Lectures 1-15
Lectures 1-15
Introduction……………………………………………………………………4
Lecture №1. An ICT role in key sectors of development of society.
Standards in the field of ICT.............................................................................5
Lecture №2. Introduction to computer systems.
Architecture of computer systems....................................................................10
Lecture №3. Software. Operating systems…………………………...………19
Lecture №4. Human-computer interaction………………………………..…24
Lecture №5. Database systems………………………………………………34
Lecture №6. Data analysis. Data management…………………………...…41
Lecture №7. Networks and telecommunications………………………….…52
Lecture №8. Cybersafety………………………………………………….....69
Lecture №9. Internet technologies…………………………………………...77
Lecture №10. Cloud and mobile technologies…………………………….…85
Lecture №11. Multimedia technologies…….……………………………..…92
Lecture №12. Technology Smart……………………………………………100
Lecture №13. E-technologies. Electronic business. Electronic training.
Electronic government………………………………………………….....…107
Lecture №14. Information technologies in the professional sphere.
Industrial ICT.................................................................................................. 115
Lecture №15. Prospects of development of ICT……………………………..121
References…………………………………………………………………….128
1
Introduction
The purpose of studying this discipline - to train students and other categories of
students is using of modern computer information technology as a tool which solves
scientific and practical problems in their subject area at a high professional level, as well
as to participate in the development and implementation of these technologies in the
framework of corporate information systems level setting objectives and monitoring of
the decision that is so necessary for the modern manager.
As a result the course of discipline students must:
• be aware the technical support of modern information technology, especially its
organization and operation, its prospects for development;
• familiar with the mathematical, software, organizational and other kinds of
computer software in-information technologies;
• gain an understanding the development of computer information technology in
their subject area;
• learn to use modern means of computer technologies in solving problems in their
subject area;
• be able to navigate and search information on the INTERNET;
• be able to work with the electronic services and INTERNET network services.
Collection of lectures include learning of such packets as MS Office, SQL and etc.
The usage of the methodical instructions allows you to consider the main possibilities of
the most popular programs on operation with computer programms.
Collection of lectures contains 15 lectures on discipline «Information and
telecommunication technology».
Collection of lectures on discipline «Information and telecommunication
technology» for students of all specialty and also can be useful for students of all other
specialties of different forms of study at learning this discipline.
Practical skills and abilities received after learning of the course on discipline
«Information and telecommunication technology» for students of all specialty are
necessary for the further mastering of following disciplines: Web technologies,
Marketing information systems, Media technologies and application programs in
advertizing.
2
Lecture №1. An ICT role in key sectors of development of society. Standards in
the field of ICT.
Purpose: To prepare students using of modern computer information technology.
Plan:
1.Definition of ICT. Subject ICT and its purposes. An ICT role in key sectors of
development of society.
2.Standards in the field of ICT. Communication between ICT and achievement of
the objectives of a sustainable development in the Millennium Declaration.
1.Definition of ICT. Subject ICT and its purposes. An ICT role in key sectors of
development of society.
Under the information and communication technologies is offered to understand the
complex objects, actions, and rules relating to the preparation, processing and delivery of
information at the personal, mass communication and production, as well as all
technologies and sectors, providing integrated these processes.
Information and communication technologies (ICT) - a set of methods, workflows
and software and hardware tools that are integrated with the aim of collecting,
processing, storage, distribution, display and use of information for the benefit of its
members
To date, the concept of IT includes microelectronics, development and production of
computers and software, connection and telephony, mobile services, providing Internet
access, providing information resources of the Internet, as well as a variety of cultural
phenomena associated with these areas of activity and rules (both formal and informal)
that govern these areas of activity.
ICT Tools
By means of modern information and communication technologies to understand
the software, firmware and hardware, as well as devices that operate on the basis of a
microprocessor, computer technology, as well as modern facilities and broadcast of
information systems, information exchange, ensuring operation for the collection, the
production, accumulation, storage, processing, communication and access to information
resources of computer networks (including global).
By means of modern information and communication technologies include
computers, PC, terminal equipment kits for computers of all classes, local area networks,
the input-output device information input means and manipulation of text and graphic
information, means of archiving large volumes of information, and other peripheral
equipment modern COMPUTER; means for converting data from the graphics or audio
data to digital representation and vice versa; tools and devices to manipulate audiovisual
information (on the basis of technology and Multimedia "Virtual Reality"); artificial
intelligence system; computer graphics system, programming systems (programming
languages, compilers, compilers, operating systems, software packages, etc..), modern
means of communication, providing information user interaction both at the local level
(for example, within a single organization or multiple organizations) and global (as part
of the global information environment).
3
The concept of information technology
Under the information technology to understand the totality of methods, production,
software and technological tools combined in the processing chain, ensuring the
collection, storage, processing, output and dissemination of information. Information
technologies are designed to reduce the complexity of the processes of information
resources.
Computer information technologies involve the use of computer and network
technologies for implementing a wide range of tasks:
The components (structure) of information technology
Information - a collection of information about the properties of an object or
process to digest the subject in the form of knowledge.
All the information which is used by people, can be divided into the following
types:
mathematical - is any information related to numbers and formulas, it can be not
only a mathematical, but physical and statistical information. Mathematical information
can be processed by a variety of computing machines and devices and stored on paper in
the form of books and records.
text - that information can be recorded on paper by hand or using a typewriter and
printing equipment and stored on paper (manuscripts, documents, books, newspapers,
etc.).
graphics - this information can be processed by a variety of means and methods
of Fine (fine arts, photography) and stored in the form of paintings, drawings, sculptures,
photo cards, etc .;
Sound - this information can be processed by means of a tape recording and
stored on magnetic tapes, records and audio CDs .;
video information - this information can be processed by means of film and video
and stored on film and videotape .
All these types of information have existed before the advent of the computer.
Modern personal computer allowed to handle these types of information and greatly
facilitated their joint use.
Information - a set of physical processes signals perceived by the subject through
his sense organs.
