0% found this document useful (0 votes)
113 views

Lectures 1-15

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
113 views

Lectures 1-15

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 120

CONTENT

Introduction……………………………………………………………………4
Lecture №1. An ICT role in key sectors of development of society.
Standards in the field of ICT.............................................................................5
Lecture №2. Introduction to computer systems.
Architecture of computer systems....................................................................10
Lecture №3. Software. Operating systems…………………………...………19
Lecture №4. Human-computer interaction………………………………..…24
Lecture №5. Database systems………………………………………………34
Lecture №6. Data analysis. Data management…………………………...…41
Lecture №7. Networks and telecommunications………………………….…52
Lecture №8. Cybersafety………………………………………………….....69
Lecture №9. Internet technologies…………………………………………...77
Lecture №10. Cloud and mobile technologies…………………………….…85
Lecture №11. Multimedia technologies…….……………………………..…92
Lecture №12. Technology Smart……………………………………………100
Lecture №13. E-technologies. Electronic business. Electronic training.
Electronic government………………………………………………….....…107
Lecture №14. Information technologies in the professional sphere.
Industrial ICT.................................................................................................. 115
Lecture №15. Prospects of development of ICT……………………………..121
References…………………………………………………………………….128

1
Introduction
The purpose of studying this discipline - to train students and other categories of
students is using of modern computer information technology as a tool which solves
scientific and practical problems in their subject area at a high professional level, as well
as to participate in the development and implementation of these technologies in the
framework of corporate information systems level setting objectives and monitoring of
the decision that is so necessary for the modern manager.
As a result the course of discipline students must:
• be aware the technical support of modern information technology, especially its
organization and operation, its prospects for development;
• familiar with the mathematical, software, organizational and other kinds of
computer software in-information technologies;
• gain an understanding the development of computer information technology in
their subject area;
• learn to use modern means of computer technologies in solving problems in their
subject area;
• be able to navigate and search information on the INTERNET;
• be able to work with the electronic services and INTERNET network services.
Collection of lectures include learning of such packets as MS Office, SQL and etc.
The usage of the methodical instructions allows you to consider the main possibilities of
the most popular programs on operation with computer programms.
Collection of lectures contains 15 lectures on discipline «Information and
telecommunication technology».
Collection of lectures on discipline «Information and telecommunication
technology» for students of all specialty and also can be useful for students of all other
specialties of different forms of study at learning this discipline.
Practical skills and abilities received after learning of the course on discipline
«Information and telecommunication technology» for students of all specialty are
necessary for the further mastering of following disciplines: Web technologies,
Marketing information systems, Media technologies and application programs in
advertizing.

2
Lecture №1. An ICT role in key sectors of development of society. Standards in
the field of ICT.
Purpose: To prepare students using of modern computer information technology.
Plan:
1.Definition of ICT. Subject ICT and its purposes. An ICT role in key sectors of
development of society.
2.Standards in the field of ICT. Communication between ICT and achievement of
the objectives of a sustainable development in the Millennium Declaration.

1.Definition of ICT. Subject ICT and its purposes. An ICT role in key sectors of
development of society.
Under the information and communication technologies is offered to understand the
complex objects, actions, and rules relating to the preparation, processing and delivery of
information at the personal, mass communication and production, as well as all
technologies and sectors, providing integrated these processes.
Information and communication technologies (ICT) - a set of methods, workflows
and software and hardware tools that are integrated with the aim of collecting,
processing, storage, distribution, display and use of information for the benefit of its
members
To date, the concept of IT includes microelectronics, development and production of
computers and software, connection and telephony, mobile services, providing Internet
access, providing information resources of the Internet, as well as a variety of cultural
phenomena associated with these areas of activity and rules (both formal and informal)
that govern these areas of activity.
ICT Tools
By means of modern information and communication technologies to understand
the software, firmware and hardware, as well as devices that operate on the basis of a
microprocessor, computer technology, as well as modern facilities and broadcast of
information systems, information exchange, ensuring operation for the collection, the
production, accumulation, storage, processing, communication and access to information
resources of computer networks (including global).
By means of modern information and communication technologies include
computers, PC, terminal equipment kits for computers of all classes, local area networks,
the input-output device information input means and manipulation of text and graphic
information, means of archiving large volumes of information, and other peripheral
equipment modern COMPUTER; means for converting data from the graphics or audio
data to digital representation and vice versa; tools and devices to manipulate audiovisual
information (on the basis of technology and Multimedia "Virtual Reality"); artificial
intelligence system; computer graphics system, programming systems (programming
languages, compilers, compilers, operating systems, software packages, etc..), modern
means of communication, providing information user interaction both at the local level
(for example, within a single organization or multiple organizations) and global (as part
of the global information environment).
3
The concept of information technology
Under the information technology to understand the totality of methods, production,
software and technological tools combined in the processing chain, ensuring the
collection, storage, processing, output and dissemination of information. Information
technologies are designed to reduce the complexity of the processes of information
resources.
Computer information technologies involve the use of computer and network
technologies for implementing a wide range of tasks:
The components (structure) of information technology
Information - a collection of information about the properties of an object or
process to digest the subject in the form of knowledge.
All the information which is used by people, can be divided into the following
types:
mathematical - is any information related to numbers and formulas, it can be not
only a mathematical, but physical and statistical information. Mathematical information
can be processed by a variety of computing machines and devices and stored on paper in
the form of books and records.
text - that information can be recorded on paper by hand or using a typewriter and
printing equipment and stored on paper (manuscripts, documents, books, newspapers,
etc.).
graphics - this information can be processed by a variety of means and methods
of Fine (fine arts, photography) and stored in the form of paintings, drawings, sculptures,
photo cards, etc .;
Sound - this information can be processed by means of a tape recording and
stored on magnetic tapes, records and audio CDs .;
video information - this information can be processed by means of film and video
and stored on film and videotape .
All these types of information have existed before the advent of the computer.
Modern personal computer allowed to handle these types of information and greatly
facilitated their joint use.
Information - a set of physical processes signals perceived by the subject through
his sense organs.
Data - data obtained by measuring, monitoring, logical or arithmetic operations
presented in a form suitable for storage, transmission and processing.
Information processes. The concept of information is inseparable from the concept
of information processes. For information processes include:
• transmission of information;
• receiving the information;
• data storage;
• processing of information and its presentation for use;
• use of information.

4
Technical means - it is a personal computer, office equipment, communication lines,
network equipment.
The software is directly dependent on the technical and information support and
realizes the functions of storage, processing, analysis, storage, interface with the
computer.
Information support - a set of data presented in some form for computer processing.
Organizational and methodological support is a complex of measures aimed at the
functioning of the computer and software to obtain the desired result.
There is another approach to dealing with automated IT structure, according to
which any IT can be divided into three interdependent and equally important components
that make up its core:
Hardware (Hardware);
software (Software);
algorithmic (intelligent) software (Brainware).

Data processing
All information supplied to the computer, or encoded digitized, i.e. all
characteristics data assigned to the number. Thus, the computer operates with no sound,
or video image, and a series of numbers. And it does not process sound or video, and the
number. After the treatment, the number again converted into sound or video and we hear
the music and see the cartoon on the computer screen.
To simplify the technical recording and processing information using the binary
system. If you are using ten digits in the usual decimal notation to record all the numbers
- 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, only two digits used in the binary system - 0 and 1, and all
numbers are written with a combination of zeros and ones:
decimal system binary system
0 0
1 1
2 10
3 11
4 100
5 101
6 110
7 111
8 1000
9 1001
10 1010
100 1100100
1000 1111101000
5
Table1- Data processing

Any sort of information is called the volume of information.


The unit of information is called a bit. The computer memory cell of 1 bit can be
stored for 1 or 0.
8 bits make up one byte.
There are multiple byte units:
Kilobyte (KB ). 1 KB = 1024 bytes.
Megabyte (MB). 1 MB = 1024 KB.
Gigabyte (GB). 1 GB = 1024 MB.
Terabyte (TB). 1 TB = 1024 GB.
For example, we can say that if you make the computer the text of one typewritten
page, it will have a capacity of about 2500 bytes.

2.Standards in the field of ICT. Communication between ICT and achievement of


the objectives of a sustainable development in the Millennium Declaration.
ICT-standards system - a set of normative and technical and regulatory guidance
documents, including a set of interrelated standards and other documents in the field of
standardization related to ICT, documents defining the methodology of development,
coordination, approval, modification, deployment, use and replacement, including a
methodology to assess facilities for compliance with these standards and other documents
in the field of standardization.
ICT industry - as a specific field of activity, which includes research, creation,
development, evaluation, procurement, acquisition, implementation, operation and
utilization of ICTs. It covers thus work as a developer and ICT suppliers and customers
and users of ICT, including the activities for the implementation, operation and
utilization of ICTs.
Industry Standard (IS) - standard related to processes, products and other aspects
of a particular field of activity (whether commercial or not aimed at profit). In this
document, under the industry standard it refers to a standard or other document in the
field of standardization, designed for the use of ICT. The procedure for the development
and application of established IS specialized body of public administration.
Standard - a document in the field of standardization, standardization of relevant
principles, covering categories such documents as the standard of organization, the
standard non-profit association, the industry standard or set of rules (the industry), the
national standard, international standard.
International standard - a standard adopted by an international organization.
National standard - a standard adopted by a national authority of the Republic of
Kazakhstan for Standardization.
Non-profit association Standard - a standard non-profit professional organization
(union, association, etc.), designed for wide application by different stakeholders. The
6
order of development of the standard and non-profit association established this
association and is harmonized with the state and industry standards development orders.
Organization Standard - a standard developed and approved by the organization
itself, based on the necessity of its use to improve production and quality assurance of
products, works and services, as well as for the dissemination and use of knowledge in
different fields of research results (the test), measurement and development.

Questions:
1. What is the definition of ICTand its purposes?
2. What is the ICT role in key sectors of development of society?
3.What kind of standards do you know in the field of ICT?
4. What kind of communications do you know between ICT and achievement of the
objectives of a sustainable development in the Millennium Declaration?
References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.
Resources:
1.http://www.intuit.ru/studies/courses/3735/977/lecture/14671

7
Lecture №2. Introduction to computer systems. Architecture of computer systems.
Purpose: to discuss and give a brief idea on computer hardware.
Plan:
1.Review of computer systems.
2.Evolution of computer systems.
3.Architecture and components of computer systems. Use of computer systems.
Data representation in computer systems.

1.Review of computer systems.


A computer is a general purpose device which can be programmed to carry out a
finite set of arithmetic or logical operations. Since a sequence of operations can be
readily changed, the computer can solve more than one kind of problem.

A computer is, at its most basic, a machine which can take instructions, and perform
computations based on those instructions.

A computer is an electronic device which is capable of receiving the inputs (data


from the user), storing it for a desired period of time, manipulating it according to the set
of instructions (called program) and producing the output to the user in desired form. It
performs a variety of operations in accordance to the set of instructions.
A computer is an electronic device that manipulates information, or "data". It has
the ability to store, retrieve, and process data. You can use a computer to type documents,
send email, and browse the internet. You can also use it to handle spreadsheets,
accounting, database management, presentations, games, and more.
When reading the above definitions you may find some common behaviors of
computers such as;
Since the computer is a man-made digital electronic device, it has a physical
structure with several parts like the monitor, processor, mouse, and key board which are
tangible. These are called Hardware. The sets of instructions which are also called
computer programs installed in the computer are called Software. These softwares tell
the hardware what to do and how to do to accomplish some tasks expected by the user to
get done by the computer.
One of the characteristics of a Computer is a storage.
Storage. The computer has an in-built memory where it can store a large amount of
data. This is called Primary Storage. This Primary Storage has a limited capacity but it
is very important as the processing unit of the computer can act directly only on
instructions and data on the primary storage. But, you can also store data in secondary
storage devices such as floppies, which can be kept outside your computer and can be
carried to other computers. These are called Secondary Storage. Before the computer
can process the data stored in Secondary storage devices, the data must be moved from
secondary storage device to primary storage. This is not a serious drawback. The

8
computers can retrieve information from files in a secondary storage device in a few
milliseconds.

2.Evolution of computer systems.


Different Types of Computers. Тhese computers come in many sizes and shapes
that perform different functions which is useful in our daily lives. You are using a type of
computer even when you withdraw cash from an ATM (Automatic Teller Machine) or
scan groceries at the shop, or use a calculator.

The computers can be mainly classified into four categories as briefly described
below. This classification is done based on the size and the data processing power.
• Microcomputers: most common type of computers in the society.
Can be used at your workplace, at school or on your study desk at home. Used
by single user at a time. Small in size. Also called Personal Computers (PCs).
• Minicomputers: used by multi-users. In the middle when the
computers are ranged from smallest to largest. Used in laboratories.
• Mainframes: Largest in size. Capable of handling and processing
very large amounts of data quickly.
• Super computers: Used for performing complex scientific and
numerical computations such as weather forecasting, fluid dynamics, nuclear
simulations, theoretical astrophysics.
Different Types of Personal Computers (PCs). Personal Computer (Mostly
referred to as PC in the community) is designed as a more user-friendly device to be
directly used by the end-user rather having an especially skilled separate computer
operator. It is less expensive compared to other types of computers listed above. PCs
come in different forms as listed below and we will have a description on each form of
PC separately.
It is noticeable that only few famous forms of PCs used today are listed below and
the list may be extended by adding many more in the future with the advancement of the
technologies. Desktop, Laptop, Netbook, PDAs, Wearable Computers, Tablets,
Desktop PCs. Usually the Desktop computers are placed in a fixed location and the
name has derived as it is intended to be sitting on a top of a desk. A monitor, mouse, and
a key board can be seen as parts of a typical desktop computer. These computers
consume low power and cost effective than the laptop computers that will be described
next. The spare parts are readily available and less expensive.
Laptop Computers. Laptops are similar to desktop PCs in operation, but designed
for mobile use. Capable of operating on the battery power and the battery can be charged
with the external power adaptor. An in-built keyboard, Liquid Crystal Display unit (LCD
screen), a touch pad (also known as track pad) to act as the mouse are the commonly seen
components. However, a mouse can be also used instead of the touch pad. Laptops are
obviously smaller in size and weight less than the desktop PCs. Therefore, it is difficult
to access its internal hardware thus difficult to upgrade as much as a desktop. But adding
more RAM or Hard Drive is possible (You will learn about RAM and Hard Drive in
9
next session). Built-in web camera is a common feature of a modern laptop computer and
these laptops come in different weights, sizes, performances, speeds, and a layman may
differentiate them specified by the diagonal distance of its display unit.
Netbook. Netbooks belong to the laptop family, but are inexpensive and relatively
smaller in size. Though the set of features and the capacity of netbooks were lesser
compared to regular laptops at the time of introducing them to the market, nowadays the
netbooks come in advanced features and in high capacities as similar to modern laptops.
PDAs. Personal Digital Assistants (PDAs) are handheld computers which are also
called palmtop computers due to its size which is smaller enough to keep it on your palm.
Most of the PDAs are pen-based and come with a stylus (a writing pen) to be used as the
input device which is sensitive to its touch screen. Most of them can access the Internet
by means of Bluetooth or Wi-Fi facilities. PDAs allow you to organize your personal or
business work and to manage your tasks through its facilities. It may be used as a
Cellular phone to send and receive calls, to search in the web, to download and play
audio/video files, to send/receive e-mails, to type in a text editor to jot down notes or
write a document, take pictures or record videos, etc.
Wearable Computers. The computers that can be worn on the body are known as
Wearable computers. There is a constant interaction between the computer and user.
These computers are mostly used to track human actions when the hands and other
sensory organs are engaged in other activities. And used with applications such as
behavioral modeling systems and healthcare monitoring systems.
Tablets. Tablets are mobile computers larger than PDAs and smaller than Laptops
described above. Usually operated by its touch screen and no formal key board are used.
The people using them spent most of their time outside and would not have access to a
keyboard or mouse.

3.Architecture and components of computer systems. Use of computer systems.


Data representation in computer systems.

What is Computer Hardware? You are already aware that a computer system is
made up of several different components. Those that can be seen and touched are referred
to as the Computer Hardware (or hardware). In other words, the physical equipments
that are involved in the function of the computer are called its hardware. The computer
hardware is typically divided into four main categories:Processing Devices, Memory
Devices, Input/, Output Devices, and Storage Devices.
Processing Devices.
The Central Processing Unit (CPU)
The Central Processing Unit is an electronic device which runs computer programs:
a set of sequential instructions. It is also called as the Computer Processor or the brain
of the computer. Тhere are two major components namely the Control Unit (CU) and
the Arithmetic and Logic Unit (ALU). The CU is the circuitry that controls the flow of
data through the processor, and coordinates the activities of the other units within it. In a
way, it is the "brain within the brain", as it controls what happens inside the processor,

10
which in turn controls the rest of the PC. The ALU is a digital circuit that performs
arithmetic and logical operations. The ALU is a fundamental building block of the central
processing unit of a computer, and even the simplest microprocessors contain one, for
purposes such as maintaining timers. The processors found inside modern CPUs have
very powerful and very complex ALUs; a single component may contain a number of
ALUs.
We consider the CPU as the processing device of the computer. You are aware that
the CPU contains Control Unit (CU) and an Arithmetic and Logic Unit (ALU). These
two components work together to perform the processing operations. On a PC, the CPU
usually is contained on a single chip and sometimes is called Microprocessor. In
addition to the CU and ALU, a microprocessor usually contains the registers and system
clock.
The Control Unit (CU). As you know, a computer program or set of instructions
must be stored in memory for a computer to process data. The CPU uses its CU to
execute these instructions. Further, the CU directs and coordinates most of the operations
of the computer. The speed at which the processor carries out its operations is measured
in megahertz (MHz). The higher the number of MHz the faster the computer can
process information. The Intel i7, Athlon, Celron, and Duron, Ultra Spark are some
examples for the brands of processors available in the market.
The Arithmetic and Logic Unit (ALU). ALU performs the arithmetic, comparison,
and logical operations. Arithmetic operations include addition (+), subtraction (-),
multiplication (*) and division (/). Comparison operations include comparing one data
item to another to determine if the first item is greater than (>), equal (=), or less than (<)
to the second item. Logical operations work with conditions such as AND, OR, NOT.
Memory Devices
Computer Memory. A character is stored in the computer as a group of 0s and 1s,
called a Byte. The size of the memory is measured by the number of bites available. The
following equalities give the measuring units of the memory.

8 Bits =1 Byte
1024 Bytes =1 Kilobyte (1KB)
1024KB =1 Megabyte (1MB)
1024 MB =1 Gigabyte (1 GB)
1024 GB =1 Terabyte (1 TB)
While performing a processing operation, a processor needs a place to temporarily
store instructions to be executed and the data to be used with those instructions. The data
and the instructions needed by the CPU are temporarily stored in the Memory. Therefore
the memory acts as the internal storage of a computer. The programs that are stored in
external storages are loaded into the memory before they start running.

Random Access Memory (RAM). The Random Access Memory (RAM) is a


volatile form of a computer memory. This small memory is capable of memorizing
temporarily. It can be read and written. That is, you can both write data into RAM and
11
read data from RAM. Together with the CPU, RAM determines the computer's speed. A
computer with a large RAM and a CPU can actually run faster than a computer with a
powerful CPU but with a low RAM.
Read Only Memory (ROM)
As RAM is volatile, the computers need a non-volatile memory to read larger
programs. This is known as the Read Only Memory (ROM). The programs which are
needed to start up your computer (Ex: to boot the computer) are stored in ROM.
Cache. Most of todays computers improve their processing times by using cache
(pronounced cash).
Memory cache, also called a cache store or RAM cache, helps speed the processes
of the computer by storing frequently used instructions and data thus reducing the access
time of data. When the processor needs an instruction or data, it first searches in the
cache.

Input Devices . A computer executes instructions and processes data into


information and stores the information for future use. Input devices are used to enter
instructions and data into the computer.
What is Input? Input is any data or instructions you enter to the memory of a
computer. Once input is in memory, the CPU can access it and process the input into
output. There are four types of input namely: data, programs, commands, and user
responses.
Data. Data is a collection of unorganized facts that can include words, numbers,
pictures, sounds, and videos. A computer manipulates and processes data into
information, which is useful.
Program. A program is a series of instructions that tells a computer how to
perform the tasks necessary to process data into information. Programs are kept on
storage media such as a floppy disk (not used now), hard disk, CD-ROM, or DVD-ROM.
Programs respond to commands issued by the user.
Command. A Command is an instruction given to a computer program. Commands
can be issued by typing keywords or pressing special keys on the keyboard. A keyword
is a specific word, phrase, or code that a program understands as an instruction. Some
keyboards include keys that send a command to a program when you press them. Instead
of requiring you to remember keywords or special keys, many programs allow you to
issue commands by selecting menu choices or graphical objects. For examples, programs
that are menu driven provide menus as a means of providing commands. Today, most
programs have a graphical user interface (GUI) that uses icons, buttons, and other
graphical objects to issue commands. However, GUI is the most user friendly way to
issue commands
Input Devices
An Input Device is any hardware component that allows you to enter data,
programs, commands, and user responses into a computer. Some of the commonly used
input devices are listed below.
Keyboard
12
Pointing devices
• Mouse
• Trackball
• Joystick
• Touchpad
• Light Pen
Scanners
Voice input systems
Web Cam
Bar code readers
Output Devices.
An output device is any computer component capable of conveying information to a
user. Some commonly used output devices are listed below.
Display devices
Cathode Ray Tube (CRT) monitors
Liquid Crystal Display (LCD) monitors / Flat-panel displays
LED Monitors
Gas plasma monitors
Printers
- Impact printers
- Daisy Wheel and Dot Matrix printers
Non-Impact Printers
- Ink Jet printers
- Thermal Dye Transfer printers
- Laser printers
Plotters
Audio Devices
Speakers
Headphones
Monitor. The monitor displays the output to the user visually. Therefore it is also
called the Visual Display Unit (VDU) or simply the screen. Similar to televisions, the
sizes of monitors are varying and often expressed in diagonally measured distance in
inches. The technology used with monitors is expanding rapidly and there are two major
types of monitors that differ in the technology of visualizing the output to the user. They
are Cathode Ray Tube (CRT) monitors, Liquid Crystal Display (LCD) and Light
Emitting Displays (LED).
The CRT monitor has more lines of dots per inch, higher the lines more amount of
the resolution. It creates the picture by number of rows or lines of the small tiny dots. For
an instance the resolution of 1024 x 768 will be sharper than 800 x 600 resolutions.
The LCD consists of two sheets of polarizing material with a liquid crystal solution

13
between them. When an electric current passed through the liquid crystal solution,
crystals align so that light cannot pass through them. It is like a shutter either allows light
to pass through or blocking the light.
The LED is the latest marketing innovation of display units. It looks similar to LCD
and it is also a flat panel display. LED means Light Emitting Diode and relates to the
way the display is illuminated. LED monitors still use the same Liquid Crystals as the
previous LCD displays. The way the backlight works however with the LED's will lead
to a number of improvements in the display.
Though CRT monitors are much cheaper than LCDs and LEDs, the CRTs consume
more power than others
Printer. A computer printer produces a hard copy (permanent human-readable text
and/or graphics) of documents stored in electronic form, usually on physical/tangible
print media such as paper or transparencies. Many printers are primarily used as local
computer peripherals, and are connected by a printer cable to a computer which serves as
a document source. Some printers, commonly known as network printers can serve as a
hardcopy device to be shared and used by any user among a group of users connected to
the network. Individual printers are often designed to support both local and network
connected users at the same time. There are several types of printers categorized based on
the applied technology of printing text/graphics on the paper.
Impact Printers. Any impact printer forms characters and graphics on a piece of
paper by striking a mechanism against in an ink ribbon that physically contacts the
papers. Because of the striking activity, impact printers generally are noisy.
Many impact printers do not provide letter-quality print. Letter-Quality (LQ)
output is a quality of print acceptable for business letters. Many impact printers produce
near letter-quality (NLQ)
print, which is slightly less clear than LQ. NLQ impact printers are used for jobs
that require only NLQ, such as printing of mailing labels, envelopes, or invoices.
Impact printers are also ideal for printing multipart forms because they easily can
print through many layers of paper. Finally, impact printers are used in many factories
and retail counters as they can survive in dusty environments, vibrations, and extreme
temperatures.
Plotter. Plotters are special type of printers used to print graphicaloutput on paper.
It interprets computer commands and makes line drawings on paper using
ulticolored automated pens.
Storage Devices. Storage refers to the media on which data, instructions, and
information are kept, as well as the devices that record and retrieve these items. In this
section we will discuss about the storage media and storage devices.
Memory versus Storage. It is important to understand the difference between the
memory. Memory holds data and instructions temporarily while they are being processed
by the CPU. Storage, also called Secondary, Auxiliary storage, or Mass storage, holds
items such as data, instruction, and information for future use.
Storage. Storage is non-volatile which means that items in storage remains even
when power is removed from the computer. A storage medium is the physical material

