Академический Документы
Профессиональный Документы
Культура Документы
РЕСПУБЛИКИ КАЗАХСТАН
«INFORMATION AND
COMMUNICATION
TECHNOLOGIES»
с использованием технологии CLIL
учебное пособие
Алматы, 2020
УДК 004(075.8)
ББК 32.816я73
А 52
Рецензенты:
ISBN 978-601-7991-22-7
УДК 004(075.8)
ББК 32.816я73
ISBN 978-601-7991-22-7
3
Примеры тестовых заданий на 1 рубежный контроль...............................130
Примеры тестовых заданий на 2 рубежный контроль...............................139
Примеры тестовых заданий на экзамен........................................................145
Глоссарий ..........................................................................................................198
Примеры заданий.............................................................................................209
Приложение.......................................................................................................241
Литература........................................................................................................249
4
ВВЕДЕНИЕ
Данные методические рекомендации по изучению дисциплины «Infor-
mation and communication technologies» с использованием технологии
CLIL предназначены для технических специальностей и включают в себя
описание 15 практических и лабораторных работ с глоссарием, тестами,
списком литературы и методическими указаниями к каждой теме. Прак-
тические и лабораторные работы по курсу проводятся с использованием
программного обеспечения операционной системы Windows 8 и выше.
Каждое занятие снабжено приемами технологии CLIL. Также приведены
варианты тестовых заданий на рубежный контроль, на экзамен и на СРС.
Своеобразие методики CLIL основывается на том, что знание англий-
ского языка становится неким инструментом изучения содержания дис-
циплины. Преподавание предмета с использованием данной технологии
базируется на содержании английских предметных текстов и на пред-
метной терминологии. При этом английский язык встроен в программу
обучения и потребность погружения в среду изучаемого языка для воз-
можности рассмотрения тематического материала существенно повышает
мотивацию студентов использовать язык в контексте определенной изу-
чаемой темы.
Этому также способствуют хорошо подобранные предметные матери-
алы не только для изучения конкретной дисциплины, но и для обучения
английскому языку: его лексических и грамматических единиц, а также
всех видов речевой деятельности (чтению, говорению, письму и аудиро-
ванию).
На своих занятиях по информационно-коммуникационным техноло-
гиям авторы используют различные типы заданий, которые подобраны по
уровню сложности, выстроены с акцентом на предметное содержание, его
понимание, проверку и последующее обсуждение.
На занятиях используются следующие приемы: «Больше и быстрее
всех», «Ключевые слова», «Вопросы». Для реализации первого приема
«Больше и быстрее всех» студенты работают в паре.
Например, по теме «Boolean Algebra» студенты могут записать следу-
ющие слова: logical calculus, mathematical logic, the Mathematical Analysis
of Logic, conjunction, truth values.
Например, по теме «Operating System» на доске могут быть записаны
следующие слова: Mac OS X, Single- and multi-user, Real-time, Single- and
multi-tasking, Unix and Unix-like systems, Microsoft Windows.
Методический прием «Вопросы» предполагает работу студентов в
паре, в ходе которой они пишут по 10 вопросов, ответы на которые хотели
5
бы получить. По крайней мере, четыре из десяти вопросов должны начи-
наться со слов Кто, Что, Как, Почему.
Таким образом, на занятиях можно использовать различные приемы,
а также их комбинацию. Сочетание разнообразных приемов технологии
CLIL поможет лучше усвоить не только предметное содержание дисци-
плины, но и английский язык. В этом поможет данное учебное пособие.
6
PRACTICAL WORK 1
Glossary
Topic Guidelines
7
Для реализации первого приема «Больше и быстрее всех» студенты
работают в паре. Тема занятия записана на доске. Для оценивания резуль-
тата работы можно использовать критерий первенства, то есть побеждает
та пара, которая первой напишет десять терминов, относящихся к данной
теме, либо можно использовать критерий времени. Побеждает та пара,
которая больше всех напишет терминов за одну минуту.
Например, по теме «Boolean Algebra» студенты могут записать сле-
дующие термины: logical calculus, mathematical logic, the Mathematical
Analysis of Logic, conjunction, truth values.
При использовании на занятии приема «Ключевые слова» студенты
пытаются определить тему занятия по хаотично расположенным на доске
ключевым словам новой темы урока. На рисунке 1 представлен фрагмент
презентации с новыми словами по теме урока.
8
Tasks for students
Test
1. A complete sentence, of which you can definitely say that its content is
either true (equal to 1) or false (equal to 0):
F) utterance;
G) conjunction;
H) disjunction;
I) negation;
J) function.
2. Logical variables, united by signs of logical operations, are:
F) Boolean expression;
G) logical function;
H) logical operation;
I) Boolean value;
J) logical relation.
3. The set of all elements belonging to both the set A and the set B is
called:
9
F) by combining the sets A and B;
G) by the intersection of the sets A and B;
H) the difference of the sets A and B.
4. Insert the missing operation characters on the sets:
A) {a, b, c} ___{d, b, e}{b};
B) {a, b, c} ___ {c, d}{a, b, c, d};
C) {a, b, c} ___ {a, d}{b, c}.
5. If any two vertices of an undirected graph can be joined by a chain, then
the graph is:
A) oriented;
B) undirected;
C) elementary;
D) with a tree;
E) connected.
References:
10
PRACTICAL WORK 2
Topic: Number System.
Lesson Objectives: to teach the skills of translating numbers from one
number system to another.
Content: By the end of the lesson, students will be able to:
• Define the concept «Number system».
• Identify the need for a numeral system.
Glossary
Topic Guidelines
2510 = 110012
11
Example 2. Translate 10101101.1012 «10» с.с.
Solution: 10101101.1012 = 1 27 + 0 26 + 1 25 + 0 24 + 1 23 + 1 22 + 0 21 +
+ 1 20 + 1 2 - 1 + 0 2 - 2 + 1 2 - 3 = 173.62510
1.1 Tasks
1. Translate this number from decimal to binary, octal and hexadecimal.
2. Translate this number to the decimal numeral system.
3. Add the numbers.
4. Perform subtraction.
5. Perform multiplication.
6. Perform division.
Note. In tasks 3-6, check the correctness of the calculations by translating
the original data and results into a decimal numeral system. In task 1d, get five
decimal places in the binary representation.
1. A) 666 (10);
B) 305 (10);
C) 153.25 (10);
D) 162.25 (10);
E) 248.46 (10).
2. A) 1100111011 (2);
B) 10000000111 (2);
C) 10110101.1 (2);
D) 100000110.10101 (2);
E) 671.24 (8);
F) 41A, 6 (16).
3. A) 10000011 (2) + 1000011 (2);
B) 1010010000 (2) + 1101111011 (2);
C) 110010.101 (2) + 1011010011.01 (2);
D) 356.5 (8) + 1757.04 (8);
E) 293.8 (16) + 3CC, 98 (16).
4. A) 100111001 (2) - 110110 (2);
B) 1111001110 (2) - 111011010 (2);
C) 1101111011.01 (2) - 101000010.0111 (2);
D) 2,025.2 (8) - 131.2 (8);
E) 2D8.4 (16) - A3, B (16).
5. A) 1100110 (2) * 1011010 (2);
B) 2001.6 (8) * 125.2 (8);
C) 2C, 4 (16) * 12.98 (16).
6. A) 110011000 (2): 10001 (2);
B) 2410 (8): 27 (8);
C) D4A (16): 1B (16).
12
1.2 Tasks
1. Convert the decimal number 76 to binary.
2. Convert the decimal number 193 to binary.
3. What is 10112 in decimal?
4. Which is equivalent to 1010011.00112 in decimal?
5. Convert the decimal number 276 to binary.
6. Convert the decimal number 756 to binary.
Test
13
c) a number of alphabetic characters used to write a number;
d) a maximum number representable in this system;
e) a number of letters and digits used to write a number.
References:
14
PRACTICAL WORK 3
Glossary
Topic Guidelines
15
Tasks for Students
1. Gapped sentences:
1. Key components ...
2. The graphical user interface of the MSDOS interface developed by
Microsoft.
3. What is Interface? ...
4. Supercomputer ...
5. Enter a device.
6. ... (?) .. – system software that manages computer hardware and software
resources and provides general services to computer programs.
7. ...... You can send letters, reports, documents, or software used for that
purpose.
8. There are two main categories of network topology, physical topology
and basic topology.
9. Network topologies: ..
10. ..... – a digital signal assigned to each device (for example, a computer, a
printer) connect to a computer network that uses Internet protocol for commu-
nication.
2. Answer the question:
1. What is Computer Configuration?
2. Which computer components are included in hardware and software?
3. What are the different configurations for two different computers if one
of them is used for writing text and the second for working with databases;
4. Which computer components are responsible for mathematical calcula-
tions? Qualify your answer.
5. Which components of the PC configuration determine its speed? Qualify
your answer.
6. What types of computers do you know? What devices do you know?
7. What is the procedure of the computer components? Qualify your
answer.
8. Which components of the PC configuration work in the shortest time
and with extended memory?
Test
16
c) Monitor and so on.
d) Headphones
2. Digital universal drive
a) DVD
b) CD
c) CD-RW
d) CD RW
e) CD COM
3. Industrial standard architecture
a) This
b) IDE
c) ATA
d) RES
4. International Information Technology Standards Committee
a) INCITS
b) T13
c) COM
d) DVD disc
e) ANSI
5. For RAM ...
a) information storage
b) editing information
c) no correct answers
d) working programs
References:
17
PRACTICAL WORK 4
Topic: Installation peripherals. Verifying.
Lesson Objectives:
1. Students will get acquainted with peripheral devices; learn how to in-
stall peripheral devices; determine the driver assignment.
2. Students can effectively work in groups.
3. Develop the ability to independently acquire new knowledge.
Glossary
18
the notebook do not suit the sound quality, then you can also use external
speakers, only they will be plugged into the headphone jack (see below about
it. Headphones can be considered a variety of speaker systems, only they are
designed for a single PC user. In fact, headphones are miniature speakers for
individual use. Headphones are connected to the computer in the same way as
speakers. On laptops, the connector is not highlighted in green, but there is a
«headphones» icon next to it.
Microphone
A microphone may be needed in two cases: ommunication via the Internet
(for example, via Skype).
Record sound for the purpose of further storage and processing on a PC.
As you might guess, a microphone is an input device. The microphone is
connected to a PC using the pink mini jack connector.
Webcam (webcam)
A webcam may be needed if you plan to communicate frequently over the
Internet, and at the same time it would be desirable to transmit not only the
voice, but also your image (it should be borne in mind that the speed of the
Internet must be sufficient to transmit the video signal). Connect the camera to
the computer via the USB connector (number 2 in figure 3).
USB flash drive (flash drive)
Flash drives refer to data storage devices, i.e. designed to store and transfer
information between computers.
By the way, I recommend that all computer users use a flash drive not only
for their intended purpose, but also as one of the means of data backup (we’ll
talk about this in one of the nearest IT lessons).
Of course, to get a flash drive is desirable already at the first steps of deve-
lopment of the computer.
From the name, you can guess that a USB flash drive is connected using the
USB connector.
Do not forget about the rule that you can remove the flash drive from the
socket after the software closes (icon near the system clock).
The program that controls the operation of the device is called the driver.
Peripheral devices (PU) – equipment designed for external processing of
information. In other words, these are devices located outside the system unit –
external devices.
• devices that are designed to enter information into the computer for
processing, and
• devices, to output information from it.
There are also devices for storing information outside the system unit
(external storage).
19
All of the above applies to external or peripheral devices of a personal
computer.
Keyboard and Mouse
These are the main devices for entering information, the need for them is
obvious and has not been discussed until the touch monitors have superseded
the usual ones:
A keyboard and a mouse with the PS/2 connector can only be connected
or disconnected when the computer is turned off. If they are made with USB-
connectors, they can be connected or disconnected at any time, even if the
computer is running.
Topic Guidelines
20
Tasks for students
1. _ u _ _ _ Computer.
2. M _ _ _ f _ _ _ _ (Large) Computer.
21
3. M _ _ _ (Medium) Computer.
4. M _ _ _ _ (Small) Computer.
__t_____ P_____p
P_______
Computer Computer
Computer
1. F__
2. _ l _ _ _ Sound.
22
3. P____
4. C____l____
5. _-R__
6. R____
6. Test assignments
What device can have a harmful effect on human health?
• Monitor.
• Printer.
• Scanner.
• Modem.
• System unit.
The computer keyboard is –
• Output Device.
• Random Access Storage Device.
23
• Computer Management Device.
• Input device for graphic information.
• Device of alphanumeric information.
The scanner is –
• Device for uninterruptible power supply.
• Information storage device.
• Device for image text and graphic information.
• Device that creates a digital copy of text and graphic information.
• Device for cleaning computers from viruses.
The minimum required set for computer operation contains ...
• System unit, printer.
• System unit, monitor, keyboard.
• System unit.
• Printer, scanner, monitor.
• Monitor, keyboard, mouse.
• Information input devices include.
• Display, keyboard, mouse.
• Scanner, keyboard, mouse.
• Printer, scanner, modem.
• Mouse, printer, system unit.
• There is no correct answer.
The devices for displaying graphic information are:
• Modem.
• Keyboard.
• Scanner.
• Printer.
• Mouse.
Device for displaying information on the screen
• Monitor.
• Mouse.
• System unit.
• Scanner.
• Keyboard.
Computer devices that are not subject to basic are called ...
• Subsidiaries.
• The main.
• Secondary.
• Unnecessary.
• Peripheral.
24
The monitor is designed for ...
• Writing information on a disk.
• Permanent storage of information.
• Connections of peripherals to the Main Line.
• Computer control for a given program.
• Display of text and graphic information.
Test
25
References:
26
PRACTICAL WORK 5
Topic: Аlgorithms.
Lesson Objectives: to examine the basic algorithms, flowcharts.
Glossary
Topic Guidelines
27
2. Студенты записывают все, что знают по теме (1-2 мин.)
3. З минуты для обмена информацией в группах, парах;
4. Каждая группа по кругу называет какой-то один факт, не повторяя
ранее сказанного
5. Преподавателем составляется список всех предложенных идей
6. Ошибки исправляются по мере изучения новой информации.
Например, можно предложить студентам сказать, что они думают
какой алгоритм можно назвать линейным, привести примеры. На занятии
изучения «Цикла» предложить предположить, что такое цикл, какие при-
меры циклических действий они могут привести.
2. To consider examples
To determine the distance on the plane between two points with given
coordinates M1 (x1, y1) and M2 (x2, y2). Create a block diagram.
28
Learn basic types of algorithms. An Algorithm is a sequence of steps that
describe how a problem can be solved. Create a flowchart for the tasks:
1. Given the edge length of the cube, find the volume of the cube and the
area of its lateral surface.
2. Three resistance R1, R2, R3 are connected in parallel. Find the resistance
of the connection.
3. To determine the time of a stone fall on the surface of the earth from a
height h.
4. A known circumference. Find the area of a circle bounded by this circle.
5. The triangle specified by coordinates of its vertices. Find:
• the perimeter of the triangle;
• the area of a triangle.
6. To calculate the height of a triangle lowered on the side and, using the
known values of the lengths of its sides a, b, c.
7. To calculate the volume of a cylinder with base radius r and height h.
8. To determine the distance travelled by a physical body in time t if the
body is moving with a constant acceleration a and has at the initial
moment of time the speed V0.
9. Calculate the area of triangle by Heron’s formula, if a = 5, b = 6, c = 9.
10. To determine the coordinates of the vertex of the parabola y = ax2 + bx +
+ c (a # 0). a = 1, b = 2, c = -9.
3. Insert the missing words in the text using the following words:
traditional, individual, minor
Unlike many ___________ cell phones, smartphones allow
____________ users to install, configure and run applications of their
choosing. A smartphone offers the ability to conform the device to your
particular way of doing things. Most standard cell-phone software offers only
limited choices for re-configuration, forcing you to adapt to the way it’s set up.
On a standard phone, whether or not you like the built-in calendar application,
you are stuck with it except for a few __________ tweaks. If that phone were
a smartphone, you could install any compatible calendar application you like.
Test
29
2. Technological chain of solving the problem on a computer is the
following sequence:
a) statement of the problem – algorithmic – programming;
b) statement of the problem – algorithmic – Mat. modeling –
programming;
c) statement of the problem – Mat. modeling – algorithmic –
programming;
d) modeling – problem formulation – algorithms – programming;
e) modeling – algorithmic – problem formulation – decision-making.
3. Specify the correct ID:
a) d100;
b) sin(x);
c) in a3;
d) x3;
e) a•3.
4. Specify the keywords of the Pascal programming language (specify
wrong answer):
a) sin(x) cos(x) tan(x);
b) interface, label, mod;
c) program, record, set;
d) array, and down to;
e) implementation, until, with.
5. Turbo Pascal includes the following set of basic symbols: (select the
wrong)
a) Greek letters
b) 10 numbers: 0-9
c) _ underscore
d) symbols: + - * / = <> < > <= >= := @
e) specifiers: ^ $ #
References:
30
PRACTICAL WORK 6
Topic: Program Structure. Data types, variables, arrays. Operators of the
programming language. Compiling and running programs.
Lesson Objectives: Get an idea of the program structure in Pascal, learn
how to use the standard features and basic operators, work in Pascal ABC.NET.
Glossary
Topic Guidelines
31
Writeln (ʹплощадь прямоугольника со сторонами ʹ, l ,ʹ и ʹ, w ,ʹ = ʹ,s );
End.
2. Tasks for students
1. Write the formula for calculating the area of the triangle in the form of an
assignment statement:
2. Write a program to calculate the value of functions
and
Test
32
5. In the TP there are the following repeat operators:
a) while, repeat, for;
b) if, repeat, for;
c) while, repeat, goto;
d) case, repeat, for;
e) repeat, for.
References:
33
PRACTICAL WORK 7
Topic: Network operating system
Lesson Objectives: this lesson covers desktop and mobile operating
systems, open-source software, and hardware compatibility.
Glossary
Android – A mobile operating system (OS) based on the Linux kernel and
currently developed by Google.
Blackberry OS – A proprietary mobile operating system developed by
BlackBerry Ltd for its BlackBerry line of smartphone handheld devices.
Chrome OS – An operating system based on the Linux kernel and designed
by Google to work with web applications and installed applications, initially
designed as a pure web thin client operating system.
Cross-platform – An attribute conferred to computer software or computing
methods and concepts that are implemented and inter-operate on multiple com-
puter platforms.
Device driver – A computer program that operates or controls a particular
type of device that is attached to a computer.
Distro (Linux distribution) – An operating system made as a collection of
software based around the Linux kernel and often around a package mana-
gement system, typically based on either Red Hat’s package manager (rpm and
yum) or Debian’s package manager (dpkg and apt).
Embedded system – A computer system with a dedicated function within a
larger mechanical or electrical system, often with real-time computing constraints.
Emulator Hardware or software or both that duplicates (or emulates) the
functions of one computer system (the guest) in another computer system (the
host), different from the first one, so that the emulated behavior closely resem-
bles the behavior of the real system (the guest).
GUI (graphical user interface) – A type of interface that allows users to
interact with electronic devices through graphical icons and visual indicators
such as secondary notation, as opposed to text-based interfaces, typed com-
mand labels or text navigation.
Topic Guidelines
34
Tasks for Students
35
exists with the GNU/Linux system, but it is already quite usefully so. For
example, it is possible to use the GNU/Linux system on one type of computer
architecture to build the same system on another architecture.
Orthogonal
This is the principle of «minimal interference». For example the work of
one user should impinge on that of another only if both of them desire it and
only to the extent that both of them do. Some would say that this applies to the
kernel as well – it should keep out of the way of user programs unless those
programs need it!
Persistent
Loosely speaking, things should be available during the time when they
are needed. Here is an anecdotal explanation. In TIFR, the typing of film club
notices was often given to «novice» volunteers. One such volunteer typed the
entire notice (about a 1000 words) and was horrified to find that the compu-
ter had ignored everything after the first 128 characters! In other words, the
operating system should try not to spring nasty surprises on the users by
deleting their data.
Abstraction
We (more and more) wish to deal with computers at a higher-level of abs-
traction than bit manipulation. This is somewhat analogous to what we do in
mathematics. At the lowest level all of mathematics deals with the fundamental
undefined entities (numbers for some people, sets for others and points,
lines, planes for yet others). However, it would be foolish of us to do all of
mathematics at this level. Similarly, the operating system needs to offer us
some high-level abstract objects to manipulate and use as a base to create even
higher-level ones. At the same time it should be possible within our system to
get «close to the metal» if need be.
3. The advantages of network operating systems are as follows −
• Centralized servers are highly stable.
• Security is server managed.
• Upgrades to new technologies and hardware can be easily integrated into
the system.
• Remote access to servers is possible from different locations and types of
systems.
The disadvantages of network operating systems are as follows −
• High cost of buying and running a server.
• Dependency on a central location for most operations.
• Regular maintenance and updates are required.
4. Вставить пропущенные слова:
1. An operating system is _____ that manages _____ and provides _____.
36
2. The operating system provides _____.
3. The operating system coordinates _____.
4. The operating system provides _____.
5. The operating system monitors _____.
6. The operating system provides _____.
7. Popular computer operating systems include _____.
8. A mobile operating system, also referred to as mobile OS, is _____.
9. Popular mobile operating systems include _____.
10. OS X, Linux, Android, Chrome OS and iOS are based on _____.
11. Popular distributions of Linux include _____.
12. Open-source software is _____.
13. Proprietary software or closed source software is _____.
14. 64-bit processors and operating systems support _____, while 32-bit
operating systems are limited to _____.
Test
37
e) Samsung.
5. When it created the Open Handset Alliance?
a) 2005;
b) 2006;
c) 2004;
d) 2007;
e) 2008.