Data - data obtained by measuring, monitoring, logical or arithmetic operations
presented in a form suitable for storage, transmission and processing.
Information processes. The concept of information is inseparable from the concept
of information processes. For information processes include:
• transmission of information;
• receiving the information;
• data storage;
• processing of information and its presentation for use;
• use of information.
4
Technical means - it is a personal computer, office equipment, communication lines,
network equipment.
The software is directly dependent on the technical and information support and
realizes the functions of storage, processing, analysis, storage, interface with the
computer.
Information support - a set of data presented in some form for computer processing.
Organizational and methodological support is a complex of measures aimed at the
functioning of the computer and software to obtain the desired result.
There is another approach to dealing with automated IT structure, according to
which any IT can be divided into three interdependent and equally important components
that make up its core:
Hardware (Hardware);
software (Software);
algorithmic (intelligent) software (Brainware).
Data processing
All information supplied to the computer, or encoded digitized, i.e. all
characteristics data assigned to the number. Thus, the computer operates with no sound,
or video image, and a series of numbers. And it does not process sound or video, and the
number. After the treatment, the number again converted into sound or video and we hear
the music and see the cartoon on the computer screen.
To simplify the technical recording and processing information using the binary
system. If you are using ten digits in the usual decimal notation to record all the numbers
- 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, only two digits used in the binary system - 0 and 1, and all
numbers are written with a combination of zeros and ones:
decimal system binary system
0 0
1 1
2 10
3 11
4 100
5 101
6 110
7 111
8 1000
9 1001
10 1010
100 1100100
1000 1111101000
5
Table1- Data processing
Questions:
1. What is the definition of ICTand its purposes?
2. What is the ICT role in key sectors of development of society?
3.What kind of standards do you know in the field of ICT?
4. What kind of communications do you know between ICT and achievement of the
objectives of a sustainable development in the Millennium Declaration?
References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.
Resources:
1.http://www.intuit.ru/studies/courses/3735/977/lecture/14671
7
Lecture №2. Introduction to computer systems. Architecture of computer systems.
Purpose: to discuss and give a brief idea on computer hardware.
Plan:
1.Review of computer systems.
2.Evolution of computer systems.
3.Architecture and components of computer systems. Use of computer systems.
Data representation in computer systems.
A computer is, at its most basic, a machine which can take instructions, and perform
computations based on those instructions.
8
computers can retrieve information from files in a secondary storage device in a few
milliseconds.
The computers can be mainly classified into four categories as briefly described
below. This classification is done based on the size and the data processing power.
• Microcomputers: most common type of computers in the society.
Can be used at your workplace, at school or on your study desk at home. Used
by single user at a time. Small in size. Also called Personal Computers (PCs).
• Minicomputers: used by multi-users. In the middle when the
computers are ranged from smallest to largest. Used in laboratories.
• Mainframes: Largest in size. Capable of handling and processing
very large amounts of data quickly.
• Super computers: Used for performing complex scientific and
numerical computations such as weather forecasting, fluid dynamics, nuclear
simulations, theoretical astrophysics.
Different Types of Personal Computers (PCs). Personal Computer (Mostly
referred to as PC in the community) is designed as a more user-friendly device to be
directly used by the end-user rather having an especially skilled separate computer
operator. It is less expensive compared to other types of computers listed above. PCs
come in different forms as listed below and we will have a description on each form of
PC separately.
It is noticeable that only few famous forms of PCs used today are listed below and
the list may be extended by adding many more in the future with the advancement of the
technologies. Desktop, Laptop, Netbook, PDAs, Wearable Computers, Tablets,
Desktop PCs. Usually the Desktop computers are placed in a fixed location and the
name has derived as it is intended to be sitting on a top of a desk. A monitor, mouse, and
a key board can be seen as parts of a typical desktop computer. These computers
consume low power and cost effective than the laptop computers that will be described
next. The spare parts are readily available and less expensive.
Laptop Computers. Laptops are similar to desktop PCs in operation, but designed
for mobile use. Capable of operating on the battery power and the battery can be charged
with the external power adaptor. An in-built keyboard, Liquid Crystal Display unit (LCD
screen), a touch pad (also known as track pad) to act as the mouse are the commonly seen
components. However, a mouse can be also used instead of the touch pad. Laptops are
obviously smaller in size and weight less than the desktop PCs. Therefore, it is difficult
to access its internal hardware thus difficult to upgrade as much as a desktop. But adding
more RAM or Hard Drive is possible (You will learn about RAM and Hard Drive in
9
next session). Built-in web camera is a common feature of a modern laptop computer and
these laptops come in different weights, sizes, performances, speeds, and a layman may
differentiate them specified by the diagonal distance of its display unit.
Netbook. Netbooks belong to the laptop family, but are inexpensive and relatively
smaller in size. Though the set of features and the capacity of netbooks were lesser
compared to regular laptops at the time of introducing them to the market, nowadays the
netbooks come in advanced features and in high capacities as similar to modern laptops.
PDAs. Personal Digital Assistants (PDAs) are handheld computers which are also
called palmtop computers due to its size which is smaller enough to keep it on your palm.
Most of the PDAs are pen-based and come with a stylus (a writing pen) to be used as the
input device which is sensitive to its touch screen. Most of them can access the Internet
by means of Bluetooth or Wi-Fi facilities. PDAs allow you to organize your personal or
business work and to manage your tasks through its facilities. It may be used as a
Cellular phone to send and receive calls, to search in the web, to download and play
audio/video files, to send/receive e-mails, to type in a text editor to jot down notes or
write a document, take pictures or record videos, etc.
Wearable Computers. The computers that can be worn on the body are known as
Wearable computers. There is a constant interaction between the computer and user.
These computers are mostly used to track human actions when the hands and other
sensory organs are engaged in other activities. And used with applications such as
behavioral modeling systems and healthcare monitoring systems.
Tablets. Tablets are mobile computers larger than PDAs and smaller than Laptops
described above. Usually operated by its touch screen and no formal key board are used.