14
on which the items are kept. One commonly used storage medium is a disk, which is
round, flat piece of plastic or metal with a magnetic coating on which items can be
written. A storage device is the mechanism used to record and retrieve items to and from
a storage medium.
Storage devices can function as source of input and output. For example, each time
a storage device transfers data, instructions, and information from a storage medium into
memory (a process called Reading); it functions as an input source. When a storage
device transfers these items from memory to a storage medium (a process called
Writing), it functions as an output source.
The speed of a storage device is defined by its access time, which is the
minimum time it takes the device to locate a single item on the disk. Compared to
memory, storage devices are slow. The access time of memory devices are measured
in milliseconds.
Hard Disk. Hard Disk drive which is often referred to as Hard Disk or Hard Drive
is a device to store and retrieve data in a computer. The hard drive can store important
system files like the operating system, program files and other data. Though HDDs were
originally designed to be used with computers nowadays the applications for HDDs have
expanded beyond computers to include digital video recorders, digital audio players,
personal digital assistants, digital cameras and video game consoles. HDD is a non-
volatile storage device that stores digitally encoded data. It is an electromagnetically
charged surface or set of disks that record data in concentric circles known as tracks.
HDDs record data by magnetizing ferromagnetic material directionally, to represent
either a 0 or a 1 binary digit. They read the data back by detecting the magnetization of
the material. A typical HDD design consists of a spindle which holds one or more flat
circular disks called platters, onto which the data is recorded. The platters are made from
a non-magnetic material, usually aluminum alloy or glass, and are coated with a thin
layer of magnetic material.
Portable Hard Disks. Portable hard disk is an interesting and useful device because
you can carry data about all over the place and transfer information, programs, pictures,
etc. between computers. Modern portable hard disks have a massive capacity like
500GB.
The System Unit . Тhe System Unit of the computer is the box-like casing which
contains the major electronic components that are responsible for the main functions of
the computer. It should be mentioned here that many people use to refer to this as the
CPU incorrectly. This erroneous reference may be due to CPU: The brain of the
commuter being that significant. However, the electronic devices such as CPU, memory,
hard disk drive are located inside the System Unit. In addition to the above parts,
Motherboard, Floppy Disk Drive, Power Supply unit, and CD-ROM Drive are the
other major components that you can find within the system unit. A brief description of
each above component is given next.
Motherboard. The motherboard is sometimes called the system board, planner
board or main board. It is the main circuit board of a computer. The motherboard
contains several connectors for attaching additional boards. Usually, the motherboard
contains the CPU, BIOS, memory, mass storage interfaces, serial/parallel ports,
15
expansion slots, and all the controllers required to control standard peripheral devices,
such as the display screen, keyboard, and disk drive.All of the basic circuitry and
components required for a computer to function are onboard the motherboard or are
connected with a cable. The most important component on a motherboard is the chipset.
It often consists of two components or chips known as the Northbridge and
Southbridge, though they may also be integrated into a single component. These chips
determine, to an extent, the features and capabilities of the motherboard.
Power Supply Unit . Power Supply Unit (PSU) is another very important unit
found in the system unit. Usually we connect the power code of the computer to the
domestic mains supply. Therefore, PSU converts Alternating Current (AC) from mains
supply to Direct Current (DC) with the required different voltages needed to power
different components of the computer. Power supplies have a certain power output
specified in Watts, a standard power supply would typically be able to deliver around 350
Watts. The more components like HDD, CD/DVD drives, and cooling fans, are
connected to your computer the greater the power required fro m the power supply
CD-ROM Drive. The CD-ROM drive is a high capacity optical data storage
device with a removable disk, it writes data onto or reads data from a storage medium.
A CD-ROM drive may be connected to the computer via an IDE (ATA), SCSI, S-
ATA, Firewire, or USB interface or a proprietary interface

Questions:
1. Why does a computer need memory?
2. What is the best type of storage for my data?
3. What factors affect a computer’s screen display?
4. Are ink jet printers better than laser printers?
5. What’s the best way to add devices to a computer system?
6. How can I protect my computer system from theft and damage?

References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.

16
Lecture №3. Software. Operating systems
Purpose: to provide the basic ideas of Software to the Students, to introduce the
learner to the Windows 7 operating system and get the learner familiar to operate the
computer through the Operating system Windows 7.
Plan:
1.Software. Types of the software, purpose and characteristic. Basic concepts of OS.
2.Evolution of operating systems. Classification of operating systems, including for
mobile devices. Classification of desktop applications.

1.Software. Types of the software, purpose and characteristic. Basic concepts of


OS.

What is Software? Software, also called a computer program or simply a


program, is a series of instructions that tells the hardware of a computer what to do. For
example, some instructions direct the computer to allow you to input data from the
keyboard and store it in memory. Other instructions cause data stored in memory to be
used in calculations such as adding a series of numbers to obtain a total.
Before a computer can perform or execute a program, the instructions in the
program must be loaded into the memory of the computer. Usually, they are loaded into
memory from storage like hard disk.
When you purchase a program, you will receive one or more CD-ROMs or a single
DVD-ROM on which the software is stored. To use the software, you often need to
install the software on the computer‟s hard disk. Sometimes, a program can be loaded in
memory directly from a CD-ROM or a DVD-ROM so that you do not have to install it on
the hard disk to use it.
When you buy a computer, it usually has some software already installed in its hard
disk. Thus you can use the computer as soon as you receive it. Software is the key to
productive use of computers. With the correct software, a computer can become a
valuable tool.
System Software. System software consists of the programs that control the
operations of the computer and its devices. Functions that system software performs
include starting up the computer; opening, executing, running, applications; storing,
retrieving, and copying files; formatting disks; reducing file sizes; and backing up the
contents of a hard disk. Accordingly you can see that the System Software will handle the
smooth running of all the components of the computer as well as providing general
functionality for other programs to use, tools to speed up the computer, tools to develop
new software and programs to keep you safe from attacks.
Operating Systems (OS).The Operating System contains instructions that co-
ordinate all of the activities of hardware devices of your computer. It also contains
instructions that allow you to run any applications software. One may define the
Operating system as an interface between a user and all computer resources.
There are two main types of Operating Systems:
17
Single-user OS: A type of OS which allows only one user at a time. There can be
single-user OS either as single-user single-task or single-user multi-task. The Single-
user single-task OS has to deal with only one person at a time running only one
application at a time. MS DOS is an example for a single user single task OS.

Multi-user OS: In some situations, we need to share the single computer among
few users. So the OS should be a multi-user where more than one user is logged on to the
computer and uses it at the same time. These multi users may work with remote desktop
connections. Further, these different users may need to run different applications at the
same time. So the OS must support multi-task facility as well. Obviously the computer
should be a powerful one. Each user draws on a big power of the computer in a shared
way. This type of Multi –user multi-task OSs have to manage some tasks as listed below:

Desktop OS vs. Server OS


The OS can also be categorized as Desktop OS and Server OS depending on
whether the OS is to be installed in a desktop computer or a server. For example, the
latest versions of the Windows OS family can be categorized as follows:
Desktop OS: windows XP, windows 7, Windows 8
Server OS:
Operating Systems for your Desktop PC.

Utility Software. Utility software or utility programs are some small programs
which performs specific task, usually related to managing a computer, its devices, or its
programs. Most operating systems include several utility programs. Also, you can buy
them as stand-alone software that offer improvements over the ones supplied with the
OS. Following are some of the specific tasks done by commonly used utility programs:
Viewing files
Compressing files
Diagnosing problems
Scanning disks
Defragmenting disks
Uninstalling software
Backing up files and disks
Checking for viruses
Displaying screen savers

Application Software
Accordingly, the second major class of Software is the Application Software.
Application software consists of programs designed to perform specific tasks of users.
Application Software, also called a software application or an application, can be used
for the following purposes, among others:

18
As a productivity/business tool
To assist with graphics and multimedia projects
To support household activities, for personal business, or for education
To facilitate communications
Software Package.Based on the purposes as listed above, the application software
is three-fold namely General Purpose, Special purpose, and Bespoke. Let us look at each
type of applications software briefly.
Special Purpose Application Software.
Special Purpose Application Software is the software created for execution of a
single specific task. Some examples are Chess game, calculator, camera application in
your mobile phone which allows you only to capture and share pictures, web browsers,
media players, calendar programs.

2.Evolution of operating systems. Classification of operating systems, including


for mobile devices.

What is Windows 7? It is redesigned with Windows Shell with a new taskbar.


Windows 7 includes a number of new features, such as advances in touch and
handwriting recognition, support for virtual hard disks, improved performance on multi-
core processors, improved boot performance, Direct Access, and kernel improvements.
Versions of Windows 7.
1. Home Premium makes it easy to create a home network and share all of
your favorite photos, videos, and music.
2. Professional is a great choice for home and for business. Using Windows 7
professional, You can run many Windows XP productivity programs in Windows XP
Mode and recover data easily with automatic backups to your home or business network.
You can also connect to company networks effortlessly and more securely with Domain
Join. With all the exciting entertainment features of Windows Home Premium.
3. Ultimate is the most versatile and powerful edition of Windows 7. It
combines remarkable ease-of-use with the entertainment features of Home Premium and
the business capabilities of Professional, including the ability to run many Windows XP
productivity programs in Windows XP Mode. For added security, you can encrypt your
data with BitLocker and BitLocker-To-Go. And for extra flexibility, you can work in any
of 35 languages. Get it all with Windows 7 Ultimate.

System requirements
Windows 7 requires the following computer hardware:

32 Bit 64 Bit
A Processor of 1 GHz or faster A Processor of 1 GHz or faster 64-
32-bit bit

19
(x86) (x64)
At least 1 GB of RAM memory At least 2 GB of RAM memory
A hard disk with at least 16GB A hard disk with at least 20GB
space space
available available.
DirectX® 9 graphics processor DirectX® 9 graphics
with processor with
WDDM or higher driver WDDM or higher driver
A DVD drive from which to A DVD drive from which to
install install
Windows. Windows.
A monitor, keyboard, and A monitor, keyboard, and
mouse or mouse or
other pointing device. other pointing device.

Table 2- Windows 7 Requirements

Basic Operations in Windows7. Let us have a look at the basic operations


available with Windows 7. This knowledge will be helpful to you to make working with
your computer easy.
First, we will learn about some required fundamental skills before performing basic
operations available with your operating systems.

Log on to your computer. The process of starting a computer session is called


logging on. When you start the computer, Windows displays a Welcome screen
containing links to each of the computer's active user accounts. (If your computer is part
of a domain, you will need to press Ctrl + Alt + Delete to display the Welcome screen.)
You select your user account and, if your account is password protected, enter your
password to log on to the computer. See Table 3 below for the login interface. When
logging on to a computer which is part of a domain, you will always enter your domain
credentials.

Brief descriptions of each component are given below.

N Name Brief Description

1 Desktop Work area on which you see your programs


Let you open programs available in your
2 Start Menu computer
Let you launch and monitor running
3 Task Bar programs
20
A portion of the taskbar that provides a
4 Notification area temporary source for
notifications and status.
5 Task Buttons Currently opened programs/applications
Icons that belongs to and leads you to
6 Desktop Icons important parts of the
computer
7 Shortcut Icons Easy way to access programs
8 Windows Gadgets Popular mini-programs
Table 3: Components of Windows 7 User Interface

Questions:
1. What is Software?
2. Differentiate System software and Application software.
3. What are the responsibilities of Operating Systems?
4. Define the following with suitable examples.
Single–user OS
Multi-user OS
5. What are utility programs? Define some tasks performed by them.
6. What is meant by library programs?
7. What are program language translators? Briefly describe three translating
approaches.
8. State the advantages and disadvantages of Bespoke Application Software.

References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.
Lecture №4. Human-computer interaction.
Purpose: to work with a system, the users need to be able to control the system and
assess the state of the system.
Plan:
1. User interface as means of human-computer interaction. Usability of interfaces.

21
2. Types of interfaces: command line interface, text interface, graphic interface.
3. Physical and mental characteristics of the user. Development stages of the user
interface. Types of testing of interfaces (testing of users). Perspectives of development of
interfaces.

1.User interface as means of human-computer interaction. Usability of interfaces.


Human–computer interaction (commonly referred to as HCI) researches the
design and use of computer technology, focused on the interfaces between people (users)
and computers. Researchers in the field of HCI both observe the ways in which humans
interact with computers and design technologies that let humans interact with computers
in novel ways.
Humans interact with computers in many ways; and the interface between humans
and the computers they use is crucial to facilitating this interaction. Desktop applications,
internet browsers, handheld computers, and computer kiosks make use of the prevalent
graphical user interfaces (GUI) of today. Voice user interfaces (VUI) are used for speech
recognition and synthesising systems, and the emerging multi-modal and gestalt User
Interfaces (GUI) allow humans to engage with embodied character agents in a way that
cannot be achieved with other interface paradigms. The growth in human-computer
interaction field has been in quality of interaction, and in different branching in its
history. Instead of designing regular interfaces, the different research branches have had
different focus on the concepts of multimodality rather than unimodality, intelligent
adaptive interfaces rather than command/action based ones, and finally active rather than
passive interfaces
The Association for Computing Machinery (ACM) defines human-computer
interaction as "a discipline concerned with the design, evaluation and implementation of
interactive computing systems for human use and with the study of major phenomena
surrounding them". An important facet of HCI is the securing of user satisfaction (or
simply End User Computing Satisfaction). "Because human–computer interaction studies
a human and a machine in communication, it draws from supporting knowledge on both
the machine and the human side. On the machine side, techniques in computer graphics,
operating systems, programming languages, and development environments are relevant.
On the human side, communication theory, graphic and industrial design disciplines,
linguistics, social sciences, cognitive psychology, social psychology, and human factors
such as computer user satisfaction are relevant. And, of course, engineering and design
methods are relevant."Due to the multidisciplinary nature of HCI, people with different
backgrounds contribute to its success. HCI is also sometimes termed human–machine
interaction (HMI), man–machine interaction (MMI) or computer–human interaction
(CHI).
Poorly designed human-machine interfaces can lead to many unexpected problems.
A classic example of this is the Three Mile Island accident, a nuclear meltdown accident,
where investigations concluded that the design of the human–machine interface was at
least partly responsible for the disaster. Similarly, accidents in aviation have resulted
from manufacturers' decisions to use non-standard flight instrument or throttle quadrant
layouts: even though the new designs were proposed to be superior in basic human–
22
machine interaction, pilots had already ingrained the "standard" layout and thus the
conceptually good idea actually had undesirable results.
Human–computer interaction studies the ways in which humans make, or don't
make, use of computational artifacts, systems and infrastructures. In doing so, much of
the research in the field seeks to improve human-computer interaction by improving the
usability of computer interfaces. How usability is to be precisely understood, how it
relates to other social and cultural values and when it is, and when it may not be a
desirable property of computer interfaces is increasingly debated.
The human–computer interface can be described as the point of communication
between the human user and the computer. The flow of information between the human
and computer is defined as the loop of interaction. The loop of interaction has several
aspects to it, including:
 Visual Based :The visual based human computer inter-action is probably the most
widespread area in HCI research.
 Audio Based : The audio based interaction between a computer and a human is
another important area of in HCI systems. This area deals with information acquired by
different audio signals.
 Task environment: The conditions and goals set upon the user.
 Machine environment: The environment that the computer is connected to, e.g. a
laptop in a college student's dorm room.
 Areas of the interface: Non-overlapping areas involve processes of the human and
computer not pertaining to their interaction. Meanwhile, the overlapping areas only
concern themselves with the processes pertaining to their interaction.
 Input flow: The flow of information that begins in the task environment, when the
user has some task that requires using their computer.
 Output: The flow of information that originates in the machine environment.
 Feedback: Loops through the interface that evaluate, moderate, and confirm
processes as they pass from the human through the interface to the computer and back.
 Fit: This is the match between the computer design, the user and the task to
optimize the human resources needed to accomplish the task.
Topics in HCI include:
Definition of User Interface.
In computer science and human-computer interaction, the user interface (of a
computer program) refers to the graphical, textual and auditory information the program
presents to the user. The user employs several control sequences (such as keystrokes with
the computer keyboard, movements of the computer mouse, or selections with the
touchscreen) to control the program.

2. Types of interfaces: command line interface, text interface, graphic interface.


There exist several types of user interfaces.

23
 Command-Line Interface (CLI): The user provides the input by typing a command
string with the computer keyboard and the system provides output by printing text on the
computer monitor .
A Command Line Interface allows the user to interact directly with the computer
system by typing in commands (instructions) into a screen
You cannot just type in any kind of instruction of course, because the computer will
only react to a definite set of words.
These commands are very specific, for example in DOS you could type in:
copy c:\item.txt d:\
That tells the machine to copy the file 'item.txt' that resides in the root directory of
drive C: into the root directory of drive D:\
Many commands have what are called 'switches'. These are extra parameters or
flags which add extra functionality to the command. For example:
»Dir gives a directory listing
»Dir /w gives the listing across the page
»Dir /s includes the sub directories
»Dir /p pauses at the bottom of every page
Before Windows was developed, this type of user interface was what most people
used to get the computer to follow instructions. Nowadays, very few people have the
knowledge to be able to use a command line interface.
An example of this type of interface is DOS (Disk Operating System).
Sometimes referred to as the command screen or a text interface, the command
line or Windows command line is a user interface that is navigated by typing commands
at prompts, instead of using the mouse. For example, the Windows folder in a Windows
command line (MS-DOS) is C:\Windows> (as shown in the picture) and in Unix or
Linux, it may be % or >. Unlike a GUI operating system, a command line only uses a
keyboard to navigate by entering commands and does not utilize a mouse for navigating.
Because a command line interface requires unique commands, this interface is often
more difficult to learn because of the need to memorize dozens of different commands.
However, a command line operating system can be a very valuable resource and should
not be ignored. For example, users who have Microsoft Windows may find trivial tasks,
such as renaming 100+ files in a folder, a very difficult task. However, renaming 100+
files in a directory can be done in less than a minute with a command entered into the
command line.
Advantages and Disadvantages
Advantages Disadvantages
If the user knows the correct
commands then this type of interface For someone who has never used
can be much faster than any other type a CLI, it can be very confusing
of interface
This type of interface needs much Commands have to be typed

24
Advantages and Disadvantages
Advantages Disadvantages
less memory (RAM) in order to use precisely. If there is a spelling error the
compared to other types of user command will fail
interfaces
If you mis-type an instruction, it
This type of interface does not use
is often necessary to start from scratch
as much CPU processing time as others
again
There are a large number of
A low resolution, cheaper monitor
commands which need to be learned -
can be used with this type of interface
in the case of Unix it can be hundreds
You can't just guess what the
A CLI does not require Windows
instruction might be and you can't just
to run
'have a go'.
Table 4- Advantages and Disadvantages

Text interface with menus


A text interface can be made easier to navigate using menus created with text and
ASCII extended characters. For example, many command line text editors have some
type of interface with menus and shortcut keys that make navigating the file being edited
easier. The picture below is an example of the MS-DOS editor used to edit files while at
the MS-DOS or Windows command line.
WIMP or GUI Interface
A graphical user interface (GUI) is the most common type of user interface in use
today. It is a very 'friendly' way for people to interact with the computer because it makes
use of pictures, graphics and icons - hence why it is called 'graphical'.
A GUI (pronounced gooey) is also known as a WIMP interface because it makes
use of:
Windows - a rectangular area on the screen where the commonly used applications
run
Icons - a picture or symbol which is used to represent a software application or
hardware device
Menus - a list of options from which the user can choose what they require
Pointers - a symbol such as an arrow which moves around the screen as you move
your mouse. Helps you to select objects.
Advantages and Disadvantages
Advantages Disadvantages
This type of user interface is
GUIs take up a much larger amount of
easy to use, especially for a
hard disk space than other interfaces
beginner

25
Advantages and Disadvantages
Advantages Disadvantages
It is easy to explore and find
They need significantly more memory
your way around the system using
(RAM) to run than other interface types
a WIMP/ GUI interface
You do not have to learn They use more processing power than
complicated commands other types of interface
There are usually a They can be slow for experienced
reasonable 'help' system included programmers to use. These people often find
with WIMP interfaces CLI interfaces much faster to use
You get the benefits of
WYSIWYG
They let you exchange data
between different software
applications
Table 5- Advantages and Disadvantages

A GUI is an interface built around visual (graphical) things:


 Windows are regions of the screen used to display information
 Icons are small pictures that are used to represent folders, software, etc.
 Menus are lists of options the user can select from
 A pointer is an arrow that can be moved around the screen and is used to select
things
Windows XP is an example of an operating system with a GUI.
GUIs are quite easy to use due to the visual nature of the interface – the user has
lots of visual clues as to what things do.

However, to display all of the nice graphics required by a GUI takes a lot of computing
power so quite a powerful computer is needed.

 Graphical User Interface (GUI): The use of pictures rather than just words to
represent the input and output of a program. Input is accepted via devices such as
keyboard and mouse.
Many years ago when computers were not very powerful they could not display the
colourful graphics required for a GUI. The only interface available to most computer uses
was the ‘command line’.

The user would see nothing but a black screen. They would have to type a command to
make anything happen.

26
To copy a text file called NOTES from a floppy disc to the hard drive the user would
have to type:
> COPY A:\NOTES.TXT C:\
The user would have to learn a whole set of strange commands so that they could
make use of the computer system. Plus it was not very interesting look at – no visual
clues to tell you what to do next.

3. Physical and mental characteristics of the user. Development stages of the user
interface. Types of testing of interfaces (testing of users). Perspectives of development of
interfaces.
This meant computers used to be quite difficult to use, so this type of interface is
only really suitable for expert users.
The system that people use to interact with a computer (to give it commands, to
see the results of those commands, etc.) is known as the user interface.
Graphical user interface
In computer science, a graphical user interface (GUI /ɡuːiː/), is a type of user
interface that allows users to interact with electronic devices through graphical icons and
visual indicators such as secondary notation, instead of text-based user interfaces, typed
command labels or text navigation. GUIs were introduced in reaction to the perceived
steep learning curve of command-line interfaces (CLIs), which require commands to be
typed on a computer keyboard.
The actions in a GUI are usually performed through direct manipulation of the
graphical elements.[4] Beyond computers, GUIs are used in many handheld mobile
devices such as MP3 players, portable media players, gaming devices, smartphones and
smaller household, office and industrial equipment. The term GUI tends not to be applied
to other lower-display resolution types of interfaces, such as video games (where head-up
display (HUD) is preferred), or not restricted to flat screens, like volumetric displays[6]
because the term is restricted to the scope of two-dimensional display screens able to
describe generic information, in the tradition of the computer science research at the
Xerox Palo Alto Research Center (PARC).
Post-WIMP interfaces
Smaller mobile devices such as personal digital assistants (PDAs) and smartphones
typically use the WIMP elements with different unifying metaphors, due to constraints in
space and available input devices. Applications for which WIMP is not well suited may
use newer interaction techniques, collectively termed post-WIMP user interfaces. As of
2011, some touchscreen-based operating systems such as Apple's iOS (iPhone) and
Android use the class of GUIs named post-WIMP. These support styles of interaction
using more than one finger in contact with a display, which allows actions such as
pinching and rotating, which are unsupported by one pointer and mouse.
Human interface devices, for the efficient interaction with a GUI include a computer
keyboard, especially used together with keyboard shortcuts, pointing devices for the
cursor (or rather pointer) control: mouse, pointing stick, touchpad, trackball, joystick,

27
virtual keyboards, and head-up displays (translucent information devices at the eye
level).
There are also actions performed by programs that affect the GUI. For example,
there are components like inotify or D-Bus to facilitate communication between
computer programs.

Operating system command-line interfaces


Operating system (OS) command line interfaces are usually distinct programs
supplied with the operating system.
A program that implements such a text interface is often called a command-line
interpreter, command processor or shell.
Application command-line interfaces
Application programs (as opposed to operating systems) may also have command
line interfaces.
An application program may support none, any, or all of these three major types of
command line interface mechanisms:
1. Parameters: Most operating systems support a means to pass additional
information to a program when it is launched. When a program is launched from an OS
command line shell, additional text provided along with the program name is passed to
the launched program.
2. Interactive command line sessions: After launch, a program may provide an
operator with an independent means to enter commands in the form of text.
3. OS inter-process communication: Most operating systems support means of
inter-process communication (for example; standard streams or named pipes). Command
lines from client processes may be redirected to a CLI program by one of these methods.
Menu Interface
This type of interface lets you interact with a computer or device by working your
way through a series of screens or menus.
Think about your iPod or mobile phone, they both use a menu driven interface. You
are presented with a menu, you make a choice and then the next menu appears on the
screen. You make another choice and so on.
Cashpoint machines (ATMs) are another good example of a menu driven interface.
Menu driven interfaces can also be verbal rather than visual. Have you ever made a
telephone call and been asked to 'press 1 for abc, press 2 for def, press 3 for ghi'?
Most of the software that you use have menu interfaces. You can use many features
of the software by working your way through the menu options. Have a look at the
menus in your word processor or spreadsheet package and see how many different
choices you are given.
A well designed menu interface is simple to use, you just follow the instructions and
make your choices.
Advantages and Disadvantages

28
Advantages Disadvantages
Extremely easy to use.
Someone who has never seen A poorly designed menu interface may be
the interface before can work slow to use
out what to do
It can be irritating if there are too many
There are no commands to
menu screens to work through - users get
learn or remember
annoyed or bored if it takes too long
You often can't go to the exact place you
Step-by-step options are
want right at the start. You have to work your
given so that the user doesn't
way through the menu screens even if you
have to remember anything
know where you want to get to.
Even if you don't know
The menu can take up a large part of the
what to do, you can usually
screen so you have to keep flicking back and
guess your way around the
forwards between applications
options
If the menu is poorly designed it might be
Menu interfaces don't have
hard to read e.g. writing is too small for people
to be visual, they can be spoken
with poor sight, colours might clash and be
- good for telephones or for
difficult to read, font style might be hard to
visually impaired people
read.

