- •Laboratory work №1
- •Computer performance: speed, efficiency, energy costs
- •Amdahl's Law
- •Cpu time
- •Full answer
- •Cpu Time Definition - What does cpu Time mean?
- •Techopedia explains cpu Time
- •Amdahl's Law
- •Speedup:
- •Amdahl's Law Defined
- •A Calculation Example
- •Amdahl's Law Illustrated
- •Optimizing Algorithms
- •Optimizing the Sequential Part
- •Execution Time vs. Speedup
- •Measure, Don't Just Calculate
- •2.1 Architecture of computer
- •2.2 Types of memory
- •2.3 Number system
- •Memory unit.
- •Input - Output
- •Adding Binary Numbers
- •Subtracting Binary Numbers
- •Multiplying Binary Numbers
- •Dividing Binary Numbers
- •4.1 Main functions, structure and types of operating system
- •4.2 Windows os
- •4.3 Working with files and directories
- •Windows system key combinations
- •Windows program key combinations
- •1. Beginning work in word processor
- •2. Creating and editing simple text documents
- •3. Work with formula editor Equation 3.0
- •Exercise 8 - Selecting and Formatting Multiple Lines
- •Exercise 9 - Formatting Last Two Lines
- •Exercise 10 - Formatting Words using the Font Dialog box
- •Symbols
- •Structures
- •10.1. The definition and structure of database
- •10.2. Creation of a new database
- •10.3. Methods of creation new table
- •Control questions
- •6.1 The main tools for work in Power Point
- •6.2 Presentations in ms Office Power Point
- •7.1. Electronic spreadsheet ms Excel
- •7.2. Entering Excel Formulas and Formatting Data
- •7.3 Cell Addressing
- •Worksheets
- •The Formula Bar
- •Entering Excel Formulas and Formatting Data
- •Copy, Cut, Paste, and Cell Addressing
- •Exercise 2
- •Absolute Cell Addressing
- •Mixed Cell Addressing
- •What is Absolute Cell Addressing ?
- •What is Mixed Cell Addressing?
- •Using Reference Operators
- •Understanding Functions
- •Alternate Method: Enter a Function with the Ribbon
- •Fill Cells Automatically
- •Exercise 2
- •Exercise 3
- •Exercise 4
- •Chart example :
- •Exercise 10 Create a Column Chart
- •Apply a Chart Layout
- •Global and local networks. Internet
- •Bases of html
- •The internet
- •Examples of a web page
- •Html Tags
- •The start tag is often called the opening tag. The end tag is often called the closing tag. Web Browsers.
- •Example Explained
- •10.1 Software and hardware for generating key information. 10.2 Protecting programs from unauthorized use via usb-key and the software manufacturer.
- •2. Brief theoretical information
- •Information for the developer.
- •3. The order of execution of work
- •4. Contents of the report
- •5. Test Questions
- •Installation Certification Center.
- •III) Request a certificate. Processing request.
- •3. The order of execution of work
- •4. Contents of the report
- •Test Questions
- •1. Objective
- •3.The order of execution of work
- •Image 1
- •Creating a strong password→
- •Verify your account via sms or Voice Call→
- •Control what others see about you across Google services→
- •Choose the information you share with others
- •More details about your name & photo
- •Preview how your information shows up
- •Preview how your information shows up
- •About Google Accounts→
- •Common issues
- •Product-specific age requirements
- •Disabled account due to incorrect birth date
- •History
- •Technical details
- •Network structure
- •Base station subsystem[edit]
- •Gsm carrier frequencies
- •Voice codecs
- •Subscriber Identity Module (sim)[edit]
- •Phone locking[edit]
- •Gsm security[edit]
- •Standards information[edit]
- •Gsm open-source software[edit]
- •Issues with patents and open source[edit]
- •13.1 Obtaining the electronic services on the portal of e-government of kazakhstan
- •Laboratory work №14
- •Information culture.Internet culture.
3.The order of execution of work
11. Start dipost program. (Figure 7)
12. In the "Box" menu, select "Mailbox Settings" In the "Email" enter the address, consisting of the initials of the subscriber, in the "key name" enter the caller ID (name of the file in the PRIVATE folder on a floppy disk), check the box opposite fields "sign letters" and "Encrypt letters" DSU for example subscriber (Risunok8)
In "Box" menu, select "cryptosystem Settings", set the parameters corresponding to a given subscriber. (Figure 9).
N
ote,
it may be necessary to change the name of the file in the floppy disk
in the PRIVATE section.
Figure 7
Figure 8
Figure 9
13. In the "Posta", select "Address Book" and recorded it .For example subscriber addresses for the RAS (Figure 10):
Figure 10
We can now send encrypted messages (Figure 11)
If you do not have access to the Internet, then you can simulate the mail agent as follows: Create a user in the pack DSU "Outbox" message, attach any text file, encrypt it (znachёk lock) .Zakryvaem Dipost. Then copy the files from the folder "Dipost \ BOXES \ DSU \ Outbox" folder "Dipost \ BOXES \ RAS \ Inbox". Next, insert the floppy disk with the RAS .Zapuskaem Dipost keys in the RAS mailbox open the folder "Inbox" and decrypt files. Communication session is over. This work is done by 2 students. reporting form - a detailed description of the work done at each step in the electronic document (Microsoft Word).