The people using them spent most of their time outside and would not have access to a
keyboard or mouse.
What is Computer Hardware? You are already aware that a computer system is
made up of several different components. Those that can be seen and touched are referred
to as the Computer Hardware (or hardware). In other words, the physical equipments
that are involved in the function of the computer are called its hardware. The computer
hardware is typically divided into four main categories:Processing Devices, Memory
Devices, Input/, Output Devices, and Storage Devices.
Processing Devices.
The Central Processing Unit (CPU)
The Central Processing Unit is an electronic device which runs computer programs:
a set of sequential instructions. It is also called as the Computer Processor or the brain
of the computer. Тhere are two major components namely the Control Unit (CU) and
the Arithmetic and Logic Unit (ALU). The CU is the circuitry that controls the flow of
data through the processor, and coordinates the activities of the other units within it. In a
way, it is the "brain within the brain", as it controls what happens inside the processor,
10
which in turn controls the rest of the PC. The ALU is a digital circuit that performs
arithmetic and logical operations. The ALU is a fundamental building block of the central
processing unit of a computer, and even the simplest microprocessors contain one, for
purposes such as maintaining timers. The processors found inside modern CPUs have
very powerful and very complex ALUs; a single component may contain a number of
ALUs.
We consider the CPU as the processing device of the computer. You are aware that
the CPU contains Control Unit (CU) and an Arithmetic and Logic Unit (ALU). These
two components work together to perform the processing operations. On a PC, the CPU
usually is contained on a single chip and sometimes is called Microprocessor. In
addition to the CU and ALU, a microprocessor usually contains the registers and system
clock.
The Control Unit (CU). As you know, a computer program or set of instructions
must be stored in memory for a computer to process data. The CPU uses its CU to
execute these instructions. Further, the CU directs and coordinates most of the operations
of the computer. The speed at which the processor carries out its operations is measured
in megahertz (MHz). The higher the number of MHz the faster the computer can
process information. The Intel i7, Athlon, Celron, and Duron, Ultra Spark are some
examples for the brands of processors available in the market.
The Arithmetic and Logic Unit (ALU). ALU performs the arithmetic, comparison,
and logical operations. Arithmetic operations include addition (+), subtraction (-),
multiplication (*) and division (/). Comparison operations include comparing one data
item to another to determine if the first item is greater than (>), equal (=), or less than (<)
to the second item. Logical operations work with conditions such as AND, OR, NOT.
Memory Devices
Computer Memory. A character is stored in the computer as a group of 0s and 1s,
called a Byte. The size of the memory is measured by the number of bites available. The
following equalities give the measuring units of the memory.
8 Bits =1 Byte
1024 Bytes =1 Kilobyte (1KB)
1024KB =1 Megabyte (1MB)
1024 MB =1 Gigabyte (1 GB)
1024 GB =1 Terabyte (1 TB)
While performing a processing operation, a processor needs a place to temporarily
store instructions to be executed and the data to be used with those instructions. The data
and the instructions needed by the CPU are temporarily stored in the Memory. Therefore
the memory acts as the internal storage of a computer. The programs that are stored in
external storages are loaded into the memory before they start running.
13
between them. When an electric current passed through the liquid crystal solution,
crystals align so that light cannot pass through them. It is like a shutter either allows light
to pass through or blocking the light.
The LED is the latest marketing innovation of display units. It looks similar to LCD
and it is also a flat panel display. LED means Light Emitting Diode and relates to the
way the display is illuminated. LED monitors still use the same Liquid Crystals as the
previous LCD displays. The way the backlight works however with the LED's will lead
to a number of improvements in the display.
Though CRT monitors are much cheaper than LCDs and LEDs, the CRTs consume
more power than others
Printer. A computer printer produces a hard copy (permanent human-readable text
and/or graphics) of documents stored in electronic form, usually on physical/tangible
print media such as paper or transparencies. Many printers are primarily used as local
computer peripherals, and are connected by a printer cable to a computer which serves as
a document source. Some printers, commonly known as network printers can serve as a
hardcopy device to be shared and used by any user among a group of users connected to
the network. Individual printers are often designed to support both local and network
connected users at the same time. There are several types of printers categorized based on
the applied technology of printing text/graphics on the paper.
Impact Printers. Any impact printer forms characters and graphics on a piece of
paper by striking a mechanism against in an ink ribbon that physically contacts the
papers. Because of the striking activity, impact printers generally are noisy.
Many impact printers do not provide letter-quality print. Letter-Quality (LQ)
output is a quality of print acceptable for business letters. Many impact printers produce
near letter-quality (NLQ)
print, which is slightly less clear than LQ. NLQ impact printers are used for jobs
that require only NLQ, such as printing of mailing labels, envelopes, or invoices.
Impact printers are also ideal for printing multipart forms because they easily can
print through many layers of paper. Finally, impact printers are used in many factories
and retail counters as they can survive in dusty environments, vibrations, and extreme
temperatures.
Plotter. Plotters are special type of printers used to print graphicaloutput on paper.
It interprets computer commands and makes line drawings on paper using
ulticolored automated pens.
Storage Devices. Storage refers to the media on which data, instructions, and
information are kept, as well as the devices that record and retrieve these items. In this
section we will discuss about the storage media and storage devices.
Memory versus Storage. It is important to understand the difference between the
memory. Memory holds data and instructions temporarily while they are being processed
by the CPU. Storage, also called Secondary, Auxiliary storage, or Mass storage, holds
items such as data, instruction, and information for future use.
Storage. Storage is non-volatile which means that items in storage remains even
when power is removed from the computer. A storage medium is the physical material
14
on which the items are kept. One commonly used storage medium is a disk, which is
round, flat piece of plastic or metal with a magnetic coating on which items can be
written. A storage device is the mechanism used to record and retrieve items to and from
a storage medium.