Table 6- Advantages and Disadvantages

Sound and speech interface


This type of interface allows the user to speak or type in their normal everyday
language in order to interact with the computer.
For example, some applications such as speech recognition software accepts the
spoken words and converts them into text on the computer. These applications have a
much wider vocabularly than the dialogue interface.
An example of a natural language interface which makes use of written text is a
'chat bot'. This software mimics a conversation - you ask it questions and it will come
back with a suitable comment for you.
This is the most technically challenging form of interface for the designers as it has
to cope with different accents, dialects, slang, homonyms (bare or bear) etc.

Questions:
1. What is the Usability of interfaces?
2. What is the Command-Line Interface?
3. What is the HCI?
29
4. What are the advantages and Disadvantages of menu interfaces?

References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.

Lecture №5. Database systems.


Purpose: to provide an overview about Database Management Systems (DBMS)
and introduce one of DBMS: SQL
Plan:
1.Bases of database systems: concept, characteristic, architecture. Data models.
Normalization. Integrity constraint on data. Query tuning and their processing.
2.Fundamentals of SQL. Parallel processing of data and their restoration.
3.Design and development of databases. Technology of programming of ORM. The
distributed, parallel and heterogeneous databases.

1.Bases of database systems: concept, characteristic, architecture. Data models.


Normalization. Integrity constraint on data. Query tuning and their processing.
Introduction to Databases. A database is a structured collection of records or data.
A computer database is a kind of software to organize the storage of data. Databases help
you organize this related information in a logical fashion for easy access and retrieval. To
develop a database, there are several models used such as Hierarchical model, Network
model, Relational model, Object-Oriented model etc.
Hierarchical model. In a hierarchical model, data is organized into an inverted tree-
like structure. This structure arranges the various data elements in a hierarchy and helps
to establish logical relationships among data elements of multiple files. Each unit in the
model is a record which is also known as a node. Each record has a single parent.

Figure 1- Hierarchical Model

30
Network model. The network model tends to store records with links to other
records. Each record in the database can have multiple parents, i.e., the relationships
among data elements can have a many to many relationships. So this model is an
expansion to the hierarchical structure, allowing many-to-many relationships in a tree-
like structure that allows multiple parents.
The network model provides greater advantage than the hierarchical model in that it
promotes greater flexibility and data accessibility.

Figure 2- Network Model


Relational model. The relational model for the database management is a database
model based on relations. The basic data structure of the relational model is a table
where information about a particular entity (say, a student) is represented in columns and
rows. The columns enumerate the various attributes (i.e. characteristics) of an entity
(e.g. student name, address, registration _number). The rows (also called records)
represent instances of an entity (e.g. specific student).
Object –Oriented model. In this Model we have to discuss the functionality of the
object oriented Programming. It takes more than storage of programming language
objects. It provides full-featured database programming capability, while containing
native language compatibility. It adds the database functionality to object programming
languages. This approach is the analogical of the application and database development
into a constant data model and language environment. Applications require less code, use
more natural data modeling, and code bases are easier to maintain. Object developers can
write complete database applications with a decent amount of additional effort. But
object-oriented databases are more expensive to develop.

Database Management System. A Database Management System (DBMS) is


computer software designed for the purpose of managing databases based on a variety of
data models. A DBMS is a complex set of software programs that controls the
organization, storage, management, and retrieval of data in a database. DBMS are
categorized according to their data structures or types, sometime DBMS is also known as
a Database Manager. Data management tasks fall into one of four general categories as
given below:
Entering data into the database.
Housekeeping tasks such as updating data, deleting obsolete records, and backing
up the database.
Sorting the data: arranging or re-arranging the database‟s records.
Obtaining subsets of data.
There are several advantages in DBMS such as reduced data redundancy and
inconsistency, enhanced data integrity, improved security etc.

31
Normalization of databases is a process of transformation of database to the kind
answering the normalized forms.
Classification of limitations of integrity
In the theory of relational databases it is accepted to distinguish four types of
limitations of integrity:
Limitation of database is name a limit on values that it is let to accept to the
indicated database.
Limiting to the variable of relation is name a limit on values that it is let to
accept to the indicated variable of relation.
Limitation of attribute is name a limit on values that it is let to accept to the
indicated attribute.
Limitation of type is not that another, as determination of great number of
values this type consists of that.
Example of widespread restriction of level of a variable of the relation is the
potential key; an example of widespread restriction of level of the database is the foreign
key.
Integrity and truth of data in a DB
Integrity of a DB doesn't guarantee reliability (truth) of the information which is
contained in it, but provides at least plausibility of this information, rejecting certainly
improbable, impossible values. Thus, it isn't necessary to confuse integrity (consistency)
of a DB to truth of a DB. Truth and consistency — not same.
Reliability (or truth) is compliance of the facts which are stored in the database, to
the real world. It is obvious that determination of reliability of a DB requires possession
of full knowledges both about DB contents, and about the real world. Determination of
integrity of a DB requires only possession of knowledge of contents of a DB and about
the rules set for it. Therefore the DBMS can't guarantee existence in the database only of
the true expressions; all that she can make, are to guarantee absence of any data causing
violation of integrity constraints (that is to guarantee that she doesn't contain any data not
compatible to these restrictions).
Query tuning
The DBMS SQL component which defines how to realize navigation on physical
data structures for access to the required data, is called the query optimizer (query
optimizer).
The navigation logic (algorithm option) for access to the required data is called way
or the access method (access path).
The sequence of the operations performed by the optimizer which provide the
selected access paths is called the execution plan (execution plan).
Process, the used query optimizer for determination of an access path, is called
query tuning (query optimization).

32
During process of optimization of requestsways of access for all types of the SQL
DML teams are determined. However the SQL SELECT team represents the greatest
complexity in the solution of a task of the choice of a way of access. Therefore this
process is usually called optimization of a request, but not optimization of ways of access
to data. Further, it should be noted that the term "optimization of requests" is not
absolutely exact — in the sense that there is no guarantee that in the course of
optimization of a request the optimum way of access will be really received.
Thus, optimization of requests can be determined as the amount of all techniques
which are applied to increase in efficiency of handling of requests.

2.Fundamentals of SQL. Parallel processing of data and their restoration.


The structured language of requests (Structured Query Language) – the standard of
communication with the database which is supported by ANSI. The majority of databases
solid adheres to the ANSI-92 standard. Almost each separate database uses some unique
set of syntax, though very strongly similar to the ANSI standard. In most cases, this
syntax is extension of the basic standard though there are cases when such syntax results
in different results for different databases.
In the general terms, "SQL the database" is the general name for the relational
database management system (RDMS). For some systems, "database" also concerns to
group of tables, data, the configuration information which are essentially separate part
from other, similar constructions. In this case, each installation of SQL of the database
can consist of several databases. In other systems, they are mentioned as tables.
The table – construction of the database which consists of the columns containing
lines of data. Usually tables are created to contain the connected information. Within the
same database several tables can be created.
Each column represents attribute or set of objects attributes, for example
identification numbers of employees, growth, color of machines, etc. Often concerning a
column the term a field with specifying of a name, for example "in the field of Name" is
used. The field of a line is the minimum element of the table. Each column in the table
has a certain name, data type and the size. Column names shall be unique within the
table.
Every line (or record) represents set of attributes of a specific object, for example,
the line can contain identification number of the employee, the size of its salary, year of
its birth, etc. Lines of tables have no names. To address a specific line, the user needs to
specify some attribute (or a set of attributes), it is unique it identifying.
One of the major operations which are executed by dataful operation is selection of
the information which is stored in the database. For this purpose the user shall execute a
request (query).
Types of requests of data
There are four main types of requests of data in SQL which relate to so-called
language of a manipulation data (DataManipulationLanguage or DML):
• SELECT – to choose lines from tables;
33
• INSERT – to add a line to the table;
• UPDATE – to change lines in the table;
• DELETE – to remove lines in the table;
Each of these requests has different operators and functions which are used to make
some dataful actions. The SELECT QUERY has the most large number of options. There
are also additional types of the requests used together with SELECT, the JOIN and
UNION type. But so far, we will concentrate only on the main requests.
Use of a Select query for selection of the necessary data
To obtain information which is stored in the database the Select query is used. Basic
action of this request is restricted to one table though there are constructions providing
selection from several tables at the same time. To receive all lines of data for specific
columns, the request of such look is used:
SELECT column1, column2 FROM table_name;
Also, it is possible to receive all columns from the table, using the podstanovochny
sign "*":
SELECT * FROM table_name;
It can be useful in that case when you are going to choose data with a certain
condition of WHERE. The following inquiry will return all columns from all lines where
"column1" contains 3 value:
SELECT * FROM table_name WHERE column1=3;

3.Design and development of databases. Technology of programming of ORM. The


distributed, parallel and heterogeneous databases.

Design of databases — process of creation of the database scheme and


determination of necessary integrity constraints.
Main objectives of design of databases:
• Support of storage in a DB of all necessary information.
• A data acquisition possibility on all necessary requests.
• Abbreviation of redundance and duplicating of data.
• Support of integrity of the database.
Main design stages of databases
Conceptual design
Conceptual design — creation of a semantic domain model, that is information
model of the highest level of abstraction. Such model is created without orientation to
any specific DBMS and a data model. The terms "semantic model", "conceptual model"
are synonyms.

34
The specific type and the maintenance of conceptual model of the database is
defined by the formal device selected for this purpose. Graphic notations, similar to ER
charts are usually used.
Most often the conceptual model of the database includes:
• description of information objects or concepts of data domain and communications
in between.
• description of integrity constraints, that is requirements to admissible values of
data and to communications in between.
Logic design
Logic design — creation of the database scheme on the basis of a specific data
model, for example, a relational data model. For a relational data model data logical
model — a set of diagrams of the relations, it is normal with specifying of primary keys,
and also the "communications" between the relations representing foreign keys.
Conversion of conceptual model to a logical model is, as a rule, carried out by the
formal rules. This stage can be substantially automated.
At a stage of logic design specifics of a specific data model are considered, but
specifics of specific DBMS can not be considered.
Physical design
Physical design — creation of the database scheme for specific DBMS. Specifics of
specific DBMS can include restrictions for naming of database objects, restrictions for
the supported data types, etc. Besides, specifics of specific DBMS in case of physical
design include a choice of the decisions connected to a physical medium of data storage
(a choice of methods of management of disk memory, division of a DB according to files
and devices, data access methods), creation of indexes etc.

What is ORM?
ORM or Object-relational mapping is a technology of programming which allows
to transform incompatible types of models to OOP, in particular, between the data store
and subjects to programming. ORM is used for simplification of process of saving
objects in a relational database and their extraction, in case of this ORM itself cares for
data transformation between two incompatible statuses. The majority of ORM tools
considerably rely on meta data of the database and objects so objects need to know
nothing about a database structure, and the database — nothing about how data are
organized in the application. ORM provides complete division of tasks in well
programmed applications in case of which both the database, and the application can
work dataful everyone in the root form.

Fugure3- ORM`s work

35
Principle of operation of ORM
Key feature of ORM is display which is used for an object binding to its data in a
DB. ORM as if creates the "virtual" database scheme in memory and allows to
manipulate data already at the object level. Display shows as an object and its properties
are connected to one or several tables and their fields in the database. ORM uses
information of this display for process control of data transformation between a basis and
forms of objects, and also for creation of SQL queries for an insertion, up-dating and
deleting data in response to changes which the application makes to these objects.
Distributed database – a set of the separated data which are logically connected
among themselves (and their descriptions) which are physically distributed on some
computer network. The distributed DBMS – the program complex intended for control
of distributed databases and allowing to make distribution of information of the
transparent for the ultimate user.
Users interact with a distributed database through applications. Applications can be
classified as those which don't require data access on other websites (local applications),
and those which require similar access (global applications).

One of approaches to integration of object-oriented applications with relational


databases consists in development of heterogeneous information systems.
Heterogeneous information systems facilitate integration of the heterogeneous
information sources structured (with existence of the regular (normalized) diagram),
semistructured and sometimes even unstructured. Any heterogeneous information system
is constructed on the global database scheme over databases of components so users get
advantages of the diagram, that is uniform interfaces of access (for example, the sql-style
interface) to the data saved in different databases and rich functional capabilities. Such
heterogeneous information system is called system of the integrated multi-databases.
Formation of the database management systems (DMS) matched on time the
considerable progress in development of technologies of the distributed computation and
parallel processing. Distributed control systems databases and parallel database
management systems resulted. These systems become the dominating tools for
application creation of intensive data handling.
The parallel computer, or the multiprocessor in itself is the distributed system made
of the nodes (processors, memory components) connected by a bystry network in the
general casing. The technology of distributed databases can be naturally reconsidered and
widespread on parallel database systems, i.e. database systems on parallel computers
The distributed and parallel DBMS provides the same functionality, as host-based
DBMSes, except for the fact that they work in the environment where data are distributed
on nodes of a computer network or the multiprocessor system.

Questions:
1.What makes databases such an essential component of modern life?
2. Can databases be used to predict consumer behavior?
3. What are the basic components of a database?
36
4. Why are relationships a significant aspect of databases?
5. What’s the difference between flat files and other database models?

References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.

Lecture №6. Data analysis. Data management..


Purpose: to give a common concepts of correlation, regression, and also
to become acquainted with descriptive statistics.
Plan:
1.Data analysis bases.
2.Methods of collection, classification and prediction. Decision trees. Processing of
large volumes of data.
3. Methods and stages of Data mining. Tasks Data mining. Visualization of data.

1.Data analysis bases.


In this lecture we will consider some aspects of statistical analysis of data, in
particular, descriptive statistics, cross-correlation and regression analyses. A statistical
analysis includes the large variety of methods, even for a superficial acquaintance
with that volume of one lecture too small. Aim of this lecture - to give a common
idea about the concepts of correlation, regression, and also to become acquainted with
descriptive statistics. The examples considered in a lecture are intentionally simplified.

There is a large variety of the applied packages realizing the wide spectrum of
statistical methods, they are also named universal packages or instrumental sets.
About such setswe in detail will talk in the final chapter of course. The wide
arsenal of methods of mathematical statistics is also
realized in Microsoft Excel, realization of examples of this
lecture is shown exactly on this program

Descriptive statistics
Descriptive statistics is a technique

37
of collection and adding up of quantitative data, that is used
for converting of mass of digital data into a form comfortable
for perception and discussion.

Aim of descriptive statistics - to generalize the primary results got as a result of


supervisions and experiments.

Cross-correlation analysis
A cross-correlation analysis is used for the quantitative estimation of inter
communication of two sets of the data presented in a dimensionless kind. A cross-
correlation analysis gives an opportunity to set, whether the sets of data
are associated on a size. The coefficient of correlation
always designated by the Latin letter r.

Connection between signs (on the scale of Chaddock) can best rong, middle
and weak. Crowd conditions connections
determine on the size of coefficient of correlation, that can take on values from,
- 1 to +1 inclusive. The criteria of estimation of crowd conditions
of connection are shown on Table 7

The 0,1-0,3 0,3-0,5 0,5-0,7 0,9-1,0


magnitude of
the correlation
coefficient
bond weak moderate noticeable high very high me
strength diu
characteristics m

high
Table 7- Quantitative criteria of estimation of crowd conditions of connection

Coefficient of correlation of Pearson

The coefficient of correlation of Pearson of r, that is a


dimensionless index in an interval from -
1,0 to 1,0 inclusive,reflects the degree of linear dependence between two great
numbers of data.
The index of crowd conditions of connection between two
signs is determined on the formula of linear coefficient of correlation

38
where x is a value of factor sign;

y is a value of effective sign;

n is a number of pairs of data.

Pair correlation is connection between two signs: effective and factor or two factor.

Variants are connections, characterizing a presence or


absence of linear connection between signs:

-large values from one set of data are related to the large values of other set (cross-
correlation) is a presence of direct linear connection;
-the small values of one set are related to the large value so the r (negative correlation)
is a presence negative linear
 small values of one set are associated with large values of the other (negative
correlation) - the presence of a negative linear relationship;
• data from the two ranges are not related (zero correlation.) - No linear relationship
data
• two ranges are related (zero correlation) - no linear relationship.
As an example, take a data set A (Table 7). It is necessary to determine the presence
of a linear relationship between the signs of x and y.
For a graphical representation of relationship between two variables used coordinate
system with the axes corresponding to the variables x and y. Construction schedule called
dispersion diagram is shown in Fig. 6. This diagram shows that the low value of the
variable x correspond to low values of the variable y, the high value of the variable x
correspond to high values of the variable y. This example demonstrates the clear
relationship.

39
Figure4- scatter plot

Thus, we can establish a relationship between the variables x and y. We calculate


the Pearson correlation coefficient between two arrays (x, y) using MS Excel Pearson
(Array1, array2) function. The result is the value of the correlation coefficient is equal to
0.998364, the relationship between the variables x and y, is very high. With the help of
MS Excel analysis package, as well as an analysis tool "Correlation", we can construct
the correlation matrix.
Any relationship between the variables have two important characteristics: size and
reliability. The stronger the relationship between two variables, the greater dependency
and easier to predict the value of one variable on another variable. Value depending
easier to measure than reliability.
Reliability dependence is no less important than its quantity. This property is due to
the representativeness of the study sample. Reliability depending describes how likely it
is that this dependence will again be found in other data.
With the growth of the value of the dependent variable reliability usually increases.

Regression analysis
The main feature of the regression analysis: specific information can be obtained
with its help on what form and nature of a relationship between the studied variables.
The sequence of the regression analysis
Consider briefly the steps of the regression analysis.

1. Formulation of the task. At this stage, formed the preliminary


hypothesis about the dependence of the studied phenomena
2. Definition of dependent and independent (explanatory) variables.
3. Collection of statistical data. Data should be collected for each of the
variables included in the regression model.
4. The wording of the communication form hypotheses (simple or
multiple linear or nonlinear).

40
5. Determination of the regression function (is to calculate numerical
values of the parameters of the regression equation)
6. Evaluation of the accuracy of the regression analysis.
7. Interpretation of the results. The resulting regression analysis results
are compared with the preliminary hypotheses. We estimate the accuracy and
credibility of the results.
8. The prediction of unknown values of the dependent variable.

Using regression analysis, possible solution to the problem of forecasting and


classification. Predicted values are calculated by substituting into the regression
equation parameters explanatory variables. The decision of the classification task
is carried out as follows: the regression line divides the entire set of objects into
two classes, and that part of the set where the function value is greater than zero,
belongs to the same class, and that, where it is less than zero, - in another class.

2.Methods of collection, classification and prediction. Decision trees. Processing of


large volumes of data.
Classification. Classification can be used to get an idea of the type of customer,
product or object, describing a number of attributes to identify a specific class. For
example, cars are easily classified by type (sedan, SUV, convertible), defining various
attributes (seats, body style, drive wheels). Studying the new car, you can take it to a
certain class by comparing the attributes with well-known definition. The same principles
can be applied to customers, for example, classifying them by age and social group.

In addition, classification may be used as input for other methods. For example, to
determine the classification can employ decision trees.

Prediction - this is a broad topic, which extends from the prediction hardware
component failures to detect fraud, and even predict the company's profits. In
combination with other methods of data mining prediction involves trend analysis,
classification, matching and model relationships. By analyzing past events or items, you
can predict the future.

For example, using data on the credit card authorization, you can combine the
analysis of the decision tree of past human transactions with the classification and
comparison with historical patterns to identify fraudulent transactions. If you buy tickets
in the US coincides with the transaction in the US, it is likely that these transactions are
genuine.

Decision trees

41
Дecision tree method is one of the most popular methods for solving problems of
classification and prediction. Sometimes this method is also called Data Mining trees
decision rules, classification and regression trees.

As can be seen from the last name, using this method solved the problem of
classification and prediction.

Тarget variable takes discrete values, using the method of decision tree classification
problem is solved.

If the dependent variable takes continuous values, the decision tree establishes the
dependence of this variable on the independent variables, ie, It solves the problem of
numerical weather prediction.

In the simplest form of a decision tree - it is a way of representing rules in a


hierarchical, coherent structure. The basis of this structure - an answer "Yes" or "No" on
a number of issues.

Fig. 9.1 shows an example of a decision tree, whose mission - to answer the
question: "Is the game of golf?" To solve the problem; decide whether to play golf, the
current situation should be referred to one of the known classes (in this case - to "play" or
"do not play").This requires a series of questions that are at the nodes of the tree, from its
root.

Our first tree node "Sunny?" a check node, ie condition. If the answer to the
question moves to the left side of the tree, called the left branch, with a negative - to the
right of the tree. Thus, internal node of the a tree is node test certain conditions. Next
comes the next question, and so on until the final node of the tree is reached, which is the
hub solutions. For our tree there are two types of end node "play" and "not play" golf.

As a result of the passage from the root (sometimes called the root node) to its top
classification problem is solved, ie, select one of the classes - "play" and "not play" golf

42
Figute 5- Decision Tree "Do Play golf?"

Intuitive decision trees. Classification model, presented in the form of a decision


tree is an intuitive and easy understanding of the problem being solved. The result of the
design of algorithms of decision trees, in contrast, for example, neural networks, which
are "black boxes" can easily be interpreted by the user. This decision trees the property is
not only important when referring to a particular class of the new object, but also useful
in the interpretation of the classification model as a whole. The decision tree allows us to
understand and explain why a particular object belongs to a particular class.

Тree algorithm design decisions do not require the user to select the input
attributes (independent variables). The input of the algorithm can be fed all the existing
attributes, the algorithm will choose the most important among them, and only they will
be used to build a tree. In comparison, for example with neural networks, this greatly
facilitates user operation, since the amount of neural networks input attributes selection
significantly affects the time of training.

The accuracy of the models created using decision trees, is comparable to other
methods of constructing classification models (statistical methods, neural networks).

A number of scalable algorithms that can be used to construct a decision tree on


the very large scale database; scalability here is that with the increasing number of
examples or database records the time spent on training, ie building decision trees, grows
linearly. Examples of such algorithms: SLIQ, SPRINT.

Handling large amounts of data.


The term "big data" - a blueprint of English term. Big data does not have a strict
definition. It is impossible to draw a clear line - is 10 terabytes, or 10 megabytes? The

43
name itself is very subjective. The word "great" - is as "one, two, many" among primitive
tribes.

However, there are well-established view that the big data - a set of technologies
that are designed to perform three operations. Firstly, manipulate large in comparison
with "standard" data volume scenarios. Secondly, to be able to work rapidly with the
incoming data in a very large volumes. That is not just a lot of data, and they are
constantly becoming more and more. Thirdly, they should be able to work with
structured and poorly structured data in parallel in different aspects. Large data suggest
that the input stream is obtained algorithms do not always structured information and that
it can be extracted from more than one idea.

The advent of big data in the public space was due to the fact that these data are
affected almost all people, not just the scientific community, where such problems are
solved for a long time. In the public sphere Big Data technology came when it began to
go on quite specific number - the number of inhabitants of the planet. 7 billion, gathering
in social networks and other projects which aggregate people. YouTube, Facebook,
VKontakte, where the number of people is measured in billions, and the number of
transactions that they perform at the same time, enormous. The data flow in this case - a
user action. For example, data of the same YouTube hosting that shimmer across the
network in both directions. Under treatment is meant not only the interpretation but also
the ability to properly handle each of these actions, that is, put it in the right place and to
make sure that these data are available to each user quickly as social networking sites do
not tolerate waiting.

Much of the data that concerns large, approaches that are used for analysis, there is
actually quite long. For example, processing of images from surveillance cameras, we are
not talking about the same picture, but the data stream. Or navigation of robots. All of
this exists for decades, just now data processing tasks affected a much larger number of
people and ideas.

Many developers are accustomed to working with static objects and think conditions
categories. In larger paradigm of other data. You should be able to work with a steady
stream of data, and it is an interesting challenge. It affects more and more areas.

In our life more and more hardware and software are starting to generate a large
amount of data - for example, "Internet of things".

Things are already generating a huge flow of information. Police system "stream"
sends information from all cameras and lets you find the machine according to these data.
More and more are coming into fashion fitness bracelets, GPS-trackers and other things
that serve human tasks and business.