References:
1. Auslander, Marc A.; Larkin, David C.; Scherr, Allan L. (2011). «The evolution
of the MVS Operating System» (PDF). IBM J. Research & Development.
2. Deitel, Harvey M.; Deitel, Paul; Choffnes, David. Operating Systems.
Pearson/Prentice Hall. ISBN 978-0-13-092641-8.
3. Bic, Lubomur F.; Shaw, Alan C. (2013). Operating Systems. Pearson: Prentice
Hall.
4. Silberschatz, Avi; Galvin, Peter; Gagne, Greg (2017). Operating Systems
Concepts. John Wiley & Sons. ISBN 0-470-12872-0.
5. O’Brien, J. A., & Marakas, G. M.(2018). Management Information Systems.
10e. McGraw-Hill Irwin.
6. Leva, Alberto; Maggio, Martina; Papadopoulos, Alessandro Vittorio;
Terraneo, Federico (2017). Control-based Operating System Design. IET.
ISBN 978-1-84919-609-3.
7. Arpaci-Dusseau, Remzi; Arpaci-Dusseau, Andrea (2015). Operating
Systems: Three Easy Pieces.
38
PRACTICAL WORK 8
Topic: Application
Lesson Objectives: Identify common programs, applications and their
purpose.
Content: By the end of the lesson, students will be able to:
• Productivity software or office productivity software is an application
software dedicated to producing information, such as documents,
presentations, worksheets, databases, charts, graphs, digital paintings,
electronic music and digital video.
• Existing office suites contain wide range of various components. Most
typically, the base components include a word processor, spreadsheet,
and presentation program.
• Popular office suites include Apache OpenOffice, LibreOffice,
Microsoft
Office and Google Docs.
Glossary
39
zip – An archive file format that supports lossless data compression,
supported by Microsoft Windows.
Test
40
2. Microsoft Visual Studio is
a) representative of the software tool;
b) software development environment;
c) device driver;
d) OS installation kit;
e) robotic.
3. Form in DBMS referred:
a) A window on the computer screen with data input;
b) Output table values in a user-friendly way;
c) designate the database field;
d) A single database file;
e) individual files are placed in a folder.
4. What must be included in the database?
a) query language processor;
b) command interface;
c) visual shell;
d) help system;
e) store files;
f) redundancy agreement.
5. List the benefits of a centralized approach to data storage and
management
a) General access ability;
b) support the integrity of files;
c) operating system;
d) unique software;
e) user model support;
f) data protection and integrity.
References:
41
PRACTICAL WORK 9
Glossary
Topic Guidelines
42
Puzzle
i o t v t j o p e l e c t r o n i c s w e r h r a g
n с o n s u m e r i m v p n y u i o p f h j o t d o
f j k l o w v b a p a p p l e w a t c h e r m y g o
o a s a a d f g p h c w e h o m e a a a a a e u h g
r b n s m a r t p o h c o n t r o l w e e e p i j l
m e c v m o p h l n i s y s t e m s e r r r o i j e
a m q w e r t o i e n e y u o p a s r r r r d o k h
t b a f g p h m c a e l e a r n i n g r r r a p l o
i e z f h k r e a e a m a z o n e c h o o o d k o m
o d o l p t y u t t f g h j k l p o i u y t d l y e
n d e d w w t y i u s o i a s e c u r i t y d h r a
a p p l e w a t c h j s m a r t p h o n e s h m t r
2. Ответить на вопросы
1. What is the Internet of Things?
2. Why do connected devices need to share data?
3. Where does the IoT go next?
Tests
43
d) a set of knowledge and skills for effective information activities that
achieve this goal;
e) his knowledge of the main types of software and user characteristics
of the computer;
f) level of understanding of laws of information processes in the nature
and society, quality of knowledge of bases of computer literacy;
g) his knowledge of the basic concepts of computer science.
3. Which one of the following statement is wrong ?
a) Online Learning is MOTIVATING.
b) Online Learning is INCREASE MATERIAL COST.
c) Online Learning is ENHANCED COMPREHENSION.
d) Online Learning is PORTABLE.
e) Learning is INCREASE MATERIAL COST.
4. The Application Package, called the editor, is designed to create and edit:
a) magazines, textbooks;
b) hard disks, floppy disks;
c) texts, documents;
d) thesis, dissertation;
e) graphics, illustrations.
5. How does a computer with a network card connect to a network?
a) computers;
b) raster;
c) archival;
d) network;
e) switch.
References:
44
PRACTICAL WORK 10
Topic: The internet. Basic concepts: the site, the ip-address, port, socket,
server, client.
Lesson Objectives: to acquire the skills of classification and analysis of IP
addresses.
Glossary
The Internet. It is the largest network in the world that connects hundreds of
thousands of individual networks all over the world.
The popular term for the Internet is the «information highway».
Rather than moving through geographical space, it moves your ideas and
information through cyberspace – the space of electronic movement of ideas
and information.
Protocol/Internet Protocol communication model (discussed in the next sec-
tion), while older networks were transitioned over to it.
IP addresses and the Internet. IPv4 addresses are the IP addresses from
the original TCP/IP protocol. In IPv4, 12 numbers are used (implemented as
four 8-bit integers), written with a dot between each integer. Since an unsigned
8-bit integer’s maximum value is 255, four integers together can encode appro-
ximately.
Topic Guidelines
45
Рисунок 5. Построение фразы на английском языке по шаблону
Task 1.
Answer the questions:
Can there be:
A. Two boxes with the same name on the same mail server;
B. Two boxes with the same passwords on the same mail server;
C. Two boxes with the same name on different mail servers;
D. Two boxes with the same name and password on different mail servers?
Task 2.
Identify the differences between e-mail and teleconference.
Task 3.
Create a screening test of 5 questions on the topic «Working with e-mail»
using a test shell (at the student’s choice).
Additional task.
Using the resources of the Internet to search for graduates of GOU NPO
PL №1, who achieved high results in their professional activities (awards,
46
titles). This material is necessary to prepare for the 100th anniversary of the
submarine number 1.
Answers to the tasks sent by e-mail to the address
Sokolova-sm@mail.ru, attaching them to the main e-mail.
2. Tasks for students
The network administrator is given an IP address and it is necessary to
divide the network into 5
a. 193.168.56.0
b. 193.25.45.0
c. 196.254.85.0
d. 193.168.54.0
Карточки с заданиями для индивидуальной работы
Определить топологию сети
1 2
Фамилии ___________________
47
Продолжение
1 2
Фамилии_____________________
Фамилии______________________
48
Test
References:
49
PRACTICAL WORK 11
Topic: Designing web-application.
Lesson Objectives: is learning the basic concepts of HTML is essential to
understanding the design documents for the Internet.
Topic Guidelines
...</HEAD>:
In the description section of the header, you can specify the title of the
document, it uses the tag <TITLE> ... </TITLE>. When the browser encounters
this tag, it displays all that is in it, as a title. An example of how to use this tag:
50
2. By nesting tags, make a list, shown in Fig. 1. Pay special attention to
the fact that the code was valid.
<!DOCTYPE HTML>
<html>
<head>
<meta charset=»utf-8»>
<title>Вложенные списки</title>
</head>
<body>
<ul>
<li>Пункт 1
<ul>
<li> Подпункт 1.1</li>
<li> Подпункт 1.2 </li>
</ul>
</li>
<li>Пункт 2
<ul>
<li>Подпункт 2.1</li>
<li>Подпункт 2.2 </li>
</ul>
</li>
</ul>
</body>
</html>
Test
51
b) To indicate the beginning of the table.
c) To specify a comment to the object.
d) To display tips to tag.
e) To insert a link to another document or resource.
2. Teg TITLE is used:
a) To indicate the page title.
b) To identify citations in the text.
c) To underline the text on the page.
d) To set the page title.
e) To select the table header...
3. Potentially possible event, action (action), the process or phenomenon
that may cause damage to anyone’s interest became known as
a) Event.
b) Threat.
c) Protection.
d) Security.
e) Crypto.
4. Specify the names of the basic protocol stack TCP / IP computer
networks
a) TCP and UDP.
b) IP and PoP.
c) TCP and IP.
d) IP and Imap.
e) TCP and Http.
5. The three most common email protocols are
a) POP, IMAP and MAPI.
b) TCP, IP, POP.
c) MAIL, e-mail, mail.ru.
d) UDP, TCP, IP.
e) VoIP, TCP/IP, OSPF.
References:
52
PRACTICAL WORK 12
Topic: Service security software. Cloud computing.
Lesson Objectives: learn service security software and therms of cloud
computing.
Glossary
Topic Guidelines
53
7. For scanning of folders or files right-click on the demanded folder or
the file and in a context menu choose the «Skanirovat_imya Folder or File»
command.
8. Carry out control of resident providers, having left-clicked on the button
A in the indication panel. The Scanner of access of avast will open!, in which
control of 7 resident providers or modules is carried out.
9. Compare work of two anti-virus programs On the basis of results of the
performed work with anti-virus programs give an assessment to these programs.
II. Назвать фамилии изображенных людей, описать их вклад в раз-
витие облачных технологий
Test
54
2. Accelerators offer residents a structured program that helps
a) demand for information resources;
b) accumulation of knowledge;
c) model complex problems;
d) play some brain functions;
e) hone your business model;
f) increase sales;
g) get the right contacts.
3. Free software movement (eng. free software, also software libre)
a) for client/server DBMS;
b) freedom to run your software;
c) for office automation;
d) Von Neumann;
e) in 1993;
f) in 1983;
g) Richard Stallman.
4. The most popular software packages in this class include products
such as
a) Quattro Pro.
b) Media Markt.
c) Microsoft Excel.
d) Adobe PhotoShop.
e) Corel DRAW.
f) Lotus 1-2-3.
g) Adobe Illustrator.
5. Knowledge management is necessary for…
a) creation of electronic document flow;
b) creation of intellectual capital of the enterprise;
c) decision making support;
d) preservation and effective use of knowledge and information in the
community;
e) network flow resource management;
f) transforming hidden knowledge into explicit knowledge;
g) create a hierarchical storage.
References:
55
PRACTICAL WORK 13
Topic: Robotics.
Lesson Objectives: students will:
– Create a definition of robot.
– Discover four different categories of robots and how they interact with
their surroundings.
– Illustrate a robot’s build (form) based upon a specific set of parameters
(function).
Glossary
Robotics is the branch of technology that deals with the design, construction,
operation, structural disposition, manufacture and application of robots.
Robotics is related to the sciences of electronics, engineering, mechanics,
and software.
Actuator – a motor that translates control signals into mechanical movement.
The control signals are usually electrical but may, more rarely, be pneumatic or
hydraulic. The power supply may likewise be any of these. It is common for
electrical control to be used to modulate a high-power pneumatic or hydraulic
motor.
Arduino – the current platform of choice for small-scale robotic experimen-
tation and physical computing.
Artificial intelligence is the intelligence of machines and the branch of
computer science that aims to create it.
Topic Guidelines
56
5. Conclude with a group discussion by sharing their answers from the
Venn diagrams and discuss the questions below.
I.
II.
1. Ask students to draw a robot, based upon their experiences.
2. Have students take two minutes to do a «think, pair, share and explain»
about what they drew and why they drew their robot in that particular manner.
57
3. Lead students through a group discussion with an outcome of creating a
definition of robots. Pose questions such as:
• Have you ever seen a robot before? What did it look like?
• What type of task was the robot trying to accomplish?
• Does a robot move? Or have arms that move?
• Are robots important? Why?
• What is a robot? Robots use different kinds of sensors to collect the
infor-mation they need. Software processes this information so the robot
can plan a response.
Then they act to complete the task.
Text 1
Social Robots
Scientists have been studying human facial expressions for many years.
With the dozens of muscles found in our faces we are able to communicate
emotional cues such as joy, anger, or shock. Social robots like EMYS have the
ability to detect emotional cues from human beings. Social robots can also be
used as a comfort mechanism. Paro is a baby seal used for therapeutic purposes
and can have a calming effect on a person in a nursing home or hospital. This
idea is much like live Animal-Assisted Therapy. Even though emotional cues
can be detected, these robots do not feel or experience emotions themselves.
Text 2
Telerobotics
Some robots can be controlled from great distances, such as from Earth
to Mars! The Curiosity rover is a remotely operated robot on Mars driven
by a team engineers at NASA’s Jet Propulsion Laboratory on Earth. Every
morning the rover is sent a specific list of tasks to accomplish – these tasks
include taking pictures of the Martian surface or collecting soil samples. Not
all remote-controlled robots have to be millions of miles away; the Da Vinci
Surgical System is a robot that assists in making major surgeries minimally
invasive. Its robotic arms carefully perform the surgery on the body as the
surgeon orchestrates every movement, incision and suture from the Da Vinci
console. This console produces a three-dimensional, high-resolution image for
the surgeon to observe and manipulate while performing the surgery.
Text 3
Mobile Robots
GOAL! Soccer ‘bots are autonomous robots that move around and play a
game of soccer. The robots move with the help of artificial intelligence (AI)
software and two cameras mounted above that act as eyes to control the game.
These eyes sense and compute data, which then flows to a central computer that
holds the AI software. The AI software processes and plans out a strategy for
58
the robots. Finally, the AI software sends out commands to the player ‘bots,
allowing them to act in the game by kicking or blocking the ball. Mobile robots
can be fun, but can also have a more serious purposes: RHex has the ability to
travel through rocks, sand, and other climates. This robot is used to study areas
that humans are not able to reach or that are unsafe to travel. Attaching objects
like climate sensors allow RHex to collect data for humans to study later.
III.
CHECK FOR UNDERSTANDING
1. How do you know if something is a robot?
2. What is the purpose of a robot?
3. What should an engineer take into consideration before building a robot?
4. Is a dishwasher a robot? Why or why not?
5. Is a cellphone a robot? Why or why not?
IV. Crossword
Across
Sections of white space in source code are generally ignored
The «letters»
You have to have one or the function will not work
A type of sensor that uses sound waves to detect a target
The language in between the robot and human. (2 Words)
Detects light waves; determines color
What robot is doing
Order of statements
The rules controlling the behavior of a computer programming language
59
Text in program
Type of programming used for pseudocode
Down
1. Lego Mindstorms programmable robots.
3. Made up of many simple statements.
4. One powered by electricity or internal combustion, that supplies motive
power for a vehicle or for some other device.
6. Detects when it is being touched.
9. Detects how altitudes of sounds.
12. End of statements.
13. The «numbers».
14. A computer program that is used to test and debug other programs.
15. The act or process of copying data in such a way.
Test
1. Robot specification tables often list a number for cycle time, the time
needed for the robot to complete a standard move. But just what is a standard
move?
a) Pick up an object, move it 25 millimeters up, 305 millimeters across,
and 25 millimeters down.
b) Pick up an object, raise it 1 meter, and set it back down.
c) Moving completely through the robot’s range of motion.
d) There is no standard move; it varies from one robot supplier to the
next.
e) There is no standard move.
2. The work envelope of a Cartesian robot can best be described as...
a) Hemisphere.
b) Heart.
c) Quadrilateral.
d) Overlapping circles.
e) Brain.
3. What is a compliance device?
a) A device that ensures a robot follows your orders.
b) A vacuum-based gripper.
c) A device that limits the motion of the robot arm to prevent injuries or
collisions.
d) A device that enables allows lateral or pivoting movement of an end-
effector.
e) Input device
60
4. What manufacturer gets the credit for the first successful industrial
application of robots?
a) Ford Motor Co.
b) General Motors Co.
c) IBM Corp.
d) General Electric.
e) Electric.
5. What does SCARA stand for?
a) Special Computerized Articulated Robot Arm.
b) Selective Compliance Assembly Robot Arm.
c) Seiko Controlled Automated Robotic Assistant.
d) Super Cool Automatic Robot Assistant.
e) Robot Assistant.
References:
61
PRACTICAL WORK 14
Topic: Infrastructure of «electronic government».
Lesson Objectives: To examine experiment of the developed countries on
forming of the Electronic government.
Glossary
Topic Guidelines
During the execution of lab tasks, you will create a report that should be a
formatted document. The result of each task should be preceded by the text of
the job itself. The report should have the following formatting requirements:
62
1) the font size of the task text is 12 pt, the inscription is bold;
2) the font type of the entire text of the document is Times New Roman;
3) align the text of the entire document – in width;
4) the indent of the red line is 1.25 cm;
5) the pages of the report should be numbered;
6) you must specify your name, group number, name of laboratory work in
the header.
A prepared, and properly formatted report, must be sent to your teacher's
email.
Important: when writing e-mails, you should follow the rules of etiquette in
the same way as when writing an ordinary letter:
1. Any letter begins with an appropriate greeting, even if you are not fami-
liar with the recipient.
2. The section Sender (from whom the letter came) should contain a first
and last name (surname and initials or position, it all depends on the
nature of the letter).
3. The letter ends with a signature indicating the information about you; for
business letters it can be the name of the organization, position, contact
phone number. If you expect further communication, you should specify
the name and patronymic name completely so that the recipient can
contact you.
4. The text of the letter does not include the contents of the past letters,
except for those cases when you really want to remind the addressee
some information.
5. It is accepted to respond to all letters (excluding advertising and news-
letters) within 2-3 days.
Important: Correspondence within the framework of training classes is clas-
sified as official, therefore letters that do not meet the etiquette rules will not be
considered.
Exercise 1
On the website of the Republic of Kazakhstan http://government.kz find the
necessary information specified in your version, make copies of the screen and
add the image data to your report.
Option 1
1. Who is the curator and state customer of the state program «Information
Society»?
2. How many state programs are under implementation?
3. How many deputies have the Chairman of the RK? Full name of all
deputies.
4. How many assignments were made by the Government of the Republic of
Kazakhstan in December 2016?
63
Option 2
1. Who is the curator and the state customer of the state program «Affordable
Housing for 2015-2020»?
2. How many government programs are under implementation by the
Government of the Republic of Kazakhstan?
3. The number of letters received from residents?
Option 3
1. Who is the curator and state customer of the state program «Social sup-
port of citizens»?
2. What subprograms are included in the state program «Social support of
citizens»?
3. Who is currently the Minister of Justice in the Republic of Kazakhstan?
How many ministers are part of the RK?
Test
64
4. Information system is
a) processes of creation, collecting, processing, accumulation, storage,
search, transfer, use and distribution of information with use of infor-
mation technologies;
b) set of the information technologies, information networks and means
of their software and hardware intended for implementation of infor-
mation processes;
c) is a system composed of people and computers that processes or
interprets information;
d) certain principles of the organization of the electronic government;
e) activities for providing information resources, information systems
to users on their requests or by agreement of the parties.
5. Information services are
a) activities for providing information resources, information systems
to users on their requests or by agreement of the parties;
b) set of the information technologies, information networks and means
of their software and hardware intended for implementation of infor-
mation processes;
c) is a system composed of people and computers that processes or
interprets information;
d) certain principles of the organization of the electronic government;
e) activities for providing information resources, information systems
to users on their requests or by agreement of the parties.
References:
65
PRACTICAL WORK 15
Topic: The main components of «e-learning».
Lesson Objectives: learn the main components of «E-Learning». Working
in «E-Learning» environment.
Topic Guidelines
66
important to know if your audience has the appropriate hardware and software
to hear the audio.
• Learning Environment: Another critical part of the analysis phase is to
identify the environment of your audience. Where will the audience complete
the training or course? Will it be in a classroom setting or at their workstation
or desk? Answers to these questions help you to design activities that best meet
the environment requirements. For example, the learner may be in a location
that inhibits his or her learning experience due to noise or other distractions.
The leaner may also be restricted to certain times of the day or limited to an
amount of time to use a computer for training. Understanding these obstacles or
challenges will better help you in designing a course.
• Job Responsibilities: As an instructional designer, and especially as an
elearning developer, you must know the job responsibilities of your audience.
Remember, required skills of the learner minus current skills of the learner
equals course objectives. Knowing what the learner is responsible for on the job
will assist you in meeting the expectations and objectives of your customers.
Also, this knowledge will help you to create effective online exercises and
games to help the learner grasp the subject presented.
• Preferences: This is one of the most overlooked areas when learning
about your audience. Your audience will always have a preference in how they
learn. Some are more prone to learn from video and audio exercises, while
others need more simulated, hands-on exercises to learn. Knowing the learning
styles will help you to design a course that is interactive and achieve results.
2. Tasks for students
Course Structure
Course structure refers to how a course is designed for e-learning. The
structure of a course plays a critical role in how your audience learns the
material. During the Design phase of ADDIE you brainstormed how the course
should be organized and structured. For e-learning the same principles apply.
Storyboarding is a great way to build your course structure. Consider the
following items when structuring your course:
• Group content into logical modules: Identify the flow of the course and
then determine how to modulate the information. Structuring the information
into small «chunks» will make it easier for your audience to follow and learn
the materials. Most people can retain a lot of information. However, the
information must be organized and grouped into small segments to ensure a
greater retention percentage of the information.
• Avoid creating modules that exceed 8-10 pages: Most people need to feel
like they are accomplishing something and need those mental check points that
indicate that they are progressing. Keeping your modules to 8-10 pages will
help the learner feel a sense of progress. Also, modules that tend to be long
67
cause the learner to loose interest and thus, the learning process becomes a
drudgery.
• Incorporate interactive concepts: Your course structure should also
include interactive concepts strategically placed throughout the course. Too
much interactivity can cause the learner to either forget why they are completing
the course or simply loose interest. A good rule of thumb is to include an
exercise or activity every third page with one major activity per module. This
will establish a good balance between exchaning information and sustaining
the interest of the learner.
• Use pictures/graphics to help explain ideas, concepts, or statements: It
is always a good practice to include images whenever possible. Many times,
instructional designers will insert an image just for the sake of inserting a
picture. Each image should have a purpose and should represent the subject
presented on the page. By using images to emphasize certain points of the
page, you will draw the learner into the subject and he or she will be able to
better relate to the concepts presented.