Storage devices can function as source of input and output. For example, each time
a storage device transfers data, instructions, and information from a storage medium into
memory (a process called Reading); it functions as an input source. When a storage
device transfers these items from memory to a storage medium (a process called
Writing), it functions as an output source.
The speed of a storage device is defined by its access time, which is the
minimum time it takes the device to locate a single item on the disk. Compared to
memory, storage devices are slow. The access time of memory devices are measured
in milliseconds.
Hard Disk. Hard Disk drive which is often referred to as Hard Disk or Hard Drive
is a device to store and retrieve data in a computer. The hard drive can store important
system files like the operating system, program files and other data. Though HDDs were
originally designed to be used with computers nowadays the applications for HDDs have
expanded beyond computers to include digital video recorders, digital audio players,
personal digital assistants, digital cameras and video game consoles. HDD is a non-
volatile storage device that stores digitally encoded data. It is an electromagnetically
charged surface or set of disks that record data in concentric circles known as tracks.
HDDs record data by magnetizing ferromagnetic material directionally, to represent
either a 0 or a 1 binary digit. They read the data back by detecting the magnetization of
the material. A typical HDD design consists of a spindle which holds one or more flat
circular disks called platters, onto which the data is recorded. The platters are made from
a non-magnetic material, usually aluminum alloy or glass, and are coated with a thin
layer of magnetic material.
Portable Hard Disks. Portable hard disk is an interesting and useful device because
you can carry data about all over the place and transfer information, programs, pictures,
etc. between computers. Modern portable hard disks have a massive capacity like
500GB.
The System Unit . Тhe System Unit of the computer is the box-like casing which
contains the major electronic components that are responsible for the main functions of
the computer. It should be mentioned here that many people use to refer to this as the
CPU incorrectly. This erroneous reference may be due to CPU: The brain of the
commuter being that significant. However, the electronic devices such as CPU, memory,
hard disk drive are located inside the System Unit. In addition to the above parts,
Motherboard, Floppy Disk Drive, Power Supply unit, and CD-ROM Drive are the
other major components that you can find within the system unit. A brief description of
each above component is given next.
Motherboard. The motherboard is sometimes called the system board, planner
board or main board. It is the main circuit board of a computer. The motherboard
contains several connectors for attaching additional boards. Usually, the motherboard
contains the CPU, BIOS, memory, mass storage interfaces, serial/parallel ports,
15
expansion slots, and all the controllers required to control standard peripheral devices,
such as the display screen, keyboard, and disk drive.All of the basic circuitry and
components required for a computer to function are onboard the motherboard or are
connected with a cable. The most important component on a motherboard is the chipset.
It often consists of two components or chips known as the Northbridge and
Southbridge, though they may also be integrated into a single component. These chips
determine, to an extent, the features and capabilities of the motherboard.
Power Supply Unit . Power Supply Unit (PSU) is another very important unit
found in the system unit. Usually we connect the power code of the computer to the
domestic mains supply. Therefore, PSU converts Alternating Current (AC) from mains
supply to Direct Current (DC) with the required different voltages needed to power
different components of the computer. Power supplies have a certain power output
specified in Watts, a standard power supply would typically be able to deliver around 350
Watts. The more components like HDD, CD/DVD drives, and cooling fans, are
connected to your computer the greater the power required fro m the power supply
CD-ROM Drive. The CD-ROM drive is a high capacity optical data storage
device with a removable disk, it writes data onto or reads data from a storage medium.
A CD-ROM drive may be connected to the computer via an IDE (ATA), SCSI, S-
ATA, Firewire, or USB interface or a proprietary interface
Questions:
1. Why does a computer need memory?
2. What is the best type of storage for my data?
3. What factors affect a computer’s screen display?
4. Are ink jet printers better than laser printers?
5. What’s the best way to add devices to a computer system?
6. How can I protect my computer system from theft and damage?
References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.
16
Lecture №3. Software. Operating systems
Purpose: to provide the basic ideas of Software to the Students, to introduce the
learner to the Windows 7 operating system and get the learner familiar to operate the
computer through the Operating system Windows 7.
Plan:
1.Software. Types of the software, purpose and characteristic. Basic concepts of OS.
2.Evolution of operating systems. Classification of operating systems, including for
mobile devices. Classification of desktop applications.
Multi-user OS: In some situations, we need to share the single computer among
few users. So the OS should be a multi-user where more than one user is logged on to the
computer and uses it at the same time. These multi users may work with remote desktop
connections. Further, these different users may need to run different applications at the
same time. So the OS must support multi-task facility as well. Obviously the computer
should be a powerful one. Each user draws on a big power of the computer in a shared
way. This type of Multi –user multi-task OSs have to manage some tasks as listed below:
Utility Software. Utility software or utility programs are some small programs
which performs specific task, usually related to managing a computer, its devices, or its
programs. Most operating systems include several utility programs. Also, you can buy
them as stand-alone software that offer improvements over the ones supplied with the
OS. Following are some of the specific tasks done by commonly used utility programs:
Viewing files
Compressing files
Diagnosing problems
Scanning disks
Defragmenting disks
Uninstalling software
Backing up files and disks
Checking for viruses
Displaying screen savers
Application Software
Accordingly, the second major class of Software is the Application Software.
Application software consists of programs designed to perform specific tasks of users.
Application Software, also called a software application or an application, can be used
for the following purposes, among others:
18
As a productivity/business tool
To assist with graphics and multimedia projects
To support household activities, for personal business, or for education
To facilitate communications
Software Package.Based on the purposes as listed above, the application software
is three-fold namely General Purpose, Special purpose, and Bespoke. Let us look at each
type of applications software briefly.
Special Purpose Application Software.
Special Purpose Application Software is the software created for execution of a
single specific task. Some examples are Chess game, calculator, camera application in
your mobile phone which allows you only to capture and share pictures, web browsers,
media players, calendar programs.
System requirements
Windows 7 requires the following computer hardware:
32 Bit 64 Bit
A Processor of 1 GHz or faster A Processor of 1 GHz or faster 64-
32-bit bit
19
(x86) (x64)
At least 1 GB of RAM memory At least 2 GB of RAM memory
A hard disk with at least 16GB A hard disk with at least 20GB
space space
available available.