44
Moscow Informatization Department of gaining a large amount of data analysts, because
the statistics on people accumulate a lot and it is multi-criteria (for each person, collected
statistics for a very large number of criteria for each group of people). In these data, it is
necessary to find patterns and trends. For such tasks needed Mathematics with IT-
education. Because eventually the data is stored in a structured database, and we must be
able to handle it and to receive information.

3. Methods and Data Mining stage. Data Mining Tasks. Data Visualization.
All Data Mining techniques are divided into two large groups according to the principle
of working with the original training data. The upper level of this classification is
determined based on whether the data Data Mining after they are stored or distilled for
later use.
1. The direct use of the data, or save the data.
In this case, the original data is stored in a detailed and explicit directly used for
predictive modeling steps and / or analysis exceptions. The problem with this group of
methods - using them can be difficult analysis of very large databases.
Methods of this group: cluster analysis, nearest neighbor method, the method of k-
nearest neighbor, reasoning by analogy.

2. Identify and use of formal laws or distillation templates.


When distillation technology templates one sample (template) information is
extracted from the raw data is converted into a certain formal structure whose form
depends on the Data Mining method. This process is performed on the stage of the free
search, in the first group stage of this method, in principle, no. On stage predictive
modeling and analysis results are used exceptions stage of free search, they are much
more compact databases themselves. Recall that the construction of these models can be
interpreted by the analyst.

Statistical methods Data mining

These methods are four interrelated sections:


• a preliminary analysis of the nature of statistics (stationary test hypotheses, normality,
independence, homogeneity, estimation of the distribution function, its parameters, etc)
• identify links and patterns (linear and nonlinear regression analysis, correlation
analysis, and others)
• multivariate statistical analysis (linear and cluster analysis, component analysis, factor
analysis, and others)

Arsenal Data Mining statistical methods classified into four groups of methods:
1.Descriptive analysis and description of the original data.
2. Analysis of relationships (correlation and regression analysis, factor analysis, analysis
of variance)

45
3. Multivariate statistical analysis (component analysis, multivariate regression analysis,
canonical correlation, and others)
4. Time series analysis (dynamic modeling and forecasting)

Cybernetic methods of Data Mining


The second direction of Data Mining - is a variety of approaches, united by the idea
of computer mathematics and the use of artificial intelligence theory.
This group includes such methods:
• Artificial neural networks (pattern recognition, clustering, forecasting)
• evolutionary programming (including algorithms method of group account of
arguments)
• genetic algorithms (optimization)
• associative memory (search analogues, prototypes)
fuzzy logic;
• decision trees;
• expert knowledge processing systems.

Data Mining techniques can also be classified according to Data Mining tasks.
In accordance with this classification select two groups. The first of them - a
division of Data Mining techniques to solving the problem of segmentation (ie the
problem of classification and clustering) and forecasting tasks.

According to a second classification by the tasks Data Mining techniques can be directed
to the descriptive and predictive results.
Descriptive methods are used to find templates or models that describe the data that
lend themselves to interpretation in terms of the analyst.

Methods aimed at obtaining descriptive results are iterative cluster analysis methods,
including: k-means algorithm, k-median, hierarchical cluster analysis methods, Kohonen
self-organizing maps, methods of cross-tabular visualization, various imaging techniques
and others.

Predictive methods use the meaning of some variables for predicting / forecasting
unknown (missing) or future values of other (target) variables.
Methods aimed at obtaining predictive results include methods such as neural
networks, decision trees, linear regression, nearest neighbor, support vector machines,
and others.

Data Mining Tasks


Tasks Data Mining are sometimes called regularity and techniques

46
There is no unified opinion as which tasks should be assigned to Data Mining. Most
reputable sources list the following: classification, clustering, forecasting, association,
visualization, analysis, and detection of abnormalities, evaluation, analysis of the
relationships, summarizing.
Data Visualization - is the provision of information with help of pictures, graphs,
charts, tables and diagrams. Value visualization is that it often allows the most clearly
and concisely identify and display information contained in the data, because the image
can immediately show that will take more than one paragraph in the verbal equivalent.

The development of methods of visual presentation of the data are equally attended
by IT professionals and designers, as the design depends largely on how clear and "read"
is visualization.
With the help of data visualization solve the most different problems.

At first, it is an important tool in the initial stages of the data analysis. The most
simple of graphics allow you to quickly find data regularities, trends or anomalies, which
will be guided by the analyst in the further work with the data. Similarly, the journalist,
using charts when viewing the primary data, may formulate questions for themselves,
from which further can lead story for another material.

Second, visualization often play an important role in the presentation of the final
results of analysis. This can be static graphs showing trends; interactive visualization,
allowing users to explore the data; and infographics (static and interactive), clear image is
based on data history.

Important task of visualization is that in a single image with a limited number of


physical measurements (typically two-dimensional) display data contained in the
plurality of measurements and the relationship between them.

Questions
1.How to determine the Pearson correlation coefficient?
2. How to solve Data Mining Tasks?
3. What does processing large amounts of data mean?
4. What types have a decision tree?

References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
47
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.

Lecture №7. Networks and telecommunications.


Purpose: to develop a solid grasp of network by introducing the basic concepts.
Plan:
1.End devices, data transfer devices, transmission medium. Types of networks.
2.Stack protocols: TCP/IP, OSI. IP addressing. Local and wide area networks.Wire
and wireless network technologies.
3. DHCP protocol. Technologies of connection to the Internet.
4.Telecommunication technologies.

1.End devices, data transfer devices, transmission medium. Types of networks.


What is a Computer Network? Two or more independent computers connected
together through a communication media form a computer network. The computers are
connected in a network to exchange information and data. The computers connected in a
network can also use resources of other computers such as software packages and
peripherals like modems, printers, backup drives, or CD-ROM drives. Networks are built
with a mix of computer hardware and computer software. Further, you do not need the
same software package installed on your machine, if your network has that software
installed on one of the machines on the network. In this sense, computer networks are
clear means for sharing resources. This makes the use of computer technology cost
effective. Following Figure 8 shows a typical network with four computers.

Figure 6- Typical computer network

Basic hardware and terminology in networks


If you explore more on computer networks, you will come across with a huge list of
terminology associated with networks. Let us look at the basic terminology used in the
subject of computer networks in brief. It is worth to note here that all networks are made
up of basic hardware building blocks to interconnect network nodes.
48
Node. Any device attached to the network capable of communicating with other
network devices is called a Node. A node can be a computer or some other device, such
as a printer. Every node has a unique network address, sometimes called a Data Link
Control (DLC) address or Media Access Control (MAC) address.

Client. A device or application that uses the services provided by a server is called a
Client in the network. A client may be a PC or a workstation on a network using services
provided from the network file server, or it may be that part of an application program
that runs on the workstation supported by additional software running on the server. One
of the most familiar clients is the Web browser.

Server. Any computer that makes access to files, printing, communications, and
other services available to users of the network is called a Server in the network. In large
networks, a dedicated server runs a special network operating system; in smaller
installations, a non-dedicated server may run a personal computer operating system with
peer-to-peer networking software running on top.
A server typically has a more advanced processor, more memory, a larger cache,
and more disk storage than a single-user workstation. A server may also have several
processors rather than just one and may be dedicated to a specific support function such
as printing, e-mail, or communications. Many servers also have large power supplies,
UPS (uninterruptible power supply) support, and fault-tolerant features, such as RAID
technology. On the Internet, a server responds to requests from a client, usually a Web
browser.

Following Figure 7 shows the client and server in a network.

Figure 7- Client and Server

Hub. A device used to extend a network so that additional workstations can be


attached. In some star networks, a hub is the central controlling device. Hubs typically
provide from 4 to 24 connections, allowing anything from 2 to 24 devices to
communicate with one another. Following Figure 10 shows the use of a hub in a Star
network (You will learn what a star network is in the latter part of this session) while the

49
Figure shows an enlarged view of an 8-port hub.

Figure 8- Hub in a Star network Figure 9- 8-port Hub

IP Address.An Internet Protocol (IP) address is a numerical identification (logical


address) that is assigned to devices participating in a computer network utilizing the
Internet Protocol for communication between its nodes. Although IP addresses are stored
as binary numbers, they are often displayed in more human-readable notations, such as
192.168.100.1(for IPv4). The role of the IP address has been characterized as follows: "A
name indicates what we seek. An address indicates where it is. A route indicates how to
get there."

A repeater is an electronic device that receives a signal and retransmits it at a higher


power level, or to the other side of an obstruction, so that the signal can cover longer
distances without degradation. In most twisted pair Ethernet configurations, repeaters are
required for cable which runs longer than 100 meters.

Bridges.A network bridge connects multiple network segments at the data link layer
(layer 2) of the OSI model. Bridges do not promiscuously copy traffic to all ports, as
hubs do, but learn which MAC addresses are reachable through specific ports. Once the
bridge associates a port and an address, it will send traffic for that address only to that
port. Bridges do send broadcasts to all ports except the one on which the broadcast was
received.

Routers. A router is a networking device that forwards packets between networks


using information in protocol headers and forwarding tables to determine the best next
router for each packet. Routers work at the Network Layer of the OSI model and the
Internet Layer of TCP/IP.

2.Stack protocols: TCP/IP, OSI. IP addressing. Local and wide area networks.Wire
and wireless network technologies.

Classifications of Computer Networks


50
Computer networks can be classified by considering following different aspects as
the basis.

- The scale
- The connection method
- The functional relationship (Network Architectures)
- The network topology

The given below classifies the computer networks according to the above different
basis.
The basis Different categories

Scale
Personal Area Network (PAN)
Local Area Network (LAN)
Metropolitan Area Network (MAN)
Wide Area Network (WAN).
Connection
method Optical fiber
Ethernet
Wireless LAN
Home PNA

Functional Active Networking


Relationship
(Architecture) Client-server networking
Peer-to-peer (workgroup) architectures

Network
topology Bus network topology
(Arrangement
of components)
Star network topology
Ring network topology
Mesh network topology
Tree or Hierarchical topology

Table 8- Classifications of Computer Networks

51
Classification of computer networks by scale

According to the Table 5 above, the networks can be classified into six classes
abbreviated as PAN, LAN, MAN and GAN.

Personal Area Network (PAN)


A personal area network (PAN) is a computer network that will be useful in
communicating computerizes devices such as telephones and PDAs. Mostly, the PAN is
communicated through wireless network technologies such as Wireless USB, Bluetooth,
Z-Wave, and IrDA. You may use PANs to communicate among the personal devices or
you may connect even to higher level networks or to the internet.

Figure 10- Personal Area Network

Local Area Network (LAN)


A local area network (LAN) is a computer network covering a small geographic
area, like a home, office, or group of buildings. Ex: a school (See Figure 11 below). The
defining characteristics of LANs, in contrast to Wide Area Networks (WANs), include
their much higher data transfer rates, smaller geographic range, and lack of a need for
leased telecommunication lines. LANs can be small, linking as few as three computers,
but often link hundreds of computers used by thousands of people. The development of
standard networking protocols and media has resulted in worldwide propagation of LANs
throughout business and educational organizations. The Figure 11 below shows a LAN
consisting of six computers/work stations.

Figure 11- Local Area Network (LAN) Figure 12- LAN in a School

Wide Area Network (WAN)


Wide Area Network is defined as a group of computers and network devices
connected across large physical areas such as states or countries. Computers connected to
52
a Wide Area Network are often connected through the telephone system. They can also
be connected through leased lines or satellites. One may define a WAN as a collection of
several LANs as depicted in Figure 13 below.

The largest WAN in existence is the Internet. (You will learn about Internet in a
coming section).

Figure 13- Wide Area Network

Metropolitan Area Network (MAN)


MAN is a network that interconnect users with computer resources in a geographic
area or region larger than that covered by a local area network (LAN) but smaller than
the area covered by wide area network (WAN). Further a MAN is a network that
connects two or more Local Area Networks or Campus Area Networks together but does
not extend beyond the boundaries of the immediate town, city, or metropolitan area. See
Figures 14,15 below for a typical set up of a MAN.

Figure 14- Metropolitan Area Network (MAN)

53
Figure 15- LAN, MAN, and WAN

Classifications of networks based on the topology

Network Topology is the schematic description how the arrangement of the network
is including the nodes, connecting lines, and other devices. As per the above Table 7, the
main network topologies are listed below.

- Bus
- Star
- Ring
- Mesh
- Tree/Hierarchical

Deep discussions on the topologies are beyond the level of this course unit.
However, brief descriptions on each topology and images of them are given below.

Bus Topology
Bus networks (not to be confused with the system bus of a computer) use a common
backbone to connect all devices. A single cable, the backbone, functions as a shared
communication medium that devices attach or tap into with an interface connector. A
device wanting to communicate with another device on the network sends a
broadcast message onto the wire that all other devices see, but only the intended
recipient actually accepts and processes the message.

Figure 16- Bus topology

Star Topology

Many home networks use the star topology. A star network features a central
connection point called a "hub node" that may be a network hub, switch or router.
Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet.
54
Compared to the bus topology, a star network generally requires more cable, but a
failure in any star network cable will only take down one computer's network access and
not the entire LAN. (If the hub fails, however the entire network also fails.)

Ring Topology
In a ring network, every device has exactly two neighbors for communication
purposes. All messages travel through a ring in the same direction (either "clockwise" or
"counterclockwise"). A failure in any cable or device breaks the loop and can take down
the entire network.

Figure 17- Star topology

Figure 18- Ring topology


To implement a ring network, one typically uses FDDI, SONET, or Token Ring
technology. Ring topologies are found in some office buildings or school campuses.

Mesh Topology

Mesh topologies involve the concept of routes. Unlike each of the previous
topologies, messages sent on a mesh network can take any of several possible paths from
source to destination. (Recall that even in a ring, although two cable paths exist, messages
can only travel in one direction.) Some WANs, most notably the Internet, employ mesh
routing.
A mesh network in which every device connects to every other is called a full mesh.
As shown in the illustration below, partial mesh networks also exist in which some
devices connect only indirectly to others.

55
Figure 19- Mesh topology

Tree Topology
Tree topologies integrate multiple star topologies together onto a bus. In its simplest
form, only hub devices connect directly to the tree bus and each hub functions as the root
of a tree of devices. This bus/star hybrid approach supports future expandability of the
network much better than a bus (limited in the number of devices due to the broadcast
traffic it generates) or a star (limited by the number of hub connection points) alone.

Figure 20- Tree topology

The Internet
As you are already aware, the Internet is the largest WAN in existence (See Figure
21 below). It is a network of networks that consists of millions of private, public,
academic, business, and government networks, of local to global scope, that are linked by
a broad array of electronic, wireless and optical networking technologies. The Internet
carries an extensive range of information resources and services, such as the inter-linked
hypertext documents of the World Wide Web (WWW) and the infrastructure to support
email.

With the dramatic rise in demand for connectivity, the Internet has become a
communications highway for millions of users. The Internet was initially restricted to
military and academic institutions, but now it is a full-fledged conduit for any and all
forms of information and commerce. Internet websites now provide personal,
educational, political and economic resources to every corner of the planet.

56
Figure 21- Internet: the largest WAN in existence

The Intranet and Extranet


The Intranet. You are already aware what the Internet is. Accordingly, the internet
which is a worldwide system can be accessed by any person or by any organization.
Since it is a vast public communication tool, some organizations were willing to maintain
their own local network which supports their employees or the members. The Intranets
were developed as a solution to the above requirement. However, the intranet also has
almost all the services provided by the Internet, but it is a private system. The access of
an intranet is restricted to the authorized members or people within the organization such
that the authorized members need to log on with a secure password.

More comprehensively, intranets are private networks based on Internet


Technologies that are located behind an organization‟s firewall. A Firewall is a set of
technologies designed to protect a private network from users on a public network. Some
intranets provide access to the Internet through a special server called a Proxy Server,
designed to cache (to store for quick re-use) frequently requested information to keep that
information readily available. This type of proxy server also provides tools for tracking
and controlling access to networks.

An intranet can cover a LAN where only staff in the same building or region can use
it. Or it can run over a WAN where staff (authorized people) from around the world can
log in.

What Intranets do

Intranets usually start by publishing web pages about the organization‟s events,
57
health and safety policies, and staff newsletters. Popular applications follow, such as
forms to reclaim expenses or request holidays. All these help eliminate paperwork and
speed up workflows of the organization.

As more features are added, this intranet can become essential to the operation of an
organization. It becomes a portal that provides access to all the things workers need.

A typical intranet may provide the services such as E-mail, File transfer, Real time
chat, web pages, video and audio streaming services. Each service requires at least one
server to provide the service.

Advantages of an Intranet

Commercial or confidential data is kept secured within the organization.


E-mails remain private and may also be encrypted.
High bandwidth. No connection limits unlike the Internet

Reliable. The organization will have dedicated IT personnel to keep things


running smoothly.

Information specificity tailored to the organization or staff‟s needs can be


published.

The Extranet
We can consider an Extranet as an extension to the Intranets what we described
above. Because, the extranets are again private networks that contains information related
to the company and accessible only for the members of the company BUT allowed for
outside individuals as well who have obtained the authority to access. Therefore, an
extranet is partially accessible to authorized outsiders.

An extranet can be configured (set up) either using a direct leased line linking all
intranets or by using a secured separate link created across the participants as a VPN
(Virtual Private Network). The latter method is more cost effective than the firs method.

Advantages of Extranets
- A cost effective method to share and trade information and all other data
effectively at any time to the authorized people (internal and external) such as the
customers, partners, investors, suppliers who are included within the built up
extranet.

- A platform for companies to conduct business-to-business deals. Can assist

58
in strengthening relationships between two or more organizations.

- Useful when the staff of the company works outside the office, from their
homes, or sales sites so that they can still be in with the company network with the
access permission.

4.DHCP protocol. Technologies of connection to the Internet.


Short for Dynamic Host Configuration Protocol, DHCP is a protocol used to
assign an IP address to a computer or device that has been connected to a network
automatically. Routers, switches, or servers that use DHCP to assign addresses to other
computers can make setup and management easier for the network administrator.
On a home network, DHCP can be setup by purchasing a home router, wireless
router, or switch with NAT/DHCP and connecting each computer to it. If the network has
a firewall, ports 67 and 68 need to be open for devices to function properly.
Configuring a DHCP Server
To configure a DHCP server, you must create the dhcpd.conf configuration file in
the /etc/ directory. A sample file can be found at /usr/share/doc/dhcp-
<version>/dhcpd.conf.sample.
DHCP also uses the file /var/lib/dhcpd/dhcpd.leases to store the client lease
database.
Configuration File
The first step in configuring a DHCP server is to create the configuration file that
stores the network information for the clients.Use this file to declare options and global
options for client systems.
The configuration file can contain extra tabs or blank lines for easier formatting.
Keywords are case-insensitive and lines beginning with a hash mark (#) are considered
comments.
Two DNS update schemes are currently implemented — the ad-hoc DNS update
mode and the interim DHCP-DNS interaction draft update mode. If and when these two
are accepted as part of the Internet Engineering Task Force (IETF) standards process,
there will be a third mode — the standard DNS update method. You must configure the
DNS server for compatibility with these schemes. Version 3.0b2pl11 and previous
versions used the ad-hoc mode; however, it has been deprecated. To keep the same
behavior, add the following line to the top of the configuration file:
ddns-update-style ad-hoc;
To use the recommended mode, add the following line to the top of the
configuration file:
ddns-update-style interim;

Refer to the dhcpd.conf man page for details about the different modes.
There are two types of statements in the configuration file:

59
 Parameters — State how to perform a task, whether to perform a task, or what
network configuration options to send to the client.
 Declarations — Describe the topology of the network, describe the clients, provide
addresses for the clients, or apply a group of parameters to a group of declarations.
The parameters that start with the keyword option are reffered to as options. These
options control DHCP options; whereas, parameters configure values that are not
optional or control how the DHCP server behaves.
Parameters (including options) declared before a section enclosed in curly brackets
({ }) are considered global parameters. Global parameters apply to all the sections below
it.
Important
If the configuration file is changed, the changes do not take effect until the DHCP
daemon is restarted with the command service dhcpd restart.
Tip
Instead of changing a DHCP configuration file and restarting the service each time,
using the omshell command provides an interactive way to connect to, query, and change
the configuration of a DHCP server. By using omshell, all changes can be made while the
server is running. For more information on omshell, refer to the omshell man page.
Additionally, a subnet can be declared, a subnet declaration must be included for
every subnet in the network. If it is not, the DHCP server fails to start.
In this example, there are global options for every DHCP client in the subnet and a
range declared. Clients are assigned an IP address within the range.
Lease Database
On the DHCP server, the file /var/lib/dhcpd/dhcpd.leases stores the DHCP client
lease database. Do not change this file. DHCP lease information for each recently
assigned IP address is automatically stored in the lease database. The information
includes the length of the lease, to whom the IP address has been assigned, the start and
end dates for the lease, and the MAC address of the network interface card that was used
to retrieve the lease.
All times in the lease database are in Coordinated Universal Time (UTC), not local
time.
The lease database is recreated from time to time so that it is not too large. First, all
known leases are saved in a temporary lease database. The dhcpd.leases file is renamed
dhcpd.leases~ and the temporary lease database is written to dhcpd.leases.
The DHCP daemon could be killed or the system could crash after the lease
database has been renamed to the backup file but before the new file has been written. If
this happens, the dhcpd.leases file does not exist, but it is required to start the service. Do
not create a new lease file. If you do, all old leases are lost which causes many problems.
The correct solution is to rename the dhcpd.leases~ backup file to dhcpd.leases and then
start the daemon.

60
Starting and Stopping the Server
Important
When the DHCP server is started for the first time, it fails unless the dhcpd.leases
file exists. Use the command touch /var/lib/dhcpd/dhcpd.leases to create the file if it does
not exist.
If the same server is also running BIND as a DNS server, this step is not necessary,
as starting the named service automatically checks for a dhcpd.leases file.
To start the DHCP service, use the command /sbin/service dhcpd start. To stop the
DHCP server, use the command /sbin/service dhcpd stop.
If more than one network interface is attached to the system, but the DHCP server
should only be started on one of the interfaces, configure the DHCP server to start only
on that device. In /etc/sysconfig/dhcpd, add the name of the interface to the list of
DHCPDARGS:
# Command line options here
DHCPDARGS=eth0
This is useful for a firewall machine with two network cards. One network card can
be configured as a DHCP client to retrieve an IP address to the Internet. The other
network card can be used as a DHCP server for the internal network behind the firewall.
Specifying only the network card connected to the internal network makes the system
more secure because users can not connect to the daemon via the Internet.
Other command line options that can be specified in /etc/sysconfig/dhcpd include:
 -p <portnum> — Specifies the UDP port number on which dhcpd should listen.
 -f — Runs the daemon as a foreground process. This is mostly used for debugging.
 -d — Logs the DHCP server daemon to the standard error descriptor. This is
mostly used for debugging. If this is not specified, the log is written to /var/log/messages.
 -cf <filename> — Specifies the location of the configuration file. The default
location is /etc/dhcpd.conf.
 -lf <filename> — Specifies the location of the lease database file. If a lease
database file already exists, it is very important that the same file be used every time the
DHCP server is started. It is strongly recommended that this option only be used for
debugging purposes on non-production machines. The default location is
/var/lib/dhcpd/dhcpd.leases.
 -q — Do not print the entire copyright message when starting the daemon.

4.Telecommunication technologies.
Telecommunications involves the transmission over long distances of all forms of
information between computers various types of communication lines. By definition, to
ensure prompt and accessible exchange of information files is necessary, that users had
access to the Internet and software for data processing. All modern telecommunication
technologies based on the use of networks.
Network resources are divided into these types:
• Hardware (servers);
61
• Software (provides reception, transmission and processing of information);
• Information (storage of different arrays of information).

There are several services, or types of services that are provided to consumers on the
Internet. For their correct use is necessary to have two computers, one of them is a
workstation user, and the second - the server is the source of network resources. The
work of all services based on the use of application protocols that specify a list of rules to
which all companies to ensure the compatibility of hardware and software. Also the data
transfer is based on a client-server program, which involves client requesting services
from the server.
The Internet can provide the following services:
• Telecommunication (messaging, information of various types and sizes,
teleconference, etc.);
• Information (search for information in any format that the user interests);
• Consulting (training and advice on any matters relating to the use of public
resources);
• Technical services (installation and testing of hardware and software);
• Commercial (all commercial activities on the Internet);
• On-line communication between subscribers;
• Placement of advertisements on various websites, social networks and other sites;
• Cellular and mobile communications.

The introduction of telecommunication technologies in different spheres of life


Initially telecommunication technologies conceived for uninterrupted messaging at a
great distance. The uniqueness of the network was that it could properly function even
after damage to its parts. Internet invented for military purposes, but it was leaked to a
wide range of users and has been used successfully in many spheres of activity. With the
help of scientists, students and professionals of different professions quick access to
information in any format could facilitate its work. Search essential data in minutes, and
the software provides them with the correct treatment. The opportunity to keep track of
all the processes of personnel and execution of orders in remote access for executives,
which greatly increased the productivity of labor.