Page Design
Like the importance of charm and charisma of the classroom instructor,
the page design of an online course is critical to the learning process. How a
page is designed can have a huge impact on the learning experience of your
audience. Consider some of the following tips when formatting your course:
• Navigation must be intuitive. Make navigation simple and easy to follow.
The easier it is to navigate, the more engaging the course will be for the learner.
• Appearance must not hinder the learning process. Remember, the
purpose of the course is to instruct the learner. The layout of the course should
not be laborious for the learner to understand what he or she must do on the
page. If a page is confusing or frustrating for the learner, they will lose interest
and you will not achieve the learning objectives.
• Balance between text and graphics is critical. Avoid over powering the
text with graphics or images. Graphics are a powerful resource for instructional
designers. Using graphics wisely to stress a concept is a great way to help the
learner comprehend a complex topic. However, if the graphic becomes too
dominate and over shadows the intent of the topic or concept on the page, the
learner can become distracted and lose interest in the course. Also, too much
text with little to no images can also have an affect on learner. Similar to
images, too much text on a page can appear to laborious for the learner and
can psychologically impact the learner in not reading the information. Thus,
balance of images and text must be considered when designing a page.
• White space is good. Some people like to use every bit of real estate
on a screen. This makes the page look cluttered and unorganized. Having a
lot of white space is actually a good practice to incorporate into your training.
68
Using white space effectively can promote a positive learning environment for
the learner as he or she will not see the page as labor intensive to complete.
• Consistency is golden (includes fonts, layouts, and pop-ups). Being
consistent throughout your course will improve the learning experience of your
audience. Keeping objects and fonts consistent throughout your course helps
the learner to become less frustrated in navigating through the training.
• Ease of scanning information is imperative. Most people like to scan
through a page. Making the page user-friendly by organizing information using
bullets or numbers can greatly improve the learning experience. Organizing
concepts and topics using bullets or numbers ensure a greater retention
percentage for the learner. It also helps the learner to quickly find key points or
facts to assist in comprehending critical topics.
• Chunking information is crucial. As mentioned before, chunking
information into small bits of information will help your audience retain the
information presented in the training. As mentioned, most people can retain
vast amounts of information if the information is presented in a well organized
fashion. Segmenting topics by steps, phases, or concepts will help the learner to
remember and understand information within the course. It will also help you
in designing an effective training course.
Content Engagement
Because e-learning is a self-study medium, interacting with the learner
becomes more important than most types of training forums. Content enga-
gement refers to how the learner interacts with content of the course. Because
studies have shown that the learning experience is greatly enhanced when
exercises or activities are incorporated into the learning process, content
engagement is critical.
Engaging exercises or events within e-learning can compensate for the lack
of an instructor who can add that human touch through personality and rheto-
rical interactions. Similar to classroom training there must be a balance in
applying engaging content. Too much engagement and you risk over shadowing
the learning objectives. Too little engagement and you risk losing the learner's
interest in the topic. Consider the following when attempting to engage the
learner in an e-learning environment.
• Use hyperlinks for additional concepts, explanations, or definitions.
The advantage of online learning is that it provides the learner with additional
resources and information with just a click of the mouse. Linking to additional
references can greatly improve the learning experience and offer added value to
the content of the topic.
• Incorporate interactive graphics such as animations or simulations.
If pictures are worth a thousand words, then interactive graphics should be
69
worth 2,000 words. Creating interactive images help the learner to experience
a hands-on learning process that accelerates the learning. For example,
information graphics provide a visual comprehension of the concept presented.
If the learner had to click on portions of the information graphic, the learning
experience would be more impactful to the learner.
Simulations and other animations also provide that same objective.
• Provide additional options/choices for the learner. In today's world,
people love the ability to choose various options. This is important when
it comes to learning because everyone learns differently, including various
learning style preferences. For example, most people learn visually. However,
there are some people that learn better via audio. By incorporating both the
visual and the audio aspects into your training, you allow the learner to choose
an option that best meets his or her learning needs.
• Incorporate quizzes, Tests, skill assessments. Another way to engage the
learner is to Test them on the things that they learned within the course. This
allows both the learner to verify that they understood the content while at the
same time the instructional designer can verify that the materials achieved the
training objectives. This also helps to establish check points for the learner to
know if they can move on within the course or return to previous topics to
review the information again.
• Create fun activities such as games or other educational methods of
interactive learning. When learning is fun, people can maintain their interest
longer in the topic. As you incorporate activities into your training, remember
to make it fun. Use games or other methods that help increase the learning
experience. However, use caution in creating the games so as not to allow the
games to over shadow the intent of the topic. Remember, the intent of these
activities is to provide context around the explanation of the topic.
• Keep activities focused on the course objective. Always ensure that no
matter what you do to engage the learner, the concepts must compliment the
training objectives or topics. The temptation for many is to become so engrossed
in interactive concepts that the reason for the training is often forgotten.
• Avoid letting the technology overshadow the course objectives. Similar
to the previous bullet, never allow technology to become the main focus of the
training. Technology is a tool and should be used as such in order to help people
learn the training objectives. When technology become the center of attention
within an online course, the learner will often fall short in achieving the course
objectives.
Usability
Many creative ideas are discarded because they do not work. Likewise,
a well organized elearning course can be ill-received if it does not function
properly. Usability refers to the Testing of e-learning content and applications.
70
Once you have built your online course, you should always Test it in the
same environment that the learner will complete the course. Consider the
following when you conduct your usability analysis.
• Verify that all links work properly.
• Ensure that activities function as designed.
• Inspect content to ensure that grammar and spelling are correct.
• Ensure that graphics are visible.
• Verify that the course works appropriately in all applicable server
environments.
• Verify that screen resolution works for the intended audience (e.g.,
800X600, 1024X768).
• Verify that course objectives and expectations are met.
1. What is e-government
2. The stages of e-government
3. Assessment of e-government development of Kazakhstan
4. When was a single electronic document management system of state
bodies created?
5. Assessment of e-government development of Kazakhstan
Test
71
3. … is manipulation of matter on an atomic, molecular, and supramolecular
scale.
a) Nanotechnology.
b) Robotics.
c) STEM.
d) E-government.
e) E-learning.
4. Internet government, digital government, online government – …
a) E-government.
b) Robotics.
c) STEM.
d) E-learning.
e) Nanotechnology.
5. The electronic government is …
a) the system providing direct link of the population with the govern-
ment of the country;
b) state forum;
c) local network;
d) E-learning;;
e) Nanotechnology.
References:
72
LABORATORY WORK № 1
Topic: Boolean algebra.
Lesson Objectives: To introduce the logic elements and nodes of a com-
puter. Show the algebra of logic used in the construction of the basic units of
computers (adder, decoder).
Key Concepts: logical elements, conjunction, disjunction, invert, flip-flop,
the adder, register, counter, decoder.
Materials and Equipment
Booleans & Logical Operators Numeric variables can store a whole range
of different numbers. Boolean variables can only store two values referred to as
Yes or No, True or False, 1 or 0. Obviously we never use booleans to perform
calculations because of their limited range. We use booleans to evaluate
conditions. Boolean Parameter In Grasshopper, booleans can be used in several
ways. The boolean parameter is a container for one or multiple boolean values,
while the Boolean Toggle allows you to quickly change between single true and
false values as inputs.
Logical operators
1. Logical operators mostly work on booleans and they are indeed very
logical. As you will remember, booleans can only have two values. Boolean
mathematics were developed by George Boole (1815-1864) and today they are
at the very core of the entire digital industry. Boolean algebra provides us with
tools to analyze, compare and describe sets of data. Although Boole originally
defined six boolean operators we will only discuss three of them:
• Not
• And
• Or
• The Not
operator is a bit of an oddity among operators, because it doesn’t require
two values. Instead, it simply inverts the one on the right. Imagine we have a
script which checks for the existence of a bunch of Block definitions in Rhino.
If a block definition does not exist, we want to inform the user and abort the
script.
2. Consider examples
Let's examine a typical situation. You have some sort of device that gene-
rates a logic signal. It could be a telephone that converts your voice signal into
a sequence of zeros and ones.
• It could be the thermostat on the wall that generates 1 when the tem-
perature is too low, and 0.
• When the temperature is above the set point temperature.
73
The logic signal, A, takes on values of 0 (FALSE, OFF) or 1 (TRUE, ON).
That signal might really be a voltage, a switch closure, etc. However, we want
to think in terms of zeros and ones, not in terms of the values of the voltage.
Operations on Logic Signals Once we have the concept of a logic signal we
can talk about operations that can be performed on logic signals. Begin by
assuming we have two logic signals, A and B.
Then assume that those two signals form an input set to some circuit that
takes two logic signals as inputs, and has an output that is also a logic signal.
That situation is represented below. The output, C, depends upon the inputs, A
and B.
There are many different ways that C could depend upon A and B. The
output, C, is a function, – a logic function – of the inputs, A and B. IWe will
examine a few basic logic functions – AND, OR and NOT functions and start
learning the circuitry that you use to implement those functions. Logic Gates If
we think of two signals, A and B, as representing a truth value of two different
propositions, then A could be either TRUE (a logical 1) or FALSE (a logical 0).
B can take on the same values.
Now consider a situation in which the output, C, is TRUE only when both
A is TRUE and B is TRUE. We can construct a truth table for this situation. In
that truth table, we insert all of the possible combinations of inputs, A and B,
and for every combination of A and B we list the output, C. A B C False False
False False True False True False False True True True A B C 0 0 0 0 1 0 1
0 0 1 1 1 An AND Example Let's imagine a physician prescribing two drugs.
For some conditions drug A is prescribed, and for other conditions drug B is
prescribed.
Taken separately each drug is safe. When used together dangerous side
effects are produced. Let A = Truth of the statement «Drug 'A' is prescribed».
• B = Truth of the statement «Drug 'B' is prescribed».
• C = Truth of the statement «The patient is in danger».
• Then, the truth table below shows when the patient is in danger. Notice
that C is TRUE when both A AND B are true and only then!
Individual tasks
Task 1. Assume you have an AND gate with two inputs, A and B. Determine
the output, C, for the following cases. A = 1, B = 0 A = 0, B = 1 If either input
is one, what is the output?
Task 2. Assume you have an OR gate with two inputs, A and B. Determine
the output, C, for the following cases.
A = 1, B = 0, A = 0, B = 1
74
If either input is zero, what is the output?
A = 1, B = 1
Task 3. Simplify logical expressions
1) F = (A and B) or not (B or C), if A = true, B = false, C = true. Compile
truth table
2) F = (A ˅ B) → (B ˅ C) Form on the implementation of the lab report.
Control questions
75
LABORATORY WORK № 2
Topic: Numeral systems. Transfer numeral from one numeral system to
another. Arithmetic in the numeral systems.
Lesson Objectives:
1. Consideration of theoretical material on number systems and transfer
numbers from one number system to another number system.
2. The development of the algorithm for converting numbers from any
number system to decimal number system.
3. Practical skills the transition from one system of notation to another
using the standard Windows program «Calculator».
4. Obtaining practical skills in performing simple arithmetic operations in
binary and octal with a check (use the Calculator).
Key Concepts: Number systems, Calculator.
Materials and Equipment: The Numeral systems Lab is accessible on web
and mobile browsers that support HTML5, including Chrome, Firefox, Safari,
and Internet Explorer (version 9.0 and higher).
Definitions
76
some scientific and other contexts where greater precision is implied by a larger
number of figures shown.
Numeral systems are sometimes called number systems, but that name is
ambiguous, as it could refer to different systems of numbers, such as the system
of real numbers, the system of complex numbers, the system of p-adic numbers,
etc. Such systems are, however, not the topic of this article.
Individual tasks
Fig. 5
Put for each letter of your name to the appropriate value. In the example
taken the name Petrov Ivan Petrovich.
1. Table 1
Петров Иван Петрович
Фамилия Имя Отчество
П 16 И 10 П 16
Е 6 В 3 Е 6
Т 19 А 1 Т 19
Р 17 Н 14 Р 17
О 15 О 15
В 3 В 3
И 10
Ч 24
Всего 76 28 110
77
Task number 1 – Do the conversion of numbers from decimal number
system to binary, octal and hexadecimal number system using the standard
Windows program «Calculator». Do the inspection, i.e. translate these numbers
into decimal number system.
Task number 2 – Make arithmetic operations in binary, octal and hexade-
cimal numeral system using the standard Windows program «Calculator».
Make the check. Work progress.
• The sum of the digits in the name and surname and the middle name we
will take as three integers, i.e. in our example: (Petrov Ivan Petrovich) is 76, 28
and 110, put these figures in table No. 1.
• Call the program «Calculator».
• Switchable Calculator in the Engineering mode. Next, make a translation
of these three numbers (in this case 76, 28 and 110) in binary, octal and
hexadecimal number systems. Received a recorded translation of the numbers
in a notebook (table 2). Check the resulting binary, octal, and hexadecimal
numbers, making a reverse translation in the decimal system according to the
pattern below, i.e. manually.
Name PETROV (76)
a) Write the binary number:
7610 à 1001100 2
CHECK: 0*20 + 0*21 + 1*22 + 1*23 + 0*24 + 0*25 + 1*26 =
4 + 8 + 64 = 76
b) Write the obtained octal number:
7610à1148
CHECK: 4*80 + 1*81 + 1*82 = 4 + 8 + 64 = 76
c) Write the obtained hexadecimal number:
7610à4С16
CHECK: 12*160 + 4*161 = 12 + 64 = 76
Name IVAN (28)
a) Write the binary number: 2810à
111002
Test: 0*20 + 0*21 + 1*22 + 1*23 + 0*24 = 4 + 8 + 16 = 28
б) Write the resulting octal number: 2810à348
Test: 4*80 + 3*81 = 4 + 24 = 28
с) Write the resulting hexadecimal number: 2810à1С16
Test: 12*160 + 1*161 = 12 + 16 = 28
78
Control questions
79
LABORATORY WORK № 3
Topic: System resources.
Lesson Objectives: Study of computer hardware and software components,
including the basics of configuration.
Key Concepts: PC hardware and software.
Materials and Equipment: PC.
Definitions
80
g) hardware interruptions – hardware shutdown controller (number of
physical inputs for ROM connection, priority, service ROM);
h) objects that provide direct access to memory – a controller for direct
access to memory (number of physical inputs, service devices);
i) parallel ports, arguments, USB I/O ports (types, numbers, address,
information exchange rate, etc.) to add a standard ROM.
Individual tasks
1. Prepare a report about the computer device. Perform the following tasks.
Use the following sources:
readings:
2. Wikipedia: Peripheral.
3. Wikipedia: Electrical connector.
multimedia:
1. YouTube: Understanding the Parts of Your Computer.
2. YouTube: What is a Peripheral.
3. YouTube: Input and output devices.
4. YouTube: Computer Terms: Peripherals.
5. YouTube: Characters, Symbols and the Unicode Miracle.
6. YouTube: Common Computer Connectors.
7. YouTube: Device Connectors and Cables.
Control questions
81
LABORATORY WORK № 4
Topic: Peripherals.
Lesson Objectives: Introduce basic components of a computer, to form the
ability to work with system resources. Install peripheral devices and test your
computer.
Key Concepts: transistors, memory, mass storage device.
Materials and Equipment: PC.
Definitions
Modern computers are electronic and digital. The actual machinery – wires,
transistors, and circuits – is called hardware; the instructions and data are
called software. All general-purpose computers require the following hardware
components:
– memory: enables a computer to store, at least temporarily, data and
programs.
– mass storage device: allows a computer to permanently retain large
amounts of data. Common mass storage devices include disk drives and tape
drives.
– input device: usually a keyboard and a mouse, the input device is the
con-duit through which data and instructions enter a computer.
– output device: a display screen, printer, or other device that lets you see
what the computer has accomplished.
– central processing unit (CPU): the heart of the computer, this is the
component that actually executes instructions. In addition to these components,
many others make it possible for the basic components to work together
efficiently. For example, every computer requires a bus that transmits data from
one part of the computer to another.
Computer Classification, By Size and Power
Computers can be generally classified by size and power as follows, though
there is considerable overlap:
– personal computer: a small, single-user computer based on a micropro-
cessor. In addition to the microprocessor, a personal computer has a keyboard
for entering data, a monitor for displaying information, and a storage device for
saving data.
– workstation: a powerful, single-user computer. A workstation is like a
personal computer, but it has a more powerful microprocessor and a higher-
quality monitor.
– minicomputer: a multi-user computer capable of supporting from 10 to
hundreds of users simultaneously.
82
– mainframe: a powerful multi-user computer capable of supporting many
hundreds or thousands of users simultaneously.
– supercomputer: an extremely fast computer that can perform hundreds
of millions of instructions per second. Common PC Components This table
lists all of the common computer components, what they connect to and what
they are used for.
1. Motherboard
The motherboard or mainboard is the main circuitboard which interconnects
to all other components. The motherboard allows communication and power to
flow throughout the computer system.
2. Processor (CPU)
The Central Processing Unit (CPU) is the brain of the computer system.
This is the part of the computer which processes all inputs and decides how
they will be outputed.
3. Memory (RAM)
Random Access Memory (RAM) is your computers short term memory and
enables the computer system to perform multitasking functions such as copy
and paste or type information into a word document without it saving.
4. Video/Graphics Card
The Video/Graphics Card is responsible for receiving visual inputs and
displaying (outputing) all visual data. Graphics processing has a very difficult
task which is why modern graphics cards now have Graphics Processor Units
(GPU) which work like a CPU but for visual data only. This allows quicker
rendering of 3D images and streaming of high definition video and leaves the
CPU free to work on all other data.
5. Network Interface Card (NIC)
The Network Interface Card (NIC) allows your computer system to commu-
nicate and pass data to other computer systems within a Local Area Network
(LAN) or over the internet to Wide Area Networks (WAN).
6. Hard Drive (HDD)
The Hard Drive (HDD) is the long term storage for your computer system.
Hard Drives are used to archive and store data for future retreival.
7. CD/DVD Drive (ROM)
The CD/DVD ROM Drive allows your computer system to read data from
external media like CDs and DVDs. Generally there are two types of CD/DVD
ROM; readers and writers (burners). 8 Sound Card The Sound Card allows for
the input (Microphones) and output (Speakers) of audio related data.
Motherboard
A motherboard is the central printed circuit board (PCB) in many modern
computers and holds many of the crucial components of the system, while
83
providing connectors for other peripherals. The motherboard can be easily
compared to the human body’s nervous system. The wires (nerves) on it transfer
data between all of the other components. The motherboard is also known as
the main board, system board or in Apple comptuers the logic board. It is also
sometimes casually refered to as the mobo.
Processor/CPU
A processor is the brain of the computer and is responsible for processing
the instructions set out by the computer program or from the users input. The
central processing unit carries out each instruction on the program in sequence,
to perform the basic arithmetical, logical, and input/output operations of the
system. The architecture of CPU chips have dramatically changed since their
first inception in the early 1960s, however, their fundamental operation remains
much the same.
Memory (RAM)
Random Access Memory (RAM) is the best known form of computer
memory. RAM is considered – random access‖ because you can access any
memory cell directly if you know the row and column that interext at that
cell. Most RAM that is installed on computers can only function when the
computer is powered. RAM is needed for your computer whenever you decide
to perform an operation. For example if you wanted to do word processing on
your computer. All the letters that you type are going into a temporary file
that is stored in the RAM. If your computer shuts down in the middle of your
document creation and you powered it back up, most likely your information
would be lost. This is because it was stored in RAM. Had you saved the
document it would have been stored onto another type of memory called ROM,
or Read-Only Memory.
Network Card
The Network Interface Card/Controller (NIC) is a computer hardware
component that connects to a computer network. The controller may also be
referred to as a network adapter, or a LAN adapter. It is commonly implemented
on expansion cards that plug into a computer bus and known as a network
interface card, network card or LAN card. However the low cost and ubiquity
of the Ethernet standard means that most newer computers have a network
interface built into the motherboard.
Hard Drive (HDD)
The hard drive disk (HDD) is a non-volatile storage device that stores
digitally encoded data on rapidly rotating rigid (i.e. hard) plates with magnetic
surfaces. Simply meaning that the hardware holds a spinning magnet or optical
disk and reads and writes data on it. As hard drives spin (usually) between
5,000 RPM and 10,000 RPM they create friction, use large amount of power,
84
are slow to get up and running and create large amounts of heat. For this
reason traditional spinning disks are slowly being replaced with flash memory
solutions such as Solid State Hard Drives (SSD).
Video Card
This component is used to transfer data to your monitor so that it ca be
displayed. The more RAM you have in a video card usually increases the per-
formance of graphic heavy applications such as games. Video cards are also
refered to as Graphics Cards and Display Cards.
Sound Card
A sound card (also known as an audi card) is a computer expansion card
that facilitates the input and output of audio signals to and from a computer
under control of computer programs.
Individual tasks
Control questions
85
LABORATORY WORK № 5
Topic: Flowcharts.
Lesson Objectives: consider basic algorithms, flowcharts.
Key Concepts: basic algorithms, flowcharts.
Materials and Equipment: PC.
Definitions
Individual tasks
Create the basic structure of the algorithm – following (linear) in the form
of block diagrams for applications:
1. The length of the cube edge. Find the volume of a cube, and the area of
its lateral surface.
2. The three resistance R1, R2, R3 are connected in parallel. Find the resis-
tance of the connection.
3. Determine the time of stone falling on the earth's surface from a height h.
4. Known circumference. Find area of a circle bounded by this circle.
5. Triangle given the coordinates of its vertices. To find: o perimeter of the
triangle; o area of the triangle.
6. Calculate the height of the triangle, lowered to the side and, on the
known values of the lengths of the sides a, b, c.