DirectX® 9 graphics processor DirectX® 9 graphics
with processor with
WDDM or higher driver WDDM or higher driver
A DVD drive from which to A DVD drive from which to
install install
Windows. Windows.
A monitor, keyboard, and A monitor, keyboard, and
mouse or mouse or
other pointing device. other pointing device.
Questions:
1. What is Software?
2. Differentiate System software and Application software.
3. What are the responsibilities of Operating Systems?
4. Define the following with suitable examples.
Single–user OS
Multi-user OS
5. What are utility programs? Define some tasks performed by them.
6. What is meant by library programs?
7. What are program language translators? Briefly describe three translating
approaches.
8. State the advantages and disadvantages of Bespoke Application Software.
References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.
Lecture №4. Human-computer interaction.
Purpose: to work with a system, the users need to be able to control the system and
assess the state of the system.
Plan:
1. User interface as means of human-computer interaction. Usability of interfaces.
21
2. Types of interfaces: command line interface, text interface, graphic interface.
3. Physical and mental characteristics of the user. Development stages of the user
interface. Types of testing of interfaces (testing of users). Perspectives of development of
interfaces.
23
Command-Line Interface (CLI): The user provides the input by typing a command
string with the computer keyboard and the system provides output by printing text on the
computer monitor .
A Command Line Interface allows the user to interact directly with the computer
system by typing in commands (instructions) into a screen
You cannot just type in any kind of instruction of course, because the computer will
only react to a definite set of words.
These commands are very specific, for example in DOS you could type in:
copy c:\item.txt d:\
That tells the machine to copy the file 'item.txt' that resides in the root directory of
drive C: into the root directory of drive D:\
Many commands have what are called 'switches'. These are extra parameters or
flags which add extra functionality to the command. For example:
»Dir gives a directory listing
»Dir /w gives the listing across the page
»Dir /s includes the sub directories
»Dir /p pauses at the bottom of every page
Before Windows was developed, this type of user interface was what most people
used to get the computer to follow instructions. Nowadays, very few people have the
knowledge to be able to use a command line interface.
An example of this type of interface is DOS (Disk Operating System).
Sometimes referred to as the command screen or a text interface, the command
line or Windows command line is a user interface that is navigated by typing commands
at prompts, instead of using the mouse. For example, the Windows folder in a Windows
command line (MS-DOS) is C:\Windows> (as shown in the picture) and in Unix or
Linux, it may be % or >. Unlike a GUI operating system, a command line only uses a
keyboard to navigate by entering commands and does not utilize a mouse for navigating.
Because a command line interface requires unique commands, this interface is often
more difficult to learn because of the need to memorize dozens of different commands.
However, a command line operating system can be a very valuable resource and should
not be ignored. For example, users who have Microsoft Windows may find trivial tasks,
such as renaming 100+ files in a folder, a very difficult task. However, renaming 100+
files in a directory can be done in less than a minute with a command entered into the
command line.
Advantages and Disadvantages
Advantages Disadvantages
If the user knows the correct
commands then this type of interface For someone who has never used
can be much faster than any other type a CLI, it can be very confusing
of interface
This type of interface needs much Commands have to be typed
24
Advantages and Disadvantages
Advantages Disadvantages
less memory (RAM) in order to use precisely. If there is a spelling error the
compared to other types of user command will fail
interfaces
If you mis-type an instruction, it
This type of interface does not use
is often necessary to start from scratch
as much CPU processing time as others
again
There are a large number of
A low resolution, cheaper monitor
commands which need to be learned -
can be used with this type of interface
in the case of Unix it can be hundreds
You can't just guess what the
A CLI does not require Windows
instruction might be and you can't just
to run
'have a go'.
Table 4- Advantages and Disadvantages
25
Advantages and Disadvantages
Advantages Disadvantages
It is easy to explore and find
They need significantly more memory
your way around the system using
(RAM) to run than other interface types
a WIMP/ GUI interface
You do not have to learn They use more processing power than
complicated commands other types of interface
There are usually a They can be slow for experienced
reasonable 'help' system included programmers to use. These people often find
with WIMP interfaces CLI interfaces much faster to use
You get the benefits of
WYSIWYG
They let you exchange data
between different software
applications
Table 5- Advantages and Disadvantages
However, to display all of the nice graphics required by a GUI takes a lot of computing
power so quite a powerful computer is needed.
Graphical User Interface (GUI): The use of pictures rather than just words to
represent the input and output of a program. Input is accepted via devices such as
keyboard and mouse.
Many years ago when computers were not very powerful they could not display the
colourful graphics required for a GUI. The only interface available to most computer uses
was the ‘command line’.
The user would see nothing but a black screen. They would have to type a command to
make anything happen.
26
To copy a text file called NOTES from a floppy disc to the hard drive the user would
have to type:
> COPY A:\NOTES.TXT C:\
The user would have to learn a whole set of strange commands so that they could
make use of the computer system. Plus it was not very interesting look at – no visual
clues to tell you what to do next.
3. Physical and mental characteristics of the user. Development stages of the user
interface. Types of testing of interfaces (testing of users). Perspectives of development of
interfaces.
This meant computers used to be quite difficult to use, so this type of interface is
only really suitable for expert users.
The system that people use to interact with a computer (to give it commands, to
see the results of those commands, etc.) is known as the user interface.
Graphical user interface
In computer science, a graphical user interface (GUI /ɡuːiː/), is a type of user
interface that allows users to interact with electronic devices through graphical icons and
visual indicators such as secondary notation, instead of text-based user interfaces, typed
command labels or text navigation. GUIs were introduced in reaction to the perceived
steep learning curve of command-line interfaces (CLIs), which require commands to be
typed on a computer keyboard.