Questions:
1. Why do we need to connect computers?
2. What is a computer network?
3. Briefly describe the following network components.
4. a. Client b. Server c. Hub d. Router

5. What are the differences between a Hub and a Switch?


6. How do we use a MODEM?

62
7. Describe the following categories of networks briefly
8. a. PAN b. LAN c. WAN d. MAN
9. Explain the classifications of networks according to the topology.
10. What does it mean Internet and Intranet? Why is it important to use intranet
than internet?
11. What is the most suitable connection method for the following;
a. Computers within a laboratory.
b. Connect two computer laboratories.

References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.
Lecture №8. Cybersafety.
Purpose: Have an idea about e-business and e-government.
Plan:
1.Security risks of information and their classification. Industry of cybersafety.
Cybersafety and control of the Internet.
2.Malicious applications. Measures and means of information protection.
3.Standards and specifications in information security field. The acts of the Republic
of Kazakhstan governing legal relations in the sphere of information security.
4.Digital signature. Encoding.

1.Security risks of information and their classification. Industry of cybersafety.


Cybersafety and control of the Internet.
One of the main aspects of the problem of security automated system (AS) is the
identification, analysis and classification of possible threats to specific speakers. A list of
the most significant threats, assess their likelihood and model of the attacker are basic
information for an optimal protection.
Information Security Risk - a set of conditions and factors that create a potential or
actual violation of the existing danger of information security. AS security threats - it is
an opportunity to influence the implementation of the information processed in the AS,
which leads to a breach of confidentiality, integrity or availability of information, as well
as the opportunity to influence the AC components, leading to their loss, destruction or
failure of the operation.
63
threats to the security of information source - a subject that is a direct cause of a
threat of safety information
The main sources of security breaches are in AS:
• accidents and disasters (fire, earthquake, hurricane, flood, etc.);
• faults and failures of hardware;
• design and development component error AC (software and data processing
technology, hardware, etc.);
• Operating error;
• deliberate actions of violators.
There are many criteria for classifying threats. Consider the most common ones.
1. The nature of the origin: natural and artificial
Natural threats - a threat caused by exposure to the AS and its objective elements of
natural physical processes or natural phenomena, independent of man. In turn, artificial
threat - a threat to the AS, caused by human activities.
2. The degree of motivation: unintentional (accidental) and intentional. The first
related to the different kinds of errors - in the design of the AS, in the software, human
error when working with the AS and etc. The second group is related to the self-serving,
and other ideological goals of people, in this case, the intruders. The reason may be to
obtain material gain, revenge, moral beliefs, and so forth.
3. The position in relation to controlled areas: internal and external threats. As an
example, external threats can be to intercept data transmitted over the network or through
a leak PEMIN. The internal threats include theft of media with confidential information,
damage to equipment, the use of various types of bookmarks.
4. The degree of impact on AS: passive and active. Passive threats - threats that do
not violate the composition and the normal operation of the AS. Example - copying of
confidential information leakage through technical channels of leakage, eavesdropping,
etc. Active threat, respectively, disrupts the normal functioning of the AS, its structure or
composition.
5. The mean infringed property information - confidentiality, availability, integrity.
6. The type of system, which is aimed threat: a system based on a stand-alone
workstation and system having a connection to the PSTN.
7. The method of realization: unauthorized access (including random) to protected
information, a special effect on the information, technical information leakage through
leak paths.

2.Malicious applications. Measures and means of information protection.


Malicious program (in the jargon of the anti-virus services, "malware", English
malware, malicious software -. «Malicious software") - any software designed to gain
unauthorized access to computing resources most computer or information stored on the
computer, with the purpose of unauthorized owner use computer resources or damage
(damage) owner information, and / or the owner of a computer and / or the owner of the
computer network by copying, distortion, deletion or substitution of information.
Types of viruses Description
64
and malware
joke Program joke Program - it is a virus-like program that usually
changes the appearance of elements on a computer screen.
"Trojan horse" Trojan horse - is a executable program that does not
replicate itself, and being introduced into the system for the
performance of potentially dangerous actions, such as opening
ports for hackers to access. This program often uses ports
"Trojan horses" to gain access to the system. An example of a
Trojan horse program can serve as asserting that it saves your
computer from viruses when it actually introduces them into the
system.
Virus Virus - a program that can reproduce itself. For this
purpose, the virus has been attached to any program. As a result,
it will be automatically executed during starting of the program.
Boot virus: A type of virus that infects partition or disk
boot sector
The malicious Java code: platform-independent virus code
written in the Java language, or embedded in a Java application.
A macro virus: a kind of virus, written as a macro for a specific
application and often embedded in the document
Viruses VBScript, JavaScript or HTML: viruses that are on
Web pages and downloaded through a browser
Worm: self-contained program (or set of programs) that
can spread copies of itself or segments to other computers, often
through email
The test virus Test virus - it is an inactive file, which is detected by the
antivirus program. Test viruses (such as the EICAR test script)
are used to verify the correct operation of the anti-virus.
Packer Packer - is compressed and / or encrypted executable for
Windows or Linux, you are often a "Trojan horse". Compress
executable packer difficult to determine the antivirus software.
Probable virus / This category of viruses and malware are suspicious files
malware with some signs of a virus or malware. For details about
probable virus or malware, see the following page of the online
encyclopedia viruses Trend Micro.:
http://www.trendmicro.com/vinfo/emea/virusencyclo/defau
lt.asp
Other The category "Other" get viruses and malware that are not
related to any of the types listed above.
Table 9- Types of viruses

Measures and means of information protection.

65
Information security is a confrontation of information security specialists and
hackers. The attacker - a subject who illegally trying to obtain, modify or destroy data of
legitimate users.

Data protection is slaboformalizuemymi task, that is, has no formal methods of


solution, and is characterized as follows:
• a large number of factors influencing the construction of effective protection;
• lack of accurate baseline data input;
• lack of mathematical methods for optimal results at the aggregate source data.
Confidentiality, integrity and availability are the three most important
properties of the information in the framework of its safety:
• confidentiality of information - the state of the information in which access to it is
carried out only entities that have a right to it;
• integrity of the information - the state of the information for which there is no any
change in any change is only intentionally subjects have a right to it;
• the availability of information - the state of the information in which entities with
access rights can sell them freely
Among these types of protection are the basic legal, organizational and
technical protection of information.
Legal protection - protection of information by legal methods, including the
development of legislative and regulatory documents (acts) that regulate subjects
regarding the protection of information, the use of these documents (acts), as well as
supervision and control over their execution
For legal protection measures include the RК laws, decrees and other legal acts. At
the legislative level, there is regulation of the rules for handling the information are
determined participants of information relations, their rights and duties as well as liability
in the event of breaches of the law. In some way measures of the group may include
prophylactic. Their main function is to prevent potential intruders, because in most cases
it is the fear of punishment stops from committing crimes. The advantages of legal
protections is their versatility in terms of application to all illegal methods of information
extraction. Moreover, in some cases, they are only applicable, such as in the protection of
copyright in case of illegal replication.
For moral and ethical measures include standards of conduct established in the
society. In some cases, they can be made in writing, such as charter or code of honor of
the organization. Compliance with ethical standards is not mandatory, and is more of a
preventive nature.
Organizational security measures - organizational measures designed to regulate the
functioning of information systems, staff performance, users interact with the system.
Among the basic organizational information protection measures can be identified as
follows:
• Formation of a security policy;
• The regulation of access to premises;
• Regulation of access of employees to use resources information system and others.

66
• Determination of liability in the event of non-compliance with information security
requirements.
Organizational measures alone can not solve the security problem. They should
work in conjunction with physical and technical means of information protection in the
definition of the actions of people.
Physical protection is a set of tools that prevent physical penetration of a potential
intruder in the monitored area. They may be mechanical, electro-mechanical or electronic
devices of various types. Most often, it is with the construction of the physical protection
of security begins in the organization, including the information.
The last and most extensive in its composition echelon protection system is the
technical protection of information. It is this type of protection is dedicated to this course.
Technical protection of information - data protection is to ensure
nekriptograficheskimi methods of safety information (data) to be protection in
accordance with applicable law, the application of technical, software and software and
hardware. It is important to note that technical protection - is not only a protection against
leakage of information through technical channels of leakage, but also protection against
unauthorized access from the mathematical effects, malware, etc. The objects of technical
protection of information can be:
• information of the object;
• Information system;
• resources information system;
• Information Technology;
• software;
• communication network.
We proceed to the review of the standards and specifications of two different types:

3.Standards and specifications in information security field. The acts of the Republic
of Kazakhstan governing legal relations in the sphere of information security.
LAW OF THE REPUBLIC OF KAZAKHSTAN
On National Security of the Republic of Kazakhstan
(With amendments and additions as 26.07.2016 )
Article 4. Types of National Security
5) information security - the state of protection of information space of the Republic
of Kazakhstan, as well as the rights and interests of man and citizen, society and the state
in the information sphere of the real and potential threats, which provides a sustainable
development of the country's independence and information.

4.Digital signature. Encoding.


1. What is a digital signature?
Digital signature - is the resulting cryptographic (encryption) transformation of
information using a private key signature props electronic document designed to protect
the document from forgery, as well as from unauthorized changes. In fact, the electronic
67
signature - a full, having the same legal effect as handwritten signature analogue, bonded
stamp.
2. Why use digital signature?
The purpose of digital signature is authentication information, ie protection of
transmitted information, the participants of information exchange for guarantees of their
authenticity. EDS system requires that every user has a private key that is used to
generate the signature, and the corresponding public key for checking signatures and
distributed to a certain circle of users in the system of information exchange.
From a practical point of view of electronic signature is used in electronic
document management systems, and for participation in electronic auctions.
3. What is the key certificate?
The certificate is an electronic document that links signature verification data to a
specific person, confirms the identity of that person and certified by an electronic digital
signature Certification Center
4. What is a Certification Authority?
Certification Center - a specialized organization performing the following functions:
• registration of users;
• Production of signature key certificates;
• creation of electronic digital signature keys to guarantee the secrecy of the closed key
EDS;
• Suspension and resumption of signature key certificates of action, as well as their
cancellation;
• maintaining a register of signature key certificates, ensuring its relevance and the
possibility of free circulation to it participants of information systems;
• verification of the uniqueness of a public key digital signature in the register of
signature key certificates;
• certification of the signature key information about their action;
• implementation of the appeals of the user certificate authentication signature key
signature in the electronic document in respect of signature key certificates issued to
them.

6. How does the digital signature?


With the help of electronic signature information is encrypted and is accessible to anyone
having access to it to the user. To determine the identity of the author of the document
and the authenticity verification using the so-called "Hash function".
In the first stage of signing the document EDS built a special function (such as a
checksum), a hash function that identifies the contents of the document. In the second
stage the author of a document encrypts the content hash his personal private key. Thus
they encrypted hash function is placed in the document and is stored and sent with it. The
size of the hash function is negligible, so there is no appreciable increase in the size of
the document.
When you receive a document signed by the electronic signature, the user can verify
its authenticity. There it is. At the first stage the recipient of the document is building its

68
own version of a hash of the signed document. In the second stage decrypted hash
function, that contain the document. The third step is the comparison of the two hash
functions. Their match is a guarantee of the authenticity of the document and its
authorship.
7. What are the two keys are needed?
In the digital signature system used asymmetric encryption method, in which two
different keys are used, none of which can be obtained from another. One key (open) is
used to encrypt and the other (private) - to decrypt the information. The private key is in
its holder, which ensures high secret key and the public key is distributed to all users of
the system, so that they can carry out the authentication of the received documents and
signatures. This key can not be used to decrypt the information so it makes no sense to
limit its spread.
With the help of the public key of the recipient information, other users information
system encrypts the information and no one but the recipient will not be able to decipher
it, because to decrypt the private key is used, and it is available only from him.

8. Is it possible to check the credentials of the person who signed the document
on behalf of a digital signature?
Yes, it is only necessary to look accessible to all users of electronic signature
certificate owner. When you receive the keys of electronic digital signature in the
employee organization leader confirms the position and powers of the employee
(including the right to sign certain categories of documents). On the basis of the
certificate of the public key signature indicates the position and powers of the electronic
signature of the owner.
9. What if the private key is lost or electronic signature was in the hands of
unauthorized persons?
This is called EDS key compromise. The first task in this situation is the early
notification Certification Authority about what happened to output from the
compromised key actions in the system. Since then, the signature becomes valid and you
can rest easy. Then you can begin to address the issue of getting a new certificate of the
signature key.
What is encryption?
Encryption - the mathematical science of codes, ciphers and secret messages.
Throughout history, people have used encryption to exchange messages, the contents of
which, they hoped, would not be able to read no one except the recipients.
Today, there are computers capable of performing encryption for us. Digital
encryption technology went beyond the simple secrets. Encryption is used for more
complex tasks, such as checking the websites of the individual author's anonymous
browsing or using the Tor network.
Under certain conditions, the encryption can be fully automatic and easy to use. But if
something goes wrong, it is helpful to understand what was going on. Then you will be
better protected from the problems.
Three important concepts in encryption.

69
Private and public keys. One of the most important concepts in the encryption -
key. The common encryption schemes have a private key that is kept secret on your
computer and allows you to read messages addressed to you. Since you can also put the
private key to send messages is protected against forgery digital signature. The public
key - the file that you can share with others or publish. It allows people to share with you
encrypted messages and to verify your signature. Private and public key - pair. They are
like two halves of a stone, two exactly suited to each other, but dissimilar parts.
Safety Certifications. Another very important concept - a security certificate. The
web browser on your computer can establish an encrypted connection with websites via
HTTPS. In such cases, the browser verifies the certificate by checking public keys of
domain names (eg, www.google.com, www.amazon.com and ssd.eff.org). Using
Certificates - one way to confirm the authenticity of your existing public key person or a
website, so you can securely exchange information with him.
The network from time to time you will see a message about a security certificate
error. As a rule, the reason is to try the hotel or an Internet cafe, where you are, "open"
your encrypted data exchange with the website. In addition, this error often occurs
because of bureaucratic problems in the certificate system. But sometimes it occurs when
you try to hacker thief, police authority or the security services to crack your encrypted
connection.
Unfortunately, it is extremely difficult to establish the true cause. Therefore, when a
security certificate error can not take exception to websites where you have an account or
where you get very important information.

Prints keys.
The word "print" in the field of computer security can mean many different things.
One of the options - "print key": a sequence of characters, such as 342e 2309 bd20 0912
ff10 6c63 2192 1928. The print key allows you to securely authenticate the private key
used by anyone on the Internet. If the test print is passed, more likely that the other
person is really who he claims to be. This method is not perfect: the attacker can use the
same print, copy.

Questions:
1. What are the threats to information security and their classification?
2. What is cyber security industry?
3. What are there measures and the protection of the media?
4. Standards and information security specifications.
5. When is founded a law on information security?
6. What is a Digital Signature?

References

70
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.

Lecture №9 Internet technologies.


Purpose: іntroduce Internet to the student, to provide an introduction to the e-mail.
Plan:
1. Basic concepts Internet. The universal identifier of resources (URI), its
assignment and components.Service DNS.
2. Web technologies: HTTP, DHTML, CSS, and JavaScript.
3. E-mail. Message format.
4. SMTP, POP3, IMAP protocols.

1. Basic concepts Internet. The universal identifier of resources (URI), its


assignment and components.Service DNS.
A URL (Uniform Resource Locator) is a form of URI and is a standardized
naming convention for addressing documents accessible over the Internet and Intranet.
An example of a URL is http://www.computerhope.com, which is the URL for the
Computer Hope website.
Overview of a URL
Below is additional information about each of the sections of the http URL for this
page.

http://
The "http" stands for HyperText Transfer Protocol and is what enables the browser
to know what protocol it is going to use to access the information specified in the
domain. After the http is the colon( : ) and two forward slashes ( //) that separate the
protocol from the remainder of the URL.

71
www.
Next, www.stands for World Wide Web and is used to distinguish the content. This
portion of the URL is not required and many times can be left out. For example, typing
"http://computerhope.com" would still get you to the Computer Hope web page. This
portion of the address can also be substituted for an important sub page known as a
subdomain. For example, http://support.computerhope.com forwards you to the main
help section of Computer Hope.
computerhope.com
Next, computerhope.com is the domain name for the website. The last portion of the
domain is known as the "domain suffix", or TLD, and is used to identify the type or
location of the website. There are dozens of other domain suffixes available. To get a
domain, you would register the name through a domain registrar.
/jargon/u/
Next, the "jargon" and "u" portions of the above URL are the directories of where
on the server the web page is located. In this example, the web page is two directories
deep, so if you were trying to find the file on the server, it would be in the
/public_html/jargon/u directory. With most servers, the public_html directory is the
default directory containing the HTML files.
url.htm
Finally, url.htm is the actual web page on the domain you're viewing. The trailing
.htm is the file extension of the web page that indicates the file is an HTML file. Other
common file extensions on the Internet include .html, .php, .asp, .cgi, .xml, .jpg, and .gif.
Each of these file extensions performs a different function, just like all the different types
of files on your computer.
The structure of the URL is shown in the figure below.

Figure 22: Structure of the URL

There are several domains available in the web such as:


edu = education institute
com = commercial enterprise
gov = government
org = organization
net = network provider
72
mil = military

2. Web technologies: HTTP, DHTML, CSS, and JavaScript.


Internet Protocols

Internet Refersto Description Internet


Protocol Services

SMTP SimpleMailTransfer A protocol for sending e- Email


Protocol mail messages between
servers

Used by local e-mail


POP3 PostOfficeProtocol clients to email
retrieve e-mail from a
version 3 remote
server over a TCP/IP
connection

This is used to transfer


FTP FileTransferProtocol files Transferring
from one host to another
host files
over a TCP-based
network,
suchastheInternet.
Define show messages
HTTP HyperTextTransfer are WorldWide
Protocol formatted and transmitted, Web(www)
and what actions Web
server sand browsers
should
take in response to the
wide
range of commands.

HTTPS HyperTextTransfer Provides authentication of WorldWide


ProtocolSecure the web site and associated Web(www)
web server andprotects
73
against man-in-the-middle
attacks.

VoIP VoiceoverInternet This enables people to use Online


Protocol the Internet as the chat(thereare
transmission medium for exceptions)
telephone calls.

Table 10- The Internet Protocols

The Internet uses a variety of languages to transmit information from one place to
the other. These languages are called protocols. Using these protocols we can acquire the
services from the Internet. Each protocol has a specific functionality and www is
considered to be the largest service acquired amongst the services provided by the
Internet.

Internet is an interconnection of computer networks all around the world. In other


words, it is the hardware which forms the physical layer to these connections is what we
refer to as the Internet. Hence, the Internet comprises of network of computers, fiber-
optic cables, copper wires and wireless networks. But www is the software which is used
to access the information from the Internet. It consists of files, folders and the documents
which are stored in different computers. Now it is crystal clear to you that the www
depends on the Internet to work.

Introducing the Internet buzz words

World Wide Web


WWW is a part of the Internet which functions using HTML. WWW operates under
a protocol called HTTP.

Browser
A browser is a computer software which can be used to view documents on the
Internet. Web browsers interpret HTML code and display images and text.

Search Engine. Search engine is an automated web-site which is programmed to


search specified keywords and give the websites and Internet based documents as a
result.

Client.A computer which is capable of receiving the information from the server in
the Internet is called a client. A home PC is an ideal example for this.
74
Server.Client computers download files in the Internet from the Server. These
servers are directly linked to the internet and consist of a lot of documents.

Domain
The Domain is the top level identification string for a particular server (yahoo.com).
There are various types of domains. It can be categorized using one or more extensions.
FTP
FTP is a standard Internet protocol which refers to the File Transfer Protocol. Using
this protocol we can transfer files from one computer to the other via Internet. This is the
simplest way to exchange files between computers on the Internet. FTP is an application
protocol that uses the Internet's TCP/IP protocols. FTP is commonly used to transfer Web
page files from their creator to the computer that acts as their server for everyone on the
Internet. It's also commonly used to download programs and other files to your computer
from other servers.

HTML
HTML is the abbreviation for Hyper Text Markup Language. The web pages are
called hypertext documents because when you click a word or a picture which is hyper
linked you can go to another location. From there you can jump to another webpage. This
is made possible because HTML allows the document‟s author to embed hyperlinks.

HTTP
HTTP is the foundation of data communication for the World Wide Web. HTTP
(Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic
images, sound, video, and other multimedia files) on the World Wide Web. When the
browser user enters file requests by either "opening" a Web file (typing in a Uniform
Resource Locator or URL) or clicking on a hypertext link, the browser builds an HTTP
request and sends it to the Internet Protocol address (IP address) indicated by the URL.
The HTTP daemon in the destination server machine receives the request and sends back
the requested file or files associated with the request.
Example URL: http://www.yahoo.com

HTTPS
HTTPS stands for “Hyper Text Transfer Protocol Secure”. This means that the data
transferred electronically is encrypted and cannot be accessed by unauthorized people.
HTTPS provides authentication of the web-site and related web server which is
interacting with thus protecting against Man-in-the middle attacks.
CSS
1. Short for Cascading Style Sheet, CSS is a concept first created by HåkonWium
Lie in 1994. In December 1996, CSS was made a specification by the W3C and today
allows web developers to alter the layout and appearance of their web pages. For

75
example, CSS may be used to change the font used in certain HTML element, as well as
its size and color. A single CSS file may be linked to multiple pages, which allows a
developer to change the appearance of all the pages at the same time.

3. E-mail. Message format.


A person can exchange his/her messages digitally through e-mail. E-mail has so
many similarities with the postal mail. Similar to a postal mail, e-mail too can be sent
from anyone but the mail will be received by the person who owns a particular e-mail
address. Of course, you would have used e-mail to convey messages to a person living in
another part of the world.

How e-mail works in brief


The mails you send will be temporarily saved in your mail server. Email servers
accept, forward, deliver, and store messages. Neither the users nor their computers are
required to be online simultaneously; they need connect only to an e-mail server, to send
or receive messages. Mail server is also used to mean a computer acting as a Mail
Transfer Agent (MTA) that isrunning the appropriate software.

Using emails
Email address. An Email address has 3 parts in it. If we type an email address, it
will be in the following format.
Eg: username@hostname

1 2 3

1:-The first part identifies the user. Usually case sensitive.


2:- The @ sign which comes in between

E-mail address breakdown


[email protected]
 The first portion all e-mail addresses, the part before the @ symbol, contains the
alias, user, group, or department of a company. In our above example support is the
Technical Support department at Computer Hope.
 Next, the @ (at sign) is used as a divider in the e-mail address;
 E-mail clients
 An email client is a computer program used to access and manage a user's
email. It is also referred to as an e-mail reader or a Mail user Agent (MUA). It
can refer to any system capable of accessing the user's email mailbox, regardless of
it being a mail user agent, a relaying server, or a human typing on a terminal. In
addition, a web application that provides message

76
4. SMTP, POP3, IMAP protocols.

More about E-mailing concepts


The SMTP Server
When we send an email, our computer connects to our email service‟s mail server.
A server is a centralized computer which manages a specific type of service. An email
server for instance, handles emails. The email server responsible for sending emails is
called the SMTP (Simple Mail Transfer Protocol) server. One SMTP server can pass on
the mail to another SMTP server and relay it to the destination through several hops.

Every email has the sender‟s address (e.g. [email protected]) and the
recipient‟s in the To
Field (e.g. [email protected]). When an email is sent, the email client
connects to the
SMTP server of the sender‟s email service (e.g. mailserver.sendermail.com). The
client transmits the address of the sender, the address of the recipient and the content of
the message.
The SMTP server goes to work at locating the whereabouts of the recipient. Using
the recipient‟smail ID (i.e. [email protected]) it locates the domain name–
e.g.recipientmail.com.

Each domain name represents a unique Web address, called an Internet protocol
(IP) address. Think of it as postal addresses of the internet. The link between domain
names to their IP addresses is stored in the Domain Name Registry. The SMTP server
then contacts the server where the registry is kept (The DNS Server). The DNS server
sends back the address to the SMTP server.

The SMTP server then proceeds to hand over the email to the SMTP server of the
recipient‟s email service (let‟s call it mailserver.recipientmail.com). This SMTP server
checks and confirms that the mail addressed to [email protected] belongs to
it and hands it over to its counterpart, the POP3 server (or the IMAP server).

The POP3 Server


Post Office Protocol (POP3) servers are the servers that do the job of receiving
mails. The number ‘3’ is the version number of the protocol in use. POP3 servers have
mail accounts (our email IDs). Each mail account is mapped to a username-password
combination. Once the message is handed over to the POP3 server, it is kept and stored
in the mail account till the recipient logs in and checks the mail.
The IMAP Server
An email client connects to the POP3 server and tells it to allow download of the
email. Once downloaded to the local machine, POP3 mailboxes do not retain a copy of
77
the email. Thus, you cannot check your emails from another PC as it has already been
downloaded. To tack this difficulty, IMAP was introduced. IMAP (Internet Message
Access Protocol version) simply retains a copy of the emails on the server. This allows
you to access your e-mail from any location with an internet connection.