7. Calculate the volume of a cylinder with a base radius r and height h.
8. Determine the distance travelled by a physical body for the time t, if the
body is moving with a constant acceleration a, and is at the initial time velocity
V0
9. Calculate the area of a triangle by Heron's formula, given the its side.
10. Determine the coordinates of the vertex of the parabola y = ax2 + bx + c
(a№0). The coefficients a, b, c are given. Form on the implementation of the lab
report.
86
Control questions
87
LABORATORY WORK № 6
Topic: Operators of the programming language.
Lesson Objectives: Get an idea of the program structure in Pascal, learn
how to use the standard features and basic operators, work in PascalABC.NET
Key Concepts: program, Pascal, chart.
Materials and Equipment: PC.
Definitions
Picture 6.
88
• Mainprogramblock.
• Statements and Expressions within each block.
• Comments.
Pascal Hello World Example
Following is a simple pascal code that would print the words "Hello,
World!":
program HelloWorld;
uses crt;
(*Here the main program block starts *) begin
writeln('Hello, World!');
end
In the upper window browser typing program programming language
Paskal, In the bottom window the result of a program appears.
Standard Pascal functions include:
Function Description Argumenttype Returntype
abs absolutevalue realorinteger sameasargument
arctan arctaninradians realorinteger real
cos cosine of a radian realorinteger real
measure
exp e to the given power realorinteger real
ln naturallogarithm realorinteger real
round roundtonearestinteger real integer
sin sin of a radian measure realorinteger real
sqr square (power 2) realorinteger sameasargument
sqrt squareroot (power 1/2) realorinteger real
trunc truncate (rounddown) realorinteger integer
For ordinal data types (integer or char), where the allowable values have a
distinct predecessor and successor, you can use these functions:
Function Description Argumenttype Returntype
chr character with given integer char
ASCII value
ord ordinalvalue integerorchar integer
pred predecessor integerorchar sameasargumenttype
succ successor integerorchar sameasargumenttype
89
Functions are called by using the function name followed by the argument(s)
in parentheses.
The basic data types in Pascal include:
Example №1.
Create a program in Pascal, and calculate the value ofy:
Individual tasks
90
Exercise 1. Draw up a program
Control questions
91
LABORATORY WORK № 7
Topic: Spreadsheet. Database. Multimedia.
Lesson Objectives:
1. Consider the purpose and possibilities of Access databases
2. Learn how to create a database table
3. The creation of a relational database and query it, the types of connections
they use.
Key Concepts: MS Access.
Materials and Equipment: PC.
Definitions
Individual tasks
92
7. Create report Suppose you want to create a report on the topic, and
readers with the results (number of issued books) for readers and topics. To
implement the report, select from the database corresponding to the data, that
is to create a query: • Create a tab using the Query Builder button to create a
new query, and save it under the name «Book reader».
8. Elements of database administration The MicroSoft Office Access
includes improved security model that simplifies database security process and
open it with security enabled. Note: although the proposed methods improve
safety, the best way to protect data – storage tables on a dedicated server
(for example, on a computer that is running Microsoft Windows SharePoint
Services 3.0) and storage of forms and reports on local computers or network
shares. Facilities security in Office Access: Database encryption password. The
encryption tools provided with MicroSoft Office Access, and combined the
previous two tools improved – the use of passwords and database encryption.
When using a database password to encrypt the database, these data are not
available for other media, and other users have to enter a password to gain
access to this database. For encryption in Access uses a more efficient algorithm
than in earlier versions of Access.
Individual task
Control questions
93
LABORATORY WORK № 8
Topic: Mobile operating system.
Lesson Objectives: Learn the basic concepts of WINDOWS OS such as a
mouse, improvement of skills with the mouse, Desktop, Start button, taskbar,
menu (main menu, context menu); learn OS command WINDOWS.
Key Concepts: basic algorithms, flowcharts.
Materials and Equipment: PC.
Definitions
Individual tasks
Task 1. Determine the type, size, storage space, installed on the computer.
See which folders and files are stored on disk.
Task 2. Perform a standard set of actions on folders and files, using Win-
dows Explorer menu command .Edit program: Cut, Copy, Paste.
Task 3. Вставить пропуски
1. Mobile devices have an operating system (OS), and can run _____.
2. Most mobile devices can be equipped with _____ communication
capabilities.
3. Most mobile devices include _____ for video and music files.
4. Many mobile devices contain sensors like _____, allowing detection of
orientation and motion.
5. Bluetooth is _____.
6. A master Bluetooth device can communicate with a maximum of _____
devices in a piconet.
7. Bluetooth has three classes of radios, with _____ most commonly found
in mobile devices.
8. Class 2 Bluetooth has a typical range of _____.
9. A Bluetooth device in discoverable mode transmits _____.
94
Control questions
95
LABORATORY WORK № 9
Topic: Standard operating system applications.
Lesson Objectives: Introduction to MS Word Word Processor, Methods for
Researching Formatting and Editing, Document, Spell Checker.
Key Concepts: basic algorithms, block diagrams.
Materials and Equipment: PC.
Definitions
Editors of text documents are the most common office programs. The most
commonly used text editor is MS Word, but older computers use a simple but
small Lexicon editor. Microsoft Word is a powerful dictionary processor for
spell checking, textual graphics, text editing, and whole text editing for layout.
Microsoft Word Editor is one of the most popular text editors available at
any level for user convenience. In addition, its technical means and tools are
very effective. Use standard Microsoft products in Word, and get contextual
sensitive help, check spelling, tables and borders, drawing, web macros, mul-
tiple languages support.
Instrumental group has been assembled and carefully organized. The tools
collected in the panels allow you to perform different actions.
Individual tasks
1.
1. Create a new document on one printed page. Save the document in the
RTF format folder.
2. Change the first and second paragraphs.
3. Enter the date and time of the text.
4. Translate the text.
5. Format the text: size – 18.
6. Check the spelling of the text and select synonyms for some words.
7. Use the special symbols, for example, □ □ □ □.
8. Change the label labels, such as bold, italic, underlined.
9. Change the case and index letters, fonts, and character size.
10. Change the color of the symbol color and underline it.
11. Change the text range, set animation.
12. Insert the first paragraph with the first line of the text, the second
paragraph with the projection with the opposite font of the third
paragraph.
96
13. Change the row spacing.
14. Format the text: size – 20.
15. Use several types of sewing in the same line.
16. Replace the interval between 1 and 1.5.
17. Define the boundaries of the parts of the text, fill in the colors.
18. Create your own style of document.
19. Create a multi-level labeled or numbered list.
20. Create your own template to quickly create documents.
21. Add an image in the form of drawing or casting.
22. Change the size of the field and orientation of the page.
23. Enter the pages in the top right corner.
24. Select the lines in the text.
25. Set section breaks for text.
26. Make the top and bottom logo of the logo on the first page.
27. Enter some text in multiple columns.
28. Create text that is flowing through the appropriate headings.
2.
1. Start MS WORD.
2. In the non-printable character mode, enter the following text according to
the basic input rules:
The first Altair 8800 microcomputer was created in 1974 for a general
view of the release of personal computers by creating APPLE machines
in the US (1976). APPLE-2 has more than 1 million computers. Copies. ^
3. Teach teacher's results.
4. Save the file with the text you entered.
5. Change the first and second paragraphs.
6. Enter the date and time of the text.
7. Translate the text.
8. Find the text of this word (Altair).
9. Check the spelling of the text and select synonyms for some words. The
Form of Laboratory Reporting.
WinRAR lets you create multiple volumes of archives, that is, multiple
archives. Typically, a large archive is intended for storing up to several disks or
other removable media. The first volume and extension of the regular expanded
archive r00, r01, r02 and more. numbered.
The archive can be continuous (provides the most compression) and self-
extracting (SFX, English) Self-eXtracting. You do not need special software to
retrieve this file, run the backup file to run, because it has an executable file
and an .exe extension.
97
3.
1. In the Workbook (your command folder), create the following folders: the
archive containing the archive folder.
2. Run WinRar.
3. Open the folder on the teacher's computer with the original material for
practical work. This folder contains three files, such as .doc, .bmp, .exe.
4. From the Workshop, copy the Files archives folder.
5. Compress the image file and compare the size of the two files. To do this,
follow these steps:
6. Right-click to select the .bmp file type.
7. Click the «Add to archive ...» button to define the archive dialog box
settings.
8. By default, the backup file refers to the original file name.
9. If you want to specify another file name, enter it in the input field.
10. Select the format of the archive file, such as RAR.
11. The remaining parameters remain unchanged.
12. Click the OK button.
13. Compare the size and archiving of the source file. Table 1 shows the data.
14. Make a backup of the .doc file and compare the size of the two files.
Table 1 shows the data.
15. Compress the .exe file and compare the size of the two files. Table 1
shows the data.
16. Delete original files.
17. Back up the files in the .zip file format. 1. Fill in the table with the data.
Control questions
98
LABORATORY WORK № 10
Topic: Web-sites. Email.
Lesson Objectives: To learn how to connect to the Internet, create a remote
access, configure the browser.
Key Concepts: basic algorithms, flowcharts.
Materials and Equipment: PC.
Definitions
Internet in the broad sense of the word means – Global computer network.
Currently, the Internet consists of several services: e-mail, WWW (World
Wide Web), IRC (Internet Relay Chat – direct contact several people in real
time), ICQ (Service to search for a network of human IP-addresses currently
connected to the Internet ), file transfer service (FTP), teleconferencing service
(Usenet).
• Physically connect the computer to one of the worldwide network of
nodes.
• Get IP-address.
• Install and configure the software – program clients the Internet-based
services, which are supposed to use the services.
Today, the Internet is used as a source of comprehensive information on the
various fields of knowledge.
Internet services, manage the transfer of documents, called World Wide
Web.
A separate document called the WWW Web-pages. Typically, this combined
document that can contain text, graphic illustrations, multimedia objects. To
create Web-pages using the language of HTML
(Hypertext Markup Language – hypertext markup language), which is using
the tags inserted in the document describes the logical structure of a document,
the document controls the formatting and placement of objects.
Hyperlink – a dedicated portion of the document (text and illustration),
which is associated with the address of another Web-document. The use of
hyperlinks allows to organize a thematic journey through the WWW without
addresses specific pages.
Individual tasks
99
2. In the dialog box, enter a new connection name for the new connection
(arbitrary) and select the modem that is used to service the connection. Click
the Next button.
3. Fill in the telephone number field (the number must be polkchen by
service providers). Click the Next button.
4. In the folder, remote access to the network formed by the new connection
icon. No further configuration is performed by editing its properties
5. If your ISP has provided several phone numbers to connect to his server,
it may be necessary for each of them create a separate connection.
Exercise 2: Configuring a remote access connection
1. Open the folder remote access to the network. It contains icons created
connections. There may be more.
2. Select the custom connection. Click on its icon, right-click. In the con-
text menu, select Properties.
3. In the General tab, select the dialog box. Check whether you select and
configure your modem.
4. On the Server Type tab, disable all network protocols except TCP/IP
protocol.
5. Click the Configure TCP/IP protocol and make the setting. Turn on the
switch input IP-addresses in accordance with ukazaniemi service provider.
(Usually address assigned by the server).
6. Enter the DNS address. If these addresses are obtained from the service
provider, turn on the switch addresses are entered manually and enter the
four numbers for the primary and secondary DNS servers. If the address is
not obtained, it is possible, they are entered automatically. In this turn on the
switch address is assigned by the server.
7. By clicking on the OK button to close the dialog box.
Exercise 3: Configuring the start page of the browser MS Internet Explorer
1. Start Internet Explorer program (Start – Programs – Internet Explorer).
2. If immediately after starting the program tries to download some sort
of the Web-page, stop downloading by clicking the Stop button. According to
records in the Address bar to set the URL-address of the page that the browser
is used as the start.
3. Give the command Tools – Internet Options. Select the General tab.
4. In the Home Page Address field, track down. According to records in
this field, set the URL-address of the page that the browser should be used as
initial.
5. Click With empty. Verify that the entry in the field about the home page
address: blank. This suggests that the next program start will automatically
load any page as the start.
100
6. Click Apply, and then close the dialog box Internet Options, click on the
OK button.
7. Close the window.
8. Re-run the program.
9. Make sure that after the launch of the program does not load any home
page, and the Address field is written about: blank.
10. Close the window.
Exercise 4. Setting up the browser window MS Internet Explorer In the
state of delivery of Internet Explorer browser of the MS is designed to work
with a screen having a 1024x768 m
1. Start Internet Explorer program.
2. Give the command Tools View panel. Make sure that only the
checkboxes marked items Common buttons and address bar, or clear the check
boxes unnecessary.
3. Give the command View-Toolbars-Customize.
4. In the dialog box, in the drop-down list, click the button text without
labels to buttons (for the emergence of tooltips).
5. In the drop-down list icon size select Small Icons.
6. Remove all the «extra» button to the toolbar so that only the buttons
associated with navigation in the WWW. They are five: Back, Forward, Stop,
Refresh Magazine.
7. Close the window.
8. The right of the Address button, click Go. Click the right mouse button
and reset the check mark beside «Go» button.
9. Drag and drop the toolbar on prvy edge of the menu bar. Dragging
is performed for the hem, available on the left side panel. As a result of the
program window should acquire compact form.
10. Restore the settings as they were set by default team. Give the View-
Toolbars – Settings – Reset.
Exercise 5. Configuring MS Internet Explorer security program
1. Give the command Service Options. In the tab, select the Advanced
dialog box.
2. Uncheck Enable profile – the program will not share information about a
user's identity at the request of the remote servers.
3. Clear the check box to automatically check for updates MS Internet
Explorer, the program alone is not addressed to «own» the server without the
user's knowledge.
4. Uncheck Use AutoComplete for Web addresses, which allows outsiders
to figure out where the user is treated.
101
5. Uncheck Allow hit counter on the page. This counter is associated
with the conduct of a computer user «browsing history», controlled by remote
servers that goes far beyond the standard HTTP protocol.
6. In the Search section of the panel addresses turn on the switch Do not
search from the address bar.
7. Click the Security tab. Select the Internet zone and set the security
setting for this zone using the other buttons.
8. Safety dialog box in Java category, set the switch Disable Java.
9. In the category of cookie files install the proposed switch – then you
will clearly see what Web sites offer to label your computer labels.
10. All sections of the categories ActiveX controls and plug-ins enable
Disable switches.
11. Click the Content Internet Options window. Click AutoFill. In the
AutoComplete Settings dialog box, turn off all auto-complete function. Clean
AutoComplete by pressing Clear Forms and Clear Passwords. Close the
window.
12. On the Content tab, use the command button profile. Make sure that
there is too much information in them.
Control questions
102
LABORATORY WORK № 11
Topic: Information technologies in the professional sphere.
Lesson Objectives: To learn to create the elementary hypertext document
means of a text editor the Notebook.To learn to use tags of formatting of a font
and the paragraph.
Key Concepts: Hypertext document.
Materials and Equipment: PC.
Definitions
103
• search and replace words and expressions;
• the inclusion in the text of simple illustrations;
• text printing.
The most widely used text editor Microsoft word, word Perfect (currently
owned by the company Corel), chiWriter, Multi-Edit And other used.
Graphic editors are for processing graphic documents, including diagrams,
illustrations, drawings and tables. Allowed to control the size and font of
figures, moving figures and letters, the formation of any image. Among
the most famous image editors can be called packages Corel DRAW, Adobe
PhotoShop and Adobe Illustrator.
Publishing systems combine the possibilities of text and graphic editors
have developed capabilities for formatting strips with graphic materials and
then printed. These systems are targeted for use in publishing and typesetting
systems are called. Because these systems can be called PageMaker products
from Adobe and Ventura Publisher of Corel Corporation.
Spreadsheets. Spreadsheet called RFP for processing tables.
The data in the table is stored in the cells located at the intersection of rows
and columns. The cells can be stored numbers, formulas and character data.
Formula values are set dependent on the contents of one cell to other cells.
Changing the contents of a cell resulting in a change of values in the dependent
cells.
The most popular PPP of this class are products such as Microsoft Excel,
Lotus 1-2-3, Quattro Pro, and others.
Database Management Systems. To create a database inside the machine
information support uses special IFR – database management system.
Database A set of specially data organized sets stored on disk adding.
Database management includes data entry, their correction and manipulation
of data, that is, delete, retrieve, update, etc. Developed database applications
to ensure the independence, working with them on the specific organization
of information in databases. Depending on how these organizations are
distinguished: network, hierarchical, distributed, relational database manage-
ment system from the available database the most widely used Microsoft
Access, Microsoft FoxPro, Paradox (corporation Borland), and the Oracle
database company, Informix, Sybase, Modern etc
Individual tasks
104
• To save the file in the created folder. At preservation, in a window of
dialogue to Keep as … in the line File Type: to choose option All files (*. *),
and in the line File Name to set a name with the .htm expansion, for example
1_name.htm (where name – your name).
• To close the document, to find his pictogram in a window my computer
or in the Conductor program window.
• To open the file. To analyse by means of what application the file is
displayed and as the entered phrase looks.
2. To enter the tags defining structure of a HTML document:
• By means of the shortcut menu to open the file by means of the Notepad
editor. To enter the tags given below, in the section of a document title (between
the <title> tags </title>) to specify the surname. <HTML> <HEAD> <TITLE>
Фамилия </TITLE> </HEAD> <BODY> I welcome you on my first web page!
</BODY> </HTML>.
• To save the document under the same name, to update its display in a
browser (to execute the Look/to Update or press the Update button at a toolbar).
To analyze the happened changes in display of the document.
3. To edit the document:
• To open the menu of a browser Look/viewing of a HTML code and to
add after the text "I welcome you on my first web page!" text of the signature:
Student of the NNN group Surname Name To keep the document (but not to
close) and to update his viewing in a browser.
• Using the single <BR> tag, to edit the document so that the signature
began with a new line, and the Surname the Name – the next line. To see
new option in a browser. Attention! After each change the document needs to
be kept, and to begin viewing in a browser with updating of loading of the
document by means of the Update button at a toolbar.
4. To issue text fragments by means of styles of Headings:
• To issue the first line of the document the Heading of the 1st Level style
by means of the pair <h1> tag … </h1>. To issue the second line as Heading of
the 6th level, and a third as Heading of the 4th level.
• To check the document in a browser, changing control of display of fonts
(the Look/Font size / Most menu large, Average, Small and the smallest).
• To change style of registration of the first line for Heading 2 levels, the
second line – for Heading 5 of level, the last line – for Heading of the 3rd level.
5. To execute formatting of a font:
• After a line the Surname the Name to add one more line of the text
Morning meets us by a cool.
• To issue the phrase on the sample given below. In the word MORNING
all letters have to have different colors. In the word the COOL to issue letters
missile defense – red color, OH – blue.
105
• To issue a line with the signature (The student of the NNN group the
Surname the Name) in the italics, to set font size relative change. To use tags
<font size="+2"> and <i>.
• To check the received document in a browser.</i></font>
6. To execute formatting of paragraphs:
• To create the new document 2_name.htm, to keep it in the same working
folder.
• To enter the text (to use copying of the text from the document 1_name.
htm): <HTML> <HEAD> <TITLE> Фамилия </TITLE> </HEAD> <BODY>
Приветствую Вас на моей второй web-страничке! <BR> Монолог Гамлета
</BODY> </HTML>
• To align the text to the center.
• To enter the text: To be or not to be – here in what a question. That it
is more noble: to take down blows of violent destiny – or against the sea of
adversities to arm, engage. And all to finish at once...
• To issue alignment of the paragraph on width.
• To limit the paragraph to horizontal dividing lines from above and from
below, using the <hr> tag.
• To copy a monologue and to break it into paragraphs. To align to the
center. To be or not to be – here in what a question. That it is more noble: to
take down blows Violent destiny – or against the sea Adversities to arm, engage
And all to finish at once...
• To keep the document.
• To check the document in a browser window, changing the window size.
7. To execute design of lists:
• To create the new document 3_name.htm, to save it in the same working
folder of a hard drive.
• To enter the text: <HTML> <HEAD> <TITLE> Фамилия </TITLE> </
HEAD> <BODY> Приветствую Вас на моей третьей web-страничке! </
BODY> </HTML>
• To add the text of the document (between the tags … ) the following
text: I know how to make out: Fonts, Titles, Paragraphs
• To issue three last lines as the list indexed. For this purpose to use the
following construction of tags: <ol> <li> Fonts, </li> <li> Titles, </li> <li>
Paragraphs </li> </ol>
• To change execution of the list for the list marked. To use the <ul> tags,
</ul>
• To create the "mixed" list: I know how to make out:
Fonts
• Size.
• Color.
106
• To a set.
• Indexes.
2. Headings
• From 1st to the 6th level.
3. Paragraphs
• Alignment.
• A rupture of lines in the paragraph.
• With reformatting use.
To show results of work to the teacher. Table of the main tags of the HTML
document. Tags of formatting of a font and paragraph
Control questions
107
LABORATORY WORK № 12
Topic: Cybersecurity.
Lesson Objectives: System and utility software
Key Concepts: basic algorithms, flowcharts.
Materials and Equipment: The Cybersecurity Lab is accessible on web
and mobile browsers that support HTML5, including Chrome, Firefox, Safari,
and Internet Explorer (version 9.0 and higher)
Definitions
Individual tasks
108
Computer virus
A computer program that can copy itself and cause harm in various ways,
such as stealing private information or destroying data.
DDoS
A distributed denial of service attack attempts to make an online service,
like a website, unavailable by overwhelming it with a flood of traffic from a
team of computers.
Doxnet
A fictional virus modeled after the Stuxnet virus. Like Stuxnet, Doxnet is
able to damage physical infrastructure.
Encryption
The process of using codes to make readable information unreadable.
Encrypted information cannot be read until it is decrypted using a secret key.
Firewall
Software designed to block malware from entering protected networks.