The actions in a GUI are usually performed through direct manipulation of the
graphical elements.[4] Beyond computers, GUIs are used in many handheld mobile
devices such as MP3 players, portable media players, gaming devices, smartphones and
smaller household, office and industrial equipment. The term GUI tends not to be applied
to other lower-display resolution types of interfaces, such as video games (where head-up
display (HUD) is preferred), or not restricted to flat screens, like volumetric displays[6]
because the term is restricted to the scope of two-dimensional display screens able to
describe generic information, in the tradition of the computer science research at the
Xerox Palo Alto Research Center (PARC).
Post-WIMP interfaces
Smaller mobile devices such as personal digital assistants (PDAs) and smartphones
typically use the WIMP elements with different unifying metaphors, due to constraints in
space and available input devices. Applications for which WIMP is not well suited may
use newer interaction techniques, collectively termed post-WIMP user interfaces. As of
2011, some touchscreen-based operating systems such as Apple's iOS (iPhone) and
Android use the class of GUIs named post-WIMP. These support styles of interaction
using more than one finger in contact with a display, which allows actions such as
pinching and rotating, which are unsupported by one pointer and mouse.
Human interface devices, for the efficient interaction with a GUI include a computer
keyboard, especially used together with keyboard shortcuts, pointing devices for the
cursor (or rather pointer) control: mouse, pointing stick, touchpad, trackball, joystick,
27
virtual keyboards, and head-up displays (translucent information devices at the eye
level).
There are also actions performed by programs that affect the GUI. For example,
there are components like inotify or D-Bus to facilitate communication between
computer programs.
28
Advantages Disadvantages
Extremely easy to use.
Someone who has never seen A poorly designed menu interface may be
the interface before can work slow to use
out what to do
It can be irritating if there are too many
There are no commands to
menu screens to work through - users get
learn or remember
annoyed or bored if it takes too long
You often can't go to the exact place you
Step-by-step options are
want right at the start. You have to work your
given so that the user doesn't
way through the menu screens even if you
have to remember anything
know where you want to get to.
Even if you don't know
The menu can take up a large part of the
what to do, you can usually
screen so you have to keep flicking back and
guess your way around the
forwards between applications
options
If the menu is poorly designed it might be
Menu interfaces don't have
hard to read e.g. writing is too small for people
to be visual, they can be spoken
with poor sight, colours might clash and be
- good for telephones or for
difficult to read, font style might be hard to
visually impaired people
read.
Questions:
1. What is the Usability of interfaces?
2. What is the Command-Line Interface?
3. What is the HCI?
29
4. What are the advantages and Disadvantages of menu interfaces?
References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.
30
Network model. The network model tends to store records with links to other
records. Each record in the database can have multiple parents, i.e., the relationships
among data elements can have a many to many relationships. So this model is an
expansion to the hierarchical structure, allowing many-to-many relationships in a tree-
like structure that allows multiple parents.
The network model provides greater advantage than the hierarchical model in that it
promotes greater flexibility and data accessibility.
31
Normalization of databases is a process of transformation of database to the kind
answering the normalized forms.
Classification of limitations of integrity
In the theory of relational databases it is accepted to distinguish four types of
limitations of integrity:
Limitation of database is name a limit on values that it is let to accept to the
indicated database.
Limiting to the variable of relation is name a limit on values that it is let to
accept to the indicated variable of relation.
Limitation of attribute is name a limit on values that it is let to accept to the
indicated attribute.
Limitation of type is not that another, as determination of great number of
values this type consists of that.
Example of widespread restriction of level of a variable of the relation is the
potential key; an example of widespread restriction of level of the database is the foreign
key.
Integrity and truth of data in a DB
Integrity of a DB doesn't guarantee reliability (truth) of the information which is
contained in it, but provides at least plausibility of this information, rejecting certainly
improbable, impossible values. Thus, it isn't necessary to confuse integrity (consistency)
of a DB to truth of a DB. Truth and consistency — not same.
Reliability (or truth) is compliance of the facts which are stored in the database, to
the real world. It is obvious that determination of reliability of a DB requires possession
of full knowledges both about DB contents, and about the real world. Determination of
integrity of a DB requires only possession of knowledge of contents of a DB and about
the rules set for it. Therefore the DBMS can't guarantee existence in the database only of
the true expressions; all that she can make, are to guarantee absence of any data causing
violation of integrity constraints (that is to guarantee that she doesn't contain any data not
compatible to these restrictions).
Query tuning
The DBMS SQL component which defines how to realize navigation on physical
data structures for access to the required data, is called the query optimizer (query
optimizer).
The navigation logic (algorithm option) for access to the required data is called way
or the access method (access path).
The sequence of the operations performed by the optimizer which provide the
selected access paths is called the execution plan (execution plan).
Process, the used query optimizer for determination of an access path, is called
query tuning (query optimization).
32
During process of optimization of requestsways of access for all types of the SQL
DML teams are determined. However the SQL SELECT team represents the greatest
complexity in the solution of a task of the choice of a way of access. Therefore this
process is usually called optimization of a request, but not optimization of ways of access
to data. Further, it should be noted that the term "optimization of requests" is not
absolutely exact — in the sense that there is no guarantee that in the course of
optimization of a request the optimum way of access will be really received.
Thus, optimization of requests can be determined as the amount of all techniques
which are applied to increase in efficiency of handling of requests.
34
The specific type and the maintenance of conceptual model of the database is
defined by the formal device selected for this purpose. Graphic notations, similar to ER
charts are usually used.
Most often the conceptual model of the database includes:
• description of information objects or concepts of data domain and communications
in between.
• description of integrity constraints, that is requirements to admissible values of
data and to communications in between.
Logic design
Logic design — creation of the database scheme on the basis of a specific data
model, for example, a relational data model. For a relational data model data logical
model — a set of diagrams of the relations, it is normal with specifying of primary keys,
and also the "communications" between the relations representing foreign keys.
Conversion of conceptual model to a logical model is, as a rule, carried out by the
formal rules. This stage can be substantially automated.
At a stage of logic design specifics of a specific data model are considered, but
specifics of specific DBMS can not be considered.