Questions:
1. What is a „mail server‟? Describe how to send an e-mail between two
people.
2. What is an e-mail client? Name two types of e-mail clients with examples.
3. Definethefollowingterms.
SMTP
DNS Server
4. What are the advantages of POP sever and IMAP server?
5. When sending an e-mail what is the difference between CC and BCC?
6. How can you attach a document to your e-mail?
7. List three e-mail etiquettes and give reasons for doing them.
8. What are the three parts of an e-mail address?
9. When creating an e-mail account what is the purpose of typing a given code
in the cage provided?
10. What is the purpose of “inbox” in an e-mail account?

References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.

Lecture №10. Cloud and Mobile technologies.


Purpose: The purpose of this lecture is to analyze current trends in hardware,
leading to the emergence of cloud computing technology.
Plan:

78
1.Date centres. Tendencies of development of the modern infrastructure
decisions.
2. Principles of cloud computing. Technologies of virtualization. Web service in the
Cloud.
3.Main terms and concepts of mobile technologies. Mobile services. Standards of
mobile technologies.

1.Date centres. Tendencies of development of the modern infrastructure


decisions.
Data center (from the English data center.), оr center (and storage), data (data center
/ TSHOD) - is a specialized building for the accommodation (hosting) server and
network equipment and connecting users to the Internet channels,
Data Center performs processing functions, storage and dissemination of
information, usually in the interest of corporate clients - it is focused on solving business
problems by providing information services. Data centers are typically located within or
in proximity to the node or connection point prisutstviyakakogo any one or more carriers.
Quality and channel bandwidth does not affect the level of service as the main criterion
for evaluating the quality of any data center is the server availability.
Modern infrastructure solutions.
Every year for the continuity of the business services requirements increase, and obsolete
equipment to ensure the smooth functioning of virtually impossible. In this regard, the
largest IT vendors produce and implement a more functional and reliable hardware and
software solutions. Consider the basic tendencies of development of infrastructure
solutions, which, one way or another, contributed to the emergence of cloud computing
concept.
Growth performance computers. The advent of multi-core and multi-processor
computer systems, the development of blade systems
1.The emergence of systems and storage area networks
2. Infrastructure Consolidation
The advent of blade systems
In the development of computer technology has always existed a large class of
problems that require a high concentration of computing resources. These include, for
example, complex high-performance computing (scientific problems, mathematical
modeling), as well as maintenance tasks large number of users (distributed databases,
Internet services, hosting). Increasing the number of computing units in the data center
requires new approaches to the placement of servers, and also leads to an increase in
premises costs for data centers, their power, cooling and maintenance. What is the Blade-
server? By definition, this market research firm IDC Blade-server or blade - a modular
single-board computer system that includes a processor and memory. The blades are
inserted into a special chassis with a backplane (backplane), providing them a network
connection and power supply.
The emergence of systems and storage area networks
Another feature of the modern history of the development of computer systems, along

79
with the advent of blade servers, was the emergence of specialized systems and storage
area networks. Internal storage subsystem servers often could not provide the required
level of scalability and performance under a cascade of increasing the volume of
information processed. As a result, there were external storage systems focused
exclusively on the decision of the data storage tasks and providing data access interface
for their use.
Data Storage System (NAS) - a hardware and software solution for the
organization of a reliable storage of information resources and providing them
secure access.
Data storage systems are reliable storage device, into a separate unit. The data
storage system may connect to the server in many ways. The most productive is the
connection for optical channels (Fiber Channel), which makes it possible to access the
storage system with speeds of 4-8 Gbit / s. Storage systems also have reservations major
hardware component - several power supplies, raid controllers, FC adapters and optical
patch cords to connect to the FC switches
Storage Area Networks
SAN - a high-speed switched data transmission network of servers, workstations,
disk storage and tape libraries. Data exchange takes place according to the protocol
Fibre, Channel, optimized for fast and guaranteed messaging allows you to send
information over a distance of several meters to hundreds of kilometers.The driving
force for the development of storage networking has become an explosive growth in the
volume of business information (such as e-mail, database and file servers highly loaded),
which requires high-speed access to disk devices at the block level. SANs help to
increase the efficiency of use of storage resources, providing opportunities to allocate any
resource to any node on the network.
Consolidation of IT infrastructure
Consolidation - an association of computing resources or management structures in
a single center.
Analysis of international experience allows us today to talk about a clear trend
towards consolidation of corporate IT resources. That she is able to significantly reduce
IT costs. Savings same tools can be directed to improving the quality of available
information services, and the introduction of new ones. In addition to optimizing IT
costs, consolidate IT resources, improves manageability enterprises through more current
and complete information about their functioning. Usually they talk about consolidation:
a)servers - moving decentralized applications distributed on different company
servers in one cluster of centralized homogeneous servers;
b) Storage - sharing of centralized storage multiple heterogeneous hosts;
c) Application - accommodation of multiple applications on a single host.
2. Principles of cloud computing. Technologies of virtualization. Web service in the
Cloud.
Terms such as "cloud" and "cloud computing" since the beginning of zero began to
be used quite often by the general public and actively Force IT-startups. For many of
these concepts are abstract and vague. Let's see, what, specifically, is the - cloud
computing.
80
Cloud computing - the public, the term that is defined in the authoritative sources
like the following:
Cloud computing - a principle (model), according to which computing resources
such as servers, storage and data processing device (or the services of the program - in
other sources) are available on request from the customer, are provided with a network
connection.
At the same time there are a few characteristics that the system should have recognition
for its cloud. Here are the most common ones:
. The same resources (service data) can be obtained regardless of which device and
how the customer uses the network node;
2. Ability to identify client's resources that it uses;
3. Price calculation depending on the volume of services used;
4. Flexibility - the ability for a customer at any time to change the amount of resources
used by it in the automatic mode;
5. The presence of a service that provides computing services, API.
6. pooling of resources allocated among the clients in a single system.

Virtualization Technology
According to statistics, the average processing capacity utilization at the server running
Windows does not exceed 10%, in Unix-based systems, this figure is better, but still an
average of less than 20%. Low server utilization is due to widely used since the early 90s
approach "one application - one server".., Ie, every time the company acquires a new
server for the deployment of a new application. It is obvious that in practice this means a
rapid increase in server park and as a consequence - increase in costs for its
administration, power and cooling, as well as the need for additional space for the
installation of all new servers and the acquisition of licenses for the server operating
system.
Virtualization of resources of the physical server, allows the flexibility to distribute
them between applications, each of which is thus "sees" only the resources dedicated to it
and "thinks" that it a dedicated server, ie in this case implemented a "one server - several
applications.". but without compromising performance, availability and security of server
applications. In addition, virtualization solutions make it possible to run in different
sections of the operating system via emulation of system calls to the hardware resources
of the server.
The virtual car will be called the software or hardware environment that hides the
real implementation of a process or an object from presentation.
Virtual car - a fully isolated software container that works with its own operating system
and applications, like a physical computer. The virtual machine acts just like a physical
computer and contains its own virtual (ie, software) of RAM, hard drive and network
adapter.
Web services in the Cloud.
Often there are three options, three service models (eng. service — services, services) in
the cloud:
1. IaaS — infrastructure as a service. This infrastructure consists of all neobhodimyh
81
computer parts and provided so that it can be customised almost as iron in the form of a
computer. Of course, it is served in the abstract after virtualization.
2. PaaS — platform as a service. In this case, the client works with the system at a higher
level. If we compare these two services with standard hosting services, the difference
between PaaS and IaaS can be thought of as the difference between normal shared
hosting and VDS.
3. SaaS — software as a service. The user is given only implemented in the framework of
service opportunities.
3.Main terms and concepts of mobile technologies. Mobile services. Standards of
mobile technologies.
Mobile device’s technology
Technology and technical devices of mobile commerce make user a large extent
independent of stationary computing devices, providing all of the above possibilities for
mobile phone or handheld computer available. This independence is very important for a
business person: often the decision is released for a limited time, and it should not
interfere with such factors as the inability to rapid clearance of the transaction or the lack
of access to information channels.
Below listed are the mobile devices that are the most common nowadays, which
allow to work in the area of mobile commerce.
Mobile phone with WAP function, GPRS or own microbrowser. Mobile
(smartphone) has become a significant phenomenon of the late XX - early XXI century.
Advances in technology and communication standards chips lowered the price of the
phone for fifteen years, more than twenty times. This functionality has increased many
times over - a modern smartphone is a powerful computing device with a flexible
operating system, large memory, database, built-in frequency and time standard
multimedia features, the ability to communicate with other electronic devices, and exit
the Internet.
Mobile access to the Internet can take place via a wireless modem, built-in WAP-
browser, or by synchronizing the device

It connected to the Internet (WAP-phone, a smartphone, a laptop, a personal


computer). Application protocol wireless connection (Wireless Application Protocol -
WAP) is a result of collaborative association WAP Forum, bringing together device
manufacturers and mobile technology (Nokia, Ericsson, Motorola, Samsung Electronics),
telecommunications operators (Deutsche Telecom, France Telecom, AT&T) and the
company that manufacture software and services providers (Microsoft, IBM, RSA,
Unwired Planet, Symbian). Association covers about 90% of the market wireless devices.
The purpose of the association - to develop a unified open standard for exchanging
content between wireless devices and Web-based server. The WAP protocol includes
specifications for the transport and session layers (see chap. "Open Systems"), as well as
data protection.
Increased attention to the WAP due to several reasons. One of them: Internet and
mobile devices today – are two very promising and rapidly developing industry,

82
therefore, the development of standard communication between them is one of the most
popular solutions. WAP is a set of the following protocols:
• protocol ensuring the data exchange between the client and the server (Wireless
Session Protocol - WSP);
• ensuring of transactions based on the protocol of the transport mechanism of
requests and responses (Wireless Transaction Protocol - WTP, Request and Reply);
• wireless transmission Datagram Protocol (Wireless Datagram Protocol - WDP);
• to ensure the safety protocol (Wireless Transport Layer Security - WTLS).
Information is transmitted between the client and the WAP-WAP-server. In a
typical mobile WAP-phone can act as a client. With microbrowser-program request is
sent to the wireless access network, which is received by the WAP-gateway. WAP-
gateway, in turn, sends the URL-request using the HTTP protocol the requested Web-
site, with the requested Web-page to be written in a language WML (Wireless Markup
Language). Web-site generates a response in WML format, sends it at WAP-gateway and
from there, the requested information is transmitted to the mobile phone in the client
binary format. After that, the information is decrypted and presented in a convenient
form for the customer - audio, video, text message.
Mobile services on the Microsoft Azure platform - one of the most modern types of
applications that can be developed in Visual Studio. Mobile service on the Azure
platform - is a server application that manages cloud database used them to store
information received from the mobile application on your mobile device. The scheme of
the chain "mobile app- mobile service" next. The user (mobile client) on your
smartphone can run a mobile application that interacts with the mobile cloud service in
the Azure cloud. The mobile client enters the required information in the form of on-
screen on a smartphone, and refers to the mobile service, stores the information in the
cloud database. After this possible treatment
This scheme is useful in many areas: for example, a visit to the patient's doctor, who
inspects the patient and transmits the data via their smartphone to the cloud database.
This cloud-based database, in turn, can be quickly accessed by other doctors and clinic
management, etc. In this respect, the use of cloud computing Azure platform provides a
huge opportunity, both in terms of the volume of information stored in the cloud, and in
terms of ease of use.
Mobile technology standards.
Nowadays, there are three standards for mobile communications: CDMA, GSM and
UMTS.
GSM-standard
Customer’s growing demand forced manufacturers to develop a variety of
technologies to increase the data rate. Thus, initially, the data transmitted in GSM at a
rate of 9.6 kilobits per second. But with the advent of GPRS-technology, subscribers
receive a decent alternative to the Dial-Up for mobile Internet access. Almost all
Ukrainian operators, the average speed of GPRS-connection is about 40-50 kilobits per
second and can vary significantly depending on various conditions.

83
The next step in the development of high-speed capabilities of GSM has been the
development of EDGE technology. Initially it had pinned great hopes up to support
streaming video and online TV. But in practice the stated rate was virtually unattainable,
thus, EDGE technology was simple, which increases the speed of access to the Internet
from a mobile phone compared to GPRS.
UMTS - a new communication standard, which allows you to get in addition to
standard services, available in the second-generation networks, and more features such as
video calls, online TV and a high-speed Internet access. This technology is recognized as
a 3G-standard. UMTS is realized in four frequency bands 850/1700/1900/2100 MHz.
However, it is possible that this number may soon be extended. In Ukraine, a UMTS
connection is available only at a frequency of 2100 MHz, and is only one provider - Utel,
two other operators, "Kyivstar" and Beeline offer their subscribers roaming access to the
network.
The rates offered UMTS standard, not long satisfied customers, so was soon
developed and implemented HSDPA technology by which data transfer rate has
increased nearly 10 times. However, with such a substantial increase in injection rate, the
reverse flow was too small. Thus was born the HSUPA technology, which is at the same
high injection rate, almost 10 times increased the rate of outgoing data flow. At this point
in Ukraine is only implemented HSDPA technology with a peak speed of 3.6 Mb / s
technology capabilities allow it to increase to 14 MB / s.
In the 4G technology standards are used LTE and WiMAX.
Many providers often use the 4G term to describe the technologies offered today,
sometimes even at the same time distorting reality. However, current 4G implementation
mostly relates to the pre-4G, since they do not fully meet the requirements of high-speed
4G - to 1Gbit / s for stationary reception and 100Mbit / s to mobile.
In addition to speed, to qualify as a 4G network, it must satisfy a number of other
principles. In short, the network must be extremely spectrally efficient, must dynamically
allocate and use their resources to support large numbers of simultaneous users per cell,
should offer a high quality of service for next generation multimedia support, and should
be based on a switched network all-IP.
LTE -standard LTE Long-Term Evolution (LTE) is regarded by many as the natural
successor to the current 3G technologies. This is partly due to the fact that it updates the
UMTS network to a significantly higher data transmission rates, as in downloading, and
the injection. The specification provides a peak download speed at the level of 100 Mbps
/ sec, and the injection - to 50Mbit / sec. However, tests in the real world data rate will
likely be in the area 5-12 Mbit / sec for downloading and 2-5Mbit / sec per injection.
In general, the LTE standard developed by a consortium 3rd Generation Partnership
Project (or 3GPP) as the eighth edition of what has evolved from the GSM family of
standards since 1992.
WiMAX - is a broadband wireless standard, which is based on the IEEE 802.16
standard. As the name implies, WiMAX can be considered an extension of the standard
Wi-Fi, designed to provide a wide range of devices (from laptops to smartphones) high-
speed mobile internet access. The current implementation is based on the WiMAX

84
802.16e specification, which is a 30-mile range (48,27km) theoretically offers transfer
speeds of up to 70Mbit / sec.
Questions:
1. What is Data Center?
2. What are the principles of cloud computing?
3. What is Virtualization Technology?
4. What are the Web-service Cloud?
5. What are the differences between a standard as LTE and WiMAX?

References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.

Resources:
1. http://www.intuit.ru/studies/courses/673/529/lecture/11914?page=2

Lecture №11. Multimedia technologies.


Purpose: to have an idea about multimedia technologies and 3-D representation of
the virtual world and animation.
Plan:
1.Representation text, audio, video and graphical information in a digital format.
Basic technologies for compression of information.
2.3-D representations of the virtual world and animation. Instruments of
development of multimedia applications.
3.Use of multimedia technologies for planning, descriptions of business processes
and their visualization.

1.Representation text, audio, video and graphical information in a digital format.


Basic technologies for compression of information.
The modern computer can process numerical, text, graphic, sound and video
information. All these types of information in the computer are presented in a binary

85
code, i.e. the two alphabet is used (only two symbols 0 and 1). It is connected with the
fact that it is convenient to present information in the form of the sequence of electric
impulses: the impulse is absent (0), the impulse is (1). It is accepted to call such coding
binary, and the logical sequences of zero and units - computer language. Each figure of
a machine binary code bears amount of information equal to one bit.
This conclusion can be drawn, considering figures of the machine alphabet as
equiprobable events. At record of binary figure it is possible to realize the choice only of
one of two possible states, and, so she bears amount of information of equal 1 bits.
Therefore, two figures bear information 2 bits, four categories - 4 bits etc. To define
amount of information in bits, it is enough to define the number of figures in a binary
machine code.
Depending on in what object the data which are subject to compression are placed
distinguish:
1. Compression (archiving) of files: it is used for reduction of the sizes of files by
preparation them to transfer by communication channels or to transportation on external
carriers of small capacity;
2. Compression (archiving) of folders: it is used as means of reduction of volume of
folders before long storage, for example, at backup;
3. Compression (consolidation) of disks: it is used for increase in efficiency of use
disk spacious by compression of data in case of record them on the data carrier (as a rule,
means of an operating system).
There are many practical algorithms of compression of data, but all of them are based on
three theoretical ways of reduction of redundancy of data. The first way consists in
change of contents of data, the second - in change of structure of data, and the third - in
simultaneous change of both structure, and contents of data. If at compression of data
there is a change of their contents, then the method of compression is called irreversible,
that is at recovery (extraction) of data from archive there is no complete recovery of
information. Such methods often are called compression methods with the regulated
losses of information. It is clear, that these methods can be applied only to such types of
data for which loss of a part of contents doesn't lead to essential distortion of information.
Video and audiodata, and also graphic data belong to such types of data. Compression
methods with the regulated losses of information provide considerably big extent of
compression, but they can't be applied to text data. Can be examples of formats of
compression with losses of information:
• JPEG - for graphic data;
• MPG - for video data;
• MP3 - for audiodata.
If at compression of data there is only a change of structure of data, then the method of
compression is called reversible. In this case, from archive it is possible to restore
information completely. Examples of formats of compression without loss of
information:
• GIF, TIFF - for graphic data;
• AVI - for video data;
• ZIP, ARJ, RAR, CAB, LH - for any types of data.

86
There are many different practical methods of compression without loss of information
which, as a rule, have different efficiency for different types of data and different
volumes. However, three theoretical algorithms are the cornerstone of these methods:
• RLE algorithm (Run Length Encoding);
• KWE group algorithms (Key Word Encoding);
• Huffman's algorithm.
RLE algorithm
The idea of detection of the repeating sequences of data and replacement with their
simpler structure in which the code of data and coefficient of repetition is specified is the
cornerstone of an algorithm of RLE. For example, let such sequence of data is set that is
subject to compression:
1111223444
In an algorithm of RLE it is offered to replace it with the following structure: 1 4 2 2 3 1
4 3 where the first of each couple of numbers is a code of data, and the second -
repetition coefficient. If for storage of each element of data of the entrance sequence 1
byte is taken away, then all sequence will occupy 10 bytes of memory whereas the output
sequence (the compressed option) occupies 8 bytes of memory. The compression
coefficient characterizing extent of compression can be calculated on a formula:
where Vx-memory size necessary for storage of the output (resultant) sequence of data,
Vn-of the entrance sequence of data.
The value of coefficient of compression is less, the compression method is more
effective. It is clear, that the algorithm of RLE will give the best effect of compression
with a bigger length of the repeating sequence of data. In case of the example reviewed
above if the entrance sequence has such appearance: 1 1 1 1 1 1 3 4 4 4, the coefficient of
compression will be equal to 60%. In this regard big efficiency of an algorithm of RLE is
reached at compression of graphic data (in particular for monophonic images).
KWE group algorithms
At the heart of a compression algorithm according to keywords the principle of coding of
lexical units by groups of bytes of the fixed length is put. The usual word can be an
example of a lexical unit. In practice, the repeating sequences of symbols which are
coded by a chain of symbols (code) of smaller length get out to a role of lexical units.
There are many implementations of the algorithm, among which the most common
are the Lempel-Zіva (LZ algorithm) and a modification of Lempel-Zіva-Welch (LZW
algorithm). Glossary This algorithm is a potentially endless list of phrases. The algorithm
starts with an almost empty dictionary, which contains only one encoded string, so-called
NULL-line. When reading the next data sequence symbol input, it is added to the current
line. The process continues as long as the current line matches any entry in the
dictionary. But sooner or later, the current line has ceased to fulfill any phrase dictionary.
At a time when the current line is the last match with the dictionary plus just read the
character of the message, the encoder outputs the code, which consists of an index of
coincidence, and it follows the character that broke the strings match. The new phrase,
consisting of matching index and the next character after him, added to the dictionary.
The next time, if the phrase appears in the message, it can be used to build longer phrases
increases the extent that data compression.

87
LZW algorithm is built around a table phrases, which replaces the character string
compressed messages in a fixed-length codes. The table has a so-called property of
timing, that is, for each phrase dictionary, consisting of a phrase w and the symbol K, w
also entered the phrase in the dictionary. If all parts of the dictionary is completely filled,
it stops being adaptive coding (encoding takes place on the basis of existing phrases in
the dictionary).
Compression algorithms in this group are most effective for text data of large volumes
and are ineffective for small file sizes (due to the need to preserve the dictionary).
Huffman algorithm
The Huffman algorithm based on the idea of coding bit groups. First, the frequency
analysis is performed the input data sequence, i.e set the frequency of occurrence of each
character occurring in it. Thereafter, the symbols are sorted to reduce occurrence
frequency.
The basic idea is this: the more common symbol, the smaller the number of bits is
encoded. coding result is stored in the dictionary required for decoding. Here is a simple
example that illustrates how the Huffman algorithm.
Suppose we are given a text in which burva 'A' consists of 10 times, the letter 'B' - 8
times, 'c'- 6 times, 'the D' - 5 times, 'E' and 'F' - 4 times. Then one of the possible coding
options Huffman given in Table 1.