Hacktivist
Someone who uses computers and computer networks to disrupt services
or share secret information in an effort to draw attention to political or social
issues.
Internet service provider (ISP)
A company or organization that gives users and devices access to the
Internet.
Support for the Cybersecurity Lab is provided by Lockheed Martin. NOVA
is produced for PBS
2. Open Multimedia Resources
The Cybersecurity Lab includes four short animated videos that cover a
variety of cybersecurity and computer science topics:
Cybersecurity 101
The Internet is fundamentally insecure. However, there are simple things
you can do to protect yourself and your information. This video also provides
an introduction to the activities in the Cybersecurity Lab.
Cyber Codes
Do you trust the security of your email, text messages, and browser history?
Learn how trustworthy online communication actually is and how encryption
can protect your privacy. Sometimes.
The Secret Life of Hackers
Hackers may not be who we think they are. In fact, you might be a hacker
and not even know it. Learn the true meaning of hacking and some of the many
reasons hackers hack.
109
A Cyber Privacy Parable
Follow the trials and tribulations of Tim as a seemingly innocent piece of
information threatens to ruin his life when it falls into the wrong hands.
Teacher Tips for Using the Cybersecurity Lab
The Cybersecurity Lab is a great resource for educators who want to
teach their students best practices for staying safe online and introduce them
to computer science principles and the architecture of online networks. In
addition, school technology and media specialists can use the Cybersecurity
Lab as an orientation activity for students before they begin using online
resources. English and social studies educators can also use the Cybersecurity
Lab to reinforce textual analysis skills, as students must find textual evidence,
draw inferences, and make judgments about the validity of sources in the Social
Engineering Challenge.
Encourage students to create a NOVA Labs account before they start the
Cybersecurity Lab for at-home or in-class completion. With an account,
students will be able to save their progress in the Lab and also generate a Lab
Report that tracks their completion of the game and video quizzes.
Use the Cybersecurity Lab video quizzes as a formative or summative
assessment to gauge student understanding of the content.
After watching the videos, facilitate an in-class discussion with students
about the content. Possible discussion topics include: 1.) The changes in techno-
logy in the past 15 years that have made cybersecurity such a pressing issue,
2.) Students’ experiences with cybersecurity, or 3.) How much of their lives
students share online and the ramifications of sharing
Upon completion of the Cybersecurity Lab game, assign the cybersecurity
stories as reading assignments with discussion questions that students can
complete for homework.
Engage (10 min) – Intro activity that poses a question or calls upon prior
knowledge
Have students watch Cybersecurity 101 and discuss what they know about
cybersecurity and what safety measures they currently take with their online
information.
Explore (20 min) – Students explore a hypothesis and collect data
Challenge students with the question, «How aware are you of the best
practices for staying safe online?». Explain to students that in the game, they
will explore ways that they can stay safe online and avoid security breaches.
Instruct students to create a list of tips that they would follow to avoid
online scams and to create reliable passwords.
Instruct students to complete all the Level 1 challenges in the game.
110
Explain (15 min) – Direct instruction and content delivery
Reconvene and discuss some of the best practices that they learned and
whether they encountered any information that supported or contradicted the
tips they compiled before the game.
Present the best practices and the glossary terms that are essential to
understand cybersecurity and instruct students to take notes.
Elaborate (45 min) – Apply content knowledge and skills to problem
(guided practice)
Instruct students to complete the remainder of the game and to take notes on
other best practices they encounter while playing the game. The Cybersecurity
Lab also works well for group play, as students can collaborate in problem
solving.
Evaluate (20 min) – Formal assessment (independent practice)
Students should complete the video quizzes and turn in their Lab report
with confirmation of Lab completion.
Educators should also use this opportunity to assess student learning, with
short response discussion questions summarizing best practices, the cyberse-
curity stories, and the glossary terms.
Control questions
111
LABORATORY WORK № 13
Topic: Software for virus protection.
Lesson Objectives:
Content: By the end of the lesson, students will be able to:
• Define and give examples of hardware and software
• Describe the difference between hardware and software
Key Concepts: basic algorithms, flowcharts.
Materials and Equipment: Computer, anti-virus programs. The computer
virus is a small harmful program which can independently create the copies
and introduce them in programs (the executed files), documents, loading sectors
of carriers of data. Depending on habitat the main types of computer viruses
are: program, loading, macro viruses, network viruses.
Definitions
Individual tasks
1. Turn on the personal computer Press the Power button on the personal
computer system unit.
2. Examine Kaspersky’s Antivirus 2019.
2.1. Start Kaspersky's Antivirus, having clicked on the Start-up button
and having chosen the Kaspersky's Program/antivirus command. As
a result the main Kaspersky's Antivirus window in the Protection
mode will open (on the Protection tab).
2.2. In the Kaspersky's Antivirus window examine components, the main
functions of the program and its settings.
2.3. Check existence of the updates (date and ways of updating) of the
anti-virus base. The built-in scheduler of automatic updating of the
anti-virus bases therefore the program independently periodically
checks for the new anti-virus bases on the server of Kaspersky Lab.
But if it is impossible to start automatic updating of the anti-virus
bases from the Internet, it is possible to use the anti-virus bases
112
which are let out in ZIP archives. Archives with anti-virus bases
regularly give all the best on the sites of Kaspersky Lab in the zips
catalog. After downloading unpacking of archive * cumul.zip (the
full set of anti-virus bases has the name avi386-cumul.zip is the all
updatings which came out till last Sunday) is made in the separate
folder. At control of updating the folder, with the unpacked archive *
cumul.zip is specified as a source of updatings.
2.4. Update anti-virus base. For this purpose in the main window click
on a tab (button) Updating, in the frame which opened on the right
click at line «Update Bases». The anti-virus base will be updated.
2.4. Install a floppy disk with files and folders in the store for floppy
disks or USB flash drive (flash card) to the USB port.
2.5. In the main window of the Antivirus of Kaspersky 2019 on the
Search of Viruses tab execute scanning of replaceable disks and a
disk C: on existence of viruses. Check results of scanning.
2.6. For scanning of folders or files right-click on the demanded folder or
the file and in a context menu choose the Check for Viruses com-
mand. Check results of scanning.
3. Study the anti-virus software of avast! Antivirus.
3.1. Start the anti-virus avast program! antivirus from the main menu?
the avast window will open! antivirus.
3.2. In a window examine basic elements: the menu (check settings of an
antivirus); pictograms: folder choice, replaceable carriers, local
disks; buttons virus storage, iavs (to update an anti-virus database),
the Resident scanner.
3.3. Update an anti-virus database, having clicked on the pictogram of
iavs.
3.4. Establish one of replaceable data carriers.
3.5. Execute scanning of a replaceable data carrier, using elements of
management of the avast window! antivirus.
3.6. Execute scanning of local disks, using elements of management of
the avast window! antivirus.
3.7. Execute scanning of folders, using elements of management of the
avast window! antivirus.
3.8. For scanning of folders or files right-click on the demanded folder
or the file and in a context menu choose the «Skanirovat_imya
Folder or File» command.
3.9. Carry out control of resident providers, having left-clicked on the
but-ton A in the indication panel. The Scanner of access of avast will
open!, in which control of 7 resident providers or modules is carried
out.
113
4. Compare work of two anti-virus programs On the basis of results of the
performed work with anti-virus programs give an assessment to these
programs.
5. After completing the lab work tell the teacher
6. Make the test and answer the questions
Control questions
1. What is a virus?
2. Source of viruses
3. The most sensational viruses
4. Prevention
5. Means of anti-virus protection
6. Technique of use of anti-virus programs
7. Anti-virus Kaspersky Anti-Virus program
8. Features of work of Kaspersky Anti-Virus Scanner
9. What are the functions of Kaspersky Anti-Virus Scanner?
10. How do you understand the concept of computer viruses?
11. Classification of viruses.
12. Why is it necessary to fight computer viruses?
13. How to start the anti-virus scanner?
14. How to see statistics in Kaspersky Anti-Virus, what information does it
contain?
114
LABORATORY WORK № 14
Topic: Infrastructure of «The electronic government of Kazakhstan».
Lesson Objectives: To examine experiment of the developed countries
on forming of the Electronic government. Key Concepts: basic algorithms,
flowcharts.
Materials and Equipment: a computer class, a projector, a floppy disk
Key Concepts: The Information System (IS) – the hardware-software
complex intended for implementation of information processes;
The gateway of «the electronic government» – the information system inten-
ded for integration of information systems of «the electronic government»
within implementation of electronic services;
Electronic document management – an electronic exchange of documents
between computer programs in the standardized form;
Electronic commerce – an exchange of goods and (or) services based on the
existing communications with the help of electronic means of communication.
The concept «electronic commerce» is equivalent to the concept «electronic
trading».
The content and order of performance:
1. Repeat theoretical material on the subject.
Problems of training: acquaintance of students:
a) with the rights of everyone to receipt of information from public infor-
mation systems;
b) use of documents in an electronic digital format in public administration
and the civil legal sphere;
c) with the technoparks created as the centers of development of the inno-
vation entrepreneurship in the field of ICT;
d) with actions directed on development of technologies of training and
training of specialists in the field of ICT;
e) development of telecommunication infrastructure and creation of points
of connection to open information systems.
Materials and Equipment: The computer, the folder with slides.
Definitions
115
electronic document management system based on the automation of the
entire set of management processes across the country and serves as the target
of significantly improving governance and reducing social communications
costs for each member of society. Creation of e-government involves building
a nationwide distribution of the social management system, implementing the
decision of the full range of tasks associated with managing documents and
their processing.
Individual tasks
116
16. List the list of documents required to obtain the services of help on a
change of name. Specify the term of the service and its cost. (услуга Получе-
ния справки о перемене фамилии).
17. Find a service To get an enquiry on the amount of income received from
sources and withheld (paid) taxes.(Получение справки о суммах получен-
ных доходов из источников и удержанных (уплаченных) налогов) Specify
the term of the service and its cost. List the list of documents required to obtain
the service.
18. What services are available at the Family tab?
19. The website to find the Civil Code of the Republic of Kazakhstan
(Гражданский кодекс Республики Казахстан). When was it adopted? What
is said in Article 10.
20. Find the RK Tax Code (Налоговый кодекс РК). When was it accepted
and changed? Take a screenshot of Article 3.
21. Go to the tab Licensing (Лицензирование). Read all the tabs on this
page and go to the Education tab. To view the information on this tab.
22. List the popular e-services.
23. Find information about the military institutions of Kazakhstan.
24. Find information about the public housing program (государственной
жилищной программе).
25. Find information about the educational credits for training of Kazakhstan
banks.
26. Find information on admission to the magistracy, which documents are
required for this.
27. Identify which services can be obtained on the job search and
employment.
28. Find information on the public service on how to register for testing for
evaluation of personal qualities (о государственной службе, как осуществля-
ется Запись на тестирование на оценку личных качеств).
Control questions
117
LABORATORY WORK № 15
Topic: The main components of «E-Learning».
Lesson Objectives: To examine experiment of the developed countries on
forming of the Electronic government.
Key Concepts: basic algorithms, flowcharts.
Materials and Equipment: a computer class, a projector, a floppy disk.
Definitions
118
download additional materials underpinning received by electronic aids theory,
pass the completed task, consult with the instructor. The main thing is that all
these features are supported electronic media programs. Now the development
of e-learning depends on the development of the media, but electronic books,
fully revealing its potential, are still in the development stage of traditional.
Moodle is an open-source content management system that is now widely
accepted worldwide within the academic community. Its social constructivist
philosophymakes Moodle an excellent choice to deliver e-learning contents
that require collaborative activities, such as those that are frequently associated
with online labs (virtual labs, mixed-reality labs, or remote labs). However,
the development of online labs that include remote experimentation resources
presents specific functional requirements that may not be entirely met by
the current features of Moodle, since the number of such labs will always be
smaller than the number of students. This discrepancy creates the need for a
booking tool to reserve online lab time beforehand, avoiding access conflicts
and at the same time helping the students to organise their time and activities.
In most cases those online labs will be meant to support hands-on activities
that are associated with learning contents delivered via the web. Tutors will in
that case need to integrate the booking link into the experiment script, a task
which will be facilitated if such tool is embedded in the elearning platform
that is used to deliver the course contents. This paper presents a Moodle
extension that offers a booking tool to support resource sharing. Such tool has
an immediate application for organising access to online labs, but may in fact
be used with any other type of scarce resources, such as the videoconferencing
rooms that are needed to support collaborative activities.
Individual tasks
Make questions about lesson students must work in pairs. They ask 10
question, which answers they would like to receive. At least 4 questions must
begin with Who, What, How and Why.
Control questions
119
ПРИМЕРЫ ТЕСТОВЫХ ЗАДАНИЙ ПО ТЕМЕ
«ИНТЕРНЕТ ТЕХНОЛОГИИ»
120
6. DNS server involved in loading a web page:
a. DNS recursor, the root server, authoritative nameserver
b. server
c. IP addresses
d. URL
e. browsers
7. Tags of HTML
a. <title>
b. <style_rus>
c. <pos>
d. <nm>
e. <m>
8. Tags of HTML
a. <scriptt>
b. <br>
c. <imgscr>
d. <vvv>
e. <osi>
121
12. Protocols of Network Layer
a. icmp
b. ri
c. osf
d. vail
e. mail
14. HTTP:
a. hypertext transfer protocol
b. hub transfer protocol
c. hyper transfer protocol
d. hyperlink t transfer protocol
e. hypertext transport protocol
122
18. Tags of HTML
a. <body>
b. <uli>
c. <h8>
d. <nm>
e. <m>
23. What is the technology standard for managing of public Web sites and
other Internet domains?
a. DNS server
b. file server
c. print server
123
d. operating system
e. cloud technology
124
ПРИМЕРЫ ТЕСТОВЫХ ЗАДАНИЙ ПО ТЕМЕ
«КИБЕРБЕЗОПАСНОСТЬ»
1. Download copy, extract data from an open system done fraudulently is
treated as …
a. cyber-warfare
b. cyber-security act
c. data-backup
d. cyber-crime
e. cyber-attacks
f. data-attacks
125
b. external programs
c. add-ons
d. secondary key
e. algorithm
f. primary key
126
10. ... cryptography deals with traditional characters, i.e., letters & digits
directly.
a. Modern
b. Classic
c. Asymmetric
d. Latest
e. Encryption
f. Plaintext
13. In general how many key elements constitute the entire security structure?
a. 1
b. 2
c. 3
d. 4
e. 5
f. 6
127
e. OS Security
f. Local Security
15. Cyber-crime can be categorized into … types.
a. 1
b. 2
c. 3
d. 4
e. 5
f. 6
128
e. IP
f. BIOS
129
ПРИМЕРЫ ТЕСТОВЫХ ЗАДАНИЙ
НА 1 РУБЕЖНЫЙ КОНТРОЛЬ
Вариант 1
130
c. the propagation of viruses
d. placed in the quarantine zone the infected files
e. the propagation of viruses and placing in quarantine the infected files
10. In what place of the HTML document must define the <title> tags,
<link> and <meta>.
a. These tags can be defined in any place in the document
b. In the <body> section
c. Section
d. In the <head1>section
e. In the <head>section
131
11. Specify which tags are used in the code below.
Я первый абзац.
________________________________________
Я второй абзац
a. <p>, <i> и <br />
b. <div>, <i> и <br />
c. <div>, <b> и <hr />
d. <p>, <a> и <br />
e. <p>, <ol> и <hr />
13. MS Excel. In the H5 cell the formula =$В$5*5 is writted. What formula
will be received when it copying in H7 cell?
a. =$В$7*7
b. =$В$5*5
c. =B$5*7
d. =B$5*7$
e. =$В$5*7
132
d. broadcasts of files per a computer network
e. the ordered storage and processing of the considerable data arrays
Вариант 2
133
b. img
c. picture
d. image
e. gpg
134
6. What is the Database:
a. A set of the data relating to a certain subject
b. The file keeping varieties of tables
c. Special folder
d. The interdependent information (data) on objects specially structured and
stored in an external memory of the computer
e. Data set or the programs stored an oblate kind
135
b. designated by Russian alphabet letters numbered
c. numbered
d. designated by any symbol
e. randomly named by user
14. It is impossible to enter data of the following type into a cell of the
electronic spreadsheet:
a. Monetary
b. Graphic
c. Numerical
d. Text
e. Date/time
16. MS Excel. Show impossible options for the data format «Date».
a. 14.2.00.
b. 4-апр-2000
c. Январь 29, 1994
d. 14/03/2009
e. 30/32/2016
136
17. As the main computer of a network is called:
a. The main
b. Server
c. Central
d. Service
e. Principal
19. An electronic store your data on the Internet, which allows you to store,
edit, and share interesting files and documents with friends and colleagues.
a. Cloud technology
b. Internet
c. Network technology
d. Web-technology
e. Algorithm
Ключи
Вариант 1 Вариант 2
1 2 3 4
1 d 1 b
2 d 2 a
3 c 3 c
4 c 4 a
5 all 5 c
6 a-d 6 d
137
Продолжение
1 2 3 4
7 a 7 b
8 b 8 d
9 c 9 c
10 e 10 c
11 c 11 a
12 a 12 e
13 b 13 e
14 e 14 b
15 b 15 d
16 e 16 e
17 b 17 b
18 b 18 c
19 a 19 a
20 e 20 a
138
ПРИМЕРЫ ТЕСТОВЫХ ЗАДАНИЙ
НА 2 РУБЕЖНЫЙ КОНТРОЛЬ
1. Web browsers are:
a. FireFox
b. MS Word
c. Chrome
d. DOS
e. WINDOWS
f. Unix
g. PC DOS
h. Safari
139
b. Opera
c. MS Dos
d. DOS
e. WINDOWS
f. Unix
g. Internet Explorer
h. MS Word
7. Tags of HTML
a. <title>
b. <style>
c. <p>
d. <nm>
e. <m>
8. Tags of HTML
a. <script>
b. <br>
c. <img>
d. <vvv>
e. <osi>
140
10. Communications between the browser and website are encrypted by
a. TLS
b. SSl
c. IP
d. TCP/IP
e. UDP
14. HTTP:
a. hyperlink t transfer protocol
b. hub transfer protocol
c. hyper transfer protocol
d. hypertext transfer protocol
e. hypertext transport protocol
141
b. UFRL
c. http
d. www
e. pop3
f. w3c
g. telnet
h. URL
142
d. <nm>
e. <table>
23. What is the technology standard for managing of public Web sites and
other Internet domains?
a. operating system
b. file server
c. print server
d. DNS server
e. cloud technology
143
Ключи
1 a, h, c 11 e, b, c 21 a, b
2 a, b, h 12 a, f, c 22 a, b
3 c, b 13 a, b, c 23 d
4 a, b 14 d 24 e
5 g, b 15 h 25 b
6 a, b, c 16 a, b, c
7 a, b, c 17 a, b, c
8 a, b, c 18 e, b
9 e, b 19 a, b
10 a, b 20 e, b
144
ПРИМЕРЫ ТЕСТОВЫХ ЗАДАНИЙ НА ЭКЗАМЕН
(первые варианты ответов правильные)
1 вариант
145
d. fast, expensive, short-term memory
e. a display screen, printer, or other device that lets you see what the
computer has accomplished
146
11. Memory
a. the electronic part of a computer system that is used for temporarily
storing the programs and data that are being used by the processor
b. data about data in a document
c. a minimal computer operating system kernel
d. the common name for the Microsoft Corporation
e. the program presents a TDI
12. A clone of the Unix operating system created by Linus Torvalds for use
on personal computers –
a. Linux
b. Mac OS X
c. Macromedia
d. Memory
e. Windows
13. Interface – …
a. the hardware or software that connects two systems and allows them to
communicate with each other
b the physical components of a computer system
c. network internal to an organization that uses Internet protocols
d. a method for storing and organizing computer files and the data they
contain to make it easy to find and access them.
e. a method for storing and organizing computer files and the data they
contain to make it easy to find and access them
147
15. File system – …
a. a method for storing and organizing computer files and the data they
contain to make it easy to find and access them.
b. a type of user interface which allows people to interact with a computer
and computer-controlled devices which employ graphical icons, visual
indicators or special graphical elements called "widgets", along with
text, labels or text navigation to represent the information and actions
available to a user.
c. the physical components of a computer system
d. the hardware or software that connects two systems and allows them to
communicate with each other
e. network internal to an organization that uses Internet protocols
18. Buffer –
a. a data area shared by hardware devices or program processes that operate
at different speeds or with different sets of priorities
b. a general purpose computer programming language that was originally
designed for writing Unix systems programs
c. an object-oriented superset of the C programming language commonly
used for writing application programs for the Microsoft Windows
operating system
d. a path for the transmission of data
e. a piece of program text written in a programming language
148
b. Artificial intelligence
c. Backbone
d. Bandwidth
e. Bridge
22. A supercomputer is
a. a computer with a high-level computational capacity compared to a
general-purpose computer
b. a theoretical quantum computer
c. the first machine was the CDC STAR-100 and the TI ASC
d. a computer processor which incorporates the functions of a computer's
central processing unit (CPU) on a single integrated circuit (IC), or at
most a few integrated circuits
e. is a single chip that contains more than one microprocessor core
149
24. Quantum computers
a. a theoretical quantum computer
b. the first machine was the CDC STAR-100 and the TI ASC
c. a computer processor which incorporates the functions of a computer's
central processing unit (CPU) on a single integrated circuit (IC), or at
most a few integrated circuits
d. is a single chip that contains more than one microprocessor core
e. a computer with a high-level computational capacity compared to a
general-purpose computer
28. Pick out the right concept (or synonym): to paste (in human-computer
interaction)
a. to insert (for example, the word in the text)
b. to create a directory
c. to copy dissimilar document types
d. commands given to computer
e. document-linking features
150
29. Pick out the right definition: Paintbrush
a. a drawing programme
b. a communication programme
c. a word processing programme
d. excel programming
e. interface
151
b. a place where information is stored
c. devices to perform commands
d. error message
e. device name
152
40. iOS (originally iPhone OS) is a mobile operating system created and
developed by …
a. Apple Inc.
