
Then, in the "Encryption", you can encrypt and decrypt a short message. Installation Center key generation (STG). Set STG (diKey.exe) running Key2.exe file Installation dipost package. Install dipost running setup.exe from the folder dipost
4. Contents of the report
The report discusses how to do the work. Give values of generated keys. Bring the results of tests of the device.
Test Questions
1. What file contains gk
2.What does uz file
3. Appointment of the master key
4. Describe the key hierarchy
List of recommended references
June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th Edition - Comprehensive, Thomson Course Technology, a division of Thomson Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski (University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
Craig Van Slyke Information Communication Technologies: Concepts, Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008, Pages: 4288
Brynjolfsson, E. and A. Saunders (2010). Wired for Innovation: How Information Technology Is Reshaping the Economy. Cambridge, MA: MIT Press
Kretschmer, T. (2012), "Information and Communication Technologies and Productivity Growth: A Survey of the Literature", OECD Digital Economy Papers, No. 195, OECD Publishing.
Laboratory work № 5.
Key generation and cryptographic information in the client email program DiPost is software jobs Centers users of information and communication services DIONYSUS (hereinafter simply Centres) and other systems that support SMTP and POP3. DiPost allows the user to prepare and store e-mail correspondence, conduct sessions of bilateral exchange of information with the Centers for different types of communication channels. When connecting the phone to the Center u1074 exchange of information is carried out automatically: all the data prepared by the subscriber to be sent, forwarded to the Centre, and the data that came in the subscriber's address since his last session with the Centre sent to the user's PC. Upon completion of the data exchange session, the user can engage in processing the information received. In addition to the usual functions of e-mail systems in DiPost the following features. Working with multiple mailboxes, it allows you to organize DiPost for several subscriber mailboxes. This capability allows the user registered in the different centers, post split flows. One mailbox (system) is automatically created, and the subsequent need to be created manually by the user. Work on communication lines of various types DiPost allows you to connect to the Centre for telephone lines (dial-up and leased) via a modem, via a local network, working on protocols IPX, TCP / IP, SMTP and POP3, on the switched network using a PPP or SLIP protocols. Automatic delivery of mail in DiPost implemented automatic exchange of information with Center mode after a specified time interval. Automatic preparation of outgoing mail in DiPost implemented automatic file conversion mode in e-mail messages and sending them to the Centre for initiating the data exchange with the Centre. Different storage formats of mail DiPost supports for storing e-mail messages (emails, letters, files) 3 mail format - Dionysos, MIME, and UUENCODE. The ability to store any messages Dionysus format gives the user a convenient means to view and edit text messages. The automatic format conversion for incoming e-mail inbox in DiPost can search emails in MIME format and auto-convert them to the format of Dionysus. If necessary, from the automatic format conversion can be dispensed with.
Support DiPost notification allows an order notification for outgoing mail and to generate a read receipt of incoming mail subscriber