Physical design
Physical design — creation of the database scheme for specific DBMS. Specifics of
specific DBMS can include restrictions for naming of database objects, restrictions for
the supported data types, etc. Besides, specifics of specific DBMS in case of physical
design include a choice of the decisions connected to a physical medium of data storage
(a choice of methods of management of disk memory, division of a DB according to files
and devices, data access methods), creation of indexes etc.
What is ORM?
ORM or Object-relational mapping is a technology of programming which allows
to transform incompatible types of models to OOP, in particular, between the data store
and subjects to programming. ORM is used for simplification of process of saving
objects in a relational database and their extraction, in case of this ORM itself cares for
data transformation between two incompatible statuses. The majority of ORM tools
considerably rely on meta data of the database and objects so objects need to know
nothing about a database structure, and the database — nothing about how data are
organized in the application. ORM provides complete division of tasks in well
programmed applications in case of which both the database, and the application can
work dataful everyone in the root form.
35
Principle of operation of ORM
Key feature of ORM is display which is used for an object binding to its data in a
DB. ORM as if creates the "virtual" database scheme in memory and allows to
manipulate data already at the object level. Display shows as an object and its properties
are connected to one or several tables and their fields in the database. ORM uses
information of this display for process control of data transformation between a basis and
forms of objects, and also for creation of SQL queries for an insertion, up-dating and
deleting data in response to changes which the application makes to these objects.
Distributed database – a set of the separated data which are logically connected
among themselves (and their descriptions) which are physically distributed on some
computer network. The distributed DBMS – the program complex intended for control
of distributed databases and allowing to make distribution of information of the
transparent for the ultimate user.
Users interact with a distributed database through applications. Applications can be
classified as those which don't require data access on other websites (local applications),
and those which require similar access (global applications).
Questions:
1.What makes databases such an essential component of modern life?
2. Can databases be used to predict consumer behavior?
3. What are the basic components of a database?
36
4. Why are relationships a significant aspect of databases?
5. What’s the difference between flat files and other database models?
References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.
There is a large variety of the applied packages realizing the wide spectrum of
statistical methods, they are also named universal packages or instrumental sets.
About such setswe in detail will talk in the final chapter of course. The wide
arsenal of methods of mathematical statistics is also
realized in Microsoft Excel, realization of examples of this
lecture is shown exactly on this program
Descriptive statistics
Descriptive statistics is a technique
37
of collection and adding up of quantitative data, that is used
for converting of mass of digital data into a form comfortable
for perception and discussion.
Cross-correlation analysis
A cross-correlation analysis is used for the quantitative estimation of inter
communication of two sets of the data presented in a dimensionless kind. A cross-
correlation analysis gives an opportunity to set, whether the sets of data
are associated on a size. The coefficient of correlation
always designated by the Latin letter r.
Connection between signs (on the scale of Chaddock) can best rong, middle
and weak. Crowd conditions connections
determine on the size of coefficient of correlation, that can take on values from,
- 1 to +1 inclusive. The criteria of estimation of crowd conditions
of connection are shown on Table 7
high
Table 7- Quantitative criteria of estimation of crowd conditions of connection
38
where x is a value of factor sign;
Pair correlation is connection between two signs: effective and factor or two factor.
-large values from one set of data are related to the large values of other set (cross-
correlation) is a presence of direct linear connection;
-the small values of one set are related to the large value so the r (negative correlation)
is a presence negative linear
small values of one set are associated with large values of the other (negative
correlation) - the presence of a negative linear relationship;
• data from the two ranges are not related (zero correlation.) - No linear relationship
data
• two ranges are related (zero correlation) - no linear relationship.
As an example, take a data set A (Table 7). It is necessary to determine the presence
of a linear relationship between the signs of x and y.
For a graphical representation of relationship between two variables used coordinate
system with the axes corresponding to the variables x and y. Construction schedule called
dispersion diagram is shown in Fig. 6. This diagram shows that the low value of the
variable x correspond to low values of the variable y, the high value of the variable x
correspond to high values of the variable y. This example demonstrates the clear
relationship.
39
Figure4- scatter plot
Regression analysis
The main feature of the regression analysis: specific information can be obtained
with its help on what form and nature of a relationship between the studied variables.
The sequence of the regression analysis
Consider briefly the steps of the regression analysis.
40
5. Determination of the regression function (is to calculate numerical
values of the parameters of the regression equation)
6. Evaluation of the accuracy of the regression analysis.
7. Interpretation of the results. The resulting regression analysis results
are compared with the preliminary hypotheses. We estimate the accuracy and
credibility of the results.
8. The prediction of unknown values of the dependent variable.
In addition, classification may be used as input for other methods. For example, to
determine the classification can employ decision trees.
Prediction - this is a broad topic, which extends from the prediction hardware
component failures to detect fraud, and even predict the company's profits. In
combination with other methods of data mining prediction involves trend analysis,
classification, matching and model relationships. By analyzing past events or items, you
can predict the future.
For example, using data on the credit card authorization, you can combine the
analysis of the decision tree of past human transactions with the classification and
comparison with historical patterns to identify fraudulent transactions. If you buy tickets
in the US coincides with the transaction in the US, it is likely that these transactions are
genuine.
Decision trees
41
Дecision tree method is one of the most popular methods for solving problems of
classification and prediction. Sometimes this method is also called Data Mining trees
decision rules, classification and regression trees.
As can be seen from the last name, using this method solved the problem of
classification and prediction.
Тarget variable takes discrete values, using the method of decision tree classification
problem is solved.
If the dependent variable takes continuous values, the decision tree establishes the
dependence of this variable on the independent variables, ie, It solves the problem of
numerical weather prediction.
Fig. 9.1 shows an example of a decision tree, whose mission - to answer the
question: "Is the game of golf?" To solve the problem; decide whether to play golf, the
current situation should be referred to one of the known classes (in this case - to "play" or
"do not play").This requires a series of questions that are at the nodes of the tree, from its
root.