Sy frequency b
mbol of occurrence it
code
A 10 0
0
B 8 0
1
C 6 1
00
D 5 1
01
E 4 1
10
F 4 1
11
Table 11- Possible coding options Huffman

see Table 1, the size of the input text before compression is 37 bytes, whereas after
compression - 93 bits, which is about 12 bytes (excluding the length of the dictionary).
The compression ratio is 32%. Huffman algorithm is universal, it can be used to

88
compress data of any type, but it is not very effective for small file sizes (due to the need
to preserve the dictionary).
In practice, software data compression synthesize these three "clean" algorithms because
their effectiveness depends on the type and amount of data. Table 2 shows the common
compression formats and their corresponding archiver Programs that are used in practice.
Format MS DOS operating Windows operating
compression system system
Utility unzippi Utility unzippi
program ng program program ng program
ARJ Arj.exe Arj.exe WinAr WinArj
j.exe .exe
RAR Rar.exe Unrar.exe WinR WinRar
ar.exe .exe
ZIP Pkzip.exe Pkunzip.exe WinZi WinZip
p.exe .exe

Table 12- Compression formats and their corresponding archiver Programs

2. 3-D representations of the virtual world and animation. Instruments of


development of multimedia applications.
To create a computer graphics using special software called 3D-editors are. They
provide the user with a three-dimensional space, where you can create, move and rotate
3D-objects. Moreover, in modern 3D-editors are there are special tools that make objects
move on their own, that is, create animations based on them.
Program 3ds Max, which will be discussed in this course, is such a 3D-editors are. This is
one of the most popular applications in the world for the development of three-
dimensional graphics, with which created many well-known films, games and
commercials.
Three-dimensional graphics - it is something between a computer game and shooting of
this film. Window 3D-editors are - a window to the virtual world, which is your set. And
only you can decide which movie you shoot, what it will be the scenery and actors.
For the three-dimensional image in the following steps are required on the plane:
• Modeling - the creation of three-dimensional mathematical model of the scene and
objects in it;
• Texturing - purpose surfaces bitmap or procedural texture models (also includes the
setting of material properties - transparency, reflection, roughness, etc.);
• Lighting - installation and configuration of the light sources;
• animation (in some cases) - giving the movement of the subject;
• Dynamic simulation (in some cases) - Automatic calculation of the interaction of
particles, hard / soft bodies, etc. to be modeled by gravity, wind, pushing, etc., as well as
with each other..
• Rendering (visualization) - construction of the projection in accordance with the
89
selected physical model;
• Compositing (layout) - finalization of the image;
• conclusion of the resulting image to the output device - a special display or printer.
Multimedia (multimedia) is a set of computer technologies, simultaneously using
multiple information environments: graphics, text, video, photography, animation, sound
effects, sound, human speech.
Multimedia technology is the combination of modern digital audio, television, visual and
virtual communications that allow you to enter, save, process and reproduce textual,
audiovisual, graphic, three dimensional and other information.
Technology of creation of multimedia applications
Programs that allow you to combine individual parts into the complete whole-in-one
multimedia application that can be divided into three groups:
• specialized program designed for fast training of certain kinds of multimedia
applications;
• more tools multimedia;
• programming languages.
The boundary between these three types of programs are gradually eroded, but still quite
noticeable. To create presentations and publications, the first group of programs. For the
development of other types of multimedia products, the possible second and third
options.
More tools media take place between programs, multimedia presentations and
programming languages. The division between programs, multimedia presentations and
author tools is rather arbitrary. In General, we can say that the first is focused mainly on
the transmission of information in one direction (from computer to user), and the second
are used to create software products with a high degree of user interaction.
The use of copyrighted media saves time and money, but the efficiency of the program
will be lower. Programming is more costly and time-consuming way, but it gives more
opportunities for implementing the ideas of the author. More systems offer a
programming environment for the scripting language for user-interface design. From real
programming languages they are distinguished by their limited capabilities. However, in
recent times, there are quite a lot of systems in which the programming, even on the
specialized, but the programming language is not mandatory and is complementary to the
capabilities of the programs to create the application on the computer screen. Such
capabilities and modern programming languages, they added wizards to quickly create
applications whose task is building source code in a programming language after the user
inputs the basic information on the application appearance.
Thus, the task of choosing the necessary funds to develop multimedia applications is not
as simple as it seems at first glance, and versatile solutions, suitable for all occasions.
For the development of a multimedia product requires a set of technical means
corresponding to a small multimedia Studio, including:
• a multimedia computer;
• color scanner, better tablet, and is needed for scanning images software;
• recording storage on CD-ROMs;
• video card for digitizing the video (if not, the recording and digitization can be
ordered).
90
3.Use of multimedia technologies for planning, descriptions of business processes
and their visualization.
Speaking about modeling business processes, we will use the terminology of several
fields of knowledge related to Economics, computer science, complex system modeling.
So, before going any further, it is necessary to introduce some basic concepts and
definitions. For a start try to understand what actually is — "modeling business
processes". A business process is defined as a logically complete the chain of related and
recurring activities, in which enterprise resources are used for processing an object
(physical or virtual) with the aim of achieving certain measurable outcomes or the
creation of products to satisfy internal or external customers. As a customer of the
business process could also be another business process. The chain typically includes
operations that are performed according to certain business rules. Under business rules,
understand the ways of implementation of business functionality within a business
process, as well as the characteristics and conditions of execution of the business process.
Components of a business process can be performed by people (manual or computer
tools or mechanisms) or be fully automated. The procedure and effectiveness of the work
of the one who performs the action, determine the overall efficiency of the business
process. The task of each enterprise seeking to improve its activities is the construction of
these business processes that would be effective and included only do the necessary
actions. The term simulation has two main values. First, under the simulation to
understand the process of constructing a model as a representative (image) of the
original, reflecting the most important features and properties. If the model is already
constructed, then modeling is the process of the study (analysis) of operation of the
system, or rather its model. The basic purpose of modeling business processes is to
describe the real course of the business processes of the company. It is necessary to
determine what is the result of the process, by whom and what actions are performed,
their order, what is the movement of documents during the execution of the process and
how the process is reliable (probability of failure) and how it can be extended/modified in
the future. To ensure the transparency of the business processes is important because only
in this case, the owner of the business process (employee, Manager business process and
responsible for its results and efficiency), business analyst, management and other
stakeholders will have a clear idea of how work is organized. Understanding the progress
of existing business processes provides an opportunity to judge their effectiveness and
quality and the need to develop supporting business it infrastructure. The successful
development of application systems supporting the business processes from beginning to
end, is possible only when the processes themselves clear details. A model of the
business process, is called its formal (graphical, tabular, text, character) description that
reflects the existing or proposed activities of the company. The model usually contains
the following information about a workflow:
• a set of components process steps — business functions;
• the order of execution of business functions;
• the mechanisms of control within a business process;
• performers each business function;
91
• incoming documents/information, outgoing documents/information;
• the resources needed to perform each business function;
• documentation/conditions governing the performance of each business function;
• parameters describing the execution of business functions and the overall process.

Questions
1. What is data center?
2. What is the principles of cloud computing?
3. Virtualization technology?
4. What are Web services in the Cloud?
5. What are the differences between a standard such as LTE and WiMAX?
6. What is the purpose of modeling? What types of modeling do you know?
7. What types of computer simulation can be carried out in environments of three-
dimensional graphics?
8. What factors influence the degree of data redundancy?
9. What is an archive? What kind of software are called archivers?
Why compression techniques in which there is a change in data content, called
irreversible?
10. Give examples of compression formats with loss of information.

References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.

Resources:
1. http://ru.wikipedia.org/wiki/
2. http://ru.wikipedia.org/wiki/
3. http://www.intuit.ru/studies/courses/673/529/lecture/11914?page=2

Lecture №12. Technology Smart.


Purpose: to prepare students for the use of Smart Technology.
Plan:

92
1.Internet of things. Big data. Technology Block Chain. Artificial intelligence.
2.Use of Smart-services. Green technologies in ICT.
3.Teleconferences. Telemedicine.

1.Internet of things. Big data. Technology Block Chain. Artificial intelligence.


Internet of Things - Internet the concept of computer networks of physical objects
("things"),equipped with built-in technologies to communicate with each other or with
the environment, which considers the organization of such networks as a phenomenon
that can rebuild the economic and social processes, are excluded from the part of the
action and operations need for human intervention Internet of things. This is a new stage
of development of the Internet, significantly enhances the collection, analysis and
distribution of data that a person can turn into information and knowledge. In this sense,
the Internet of Things becomes very important.
Why do we need the Internet of Things (IoT)
Ideology Internet of Things is aimed at enhancing economic efficiency by
automating processes in various fields of activity and exclusion of these rights.
At the beginning of 2016 the use of Internet of Things technologies are oriented
primarily on mass segments IoT, where the end user motivation are market incentives for
the use of the IoT solutions and services, such as:
1. "Smart House", including:
 Solutions for intelligent security services
 solutions for intelligent resource optimization services by households
2. "Intelligent Transport", including:
 class fleet management services for individual carriers (some analogue of
Uber for trucks)
 Services UBI-insurance
 services for maintenance of the actual
3. Trade and financial
 Solutions for the automatic transmission and analysis of data with POS-
terminals, including virtual
 services:inventory management as a service households
How did the Internet of Things
Internet of Things was born at MIT. In 1999, there Center for Automatic
Identification was established (Auto-ID Center), engaged in radio frequency
identification(RFID)and new sensor technology. Center coordinated the work of the
seven universities located on four continents. It is the architecture of things the Internet
has been developed here-.
According to the consulting division Cisco IBSG (Internet Business Solutions
Group) American corporation, the Internet of Things Just a moment in time when the
number of "things" or material objects connected to the Internet, exceeded the number of
people using " world Wide Web ".

93
in 2010, the number of connected devices has increased to 12.5 billion, while the
world population was 6.8 billion people as a result of the rapid spread of smartphones
and tablet computers. Thus, for the first time in the history of every person to have to
become more than one connected device (1.84 unit per capita).
Big data begin information technology- a set of approaches, tools and methods for
handling structured and unstructured data of huge volume and considerable variety for
perceived human results, effective in the conditions of continuous growth, the
distribution across multiple nodes of a computer network,formed at the end of
2000s,alternative to traditional database management systems and solutions-class
Intelligence. Business In this series include funds massively parallel processing vaguely
structured data, primarily solutions NoSQL category,algorithms, the MapReduce
software frameworks and libraries project Hadoop
Methods of analysis
methods and analysis techniques applicable to big data, allocated at McKinsey
report:.
 Class Methods Data Mining:rule learning,association classification (methods
of categorization of new data on the basis of previously Applied on the longer is
there data), cluster analysis, regression analysis,
 crowdsourcing- categorization and enrichment of data forces wide, an
indefinite number of people, attracted on the basis of a public offer, without entry
labor relations;
 fusion and integration-data a set of techniques for integrating disparate data
from a variety of sources to enable in-depth analysis, as examples of such
techniques, composing this class of methods provides digital signal processing,and
natural language processing (including tone analysis),
 Machine learning,including training with the teacher without the teacher,as
well as learning Ensemble- the use of models built on the basis of statistical
analysis and machine learning for complex projections based on basic models
constituent Wed. with a statistical ensemble in statistical mechanics),
 artificial neural networks, network analysis, optimization,including genetic
algorithms,
 Pattern recognition,
 Predictive analytics,
 Simulation modeling,
 spatial analysi- the Spatial class methods using topological, geometric and
geographic information data,
 Statistical analysis,as examples of methods are A / B-testing and time-series
analysis,
 visualization of analytical data- presentation of information in the form of
drawings, diagrams, using interactive features and animation for the results, and
for use as raw data for further analysis of-the transaction chain blocks built
according to certain rules of a chain of transactions generated blocks. For the first
time the term appeared as the title of a distributed database implemented in
94
cryptocurrency"Bitcoin".Also widely used term Blockchain as a transliteration
from(Eng. Block chain Blockchain,Block - a block, chain- chain)
Block Transaction
Transaction Block - a special structure for the transaction group records in the
system Bitcoin:..and others like it
Тransaction is considered to be accurate ( "the confirmed"), its format and the
signature must check and then a group of transactions recorded in a special structure - the
block.The information in the blocks, you can quickly double-check. Each block always
contains information about the previous block. All units can be built in a single chain,
which contains information about all committed transactions ever in this database. The
first unit in the chain - the primary unit ( block) -genesis is regarded as a special case,
because it does not have the parent unit transactions..
The block consists of a header and a list of Title block includes a hash, hash of the
previous block, hash transaction and additional service information. The system first
Bitcoin transaction in a block is always specified to obtain a commission that will reward
the user for the established flow.
Then go all or some of the recent transactions that have not yet been recorded in the
previous blocks. For transactions in the block using a tree hashing,similar to the
formation of hash sums for the file in the BitTorrent protocol.Transaction fees for
charging besides creating unit contained within the attribute input the reference to
transaction data from the previous state (at Bitcoin system, for example, reference is
made to the transaction for which consumable bitcoins were obtained). Transaction Fees
may contain any information in the attribute (for which this field is known as the
English. parameter),Coinbase because they have no parent transaction.
Created block is adopted the other users, if the numerical value of the header hash is
equal to or below a certain number, the value of which is adjusted periodically. As a
result of the hash (SHA-256 function) is irreversible,there is no algorithm for obtaining
the desired result, in addition to random search. If the hash does not satisfy the condition,
then the title is changed parameter nonce and the hash is recalculated. Typically, a large
number of calculations of the original is required. When the option is found, the node
sends the resulting unit is connected to other nodes that test unit. If there are no errors,
then the block is considered to be added to the chain, and the next block should include a
hash of it.
The value of the target number, which is compared to the hash in Bitcoin system is
adjusted every 2016 blocks. It is planned that the entire system Bitcoin network must
spend a generation unit for about 10 minutes, at blocks 2016 - about two weeks. If block
2016 formed faster, the goal is slightly reduced, and it becomes difficult to achieve
otherwise target increases. Changing the computational complexity does not affect the
reliability of Bitcoin network and only need to system generated blocks with almost
constant speed, independent of the processing power of network members.
Block chain

95
Figure 23-Block chain

Primary sequence of blocks (black) is the longest of the initial (green ) to the
current. The side branches (purple) are cut off.
Artificial intelligence Science and technology for creating intelligent
machines,especially intelligent computer programs;
2) the property of intelligent systems to perform creative functions that are
traditionally considered the prerogative of the human
AI is associated with a similar task of using computers to understand human
intelligence,but not necessarily limited to biologically plausible methods AI:..
We can distinguish two directions of development of
 Problem solving associated with the approach of the specialized AI systems
to human capabilities and their integration, which realized the nature of man;.the
creation of artificial intelligence, which represents the integration of already
existing AI systems into a single system capable of solving the problems of
mankind,but at the moment there is the involvement of many people in the field of
artificial intelligence domains that have more practical relevance to AI rather than
fundamental. Many approaches have been tried, but the emergence of artificial
intelligence, no research team has not yet been reached. Below are just some of the
most well-known developments in the field of AI

Application
 Blue -Deep Defeated world chess champion.match Kasparov against a
supercomputer is not brought satisfaction neither computer scientists or chess
players, and the system was not recognized Kasparov(see. The person against the
computer). Then IBM supercomputer line was manifested in projects brute force
Blue Gene (molecular modeling) and simulation system of pyramidal cells the
incenter of the Swiss Brain
 IBM development perspective, the ability to perceive human speech and to
produce probabilistic search, using a large number of algorithms. To demonstrate
the Watson took part in the American game«Jeopardy!»,Analogue"of the game"in
Russia, where the system was able to win in both games
 -MYCIN One of the earliest expert systems that can diagnose a small set of
diseases, often just the same as Dr.
 20Qa project based on the ideas of AI, based on the classic game of "20
questions." He became very popular after the appearance on the Internet at 20q.net
site.

96
 Speech Recognition.Systems such as the ViaVoice able to serve consumers.
 Robots in the annual tournament, RoboCup compete in simplified form of
football.
Banks use artificial intelligence systems (AIS) in the insurance business (actuarial
mathematics), while playing at the stock exchange, and management of the property.
Pattern recognition methods (including more complex and specialized, as well as neural
networks) are widely used in optical and acoustic recognition (including text and speech),
medical diagnostics, spam filters, air defense systems (goals definition), as well as to
provide a number of other national security issues.

2.Use of Smart-services. Green technologies in ICT.


Synonyms: SMART-approach / method
This term refers to a way of wording the immediate objectives of
so-called smart goals (from the English travel smart - smart.) - A goal that meet the
following requirements direction.
Specific - concrete - determine the original motion
Measurable measurable - set its units
Аchievable attainable - to compare with the realities of the day and the environment
Realistic the realistic / pragmatic - to have a subsequent use of the achievements
Timed a specific time - define the date / time to achieve last.

One of the D TV manufacturers are additional possibilities of television sets under the
name Smart TV. These television sets are also called "smart TVs", and they provide
access to the Internet and install additional applications, as well as provide additional
opportunities for media content (video files, photos, music) to the TV.
This feature will allow you to download a variety of applications to search for
television content chat while watching programs on the air, to search for information on
the Internet from your couch, keep in touch with friends and family, find reviews about
movies and much moreTV:.
Hub - Smart is a service in which all advanced features Samsung application store
browser, search, and, of course, the applications themselves. The number of available
Smart Hub features may vary from series to which television belongs.

3.Teleconferences. Telemedicine.
On the Internet, there are tens of thousands of conferences or newsgroups (news),
each of which is devoted to the discussion of any problems. Each conference is allocated
to your mailbox on Web servers that support the work of this conference call.
Users can send their messages to any of these servers. Server periodically
synchronized, that is, exchange mailbox content teleconferencing, conference
proceedings therefore fully accessible to the user on any such server.

97
How it works in teleconferences is not much different from the principle of e-mail.
The user can send their messages to any newsgroup and read messages sent by other
participants.
To work in newsgroups are usually used the same e-mail programs, and that when
working with e-mail, such as Outlook Express. Setting up Outlook Express to work with
newsgroups is similar to configuring e-mail, you have created an account for the news,
such as "Conference". Outlook Express creates the same name off older the Conference
of the that is initially empty
Telemedicine - one of the areas of medicine, based on the use of modern
communication technologies for remote medical care and timely advice
Basic telemedicine direction follows:Among the major telemedicine areas should
be allocated as Telemedical consultations, tele-education, online broadcast operations,
remote biomonitoring and home telemedicine.
Тelemedicine consultations. The telemedicine is remote consultation and diagnosis
of patients are considered to be the most common and popular service. With the help of
video conferencing systems between vrachёm consultant and the patient is getting better
full audiovisual contact. Thus, the patient and the doctor can not only see and hear each
other, but also to share graphics and text data (eg, x-ray of the patient picture doctor or
license).
The medical tele-education. Health seminars, conferences and lectures broadcast
videoconferencing system enable professionals of a higher level to share their knowledge
and skills not only in theory but also in practice. Thus, more experienced professionals
can even remotely monitor the progress of operations and to give practical advice to their
colleagues.

The online broadcast of surgery. The use of webcams to transmit over the Internet
a variety of information, allows for broadcast operations. This area is also used
telemedicine for Tele-mentoring when a more experienced expert to remotely control the
actions of their colleagues in the online mode. During the operation, one person can
transmit different image medtechnics (microscope, endoscope or an operating table),
applied to digital video cameras, his colleague. In addition, you can transfer and
telemetry information (about the patient's state of the pressure, the frequency of its pulse
rate and many others. Al.).

Home telemedicine. This area includes the provision of telemedicine physicians


care for patients undergoing treatment in the home. Specially designed for such purposes,
telemedicine equipment transmits and collection of patient information directly from his
home.It is realized as follows: the patient to the home PC connected special complexes
containing sensors for the measurement of body temperature, blood pressure and other
data necessary for the medical professional. Thanks to videoconferencing systems all this
information from the patient's home PC is automatically transmitted to the telemedicine
center for further processing specialists. Particularly relevant home telemedicine for
patients in need of regular, operational surveys (for example, people with heart disease).

98
Questions:
1.What is Internet of things?
2. What is Big data, technology Block Chain?
3.Give exampies to Artificial intelligence.
4.How correctly use Smart-services?
5.What are there Green technologies in ICT?
6. What advantages of ICT in teleconferences, telemedicine.?
References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.

Lecture №13. E-technologies. Electronic business. Electronic training.


Electronic government.
Purpose: to know about e-business and e-government.
Plan:
1.Electronic business: Main models of electronic business. Information
infrastructure of electronic business. Legal regulation in electronic business.
2.Electronic training: architecture, structure and platforms. Electronic textbooks.
3.Electronic government: concept, architecture, services. Formats of implementation
of the electronic government in developed countries.

1.Electronic business: Main models of electronic business. Information


infrastructure of electronic business. Legal regulation in electronic business.
According to the definition of IBM professionals, electronic business(e-
business) The transformation of key business processes using Internet technologies.
Thus, e-business refers to any business activity that uses the possibilities of global
information networks for transforming internal and external relationships to create a
profit.

99
An important part of e-business is e-commerce.Under the e-commerce (e-
commerce) refers to all forms of business transactions that are carried out with the
help of information networks definitions:.
in the dictionary e-business terms by PriceWaterhouseCoopers and eTopS
Consulting companies are given the following
E-business -improving the efficiency of the business, based on the use of
information technology for in order to ensure interoperability of business partners and
create an integrated value chain-..
E-commerce marketing, submission of proposals, sales, rental, licensing, supply
of goods, services or information through computer networks or the Internet
Internet business can be described as medium which allows companies to
increase revenues · because created new channels of income and an increase in
sales volumes;
· reduce costs by reducing the costs of transactions and overheads needs;.
· improve the quality of services, improving the service offered to customers and
better meet their
· Improve conditions for investment;
· ensure corporate company information all over the world or just a target group
of customers;
· automate and optimize business processes both internally and in its relations
with suppliers, dealers and partners;
· ensure business continuity (7 days a week, 24 hours a day).
The basic model of Internet business models There are pure e-business.
The state Business (B) Citizen (C)
(G)
Sta G2G G2B information and sale of illiquid G2C
te coordination assets
Bu B2B supply B2Ge-commerce B2C E-
siness of Commerce
Citi C2G taxes C2B price comparisons C2C
zen Auctions

Table 13- The basic model of Internet business

B2B «Business-to-business»or "Business to Business" - these terms are


indicated all the interactions between enterprises, companies and firms. . The
organization of deliveries, exchange of documents, purchase orders, financial flows,
coordination, joint activities - all this interaction of business with another
Major B2B tools include:
1.the corporate web-site (info page with the listing, project goods and services,
activities, proposals for cooperation),

100
2.internet incubator (a company specializing in the creation of start-up
companies with a view to their subsequent sale to
3.investors;.Internet marketing
Internet marketing is an important tool for effective Internet business Internet
enables companies. more automated marketing through the use of databases-..

B2C «Business-to-customer» B2C or "Business-to-consumer" is the


relationship of the seller and the buyer these include the acquisition of the customer of
any product or service, receiving the consultations, registration of insurance etc.
All the trading system through the Internet can be categorized as web-
showcases, Internet shops and Internet business systems .
Web-showcase designed web-design means the price list the trading company,
which does not contain the business logic of the trading process .
2.Shop Online also comprises web-shop windows, all necessary business logic to
manage the e-commerce process (back-office).
3.Online trading system (OTS) is an online store, the back office is fully (in real
time) is integrated into the trading company's business processes, as well as internal
company document automation-.
Today main attention is focused on the so-called B2C model in which the main
consumers of e-commerce services are the buyers individuals. A very important point
that must be borne in mind when talking about the growth of B2C e-business market -
it is the overall development of the economy, improving the welfare of the "average"
customer. If there is an active development of the economy, will be at a standstill and
the most promising high-tech markets. A man willing to spend money in the e-shop
only when they stayed with him after satisfying the basic needs of food, clothing, etc.
Another aspect of the problem The quality of services. Online shopping can be
developed only if the high quality of all its components. Logistics - perhaps the
defining component of e-commerce B2C model, and we have it is almost not
developed. Transport infrastructure, e-mail system - to high-quality delivery of
Culture continue to develop and evolve. In addition, to create a functioning delivery
infrastructure needs a lot of money and considerable time
Well, the fundamental problem hindering the rapid growth of B2C applications
in our country, -. Standard of living
C2C
model«Customer-to-Customer»,C2C the reflects business relationship arising
between individuals on the on-line auctions and exchanges-.
1.Internet market trading marketplace through which companies conduct trade
in goods and services. The owner gets a commission or, in each transaction it is the
seller or the buyer, reducing costs.
The Exchange is a program of trade-information system that provides traders
(members) equal rights and opportunities for making transactions impartially
performing set of trading rules. The trading system is open and secure due to
accessibility of information on the Internet-.
101
2.Internet auction Trading showcase, where sellers put up for sale the goods
belong to them, and buyers apply for the purchase of these goods«Business-to-
government».
«B2G»
B2G or - a special type of trade on the orders of government organizations

1. Commodity market
infrastructure - a mandatory component of any integrated economic system. The
word "infrastructure" refers to the base, the internal structure of the economic system.
The infrastructure business is a set of components that provide the free flow and overflow
of various resources: financial, trade, labor, information, etc. and linking the movement
together. Business infrastructure ensures its successful functioning control.

She currently performs several important functions:


o the institutionalization of business relations,
o help the subjects of business in the realization of their interests,
o specialized businesses, improving the efficiency of their work on the basis of
differentiation filled their niche markets;
o facilitating forms of legal state and public regulation of business practices
Under the trade market is the sphere of realization of a particular product or group
of products, linked to certain features of the production or consumption nature markets
There are many different signs of the classification of commodity
o on the territorial coverage. Analysis of the market in a particular study,
conducted within the framework of the internal, external and regional market;
o the nature of the end-use product (markets of consumer goods, the markets
of capital goods);
o by the ability of goods to satisfy the needs of certain groups of consumers
(market men's, women's clothing, goods market for photographers, tourists,
o etc.).on terms of use of the goods (durable consumer goods, the average
period of use, short-term)
of product sales market - it is part of the market, within which is carried out, the sale
of goods divided.

Individual commodity market consumers can be into several segments: consumers,


who do not know about the product; They know about the product, but do not buy it;
acquire competitors' products; purchase our products work in the commodity market
require a comprehensive information support

2. Financial market
Modern financial markets this is an extremely complex structure with multiple
participants - financial intermediaries, operating with a variety of financial instruments,
and perform a wide range of functions for the maintenance of economic processes and
management. In the financial market presented a special commodity - money provided
102
for use at a time, in the form of loans under the obligation or permanently, under the
action

3. Labor market
Jobs Ways, public organizations and mechanisms that allow people to find a job
according to their abilities and skills, and employers to hire workers they need for the
organization of the business or other activity.

Wages the value of remuneration paid to the employee for the performance of a specific
task, the amount of work or the performance of their duties for some time

The market has two unique features that leave their mark on the action of the common
market mechanisms -. the universality of goods sold there and the desire for social justice
sellers

product versatility workforce due to the fact that the person is fit to master different
professions and retrained for life, if it is profitable and justify the investment of time,
effort and money. In developed countries, is not uncommon, when changing profession
even people with higher education.

In addition, the flexibility of labor as a commodity is manifested in the fact that


professionals of the same profession can work in a variety of companies, parts of the
same country, and even to change the country, where they have to work hard .

4.Information market

information services market is a confluence of economic, legal and organizational


relations on trade (buying and selling) information services between suppliers and
consumers, and is characterized by a particular nomenclature of services, as well as the
terms and conditions of their representation mechanisms.

The advent of modern information services expanded demand information on products,


as promoted the individualization of supply of these products, their approximation to the
individual needs of individual users and, thus, to the convergence of information models
of producers and users teaching.

2.Electronic training: architecture, structure and platforms. Electronic textbooks.