b. Google
c. Windows
d. Microsoft
e. Nokia
41. (?)… is a term used to denote the act or process by which application
software is developed for mobile devices, such as personal digital assistants,
enterprise digital assistants or mobile phones.
a. Mobile application development
b. iOS shares
c. Windows
d. Microsoft
e. Yandex
44. A single-tasking operating system can only run (?) program at a time
a. one
b. two
c. 3
d. 4
e. many
153
45. A (?) is an operating system that guarantees to process events or data by
a specific moment in time.
a. real-time operating system
b. A library operating system
c. Embedded operating system
d. A distributed operating system
e. Single-user operating system
47. Click –
a. position the mouse pointer over an element, press and release the left
mouse button in one time.
b. same as above except press the mouse button twice in quick succession
without moving the mouse between clicks.
c. position the mouse pointer over an element, press and hold the left mouse
button, and drag the mouse across the screen.
d. the instruction manuals for most software applications contain a section
describing the functions of each key or combination of keys.
e. a display adapter card is actually what builds the video images
48. Double-click
a. position the mouse pointer over an element, press the mouse button twice
and release the left mouse button in one time in quick succession without
moving the mouse between clicks.
b. same as above except press the mouse button twice in quick succession
without moving the mouse between clicks.
c. position the mouse pointer over an element, press and hold the left mouse
button, and drag the mouse across the screen.
d. The instruction manuals for most software applications contain a section
describing the functions of each key or combination of keys.
e. A display adapter card is actually what builds the video images position
the mouse pointer over an element and press and release the left mouse
button one time
154
49. Drag is …
a. position the mouse pointer over an element, press, to move by the left
mouse button on the necessary place in one time and to drop
b. position the mouse pointer over an element, press the mouse button twice
and release the left mouse button in one time in quick succession without
moving the mouse between clicks.
c. position the mouse pointer over an element, press and hold the right
mouse button, and to move the mouse across the screen.
d. the instruction manuals for most software applications contain a section
describing the functions of each key or combination of keys
e. a display adapter card that builds the video images
51. When (to invent) Ch. Babbage the first calculating machine?
a. In 1812
b. In 1912
c. In 1822
d. In 1911
e. In 1712
155
54. Father of the computer
a. Charles Babbage
b. Ada Lovelace
c. Konrad Zuse
d. Frederick P. Brooks
e. Mohammad Usman Khan
56. ALU –
a. arithmetic logic unit
b. arithmetic logic unprocess
c. arithmetic low unit
d. algebra logic unit
e. arithmetic unit
57. OS (abbreviation)
a. operating system
b. open system
c. offen system
d. old system
e. un system
156
c. result
d. diskcopy.exe
e. Device names
60. … is a computer program that you use for writing letters, reports,
documents, or the software that is used for this purpose
a. A word processor
b. Databases
c. Graphics
d. e-mail
e. laptop
157
65. In OS Windows «clipboard» is ...
a. The special area of memory for temporary storage of information when
moving objects
b. Windows applications Word
c. Part of the memory where the operating system
d. Land of memory on your hard drive
e. Writes the selected piece in a file
158
c. Ada Lovelace
d. Norbert Wiener
e. Blaise Pascal
71. Select the correct record the full name of the file:
a. C: \ DIR1 \ DIR2 \ text.txt
b. A/dir1/fil com
c. B: \ D1 \ Dir2
d. D: \ \ dir.my \ \ do txt
e. object for automation of frequently performed
159
b. the possibility of splitting the processing of information into simpler
steps
c. the possibility of obtaining the desired result for a given input information
for a specific number of steps
d. suitability of the algorithm for solving a certain class of problems
e. object for automation of frequently performed
2 вариант
1. Interface –
a. the hardware or software that connects two systems and allows them to
communicate with each other
b. the conditions and goals set upon the user
c. is the arrangement of the various elements (links, nodes, etc.) of a
computer network
d. two basic categories of network topologies
e. a software package for a specific task
3. Network topologies:
a. Bus, star, ring
b. Bus, round, ring
c. Bus, star, line
d. Button, star, ring
e. Bus, star, button
160
5. NAT –
a. network address translation
b. network address transport
c. network area translation
d. Net translation
e. Network and translation
161
c. a set of standards for software used with internal look-up tables in a TCP/
IP network for routing data through a gateway between networks restore
d. an electronic device that links different networks or parts of a network
e. a network connecting computers within very large areas, such as states,
countries, and the world
12. Protocol –
a. a set of standards for software used with internal look-up tables in a TCP/
IP network for routing data through a gateway between networks restore.
b. a network connecting computers within very large areas, such as states,
countries, and the world
c. a network connecting computers in a relatively small area such as a
building.
d. a board that provides network communication capabilities to and from a
computer
e. an electronic device that links different networks or parts of a network
162
15. Indicate which of the IP address belongs to a class C
a. 193.168.102.1
b. 255.255.255.0
c. 255.255.0.0
d. 0.0.0.1
e. 255.0.0.1
19. Ergonomika – it is
a. Science on the development of products that interact with us physically.
b. Science that studies the application scope of our mental characteristics.
c. The science of the economically correct solutions.
d. The science of the psychological impact of computers on the person.
e. The science of designing the user interface.
163
d. line
e. mixed
21. What is the well-defined set of rules and conventions for communication
network of the same level?
a. protocol
b. interface
c. model
d. network model
e. Network interface
22. Specify the names of the basic protocol stack TCP / IP computer
networks
a. TCP and IP
b. TCP and UDP
c. IP and PoP
d. IP and Imap
e. TCP and Http
23. Determine the number of nodes that can support a network of class C
a. 254
b. 16384
c. 65534
d. 2097152
e. 256
24. Determine the subnet mask for the network identifiers of class C
a. 255.255.255.0
b. 255.255.255.255
c. 255.255.0.0
d. 255.0.0.0
e. 0.0.0.0
164
26. To determine which class belongs to address 196.245.88.23
a. C
b. A
c. B
d. D
e. E
30. Turbo Pascal includes the following set of basic symbols: (select the
wrong)
a. Greek letters
b. _ underscore
165
c. 10 numbers: 0-9
d. operations symbols: + - * / = <> < > <= >= := @
e. specifiers: ^ $ #
33. An electronic store your data on the Internet, which allows you to store,
edit, and share interesting files and documents with friends and colleagues.
a. Cloud technology
b. Internet
c. Network technology
d. Web-technology
e. Algorithm
166
c. Bridges and routers are both special kinds of devices used for
internetworking LANs that is, linking different LANs or LAN segments
together.
d. The Microsoft MS-DOS operating system is like a translator between
you and your computer.
e. A file is a collection of related information, like the contents of a file
folder in a desk drawer.
167
b. visual
c. tactile
d. olfactory
e. flavoring
43. Three basic principles which information security shall provide are
formulated:
a. Integrity of data, Confidentiality of information, Accessibility of infor-
mation to all authorized users
b. information valuable at present time, information obtained without
misstatements, contains a specific set of concepts
c. transferred in a type of the symbols intended to designate language
lexemes, in the form of images, objects, schedules, perceived by organs
of vision
d. all aspects connected with determination, a condition of security of data
in case of which their confidentiality, ensuring access to information only
to the authorized users
e. information valuable at present time, all aspects connected with
determination, information obtained without misstatements
44. A representation of the data in a way that provides the most efficient
person working on their study
a. Data visualization
b. Integrity of data
168
c. The following main types of information
d. Availability
e. Internet
169
c. time series charts
d. columnar and pie charts
e. contour plots
52. The formal sign system intended for record of computer programs – …
a. Programming language
b. WAN
c. LAN
d. ICT
e. Multimedia
170
54. … is manipulation of matter on an atomic, molecular, and supramolecular
scale.
a. Nanotechnology
b. Robotics
c. STEM
d. E-government
e. E-learning
171
b. E-learning
c. Nanotechnology
d. E-government
e. ICT
60. … is one that provides its home owners comfort, security, energy
efficiency (low operating costs) and convenience at all times, regardless of
whether anyone is home.
a. A Smart Home
b. Smart City
c. Nanotechnology
d. ICT
e. E-learning
61. … is a city where day after day the quality of life is improved and the
costs of sevices are decreased
a. SmartCity
b. A Smart Home
c. Nanotechnology
d. ICT
e. E-learning
63. Access. The field value which can not be repeated is called:
a. key
b. binding
c. counter
d. unique
e. ict
172
d. A1
e. AB
67. MS Excel. The cell which located on intersection 3 lines and 1 column
is designated:
a. A3
b. C1
c. AA
d. 3A
e. B1
173
70. How cell coordinates in MS Excel are called?
a. Address
b. Digit
c. Cell
d. Letter
e. Number
75. How the ordered sequence of computer commands for the tasks' decision
is called?
a. Program
b. Application
174
c. Translation
d. Compilation
e. Debugging
175
ВАРИАНТЫ ТЕСТОВ ДЛЯ ПРОВЕДЕНИЯ
САМОСТОЯТЕЛЬНОЙ РАБОТЫ
1 вариант
176
b. Opera
c. MS Dos
d. DOS
e. WINDOWS
7. Tags of HTML
a. <title>
b. <style>
c. <p>
d. <nm>
e. <m>
f. <j>
g. <k>
177
b. SSl
c. IP
d. TCP/IP
e. UDP
f. DDD
178
c. a computer processor which incorporates the functions of a computer's
central processing unit (CPU) on a single integrated circuit (IC), or at
most a few integrated circuits/
d. is a single chip that contains more than one microprocessor core
e. a computer with a high-level computational capacity compared to a
general-purpose computer
179
b. <br>
c. <td6>
d. <nm>
e. <table>
f. <jou>
g. <poi)
180
f. a description of the successive stages of data processing. The algorithm is
given in an arbitrary statement in natural language
2 вариант
181
4. Input devices:
a. Keyboard
b. mouse
c. printer
d. smattphone
e. plotter
6. Output devices:
a. printer
b. monitor
c. authoritative nameserver
d. URL
e. browsers
f. server
g. IP addresses
182
9. Mobile operating system:
a. Windows
b. iOS
c. Unix
d. Linux
e. Android
f. DOS
183
b. supercomputer
c. laptop
d. Midsize computer
e. PC
184
d. <nm>
e. <m>
f. <PPP>
g. <vvv>
185
24. In a graphical representation of the algorithm?
a. a system of symbols and rules designed for a uniform recording
algorithms.
b. a text on programming languages
c. http
d. object for automation of frequently performed
e. represented by a sequence of interrelated functional blocks, each of
which corresponds to the execution of one or more actions
f. a description of the successive stages of data processing. The algorithm is
given in an arbitrary statement in natural language
25. Main components of the computer a. USB, Monitor, Input device, Output
device, scaner
b. CPU, Memory, Mass storage device, Input device, Output device
c. e-mail communication protocols
d. Central processing unit
e. fast, expensive, short-term memory
f. A display screen, printer, or other device that lets you see what the
computer has accomplished
3 вариант
186
3. DNS servers eliminate the need for humans to memorize IP addresses
such as
a. 3,4,5,5
b. 2400:cb00:2048:1:cb29:d7a2
c. 192.168.1.1
d. 0.0.0.0
e. OSI
7. Tags of HTML
a. <title>
b. <style>
c. <p>
187
d. <nm>
e. <m>
8. Tags of HTML
a. <script>
b. <br>
c. <img>
d. <vvv>
e. <osi>
188
f. rip
g. pop3
h. smtp
14. HTTP:
a. hyperlink t transfer protocol
b. hub transfer protocol
c. hyper transfer protocol
d. hypertext transfer protocol
e. hypertext transport protocol
189
18. Tags of HTML
a. <m>
b. <ul>
c. <h8>
d. <nm>
e. <body>
23. What is the technology standard for managing of public Web sites and
other Internet domains?
a. operating system
b. file server
c. print server
190
d. DNS server
e. cloud technology
4 вариант
191
3. DNS servers eliminate the need for humans to memorize IP addresses
such as
a. 3,4,5,5
b. 2400:cb00:2048:1:cb29:d7a2
c. 192.168.1.1
d. 0.0.0.0
e. OSI
7. Tags of HTML
a. <title>
b. <style>
c. <p>
d. <nm>
e. <m>
f. <j>
g. <k>
192
8. Tags of HTML
a. <script>
b. <br>
c. <img>
d. <vvv>
e. <osi>
f. <ip>
193
13. Internet based services
Сервисы Интернета
a. telnet
b. ftp
c. www
d. osi
e. msi
14. HTTP:
a. hyperlink t transfer protocol
b. hub transfer protocol
c. hyper transfer protocol
d. hypertext transfer protocol
e. hypertext transport protocol
194
d. <nm>
e. <body>
f. <mmm>
195
23. What is the technology standard for managing of public Web sites and
other Internet domains?
a. operating system
b. file server
c. print server
d. DNS server
e. cloud technology
f. multimedia
196
Ключ к варианту 3
1 a, h, c 11 e, b, c 21 a, b
2 a, b, h 12 a, f, c 22 a, b
3 c, b 13 a, b, c 23 d
4 a, b 14 d 24 e
5 g, b 15 h 25 b
6 a, b, c 16 a, b, c
7 a, b, c 17 a, b, c
8 a, b, c 18 e, b
9 e, b 19 a, b
10 a, b 20 e, b
Ключ к варианту 4
1 a, g, c 11 e, b, c 21 a, b
2 a, b, g 12 a, f, c 22 a, b
3 c, b 13 a, b, c 23 d
4 a, b 14 d 24 e
5 a, b 15 а 25 b
6 a, b, c 16 a, b, c
7 a, b, c 17 a, b, c
8 a, b, c 18 e, b
9 e, b 19 a, b
10 a, b 20 e, b
197
GLOSSARY
An operating system
198
Input devices include keyboards, pointing devices, scanners, microphones,
and webcams.
Output devices include monitors, printers, and speakers.
Combined input/output devices include fax and touchscreen displays.
Data storage devices include hard drives, flash drives, optical drives, Net-
work Attached Storage (NAS), media players, and smart phones.
A wide variety of electrical connectors are used to connect peripherals to
computers.
Security threats include malware, phishing, social engineering, spam,
password cracking, and physical security risks.
Malware is any software used to disrupt computer operation, gather
sensitive information, or gain access to private computer systems. This includes
viruses, Trojans, spyware, and ransomware.
Physical security threats include hardware theft, software/license theft,
shoulder surfing, and dumpster diving.
Effective password management includes password complexity, password
confidentiality, password expiration, limited password reuse, changing default
passwords, understanding single sign-on, and using multi-factor authentication.
Device hardening includes disabling unused features such as Bluetooth and
Near Field Communication, using screen timeout and lock options, enabling
security software features, using a software firewall, using anti-malware soft-
ware, and encrypting data storage.
Security best practices include being alert for suspicious emails, attach-
ments, and hyperlinks, responding to security software alerts, renaming admi-
nistrator accounts, and disabling guest accounts.
A computer network or data network is a telecommunications network
that allows computers to exchange data. Networked computing devices pass
data to each other in the form of packets across connections established using
either cable or wireless media.
A network packet is a formatted unit of data sent through a network to
the destination. Once packets arrive, they are reassembled into their original
message.
Wired media includes coaxial cable, twisted-pair cable, and optical fiber.
Wireless local area network connections use spread spectrum technology
based on a common flavor of open-standards wireless radio-wave technology
defined as IEEE 802.11 and known as Wi-Fi.
A network interface controller (NIC) is hardware that provides a computer
with the ability to access the transmission media, and has the ability to process
low-level network information.
In Ethernet networks, each NIC has a unique 48-bit Media Access Control
(MAC) address.
199
A repeater or hub is an electronic device that receives a network signal in
the form of bits, cleans it of unnecessary noise, and regenerates it. In local area
networks, switches have replaced hubs.
A bridge or switch is a device that connects and filters multiple network
segments or devices, by forwarding data only to one or multiple devices that
need to receive the data based on destination MAC address.
A router is a device that forwards data packets between different computer
networks based on network address (IP address).
A modem is a device used to connect network nodes via wire not originally
designed for digital network traffic, by modulating the digital signal to produce
an analog signal for transmission.
A firewall is a device used to control network security and access rules
by rejecting access requests from unrecognized sources while allowing actions
from recognized ones.
An access point is a device that allows wireless devices to connect to a
wired network using Wi-Fi, or related standards.
An Internet Protocol address (IP address) is a numerical label assigned
to each device participating in a network that uses the Internet Protocol for
communication. An IP address serves two principal functions: host identifica-
tion and network addressing.
IP addresses are 32-bit (IPv4) or 128-bit (IPv6) numbers usually written
and displayed in human-readable notations, such as 198.51.100.1 (IPv4), and
2001:db8:0:1234:0:567:8:1 (IPv6).
IP addresses are assigned to a host either anew at the time of booting,
or permanently by fixed configuration of its hardware or software. Persistent
configuration is also known as using a static IP address.
In contrast, in situations when the computer's IP address is assigned newly
each time, this is known as using a dynamic IP address.
Static IP addresses are manually assigned to a computer by an
administrator.
Dynamic IP addresses are assigned either by the computer interface or
host software itself through automatic configuration, or assigned by a server
using Dynamic Host Configuration Protocol (DHCP).
A shared resource, or network share, is a computer resource made available
from one host to other hosts on a computer network.
Common network sharing protocols include Server Message Block
(Windows, OS X, Unix-like), Apple File Protocol (OS X), and Network File
System (Unix-like).
In SOHO networks, a decentralized approach is often used, where every
user may make their local folders and printers available to others. This approach
is sometimes denoted as a workgroup or peer-to-peer network.
200
In a workgroup, each computer is responsible for its own security, rather
than relying on centralized authentication.
Windows 7 and later Microsoft operating systems extend the workgroup
with a homegroup option that uses a password to join computers into the group,
and allows users' libraries, along with individual files and folders, to be shared
between multiple computers.
In larger networks, a centralized file server or print server, sometimes
denoted client–server network, is typically used. A client process on the local
user computer takes the initiative to start the communication, while a server
process on the file server or print server remote computer passively waits for
requests to start a communication session.
The centralized authentication approach used in larger networks is referred
to as a domain, where all user accounts, computers, printers and other security
principals, are registered with a central directory service.
In very large networks, a Storage Area Network (SAN) approach to shared
resources may be used in addition to file and print servers.
ipconfig is a Microsoft Windows console application that displays all
current TCP/IP network configuration values and can modify Dynamic Host
Configuration Protocol DHCP and Domain Name System DNS settings.
ifconfig is a system administration utility in Unix-like operating systems
that has features for configuring, controlling, and querying TCP/IP network
interface parameters.
ping is a computer network administration software utility used to test the
reachability of a host on an Internet Protocol (IP) network and to measure the
round-trip time for messages sent from the originating host to a destination
computer.
nslookup is a network administration command-line tool available for many
computer operating systems for querying the Domain Name System (DNS)
to obtain domain name or IP address mapping or for any other specific DNS
record.
net share is a Microsoft Windows command that manages shared resources.
net use is a Microsoft Windows command that connects a computer to or
disconnects a computer from a shared resource, or displays information about
computer connections.
Installation (or setup) of a computer program (including device drivers and
plugins), is the act of making the program ready for execution.
Installation typically involves code being copied/generated from the
installation files to new files on the local computer for easier access by the
operating system.
201
Because code is generally copied/generated in multiple locations, uninstal-
lation usually involves more than just erasing the program folder. For example,
registry files and other system code may need to be modified or deleted for a
complete uninstallation.
Common operations performed during software installations include:
Making sure that necessary system requirements are met
Checking for existing versions of the software
Creating or updating program files and folders
Adding configuration data such as configuration files, Windows registry
entries or environment variables
Making the software accessible to the user, for instance by creating links,
shortcuts or bookmarks
Configuring components that run automatically, such as daemons or
Windows services
Performing product activation
Updating the software versions
Windows Update is a service offered by Microsoft that provides updates
for Windows components.
Microsoft Update is a service offered by Microsoft that provides updates for
Windows components and other Microsoft software.
A software license is a legal instrument (usually by way of contract
law, with or without printed material) governing the use or redistribution of
software.
Software licenses are typically either proprietary licenses or free and open
source licenses [11].
With proprietary software licenses, the software publisher grants the use of
one or more copies of software under the end-user license agreement (EULA),
but ownership of those copies remains with the software publisher.
Free and open-source licenses generally fall under two categories: Those
with the aim to have minimal requirements about how the software can be
redistributed (permissive licenses), and those that aim to preserve the freedoms
that are given to the users by ensuring that all subsequent users receive those
rights (copyleft Licenses).
The Control Panel is a part of the Microsoft Windows graphical user
interface which allows users to view and manipulate basic system settings and
controls via applets.
System Preferences is an application included with the OS X operating
system that allows users to modify various system settings which are divided
into separate preference panes.
202
Web browsing best practices include:
Using secure websites with valid certificates
Recognizing suspicious links and ads, and untrusted sources
Recognizing adware symptoms, including popups, home page redirection,
and search engine redirection
Using current browsers with updated plugins
Disabling unneeded plugins, toolbars, and extensions
Using or disabling autofill forms
Clearing browser cache, history, and cookies
Understanding the risks of using public workstations
Limiting the use of personal information (PII)
A public key infrastructure (PKI) uses a trusted certificate authority (CA)
to validate and sign public key certificates.
A public key certificate contains the public key of the organization providing
the certificate and the digital signature of the certificate authority that validated
the certificate's information.
A digital signature uses the signer's private key to generate the signature,
allowing the signature to be validated using the signer's public key.