4.Contents of the report
reporting form - a detailed description of the work done at each step in the electronic document (Microsoft Word). Give the structure of a key diskette. The content of the file public and private keys. 5. Test Questions
1.Describe the key floppy disk structure
2. How to get the private key?
3. How to get the public key?
4. What are the rules of secure document?
5. What basic threats confronts secure document system
Creating a protected document
Objective: To study the principles of «Crypton Word», «Crypton Excel», understand procedures cipher tion / decryption of electronic documents, setting the electronic digital signature (EDS). Methodical instructions to performance of laboratory work:
Check Novex Stealth key in the LPT port on the rear panel of the system unit. Centre the instrument thread setting emulator Crypton
Open the MS Word program.
Create a new electronic document or open any available.
Create a protected document and put the electronic signature. 1.Learn to work on the master encryption keys 2.Read the test program Crypton API application functions 3.Get the skills to work with Crypton Disk Setting emulator made by means of a label "Configuration emulator driver", accessible through the main menu of Windows. With this label program called config-integration emulator "drvsetup.exe", located in the directory of the emulator settings. The main window is shown in Fig. 1:
Pic. 1. The main window of the emulator configuration software
Fig. 1. The main window of the emulator configuration software
This window has three tabs:
1) "On the driver" (see. Fig. 1). This tab contains information about your eq-zemplyare emulator: installed version of the emulator;
the operating system used;
serial number of the emulator.
5. "Current state". This tab provides information about the number of open sessions emulator, t. E., Whether the emulator is currently in use and how many applications are using it. In addition, this tab provides information about the protection status of Copying, of this instance of the emulator. 6. "Civil Code and US" (see. Fig. 2). This tab is used to specify the location of keys ini-socialization emulator, as well as their loading and unloading. Appointment initialization keys and smacking dock work with them are described below. The main window of the configuration software emulator also has the following buttons: 7. "Apply". Writes configuration changes and allows you to continue working with the pro-gramme emulator configuration. 8. "Help". It is background information on the emulator.
Fig. 2. Tab "GC and US 'main window configuration software emulator The only configuration parameter that can be changed with confit-figuration emulator program - is the location of the master key (GK) and the replacement unit (KM). These key elements used by the emulator to perform cryptographic functions and must be for the ship-in emulator prior to performing any cryptographic functions.
To change the location of the GC and US directory tab is "GC and US" configuration software emulator (see. Fig. 2). This tab contains the following additional elements:
Input field for CC location directory and ultrasound.
3 button to select the location of the GC directory and ultrasound using standard dialog boxes (to the right of the directory entry). 4 Button for loading and unloading of the Civil Code and ultrasound. The name of the button is changed depending on whether the emulator is initialized, and may be one of the following: - "Load CC and US" - if the GC and US has not yet uploaded (the emulator is not initialized). Clicking on this button loads a GC and US (the download process is described in detail below). - "Unload CC and US" - if the emulator has already been initialized. In this case, the Civil Code and the ultrasonic keys are unloaded and further work is necessary to initialize the emulator clearly Islands. Keys HA and KM are stored on storage media information in the files "gk.db3" and "uz.db3" respectively. This version of the emulator allows use as a key media-only removable but supports of information, such as a floppy disk or a smart card. press the button "Sign and encrypt" panel in-TOOLS FOR «Crypton Word» To create a security document. In the Microsoft Word at least one document to be opened. It protects the active document. If Microsoft Word does not contain the active document, an error message bu-children. In addition, to create a secure document program will require download of the Civil Code and the ultrasonic keys. To do this, insert the floppy disk with stored thereon keys GK and US (the teacher). In after this dialog box appears with a proposal to remove the carrier. Warning: Never leave the vehicle with CC and US in the drive!
If the current document is not saved, you will receive a message with a proposal preserves-tion document. Clicking "Cancel" in the window cancels the operation of creating a protected document. Clicking "Yes" the document is saved, if you select the button "No" to the saving-Document does not occur; and in fact, and in another case, the current document is closed, and then displays a window for creating a protected document (see. Fig. 1).
To create a security document, follow these steps:
1) Specify the file name to record it.
2) Select the location of the catalog file to be created.
3) Select the desired subscribers with the mouse and the «Ctrl» key and «Shift». Isolation bony-ing in the same manner as the selection of objects into the Windows Explorer program. 4) Click "OK". Along with encryption on the files will be installed an electronic signature for subsequent monitoring of the integrity and authorship of a document. To be signed only a copy of the original document in the computer's memory, the original document is not changed. After pressing the "OK" button to begin the process of creating a protected document. This displays a screen that shows the progress of the process. progress window contains the button "Cancel", clicking on which you can cancel the process. This displays a confirmation cancel.
Laboratory work №1
CREATE A GOOGLE ACCOUNT TO USE GOOGLE DOCS. THE USE OF MOBILE TECHNOLOGY TO ACCESS THE INFORMATION, GPS NAVIGATORS, GSM ALARM.
Create your Google Account →