E-learning(Eng. E-learning, an abbreviation of the English. Learning) -Electronica
system of training through computer and electronic technologies
Definition UNESCO«E-Learning - learning through the Internet and
experts:..multimedia,"
e-learning include:

103
 independent work with electronic materials, using a personal computer,
PDA, mobile phone, DVD-player,TV and other,
 obtaining advice, tips, ratings from a remote (geographically) expert
(teacher), for remote interaction, theof
 Creation a distributed user community (social networks), leading the overall
virtual learning activities,
 timely Hour delivery of e-learning materials; standards and specifications for
electronic learning materials and technology, distance learning tools,
 formation and improvement of information culture for all heads of
enterprises and divisions of the group, and the mastery of modern information
technology, improving the efficiency of its ordinary activities,
 the development and promotion of innovative educational technologies, the
transfer of their teachers;
 to develop educational web-resources;
 the opportunity at any time and in any place to get modern knowledge, are
available in any part of the world access to higher education for persons with special
needs
related to e-learning, electronic textbooks, educational services and technology. In
fact, e-learning began with the use of computers in education. Initially training with the
use of computers alternated conventional, classic practical exercises. E-learning and now
does not exclude communication with the teacher face to face.

ELearning modern sample concept has evolved along with the Internet connectivity
technologies, and includes the ability to virtually anywhere download additional
materials underpinning received by electronic aids theory, pass the completed task ,
consult with the instructor. The main thing is that all these features are supported
electronic media programs. Now the development of e-learning depends on the
development of the media, but electronic books, fully revealing its potential, are still in
the development stage of traditional:.
e-education has a number of advantages
1. Freedom of access- the student can do almost anywhere. Not all e-learning is
available through the Internet. Adult students can study without interruption from work
2. Reduced training costs The student bears the cost of media, but it does not
bear on the methodological literature. In addition, the economy is growing at the expense
of wages, which do not need to pay teachers, the content of education and so on.
Production of e-learning materials does not imply deforestation
3. Flexibility training- duration and sequence of study materials listener
chooses, completely adapting the whole learning process to fit their capabilities and
needs courses
4. The opportunity to develop in step with the times- users of electronic And
the teachers and students develop their skills and knowledge in accordance with the latest
modern technology and standards. Electronic courses also allow you to update the study
materials timely and promptly.
104
5. Potentially equal opportunities obucheniya- training becomes independent of
the quality of teaching in a particular school.
6. The ability to define the criteria for assessment of Knowledge in e-learning
has the opportunity to exhibit clear criteria by which to assess the knowledge gained in
the process of student learning.

Electronic textbook- a special device libo program software used in the educational
process and replaces the traditional paper book. Currently, treatment of the phrase
"electronic textbook" is very broad: in some cases it means the electronic version of the
paper textbook, in some - a complex program on electronic devices, allowing to show
students, in addition to the text, studies multimedy material containing a interactive
units of examination updating from a central source and so on. Electronic textbooks
latter species are still under development, so basically modern electronic textbooks are
electronic text with illustrations. Almost all teachers celebrate the simplicity of using
the electronic textbook students, increase students' motivation and interest in working
with academic subject with the help of a technical device, the pleasure when using ET
in the classroom and at home.

3.Electronic government: concept, architecture, services. Formats of


implementation of the electronic government in developed countries.
Electronic Government (English e-Government.) - A way to provide information
and assistance already formed a set of public services to citizens, businesses, other
branches of the government and public officials, in which the personal interaction
between the state and the applicant is minimized and information technology is used as
much as possible. E-government - state electronic document management system based
on the automation of the entire set of management processes across the country and
serves as the target of significantly improving governance and reducing social
communications costs for each member of society. Creation of e-government involves
building a nationwide distribution of the social management system, implementing the
decision of the full range of tasks associated with managing documents and their
processing.

Questions:
1. What is Electronic business?
2. What are the principles of еlectronic government?
3. What are the еlectronic trainings?
What are the differences between еlectronic training and еlectronic textbooks?
4. What are formats of implementation of the electronic government in developed
countries an archive?

References

105
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 2015,
576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2012,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.
5. Business Fundamentals: Hands-on training manual / Ed. YB Rubin, M-2014
6. Mushroom VD Business Basics: A Tutorial. - M .: Finance and Statistics, 2016
7. Fundamentals of business activities. Financial management. Marketing / Ed. VM
Vlasova - M .: Finance and Statistics, 2015.
Resources:
1.http: //refleader.ru/jgeujgrnayfsyfs.html
2.http://ru.wikipedia.org/wiki/
3.http://ru.wikipedia.org/wiki/
4.http://www.intuit.ru/studies/courses/673/529/lecture/
Lecture №14. Information technologies in the professional sphere. Industrial
ICT
Purpose: to train students to use software for solving specialized professional field
Plan:
1.The software for the solution of tasks of the specialized professional sphere.
2.Modern IT trends in the professional sphere: medicine, power, etc.
3.Use of search engines and electronic resources in the professional purposes.
4.Safety issues in industrial information and communication technologies.

1.The software for the solution of tasks of the specialized professional sphere.
Аpplication package- a set of programs designed to meet the challenges of a
certain class (functional subsystem, business application)method-oriented.
 the following types of PPP:
 general purpose (universal);
 problem-oriented,
 global networks;
 organization (administration) computing process whole..
IFR general purpose- versatile software designed to automate the development and
operation of the user's functional tasks and information systems as a By this RFP class
includes:
106
 text editor (word processor) and graphics,
 spreadsheets,
 database management systems (DBMS);
 integrated
 packages; Case-technology;
 the shell of expert systems and artificial intelligence systems
changes.
RFP for creating and text documents, graphics, and illustrations, called the editor.
Text editors designed to handle text and perform mainly the following functions:
record the text file;
insert, delete, replace characters, lines, text fragments,
spell checking,
formatted text, different fonts,
text alignment
preparation tables of contents, splitting the text on the page;
search and replace words and expressions,
the inclusion in the text of simple illustrations;
text printing
The most widely used text editor Microsoft word, word Perfect (currently owned by
the company Corel), chiWriter, Multi-Edit And other used.
Graphic editors are for processing graphic documents, including diagrams,
illustrations, drawings and tables. Allowed to control the size and font of figures, moving
figures and letters, the formation of any image. Among the most famous image editors
can be called packages Corel DRAW, Adobe PhotoShop and Adobe Illustrator.
Publishing systems combine the possibilities of text and graphic editors have
developed capabilities for formatting strips with graphic materials and then printed.
These systems are targeted for use in publishing and typesetting systems are called.
Because these systems can be called PageMaker products from Adobe and Ventura
Publisher of Corel Corporation.
Spreadsheets. Spreadsheet called RFP for processing tables.
The data in the table is stored in the cells located at the intersection of rows and
columns. The cells can be stored numbers, formulas and character data. Formula values
are set dependent on the contents of one cell to other cells. Changing the contents of a
cell resulting in a change of values in the dependent cells.
The most popular PPP of this class are products such as Microsoft Excel, Lotus 1-2-
3, Quattro Pro, and others.
Database Management Systems.To create a database inside the machine
information support uses special IFR - database management system-.
Database A set of specially data organized sets stored on disk adding,.
database management includes data entry, their correction and manipulation of data,
that is, delete, retrieve, update, etc. Developed database applications to ensure the
107
independence, working with them on the specific organization of information in
databases. Depending on how these organizations are distinguished: network,
hierarchical, distributed, relational database management system
from the available database the most widely used Microsoft Access, Microsoft
FoxPro, Paradox (corporation Borland), and the Oracle database company, Informix,
Sybase, Modern etc

2.Modern IT trends in the professional sphere: medicine, power, etc.


Computers have long been used in medicine. Many modern diagnostic methods
based on computer technology. Such methods are surveys, as ultrasound or computed
tomography, generally unthinkable without a computer. But in a more "old" methods of
examination and diagnostic computers are invading more and more actively. Cardiogram
and blood tests, the study of the fundus and dental health ... - It's hard to find an area of
medicine in which computers have not been applied to more and more to.
Active, but only diagnostic use of computers in medicine is not limited They are
increasingly beginning to be used in the treatment of various diseases -. Starting from the
construction of the optimal treatment plan and to manage the various medical facilities
during procedures

The information economy has changed many aspects of economic reality, in


particular, and the function of money, that of a universal equivalent effort gradually
turned into a means of calculation. Virtual banks and payment systems -. The fruit of
development of information technologies
in economics and business information technology applied to the processing, sorting
and aggregating data for the organization of interaction of actors and computer
technology, to meet the information needs for operational communications, etc.
It is understood investment decision in the development of information
technologies, as well as other management decisions should take into account economic
feasibility. But it turns out that this very convenient to calculate the benefit in using all of
the same information technologies. There are models of counting the total economic
impact, which allows to take into account, among other things, additional benefits of the
introduction of information technologies, scalability and flexibility of the systems, as
well as potential risks.

3.Use of search engines and electronic resources in the professional purposes.


The search engine (Eng. engine) -searchit is a computer system designed tofor
search information.One of the most well-known applications of search engines - web
services to search for text or graphic information in the World WideWeb.There are also
systems that can search for files on the FTP-server, goods inonlinestores, information in
the Usenetnewsgroups.
To search for information using a search engine user formulates a search
request.The search engine's job is to search for the user to find documents that contain
108
any specified keywords, or words, in any way related to the keyword. In this case the
search engine generates a search result page. Such a search listing may comprise various
types of results, such as web pages, images, audio files. Some search engines also extract
information from the appropriate database and web directory.
The search engine is better than more documents that are to relevant the user's
request, it will return. Search results may become less relevant due to the nature of
algorithms or due to human error. Мost popular search engine in the world is Google.
According to the methods of research and service shared by four types of search
Systems using crawlers, systems controlled by a person, the hybrid system and the meta-
system. The search system architecture typically includes:
 crawler that collects information from Internet sites or from other
documents,
 indexer, provides a quick search on the stored information, and
 the search engine - a graphical interface for the user
How does search engine

Figure 24- job of search engine

High-level architecture of the standard crawler


Main components of a search engine crawler, indexer, search engine:.
As a rule, the system works in stages. First, the crawler receives the content, then
the indexer generates a searchable index, and finally, the search engine provides the
functionality to search for the indexed data. To update the search engine indexing of the
loop is executed again.
Search engines work by storing information about many web pages, which they
receive from HTML pages. Crawler or "crawler"(eng. -Crawler)a program that
automatically runs through all the links found on the page, and makes them stand out.
Crawler based on references or on the basis of a predetermined list of addresses, searches
for new documents, not yet well-known search engine. The site owner can exclude
certain page using a robots.txt, using which you can prevent the indexing of files, pages
or the site directory.

109
Searcher operates to output files received from the indexer. The search engine
receives user requests, processes them using the index and returns search results

4.Safety issues in industrial information and communication technologies.


Vision of information security of the Republic of Kazakhstan
Information Security Concept of the Republic of (Hereinafter - the Concept) is designed
to ensure that the interests of society and state in the information sphere.
recently updated issue of equal participation of the Republic of Kazakhstan in the
international exchange of information and processes in the international regulation of
information security. The need to defend the national interest requires an increase in the
activity of state bodies in the framework of existing international organizations
introduction.
Thus, the current state of information security is characterized by the following threats:
1) the imperfection of information security system and dysfunction of critical facilities
information;
2) low level of production, the and the use of modern information and communication
technology that does not meet the objective needs of and
society,
3) depending on the Republic of Kazakhstan on import of information technologies,
informatization and protection of information, the use of which may cause damage to the
national interests of the country;
4) the rise of information warfare between the world's leading centers of power,
preparation and conduct of foreign states struggle in the information space;
5) non-constructive policy of foreign countries in the field of global information
monitoring, dissemination of information and the new information technologies;
6) the development of information manipulation technologies;
7) the possibility of destructive information impact on the public consciousness and
public institutions, the applicator damage to the country's national interests;
8) dissemination of false or deliberately distorted information that could harm the
national interests of the Republic of Kazakhstan;
9) openness and vulnerability of the national information space from external influence;
10) lack of effectiveness of information support of public policies;
11) a weak protection and low competitiveness national information space;
12) non-compliance of national content quality of the objective requirements of
Kazakhstan's society and world level;
13) increase in crime, including transnational crime, as well as extremist and terrorist
activities, using information and communication technologies;
14) attempts unauthorized access to information resources Republic of Kazakhstan,
resulting in damage to its national interests;
15) activities of foreign intelligence and special services, as well as foreign political and
economic structures, aimed against the interests of the Republic of Kazakhstan;
16) violations of secrecy when working with information constituting state secrets of the
Republic of Kazakhstan, as well as willful misconduct and unintentional errors and
irregularities in the handling of information of restricted access;

110
17) lack of legal regulation of information sphere system;
18) natural disasters and catastrophes;
19) unlawful actions of state structures, leading to a violation of the legitimate rights and
interests of individuals and legal entities, the state in the field of information
Aims and objectives
The aim of the Concept is creation of a national information security system that
guarantees the protection of the national interests of the Republic of Kazakhstan in the
field of information
to achieve this goal it is necessary to solve the following set of tasks:
1) the development of information security management system that enables ensure
security of the country's national information infrastructure, and a single national
information space;
7) 2016, the level of maintenance to eliminate downtime of information systems for
information security will be reduced to 20 minutes;
8) will be provided by the production of the domestic computer hardware, accessories,
peripherals and software
9)increase the level of innovative activity of industrial enterprises;
10) legal framework governing the information sector will be improved, including
through international cooperation;
11) will improve the system of staffing in the field of information security and the
protection of state secrets.

Questions:
5. What is the software for the solution of tasks of the specialized professional
sphere?
6. Safety issues in industrial information and communication technologies
7. What is the modern IT trends in the professional sphere?
8. What are the differences between using of search engines and electronic resources
in the professional purposes?

References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.

111
Lecture №15. Prospects of development of ICT
Purpose: to prepare students to use programs of acceleration and incubation
Plan:
1.Prospects of development in the sphere of the IT market: development of the free
software. Forming of an ecosystem of IT of entrepreneurship and support small startup of
the companies.
2.Programs of acceleration and incubation.
3.Development of necessary infrastructure of electronic payments and logistics.
4.Prospects of development of E-technologies.

1.Prospects of development in the sphere of the IT market: development of the free


software. Forming of an ecosystem of IT of entrepreneurship and support small startup of
the companies.

The free software (SPO, eng. free software also software libre or libre software),
free software software, where users have rights ("freedom") on its installation, start-up,
free use, study, dissemination and change (improvement) and distribution of copies and
results of any changes. If the software has the exclusive rights, the freedom, are declared
using the free license.

As a free (freeware) and free software, SPO can be used to obtain and usually free
(but the distributor can charge for the obtaining of his copies, delivery channels, media
CD-ROMs or additional services). However, freeware is usually distributed as
executables without source code is proprietary, and to be free (free software), recipients
must be available in source code from which you can create executable files together
with the appropriate licenses. Due to the fact that the word "sale" and called the original
sale, and distribution of copies for the money, and paid licensing (usually proprietary
conditions), some still believe free software is a subset of the free.

Often distinguish between free and open source software (open source) — although
the availability of source code for the SPO is required and many open programs are both
free. The choice of the name is often associated with the language and purpose of
vacancy or openness.

The free software movement began in 1983 when Richard Stallman formed the idea
of having freedom to use the software (eng. software freedom) users. In 1985 Stallman
founded the free software Foundation to provide organizational structure to promote their
ideas.

The business model of the SPO, as a rule, based on the principle of empowerment
— for example, new objects of application, training, integration, configuration or
certification. At the same time, some business models which work with proprietary

112
software that is not compatible with free software, especially those that force users to pay
for the license to legally use a software product.
2.Programs of acceleration and incubation.
Accelerator — a company the business of which is to help other companies
(residents of the accelerator).

Accelerators offer residents a structured program that helps the team to hone the
business model to get the necessary contacts and increase sales. The program lasts from 3
months to half a year. The accelerator typically is a coworking space, where resident
companies can be during acceleration.

The business model accelerator


Accelerators make the receipt of shares in the company and the subsequent sale of
this stake, so often work in conjunction with the venture Fund (the Fund makes
investments, the accelerator educational program, networking, infrastructure).

For example, the accelerator received a share in the amount of 10% of the project N.
a Project N went through the acceleration program, has grown to become a significant
player in the market. Google decided to buy the startup for $10 million In this case, the
accelerator receives 10% of the purchase amount is $1 million.

Program incubation – assistance in the development, promotion and financing for


established small innovative or entrepreneurial companies.
To obtain resident status for the incubation program small businesses must meet the
requirements:
• be registered as a legal entity or individual entrepreneur
• period of activity of a small business entity with the state registration till the
moment of submission of the application should not exceed one year
not carry out the following activities:
• financial, insurance services
• retail and wholesale trade
•building
• medical services
• catering
• real estate transactions
• production of excisable goods
• production and sale of minerals
• gambling.
During the implementation of the incubation program provided office space or
workplace, and end up consulting services on business issues.

113
3.Development of necessary infrastructure of electronic payments and logistics.

E-logistics is the management and optimization of information flows that arise in


the supply chain management of products from producer to consumer. The review
considers the main components of e-logistics: the international system of commodity
numbering codes, electronic data interchange (EDI), global data synchronization network
(GDSN), the role of international and local product catalogues.

"E-logistics" – a study of current trends in development of logistics management e-


logistics and the mastery of techniques and approaches in designing and managing the
supply chain using modern information, communication and computer technology (ICT).

Examines theoretical and applied aspects of electronic logistics as part of overall


concept of supply chain management with the use of active learning methods (discussion
problems, case studies and group work

Payment system — a set of procedures enabling the transfer of funds.

It is generally understood that through payment systems money is transferred. If we


approach translation from a legal point of view, in most cases there is a transfer of debt:
means that the payment system should one of the customers, it becomes must to another
client.

Payment systems are a substitute for cash transactions in the implementation of


domestic and international payments and is one of the basic services provided by banks
and other specialized financial institutions. The biggest service of this kind is the system
SWIFT — society for worldwide interbank financial telecommunication, an international
interbank transfer system information and make payments.
Advanced forms of payment systems are the financial procedures carried out via
ATMs, payment kiosks, POS terminals, and cards with a stored cash value transaction in
the foreign exchange markets, futures, derivatives and options.

Electronic payment systems are a sub-set of payment systems that ensure the
implementation of electronic transfer of payments through the payment network or the
chips.
In an average day through the payment system of Kazakhstan is of 119.3 thousand
transactions in the amount of 753,8 billion tenge.
The largest payment systems are WebMoney — system of instant payments,
Yandex.Money, Qiwi payment service, payment terminals (indoor and outdoor).

WebMoney is a universal tool for calculations in the Network, the whole financial
relationships, which today are used by millions of people around the world. Kazakhstan
takes the 4th place in the number of registrations and probably other indicators too.
Kazakhstan is ahead of only Russia, Ukraine and Belarus.

114
Yandex.Money is the largest electronic payment system in Runet, which offers
simple secure methods of payment for goods and services. Are the offices of Alliance
Bank and branch transfer system CONTACT, as well as terminals Quickpay. Most
Kazakhstanis pay via Yandex.Money online game, entertainment, extra opportunities in
social networks and online advertising.

Qiwi payment service designed to pay for everyday services from mobile
communications and utilities to Bank loans.

The peculiarity of Qiwi service is that payments can be made in cash in the network
of QIWI payment terminals and via the Internet service and the app for mobile devices.
In fact, the user can make a payment from your account in the system being in a
convenient place and in convenient time.

At the moment, with the help of the payment system in Kazakhstan will be possible
to replenish the account in favor of the 157 companies-providers such as utilities,
Internet, cellular communication, IP-telephony, various products through catalogs,
including the services of the three thousand companies that are connected to QIWI-
wallet.
Also on the territory of Kazakhstan has a QIWI-purse in two languages.

Payment terminal — a hardware-software complex providing reception of payments


from individuals in self-service mode. For a payment terminal is characterized by a high
degree of autonomy in its work.

Using terminal you can pay for mobile communication, utility services, Internet
service providers, repay loans, replenish the Bank account.
Kazakhstan companies providing services in the field of payment terminals:
Quickpay, Taulink of Asia Terminal ComepayCyberPlat, TelePay.

Quickpay — the company was founded in 2003. The company started its activity as
a software developer. For the first time in Russia the company developed software for
touch-screen payment terminals on the operating system "Linux". In 2007, the company
entered the market of Kazakhstan.
Taulinkcompany started its activity in the Republic of Kazakhstan in 2006 by the
commercial launch of the first business decisions within the international
telecommunications exhibition KITEL-2006. System for accepting payments TAULINK
represented in more than 8 200 sales and service outlets in 507 settlements of
Kazakhstan.

"Asia Terminal" company exists on the market since 2006. Under the brand "Asia
Terminal" has been known since 2008. Is the production of a full (closed) cycle – from
design and cutting to sales, software and service.

115
Comepay (Kampey) — the company was founded in 2006, operates in the market
under the registered brand name "Comepay" and is one of the leading companies of the
Russian Federation for reception of instant payments.
Organized more than 2000 service providers — from utilities companies to leading
domestic banks that are connected to more than 38 000 points of payment and more than
25 000 payment terminals.

"CyberPlat-Kazakhstan" company was founded on 15 September 2005. The first


payment was made in April 2006. Currently, the network of points of reception of
payments on the territory of Kazakhstan has more than 3,100 outlets, which carry out
reception of payments in favor of mobile operators and Internet service through the
payment system CyberPlat.

TelePay — the company exists since 2004. The system used the latest in
telecommunications and banking technology.

Recently introduced payment system Wooppay is more than just an electronic


wallet. This is an indispensable tool in addressing any daily concerns, leisure, shopping
or travel planning. This — Multibank system. This means that you can choose which of
the banks-partners of the system. The money credited to your purse, lie in the chosen
Bank and their electronic rights are in your wallet that provides 100% security for your
money.
Director of marketing Wooppay Dmitry Prihozhan in an interview CabMarket —
about the history of the origin of the company and plans for the future.
There are also disadvantages: in Karaganda hard to find someone who is not in
Wooppay. So, if you want to gather a great company and not to talk about work, you
need to try hard, because each second in Karaganda in any way associated with our
company.

So far we have implemented only a small part of what you planned, but every day
we are working on new services, add features and remove bugs. Every week on the
website filled with changes and services become more convenient. Anyone interested —
sign up, enjoy and stay tuned. And on all issues, you can contact our customer service
Department.

4.Prospects of development of E-technologies.


The state program "Information Kazakhstan - 2020"
The decree of the President of the Republic of Kazakhstan dated 1 February 2010 №
922 "Strategic plan of development of Kazakhstan till 2020"
Тhe purpose of the Program: creation of conditions for transition to Basic
information society.
Program objectives:

116
1) the Development of it
2) ensure the availability of information and communication
infrastructure
3) automation of the activities of state bodies and e-services
4) open government
5) the Development of domestic information space.
Target indicators:
1) the share of the ICT sector in GDP in 2020 - 4 %
2) quantity updated standard curricula of it professions in accordance
with professional standards: technical and vocational UNIVERSITY in 2020 – 6
3) the level of digital literacy in 2020 - 80 %
4) density of Internet users per 100 inhabitants in 2020 - 75 %
5) the coverage of digital terrestrial television of Kazakhstan's population
in 2020 – 95%
6) the coverage of the state radio channels in the FM band "Kazakh
radio" and "Shalkar", in 2020 - 95%
7) the effectiveness ratio of use of information technologies, which
developed the target architecture (ROA-return on IT assets) to the year 2020 – 30
8) the level of Kazakhstan's development index of "e-government" in
2020 - among the first 25 countries
9) index the e-participation of the Republic of Kazakhstan in 2020 -
among the first 20 countries
10) the number of available local media in Kazakhstan to 2020 – 2280
11) the proportion of the population satisfying the basic information needs
at the expense of the domestic media (according to sociological research), in 2020
– 53%

Questions:
1. What are the differences between programs of acceleration and incubation?
2. What are prospects of development of E-technologies?
3. Are there prospects of development in the sphere of the IT market?
4. Development of necessary infrastructure of electronic payments and
logistics.

References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.

117
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.

References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 2015,
576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2012,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.
5. Business Fundamentals: Hands-on training manual / Ed. YB Rubin, M-2014
6. Mushroom VD Business Basics: A Tutorial. - M .: Finance and Statistics, 2016
7. Fundamentals of business activities. Financial management. Marketing / Ed. VM
Vlasova - M .: Finance and Statistics, 2015.
8. Указ Президента Республики Казахстан от 1 февраля 2010 года № 922 «О
Стратегическом плане развития Республики Казахстан до 2020 года»

Resources:
1. http: //refleader.ru/jgeujgrnayfsyfs.html
2. http://ru.wikipedia.org/wiki/
3. http://ru.wikipedia.org/wiki/
http://www.intuit.ru/studies/courses/673/529/lecture/
4. http://www.openbookproject.net/courses/intro2ict/hardware/internal.ht
ml
5. http://www.irma-international.org/chapter/supporting-self-regulated-
learning-ict/13429/
6. http://bookboon.com/en/it-programming-ebooks
7. http://www.e-booksdirectory.com/listing.php?category=475
8. http://www.freebookcentre.net/

118
119
120

You might also like