Operating systems come pre-populated with public key certificates from
certificate authorities. Proper disposal of computer equipment includes using
a qualified recycler for systems, monitors, scanners, batteries, ink and toner
cartridges to keep hazardous materials from contaminating the environment.
Erase or wipe hard drives to eliminate sensitive information prior to
disposal.
PC power management refers to the mechanism for controlling the power
use of personal computer hardware. Common operating system power settings
include sleep and hibernation modes.
Electrical power supply voltage and frequency varies between regions,
with 120 volts and 60 cycles per second common in North America, and 230
volts and 50 cycles common in Europe. Voltage converters may be necessary
for people traveling with mobile devices.
Computers should be placed in locations that have good airflow while
minimizing humidity and temperature issues, minimize dust accumulation, and
avoid disruption from EMI sources.
Electrostatic discharge (ESD) occurs when differently-charged objects are
brought close together or when the dielectric between them breaks down, often
creating a visible spark. ESD can cause damage to sensitive electronic devices.
Electrostatic discharge may be controlled through the use of ESD-
safe packing material, the use of conductive filaments on garments worn by
assembly workers, conducting wrist straps and foot-straps to prevent high
203
voltages from accumulating on workers' bodies, anti-static mats or conductive
flooring materials to conduct harmful electric charges away from the work
area, and humidity control.
Physical ergonomics is the science of designing user interaction with
equipment and workplaces to fit the user. Proper placement of screens,
keyboards and mice can reduce eye-strain and repetitive stress injuries.
Mobile devices are small, typically handheld computing devices having a
display screen with touch input and/or a miniature keyboard and a variety of
wireless connectivity options.
Mobile devices have an operating system (OS), and can run various types of
application software, known as apps.
Most mobile devices can be equipped with Wi-Fi, Bluetooth, NFC and GPS
capabilities.
Most mobile devices include a camera and media player for video and music
files.
Many mobile devices contain sensors like accelerometers, compasses,
magnetometers, and/or gyroscopes, allowing detection of orientation and
motion.
Bluetooth is a wireless technology standard for exchanging data over short
distances from fixed and mobile devices, and building personal area networks
(PANs).
A master Bluetooth device can communicate with a maximum of seven
devices in a piconet.
Bluetooth has three classes of radios, with Class 2 most commonly found
in mobile devices.
Class 2 Bluetooth has a typical range of 5-10 meters.
A Bluetooth device in discoverable mode transmits the device name, device
class, list of services, and other technical information on demand.
Use of Bluetooth device services may require pairing or acceptance by its
owner, but the connection itself can be initiated by any device and held until it
goes out of range.
The Bluetooth pairing process may be triggered either by a specific request
from a user to generate a bond, or it is triggered automatically when connecting
to a service where the identity of a device is required for security purposes.
During pairing, Bluetooth devices establish a bond through a shared secret
known as a link key.
The bond enables Bluetooth devices to reconnect to each other in the future
without user intervention when the devices are in range.
Bluetooth security uses the link key to generat the encryption key used to
secure communication.
204
When desired, users can delete the Bluetooth link key to remove bonding
relationships.
Bluetooth security risks may be mitigated by using Bluetooth only when
required, enabling discovery only when necessary, removing paired devices
when not in use, and regularly updating firmware on Bluetooth-enabled devices.
Voice over IP (VoIP) is a methodology and group of technologies for
the delivery of voice communications and multimedia sessions over Internet
Protocol (IP) networks, such as the Internet.
VoIP is available on many smartphones, personal computers, and on
Internet access devices. Calls and SMS text messages may be sent over 3G or
Wi-Fi.
VoIP connections are perceived as less reliable than circuit-switched public
telephone networks and may face problems with latency, packet loss, and jitter.
Multi-touch refers to the ability of a surface (a trackpad or touchscreen) to
recognize the presence of more than one point of contact with the surface.
Multi-touch awareness is often used to implement advanced functionality
such as swiping, pinch to zoom, and other predefined gestures.
Hardware
205
Video cards – otherwise called graphics cards, graphics adapters or video
adapters – process the graphics output from the motherboard and transmit it to
the display.
Audio cards are internal computer expansion cards that facilitate
economical input and output of audio signals to and from a computer under
control of computer programs, also known as a sound card.
A network interface controller (NIC, also known as a network interface
card, network adapter, LAN adapter, and by similar terms) is a computer
hardware component that connects a computer to a computer network.
A modem (modulator-demodulator) is a device that modulates signals to
encode digital information and demodulates signals to decode the transmitted
information, initially used for telephone line data transmission, but also used
with DSL and cable high speed connections.
The motherboard, also referred to as system board or main board, is the
primary circuit board within a personal computer, and other major system
components plug directly onto or cable into the motherboard.
System cooling is required to remove the waste heat produced by computer
components, to keep components within permissible operating temperature
limits. Methods include case fans, CPU fans, and liquid cooling.
Liquid cooling uses a liquid rather than air as the heat conductor, with the
most common heat transfer fluid in desktop PCs being (distilled) water.
The fundamental purposes of the BIOS are to initialize and test the system
hardware components, and to load a boot loader or an operating system from a
mass storage device.
206
CPU (Central Processing Unit)
Typically a small microchip, the electronic circuitry within a computer that
carries out the instructions of a computer program by performing the basic
arithmetic, logical, control and input/output.
Computer fan
Any fan inside, or attached to, a computer case used for active cooling, and
may refer to fans that draw cooler air into the case from the outside, expel warm
air from inside, or move air across a heat sink to cool a particular component.
DDR (Double Data Rate)
A computer bus that transfers data on both the rising and falling edges of
the clock signal.
DDR RAM (Double Data-Rate Random Access Memory) / DDR SDRAM
(Double Data-Rate Synchronous Dynamic Random Access Memory)
A class of memory integrated circuits used in computers that makes higher
transfer rates possible by more strict control of the timing of the electrical data
and clock signals.
DIMM (dual in-line memory module)
A series of dynamic random-access memory integrated circuits.
Gb (Gigabit)
A unit of digital information equal to 109 (1 billion) bits.
GB (Gigabyte)
A unit of digital information equal to 109 (1 billion) bytes.
GHz (Gigahertz)
A unit of frequency defined as 109 (1 billion) cycles per second.
Heat sink
A passive heat exchanger that cools a device by dissipating heat into the
surrounding medium.
Hertz (Hz)
A unit of frequency defined as one cycle per second.
IDE (Integrated Drive Electronics)
The original name for what became the ATA/ATAPI/PATA interface stan-
dard for the connection of computer storage devices such as hard disks, floppy
drives, and optical disc drives.
Kb (Kilobit)
A unit of digital information equal to 103 (1 thousand) bits.
KB (Kilobyte)
A unit of digital information equal to 103 (1 thousand) bytes.
Mac (Macintosh)
A series of personal computers manufactured by Apple Inc. and running the
OS X operating system.
Mb (Megabit)
207
A unit of digital information equal to 106 (1 million) bits.
MB (Megabyte)
A unit of digital information equal to 106 (1 million) bytes.
MHz (Megahertz)
A unit of frequency defined as 106 (1 million) cycles per second.
OEM (Original Equipment Manufacturer)
A term that refers either to a company that makes a part or subsystem used
in another company's end product or collectively to all of the various manu-
facturers involved in the final assembly of an end product.
PB (Petabyte)
A unit of digital information equal to 1015 (1 quadrillion) bytes.
PC (Personal Computer)
A personal computer running Microsoft Windows, used in contrast with
Mac.
PCI (Peripheral Component Interconnect)
A local computer bus for attaching hardware devices in a computer, which
replaced the original ISA and VESA bus configuration.
PCIe (Peripheral Component Interconnect Express)
A high-speed serial computer expansion bus standard designed to replace
the older PCI, PCI-X, and AGP bus standards.
PCI-X (Peripheral Component Interconnect Extended)
A computer bus and expansion card standard that enhances the 32-bit PCI
Local Bus for higher bandwidth.
POST (Power-On Self-Test)
A process performed by firmware or software routines immediately after a
computer or other digital electronic device is powered on.
RISC (Reduced Instruction Set Computing)
A CPU design strategy based on the insight that a simplified instruction
set provides higher performance when combined with a microprocessor
architecture capable of executing those instructions using fewer cycles per
instruction.
SATA (Serial Advanced Technology Attachment)
A computer bus interface that connects host bus adapters to mass storage
devices such as hard disk drives and optical drives, which replaced IDE /
Parallel ATA.
TB (Terabyte)
A unit of digital information equal to 1012 (1 trillion) bytes.
Unified Extensible Firmware Interface (UEFI)
A specification that defines a software interface between an operating
system and platform firmware, meant to replace the Basic Input/Output System
(BIOS) firmware interface.
208
ПРИМЕРЫ ЗАДАНИЙ
I.
1. The central processing unit, or CPU, is that part of a computer which
_____.
The central processing unit, or CPU, is that part of a computer which
executes software program instructions.
2. The power supply unit, or PSU, converts _____ to _____.
The power supply unit, or PSU, converts general purpose electric current
from the mains to direct current for the other components of the computer.
3. A PC's main memory is _____, and is used to _____.
A PC's main memory is a fast storage area that is directly accessible by the
CPU, and is used to store the currently executing program and immediately
needed data.
4. Mass storage devices such as _____ store _____.
Mass storage devices such as hard drives store programs and data even when
the power is off; they do require power to perform read and write functions
during usage.
5. Optical drives, including _____, are _____.
Optical drives, including CD, DVD, and Blu-ray Disc, are data storage
devices using rapidly rotating discs coated with reflective material and read
using a laser diode.
6. Hard disk drives (HDD) are _____.
Hard disk drives (HDD) are data storage devices used for storing and
retrieving digital information using rapidly rotating disks (platters) coated with
magnetic material.
7. Solid state drives (SSD) are _____.
Solid state drives (SSD) are data storage devices using integrated circuit
assemblies as memory to store data persistently.
8. Video cards – otherwise called _____ – process _____ and transmit it
to _____.
Video cards – otherwise called graphics cards, graphics adapters or video
adapters – process the graphics output from the motherboard and transmit it to
the display.
9. Audio cards are _____.
Audio cards are internal computer expansion cards that facilitate economical
input and output of audio signals to and from a computer under control of
computer programs, also known as a sound card.
10. A network interface controller (NIC, also known as _____) is a _____.
A network interface controller (NIC, also known as a network interface
209
card, network adapter, LAN adapter, and by similar terms) is a computer
hardware component that connects a computer to a computer network.
11. A modem (modulator-demodulator) is a _____, initially used for _____,
but also used with _____.
A modem (modulator-demodulator) is a device that modulates signals to
encode digital information and demodulates signals to decode the transmitted
information, initially used for telephone line data transmission, but also used
with DSL and cable high speed connections.
12. The motherboard, also referred to as _____, is the _____.
The motherboard, also referred to as system board or main board, is the
primary circuit board within a personal computer, and other major system
components plug directly onto or cable into the motherboard.
13. System cooling is required to _____. Methods include _____.
System cooling is required to remove the waste heat produced by computer
components, to keep components within permissible operating temperature
limits. Methods include case fans, CPU fans, and liquid cooling.
14. Liquid cooling uses a liquid rather than air as _____, with the most
common _____ in desktop PCs being _____.
Liquid cooling uses a liquid rather than air as the heat conductor, with the
most common heat transfer fluid in desktop PCs being (de-ionized) water.
15. The fundamental purposes of the BIOS are to _____, and to _____.
The fundamental purposes of the BIOS are to initialize and test the system
hardware components, and to load a boot loader or an operating system from a
mass storage device.
II.
Computer Graphics
Computer graphics are pictures and drawings produced by computers. A
graphics programme interprets the input provided by the user and transports it
into images that can be displayed on the screen, printed on paper or transferred
to microfilm. In the process the computer uses hundreds of mathematical
formulas to convert the bits of data into precise shapes and colours.
Graphics can be developed for a variety of uses including illustrations,
architectural designs and detailed engineering drawings. Mechanical engi-
neering uses sophisticated programs for applications in computer-aided design
(CAD) and computer-aided manufacturing (CAM). In the car industry CAD
software is used to develop, model and test car designs before the actual parts
are made. This can save a lot of time and money.
Basically, computer helps users to understand complex information quickly
by presenting it in more understandable and clearer visual forms. Electric
210
engineers use computer graphics for designing circuits and in business it is
possible to present information as graphics and diagrams.
These are certain to be much more effective ways of communicating than
lists of figures or long explanations. Today, three-dimensional graphics along
with colour and computer animation are supposed to be essential for graphic
design, computer-aided engineering (CAE) and academic research. Computer
animation is the process of creating objects and pictures which move across
the screen; it is used by scientists and engineers to analyze problems. With
appropriate software they can study the structure of objects and how it is
affected by particular changes.
A graphic package is a software that enables a user to draw and manipulate
objects on a computer. Each graphic package has its own facilities, as well as
a wide range of basic drawing and painting tools. The collection of tools in
a package is known as a palette. The basic geometric shapes, such as lines
between two points, arcs, circles, polygons, ellipses and even text, making
graphical objects are called «primitives». You can choose both the primitive
you want and where it should go on the screen. Moreover, you can specify the
«attributes» of each primitive, e.g., its colour, line type and so on.
The various tools in a palette usually appear together as pop-up icons in
a menu. To use one you can activate it by clicking on it. After specifying
the primitives and their attributes you must transform them. Transformation
means moving or manipulating the object by translating, rotating and scaling
the object. Translation is moving an object along an axis to somewhere else in
the viewing area. Rotation is turning the object larger or smaller in any of the
horizontal, vertical or depth direction (corresponding to the x, у and z axis).
The term «rendering» describes the techniques used to make your object
look real. Rendering includes hidden surface removal, light sources and
reflections.
211
III. Make all types of questions to the following sentence:
A graphics programme interprets the input provided by the user and
transports it into images.
VII. Write out five sentences with Present Simple and translate the
predicate.
212
4. The collection of tools in a package is known as … .
a) palette;
b) polygon;
c) palate.
5. … are called «primitives».
a) the digits;
b) the basic geometric shapes;
c) the letters.
6. The various tools in a palette usually appear together as … in a menu.
a) pop-up corks;
b) pop-up letters;
c) pop-up icons.
X. Translate:
1. Набор инструментов графического пакета известен под названием
«палитра». 2. Более того, вы можете определять свойства каждого при-
митива, т.е. его цвет, тип линии и т.д. 3. Инженеры электрики используют
компьютерную графику для проектирования схем. 4. Компьютер преоб-
разует вводимую команду в графические образы при помощи математи-
ческих формул.
What is MS-DOS
The Microsoft MS-DOS operating system is like a translator between you
and your computer. The programmes in this operating system allow you com-
municate with your computer, your disk drives and your printer, letting you
use these resources to your advantage. MS-DOS also helps you to manage
programmes and data. Once you have loaded MS-DOS into your computer's
memory, you can compose letters and reports, run programmes and languages
such as Microsoft GW-BASIC, and use devices such as printers and disk drives.
213
Terms You Should Know
When you are introduced to a new or different idea, you must often learn a
new set of words to understand the idea. The MS-DOS operating system is no
exception. The following pages explain some terms you will need to know so
that you can read and use the manuals.
Programme
Programmes, often called application programmes, applications, or soft-
ware are series of instructions written in computer languages. These instruc-
tions are stored in files and tell your computer to perform a task. For example,
a programme might tell your computer to alphabetically sort a list of names.
Spreadsheets and word processors are other examples of programmes.
File
A file is a collection of related information, like the contents of a file folder
in a desk drawer. File folders, for instance, might contain business letters, office
memos, or monthly sales data. Files on your disks could also contain letters,
memos, or data. For example, your MS-DOS master disk contains more than
thirty files. Your other disks may contain files that you've created, or that came
with the disk.
Filename
Just as each folder in a file cabinet has a label, each file on a disk has a
name. This name has two parts: a filename and an extension. A filename can
be from one to eight characters in length, and can be typed in uppercase or
lowercase letters. MS-DOS automatically converts filenames to uppercase
letters. Filename extensions consist of a period followed by one, two, or three
characters. Extensions are optional, but it's good idea to use them, since they
are useful for describing the contents of a file to you and to MS-DOS. For
instance, if you want to be able to quickly identify your report files, you can
add the filename extension rpt to each one. Here's an example of a filename
with this extension.
progress .rpt filename filename extension
Directory
A directory is a table of contents for a disk. It contains the names of your
files, their sizes, and the dates they were last modified. Volume Label When
you use a new disk, you can put a label on the outside of it to help you identify
its contents. You can also give each of your disks an internal name, called
a volume label. You can look at the volume label on a disk by displaying its
directory. Some programmes may look at the volume label to see if you are
using the correct disk. So make sure that you label your disks.
Disk Drive
To use the files or programmes that are on a floppy disk, you must first
insert the disk into a floppy disk drive. Floppy disk drives are commonly
214
referred to as the A drive and the В drive. A hard disk drive, normally installed
inside your computer, is usually referred to as the С drive.
Drive Name
A complete drive name consists of a drive letter and a colon. When using
a command, you may need to type a drive name before your filename to tell
MS-DOS where to find the disk that contains your file. For example, suppose
you have a file named finances.doc on the disk in drive B. To tell MS-DOS
where to find this file you would type the drive name before the filename: b:
finances.doc drive name filename with extension.
Command
Just as you will run programmes to create and update files containing your
data, you will also need to run some special programmes, called MS-DOS com-
mands, that let you work with entire files. When you type MS-DOS commands,
you are asking the computer to perform tasks. For example, when you use the
diskcopy command to copy your MS-DOS master disk, you are using a file
named diskcopy.exe, whose task is to copy the files on the MS-DOS disk.
Error messages
If you or your computer makes a mistake when using a device or MS-DOS
command, MS-DOS displays an appropriate error message. Error messages
apply to general errors (such as misspelling a command) or to device errors
(such as trying to use a printer that is out of paper).
Memory
Memory is the place in your computer where information is actively used.
When you run a programme, MS-DOS stores that programme and the files it
uses in the computer's available memory. Some programmes and files use more
memory than others, depending on how large and complex they are.
Devices
Whenever you use your computer, you supply the information (input) and
expect a result (output). Your computer uses pieces of hardware called devices
to receive input and send output. For example, when you type a command, your
computer receives input from your keyboard and disk drive, and usually sends
output to your screen. It can also receive input from a mouse, or send output
to a printer. Some devices, such as disk drives, perform both input and output.
Device Names
Device names are special names given to each device that your computer
«knows» about. An example of a device name is LPT1, which stands for the first
parallel lineprinter connected to your computer. When you add a new device,
such as a mouse, to your computer, you sometimes need to tell MS-DOS about
it by setting up (configuring) your computer for that device.
215
ASSIGNMENT TO TEXT 5
216
V. Pick out the right definition:
1. Operating system
a) allows to communicate with computer and other devices;
b) a table of contents for the disk;
c) is a disk copy command.
2. Device
a) a disk drive;
b) a collection of related information;
c) a piece of hardware.
3. Programme
a) a place where information is stored;
b) instructions written in computer language;
c) devices to perform commands.
4. File
a) software;
b) error message;
c) collection of related information.
5. Volume label
a) internal name of disk;
b) device name;
c) filename.
217
2. Where is information stored?
a) In the programme.
b) In the disk drive.
c) In the memory.
3. What devices can serve as input?
a) A printer.
b) A mouse.
c) A screen.
IX. Translate:
1. The programmes in this operating system allow you communicate with
your computer, your disk drives and your printer, letting you use these
resources to your advantage.
2. MS-DOS also helps you to manage programs and data.
3. Filename extensions consist of a period followed by one, two, or three
characters.
4. Floppy disk drives are commonly referred to as the A drive and the В
drive.
5. If you or your computer makes a mistake when using a device or MS-
DOS command, MS-DOS displays an appropriate error message.
218
X. Translate:
1. Примером может служить устройство под названием LPT1, которое
расшифровывается как построчный принтер.
2. Некоторые программы и файлы используют больший объем памя-
ти, в зависимости от их размера и сложности.
3. Когда вы печатаете команды MS-D
The Internet
The Internet is a magnificent global network with millions and millions
of computers and people connected to one another where each day people
worldwide exchange an immeasurable amount of information, electronic mail,
news, resources and, more important, ideas. It has grown at a surprising rate.
Almost everyone has heard about it and an increasing number of people use it
regularly. The current estimate is that over 70 million people are connected, in
some way, to the Internet – whether they know it or not.
With a few touches at a keyboard a person can get access to materials in
almost everywhere. One can have access to full-text newspapers, magazines,
journals, reference works, and even books. The Web is one of the best resources
for up-to-date information. It is a hypertext-based system by which you can
navigate through the Internet. Hypertext is the text that contains links to other
documents. A special program known as «browser» can help you find news,
pictures, virtual museums, electronic magazines, etc. and print Web pages.
You can also click on keywords or buttons that take you to other pages or
other Web sites. This is possible because 41 browsers understand hypertext
markup language or code, a set of commands to indicate how a Web page is
formatted and displayed. Internet Video conferencing programmes enable
users to talk to and see each other, exchange textual and graphical information,
and collaborate. Internet TV sets allow you to surf the Web and have e-mail
while you are watching TV, or vice versa. Imagine watching a film on TV and
simultaneously accessing a Web site where you get information on the actors of
the film.
The next generation of Internet-enabled televisions will incorporate a
smart-card for home shopping, banking and other interactive services. Internet-
enabled TV means a TV set used as an Internet device. The Internet is a
good example of a wide area network (WAN). For long-distance or worldwide
communications computers are usually connected into a wide area network to
form a single integrated network. Networks can be linked together by telephone
lines or fibre-optic cables. Modern telecommunication systems use fibre-optic
cables because they offer considerable advantages.
219
The cables require little physical space, they are safe as they don't carry
electricity, and they avoid electromagnetic interference. Networks on different
continents can also be connected via satellites. Computers are connected by
means of a modem to ordinary telephone lines or fibre-optic cables, which are
linked to a dish aerial. Communication satellites receive and send signals on a
transcontinental scale.
ASSIGNMENT TO TEXT
220
language wide area................... information
to get ….................................... via
hypertext .................................. communications
to navigate . .............................. interference
up-to-date.................................. network
to get.......................................... aerial
IX. Translate:
1. The Internet is a magnificent global network with millions and millions
of computers and people connected to one another where each day people
worldwide exchange an immeasurable amount of information, electronic
mail, news, resources and, more important, ideas. 2. Hypertext is the text that
contains links to other documents. 3. Internet Video conferencing programs
enable users to talk to and see each other, exchange textual and graphical
information, and collaborate. 4. The next generation of Internet-enabled
televisions will incorporate a smart-card for home shopping, banking and other
interactive services. 5. Computers are connected by means of a modem to
ordinary telephone lines or fibre-optic cables, which are linked to a dish aerial.
221
X. Translate:
1. Почти все о нем слышали и им пользуется все большее число людей.
2. Сеть является одним из лучших источников информации. 3. Сеть осно-
вана на системе гипертекстов, при помощи которой можно перемещаться
по сети. 4. Интернет представляет собой отличный пример глобальной
сети. 5. Компьютеры соединены при помощи модема с телефонными про-
водами или оптико-волоконными кабелями, которые в свою очередь под-
ключены к параболическим антеннам.
222
ВАРИАНТЫ ЗАДАНИЙ ДЛЯ СРС
1 вариант
223
2. An inter-connected environment in which all the participants in
dispersed locations can access and interact with each other just as inside a
single entity.
1. CAD (Computer Aided Design)
2. rar (Roshal ARchive)
3. collaborative workspace
4. remote desktop software
3. Application software dedicated to producing information, such as
documents, presentations, worksheets, databases, charts, graphs, digital
paintings, electronic music and digital video.
1. screen sharing software
2. productivity software
3. compression software
4. graphic design software
4. A file extension and commonly used method of lossy compression for
digital images, particularly for those images produced by digital photography.
1. bmp
2. msi
3. app
4. jpg
5. A document file format used for presentation software files.
1. xls/xlsx
2. ppt/pptx
3. txt
4. pdf (Portable Document Format)
5 вопросов «верно-неверно»
1. A collection of bundled productivity software intended to be used by
knowledge workers. → software firewall
Верно Неверно
2. A file extension used to indicate Flash Video files. → flv
Верно Неверно
3. Productivity software used to perform the organization, analysis and
storage of data in tabular form. → presentation software
Верно Неверно
4. Productivity software used to run a personal computer's desktop
environment remotely on one system while being displayed on a separate client
device. → remote desktop software
Верно Неверно
5. A file extension used to indicate a Microsoft Windows Installer (software
installation) file. → dmg
Верно Неверно
224
Вариант 2
225
3. A series of Unix-based graphical interface operating systems developed
and marketed by Apple Inc. designed to run on Mac computers.
1. cross-platform
2. multitasking
3. paging
4. OS X
4. A memory management technique that is implemented using both
hardware and software that maps memory addresses used by a program, called
virtual addresses, into physical addresses in computer memory.
1. package manager
2. protected mode
3. virtual memory
4. paging
5. A proprietary mobile operating system developed by BlackBerry Ltd for
its BlackBerry line of smartphone handheld devices.
1. mobile operating system
2. embedded system
3. legacy system
4. Blackberry OS
5 вопросов «верно-неверно»
1. A memory management scheme by which a computer stores and
retrieves data from the secondary storage for use in main memory. → virtual
memory
Верно Неверно
2. Computer software with its source code made available with a license in
which the copyright holder provides the rights to study, change and distribute
the software to anyone and for any purpose. → Chrome OS
Верно Неверно
3. Computer software licensed under exclusive legal right of the copyright
holder with the intent that the licensee is given the right to use the software only
under certain conditions, and restricted from other uses, such as modification,
sharing, studying, redistribution, or reverse engineering. → proprietary
software
Верно Неверно
4. An operating system component that manages input/output requests from
software, and translates them into data processing instructions for the central
processing unit and other electronic components of a computer. → kernel
Верно Неверно
5. Provides an interface between the user and the system, coordinates
hardware components, provides an environment for software applications to
226
function, monitors system health and functionality, and provides a file structure
for data management. → operating system
Верно Неверно
Вариант 3
227
1. NIC
2. byte
3. bit
4. SATA
3. Converts general purpose electric current from the mains to direct
current for the other components of the computer.
1. IDE
2. BIOS
3. solid state drive
4. PSU
4. A unit of digital information in computing and telecommunications that
consists of eight bits, permitting the values 0 through 255 and used to encode a
single character of text.
1. PCIe
2. TB
3. byte
4. Hertz
5. A device that modulates signals to encode digital information and demo-
dulates signals to decode the transmitted information, used with phone line and
cable connections.
1. modem
2. OEM
3. UEFI
4. DDR RAM
5 вопросов «верно-неверно»
1. The primary circuit board within a personal computer. → video card
Верно Неверно
2. A series of personal computers manufactured by Apple Inc. and running
the OS X operating system. → MHz
Верно Неверно
3. A passive heat exchanger. → computer fan
Верно Неверно
4. A class of memory integrated circuits used in computers that makes
higher transfer rates possible by more strict control of the timing of the
electrical data and clock signals. → DDR RAM
Верно Неверно
5. A computer bus interface that connects host bus adapters to mass
storage devices such as hard disk drives and optical drives, which replaced IDE
/Parallel ATA. → SATA
Верно Неверно
228
Вариант 4
229
5 вопросов с выбором ответа
1. An anti-malware program developed by Microsoft and included in
Windows Vista and later operating systems.
1. portable application
2. screen resolution
3. Windows Defender
4. display resolution
2. A service offered by Microsoft that provides updates for Windows
components.
1. product activation
2. Microsoft Update
3. Windows Update
4. Control Panel
3. Software that becomes perceptibly slower, use more memory / disk space
or processing power, or have higher hardware requirements than the previous
version whilst making only dubious user-perceptible improvements.
1. clean installation
2. silent installation
3. bloatware
4. Kickstart
4. A part of the Microsoft Windows graphical user interface which allows
users to view and manipulate basic system settings and controls via applets.
1. localization
2. accessibility
3. Control Panel
4. software license
5. A means of adapting computer software to different languages, regional
differences and technical requirements of a target market.
1. software license
2. localization
3. accessibility
4. automatic updates
5 вопросов «верно-неверно»
1. A feature in Microsoft Windows that allows the user to revert their
computer's state (including system files, installed applications, Windows
Registry, and system settings) to that of a previous point in time, which can
be used to recover from system malfunctions or other problems. → System
Preferences
Верно Неверно
2. Another name for display resolution. → System Preferences
Верно Неверно
230
3. An installation method used primarily by Red Hat Enterprise Linux
to automatically perform unattended operating system installation and con-
figuration. → Kickstart
Верно Неверно
4. A replacement of hardware, software or firmware with a newer or better
version, in order to bring the system up to date or to improve its characteristics.
→ upgrade
Верно Неверно
5. A configuration that allows an operating system or application to auto-
matically download and install system updates. → automated installation
Верно Неверно
Ответы варианту 1
231
2. tiff (Tagged Image File Format)
ОТВЕТ
C. A file format for storing raster graphics images, popular among
graphic artists and the publishing industry, the specification of
which is controlled by Adobe Systems.
3. pdf (Portable Document Format)
ОТВЕТ
D. A document file format used to present documents in a manner
independent of application software, hardware, and operating systems.
4. gif (Graphics Interchange Format)
ОТВЕТ
B. A bitmap image format that was introduced by CompuServe.
5. Microsoft Office Compatibility Pack
ОТВЕТ
A. A set of add-ins that allow Microsoft Office 2000, XP, and 2003 to
open, edit, and save files using the file format of Office 2007 and
later versions of Word, Excel, and PowerPoint.
5 вопросов с выбором ответа
1. A file extension used for MPEG-1 or MPEG-2 audio and video
compression files.
1. mpg
2. An inter-connected environment in which all the participants in
dispersed locations can access and interact with each other just as inside a
single entity.
1. collaborative workspace
3. Application software dedicated to producing information, such as
documents, presentations, worksheets, databases, charts, graphs, digital
paintings, electronic music and digital video.
1. productivity software
4. A file extension and commonly used method of lossy compression for
digital images, particularly for those images produced by digital photography.
1. jpg
5. A document file format used for presentation software files.
1. ppt/pptx
5 вопросов «верно-неверно»
1. A collection of bundled productivity software intended to be used by
knowledge workers. → software firewall
ОТВЕТ
Правильный ответ: → office suite
232
2. A file extension used to indicate Flash Video files. → flv
ОТВЕТ
Верно
3. Productivity software used to perform the organization, analysis and
storage of data in tabular form. → presentation software
ОТВЕТ
Неверно
Правильный ответ: → spreadsheet software
4. Productivity software used to run a personal computer's desktop
environment remotely on one system while being displayed on a separate client
device. → remote desktop software
ОТВЕТ
Верно
5. A file extension used to indicate a Microsoft Windows Installer (software
installation) file. → dmg
ОТВЕТ
Неверно
Правильный ответ: → msi
Ответы к варианту 2
233
5. A Unix-like computer operating system assembled under the model of
free and open-source software development and distribution.
ОТВЕТ
Linux
5 вопросов для подбора
1. mobile operating systems
ОТВЕТ
D. Android, iOS, Windows Phone, and Blackberry.
2. Linux distributions
ОТВЕТ
A. Red Hat, Debian, Ubuntu, Linux Mint, and Google's Android.
3. computer operating systems
ОТВЕТ
C. Windows, OS X, Linux, and Chrome OS.
4. based on Unix
ОТВЕТ
E. OS X, Linux, Android, Chrome OS and iOS.
5. device driver
ОТВЕТ
B. A computer program that operates or controls a particular type of
device that is attached to a computer.
5 вопросов с выбором ответа
1. A type of interface that allows users to interact with electronic devices
through graphical icons and visual indicators such as secondary notation, as
opposed to text-based interfaces, typed command labels or text navigation.
1. GUI (graphical user interface)
2. An operating system that operates a smartphone, tablet, PDA, or other
mobile device.
1. mobile operating system
3. A series of Unix-based graphical interface operating systems developed
and marketed by Apple Inc. designed to run on Mac computers.
1. OS X
4. A memory management technique that is implemented using both
hardware and software that maps memory addresses used by a program, called
virtual addresses, into physical addresses in computer memory.
1. virtual memory
5. A proprietary mobile operating system developed by BlackBerry Ltd for
its BlackBerry line of smartphone handheld devices.
1. Blackberry OS
234
5 вопросов «верно-неверно»
1. A memory management scheme by which a computer stores and
retrieves data from the secondary storage for use in main memory. → virtual
memory
ОТВЕТ
Неверно
Правильный ответ: → paging
2. Computer software with its source code made available with a license in
which the copyright holder provides the rights to study, change and distribute
the software to anyone and for any purpose. → Chrome OS
ОТВЕТ
Неверно
Правильный ответ: → open-source software
3. Computer software licensed under exclusive legal right of the copyright
holder with the intent that the licensee is given the right to use the software only
under certain conditions, and restricted from other uses, such as modification,
sharing, studying, redistribution, or reverse engineering. → proprietary
software
ОТВЕТ
Верно
4. An operating system component that manages input/output requests from
software, and translates them into data processing instructions for the central
processing unit and other electronic components of a computer. → kernel
ОТВЕТ
Верно
5. Provides an interface between the user and the system, coordinates
hardware components, provides an environment for software applications to
function, monitors system health and functionality, and provides a file structure
for data management. → operating system
ОТВЕТ
Верно
Ответы к варианту 3
235
2. A fast storage area that is directly accessible by the CPU, and is used to
store the currently executing program and immediately needed data.
ОТВЕТ
main memory
3. Data storage device using integrated circuit assemblies as memory to
store data persistently.
ОТВЕТ
solid state drive
4. A unit of digital information equal to 10^6 (1 million) bits.
ОТВЕТ
Mb
5. Data storage device used for storing and retrieving digital information
using rapidly rotating platters coated with magnetic material.
ОТВЕТ
hard disk drive
5 вопросов для подбора
1. MHz
ОТВЕТ
D. A unit of frequency defined as 10^6 (1 million) cycles per second.
2. GHz
ОТВЕТ
E. A unit of frequency defined as 10^9 (1 billion) cycles per second.
3. NIC
ОТВЕТ
C. A computer hardware component that connects a computer to a
computer network.
4. PC
ОТВЕТ
B. A personal computer running Microsoft Windows, used in contrast
with Mac.
5. CPU
ОТВЕТ
A. The part of a computer which executes software program
instructions.
5 вопросов с выбором ответа
1. A device inside or attached to a computer case used for active cooling.
1. computer fan
2. The basic unit of information in computing and digital communications
which can have only one of two values, most commonly represented as either a
0 or 1.
1. bit
236
3. Converts general purpose electric current from the mains to direct
current for the other components of the computer.
1. PSU
4. A unit of digital information in computing and telecommunications that
consists of eight bits, permitting the values 0 through 255 and used to encode a
single character of text.
1. byte
5. A device that modulates signals to encode digital information and
demodulates signals to decode the transmitted information, used with phone
line and cable connections.
1. modem
5 вопросов «верно-неверно»
1. The primary circuit board within a personal computer. → video card
ОТВЕТ
Неверно
Правильный ответ: → motherboard
2. A series of personal computers manufactured by Apple Inc. and running
the OS X operating system. → MHz
ОТВЕТ
Неверно
Правильный ответ: → Mac
3. A passive heat exchanger. → computer fan
ОТВЕТ
Неверно
Правильный ответ: → heat sink
4. A class of memory integrated circuits used in computers that makes
higher transfer rates possible by more strict control of the timing of the
electrical data and clock signals. → DDR RAM
ОТВЕТ
Верно
5. A computer bus interface that connects host bus adapters to mass
storage devices such as hard disk drives and optical drives, which replaced IDE
/ Parallel ATA. → SATA
ОТВЕТ
Верно
Ответы к варианту 4
237
customer situation, undergo less regression testing, and have more
limited distribution than patches.
ОТВЕТ
hotfix
2. Making sure that necessary system requirements are met
Checking for existing versions of the software
Creating or updating program files and folders
Adding configuration data
Making the software accessible to the user
Configuring components that run automatically
Performing product activation,
Updating the software versions
ОТВЕТ
common operations performed during software installation
3. Usually involves more than just erasing the program folder.
ОТВЕТ
uninstallation
4. A legal instrument (usually by way of contract law, with or without
printed material) governing the use or redistribution of software.
ОТВЕТ
software license
5. Refers to the process of loading the basic software into the memory of
a computer after power-on or general reset, especially the operating system
which will then take care of loading other software as needed.
ОТВЕТ
booting (bootstrapping)
5 вопросов для подбора
1. EULA (End User License Agreement)
ОТВЕТ
C. A license agreement for proprietary software that provides a contract
between the licensor and purchaser, establishing the purchaser's
right to use the software.
2. copyleft
ОТВЕТ
D. The practice of using copyright law to offer the right to distribute
copies and modified versions of a work and requiring that the same
rights be preserved in modified versions of the work.
3. control panel
ОТВЕТ
E. A system utility that give the user control over hardware and soft-
ware settings.
238
4. patch
ОТВЕТ
B. A piece of software designed to update a computer program or its
supporting data, to fix or improve it.
5. portable application
ОТВЕТ
A. A program designed to run on a compatible computer without being
installed in a way that modifies the computer's configuration infor-
mation.
5 вопросов с выбором ответа
1. An anti-malware program developed by Microsoft and included in
Windows Vista and later operating systems.
1. Windows Defender
2. A service offered by Microsoft that provides updates for Windows
components.
1. Windows Update
3. Software that becomes perceptibly slower, use more memory / disk space
or processing power, or have higher hardware requirements than the previous
version whilst making only dubious user-perceptible improvements.
1. bloatware
4. A part of the Microsoft Windows graphical user interface which allows
users to view and manipulate basic system settings and controls via applets.
1. Control Panel
5. A means of adapting computer software to different languages, regional
differences and technical requirements of a target market.
1. localization
5 вопросов «верно-неверно»
1. A feature in Microsoft Windows that allows the user to revert their
computer's state (including system files, installed applications, Windows
Registry, and system settings) to that of a previous point in time, which can
be used to recover from system malfunctions or other problems. → System
Preferences
ОТВЕТ
Правильный ответ: → System Restore
2. Another name for display resolution. → System Preferences
ОТВЕТ
Неверно
Правильный ответ: → screen resolution
3. An installation method used primarily by Red Hat Enterprise Linux
to automatically perform unattended operating system installation and
configuration. → Kickstart
239
ОТВЕТ
Верно
4. A replacement of hardware, software or firmware with a newer or better
version, in order to bring the system up to date or to improve its characteristics.
→ upgrade
ОТВЕТ
Верно
5. A configuration that allows an operating system or application to
automatically download and install system updates. → automated installation
ОТВЕТ
Неверно
Правильный ответ: → automatic updates
240
ПРИЛОЖЕНИЕ
При обучении важным инструментом для проверки знаний выступает
тест. Мощным инструментом для создания тестов можно назвать про-
грамму iSpring Suite.
Причем все материалы, которые созданы с помощью iSpring удобно
использовать не только с компьютеров, но и с телефонов, планшетов на
любой платформе: Android, iOS, и Windows Phone. iSpring Suite – работа-
ющий в интерфейсе Microsoft PowerPoint конструктор презентаций и кур-
сов, используемых в электронном обучении. iSpring Suite интегрирован в
PowerPoint и помогает быстро преобразовать презентацию в электронный
обучающий курс с тестами, тренажерами и другими интерактивными
модулями.
В iSpring Suite можно создавать до 14 различных типов тестов, а также
создавать уникальный дизайн для каждого задания, добавлять озвучива-
ние к текстам, вставлять изображения и фотографии в тесты.
Для того чтобы создать набор тестов, нужно выполнить определенные
шаги. На первом этапе следует определить тип тестовых вопросов.
В iSpring Suite при составлении тестовых заданий обычно используют
варианты из 11 оценочных вопросов, например, самый простой вари-
ант теста, когда нужно только определить истинность ответа. Обычно
используются два переключателя Верно/Неверно.
Также имеется вариант, когда пользователю нужно выбрать один пра-
вильный вариант ответа из множества предложенных ответов, как на
рисунке 1. На рисунке представлен пример из разработанного авторами
тестового комплекса.
241
Рисунок 1. Выбор одного ответа (продолжение)
242
Имеется в iSpring Suite также тип теста, предполагающий краткий
письменный ответ, то есть списка предполагаемых ответов нет, нужно
ввести свой ответ в текстовое поле. Данный вид теста представлен на
рисунке 3.
243
Интересный вариант теста – это перетаскивание слов. То есть поль-
зователю нужно вставить правильные слова из некоторого банка слов и
заменить пропуски словами
Заполнить пропуски – следует заполнить некоторые пропуски, кото-
рые встречаются в тексте. Этот вид теста похож на «Вложенные ответы»
и «Банк слов». Подобный тип вопросов подойдет, если требуется прове-
рить насколько хорошо студент знает определенное правило.
Тип теста «Соответствие» предполагает соединение пары слов или
фраз.
Оптимальное задание по данному виду теста содержит от 4 до 10
определенных условий. Соответствия следует проводить между: опреде-
ленными понятиями и некоторыми определениями, текстом и изображе-
нием к нему, списком авторов и его цитатами, какими-либо датами и их
событиями, например как на рисунке 5.
244
Рисунок 6. Форма сообщений от системы о правильном ответе
245
ПРИМЕРЫ ТЕСТОВЫХ ВОПРОСОВ
246
247
248
ЛИТЕРАТУРА
1. Pyatibratov А.P., Gudyno L.P., Kirichenko А.А. Computer systems, networks
and telecommunications. – М., «Finance and statistics», 2019.
2. Eric H. Glendinning. Information technology: A Student‘s Book/ Eric H.
3. Glendinning, John McEwan. Oxford N.Y.: Oxford University Press., 2012.
4. Simonovic SV et al. Science. Basic course: textbook for higher technical
educational institutions. – SPb.: Peter, 2017. – 639. 1. Simonovic SV et al.
Science. Basic course:
5. Textbook for higher technical educational institutions. – SPb .: Peter, 2017. –
639.
6. Deitel HM, Deitel PJ., Chofnes DR OS. Part 1: Fundamentals and Principles.
– M .: BinomPress, 2018. – 677.
7. Yarochkin VI Information security: Textbook for universities. – M.: Acad.
Project 2008 – 544.
8. Shangin VF Information security of computer systems and networks:
Textbook. – M.: ID FORUM, SIC INFRA-M, 2013 – 416.
9. Informatics / Ed. NV Makarova. M.: Finance and Statistics 199.
10. Olifer VG, Olifer NA Networks. Principles, technologies, protocols. – SPb.:
Peter, 2018.
11. Simon, FAT32 file system for Windows 95 // PC Magazine. 2016, April 8.
P. – 279.
249
К.П.АМАН, А.А.МУСИНА
ISBN 978-601-7991-22-7
Издательство «Бастау».
Гос. лицензия № 0000036
Министерства образования и науки РК.
Сертификат Национальной государственной
книжной палаты РК №155 о присвоении
международного регистрационного кода 978-601-281.
Национальный сертификат «Лидер отрасли-2018»
Национального бизнес-рейтинга Республики Казахстан.
г. Алматы, пр. Сейфуллина, 458/460-95.
Тел.: 279 49 53, 279 97 32.
Отпечатано в типографии
«Полиграфсервис» (тел.: 233 32 53).
г. Алматы, ул. Зеленая, 13а.