Our first tree node "Sunny?" a check node, ie condition. If the answer to the
question moves to the left side of the tree, called the left branch, with a negative - to the
right of the tree. Thus, internal node of the a tree is node test certain conditions. Next
comes the next question, and so on until the final node of the tree is reached, which is the
hub solutions. For our tree there are two types of end node "play" and "not play" golf.
As a result of the passage from the root (sometimes called the root node) to its top
classification problem is solved, ie, select one of the classes - "play" and "not play" golf
42
Figute 5- Decision Tree "Do Play golf?"
Тree algorithm design decisions do not require the user to select the input
attributes (independent variables). The input of the algorithm can be fed all the existing
attributes, the algorithm will choose the most important among them, and only they will
be used to build a tree. In comparison, for example with neural networks, this greatly
facilitates user operation, since the amount of neural networks input attributes selection
significantly affects the time of training.
The accuracy of the models created using decision trees, is comparable to other
methods of constructing classification models (statistical methods, neural networks).
43
name itself is very subjective. The word "great" - is as "one, two, many" among primitive
tribes.
However, there are well-established view that the big data - a set of technologies
that are designed to perform three operations. Firstly, manipulate large in comparison
with "standard" data volume scenarios. Secondly, to be able to work rapidly with the
incoming data in a very large volumes. That is not just a lot of data, and they are
constantly becoming more and more. Thirdly, they should be able to work with
structured and poorly structured data in parallel in different aspects. Large data suggest
that the input stream is obtained algorithms do not always structured information and that
it can be extracted from more than one idea.
The advent of big data in the public space was due to the fact that these data are
affected almost all people, not just the scientific community, where such problems are
solved for a long time. In the public sphere Big Data technology came when it began to
go on quite specific number - the number of inhabitants of the planet. 7 billion, gathering
in social networks and other projects which aggregate people. YouTube, Facebook,
VKontakte, where the number of people is measured in billions, and the number of
transactions that they perform at the same time, enormous. The data flow in this case - a
user action. For example, data of the same YouTube hosting that shimmer across the
network in both directions. Under treatment is meant not only the interpretation but also
the ability to properly handle each of these actions, that is, put it in the right place and to
make sure that these data are available to each user quickly as social networking sites do
not tolerate waiting.
Much of the data that concerns large, approaches that are used for analysis, there is
actually quite long. For example, processing of images from surveillance cameras, we are
not talking about the same picture, but the data stream. Or navigation of robots. All of
this exists for decades, just now data processing tasks affected a much larger number of
people and ideas.
Many developers are accustomed to working with static objects and think conditions
categories. In larger paradigm of other data. You should be able to work with a steady
stream of data, and it is an interesting challenge. It affects more and more areas.
In our life more and more hardware and software are starting to generate a large
amount of data - for example, "Internet of things".
Things are already generating a huge flow of information. Police system "stream"
sends information from all cameras and lets you find the machine according to these data.
More and more are coming into fashion fitness bracelets, GPS-trackers and other things
that serve human tasks and business.
44
Moscow Informatization Department of gaining a large amount of data analysts, because
the statistics on people accumulate a lot and it is multi-criteria (for each person, collected
statistics for a very large number of criteria for each group of people). In these data, it is
necessary to find patterns and trends. For such tasks needed Mathematics with IT-
education. Because eventually the data is stored in a structured database, and we must be
able to handle it and to receive information.
3. Methods and Data Mining stage. Data Mining Tasks. Data Visualization.
All Data Mining techniques are divided into two large groups according to the principle
of working with the original training data. The upper level of this classification is
determined based on whether the data Data Mining after they are stored or distilled for
later use.
1. The direct use of the data, or save the data.
In this case, the original data is stored in a detailed and explicit directly used for
predictive modeling steps and / or analysis exceptions. The problem with this group of
methods - using them can be difficult analysis of very large databases.
Methods of this group: cluster analysis, nearest neighbor method, the method of k-
nearest neighbor, reasoning by analogy.
Arsenal Data Mining statistical methods classified into four groups of methods:
1.Descriptive analysis and description of the original data.
2. Analysis of relationships (correlation and regression analysis, factor analysis, analysis
of variance)
45
3. Multivariate statistical analysis (component analysis, multivariate regression analysis,
canonical correlation, and others)
4. Time series analysis (dynamic modeling and forecasting)
Data Mining techniques can also be classified according to Data Mining tasks.
In accordance with this classification select two groups. The first of them - a
division of Data Mining techniques to solving the problem of segmentation (ie the
problem of classification and clustering) and forecasting tasks.
According to a second classification by the tasks Data Mining techniques can be directed
to the descriptive and predictive results.
Descriptive methods are used to find templates or models that describe the data that
lend themselves to interpretation in terms of the analyst.
Methods aimed at obtaining descriptive results are iterative cluster analysis methods,
including: k-means algorithm, k-median, hierarchical cluster analysis methods, Kohonen
self-organizing maps, methods of cross-tabular visualization, various imaging techniques
and others.
Predictive methods use the meaning of some variables for predicting / forecasting
unknown (missing) or future values of other (target) variables.
Methods aimed at obtaining predictive results include methods such as neural
networks, decision trees, linear regression, nearest neighbor, support vector machines,
and others.
46
There is no unified opinion as which tasks should be assigned to Data Mining. Most
reputable sources list the following: classification, clustering, forecasting, association,
visualization, analysis, and detection of abnormalities, evaluation, analysis of the
relationships, summarizing.
Data Visualization - is the provision of information with help of pictures, graphs,
charts, tables and diagrams. Value visualization is that it often allows the most clearly
and concisely identify and display information contained in the data, because the image
can immediately show that will take more than one paragraph in the verbal equivalent.
The development of methods of visual presentation of the data are equally attended
by IT professionals and designers, as the design depends largely on how clear and "read"
is visualization.
With the help of data visualization solve the most different problems.
At first, it is an important tool in the initial stages of the data analysis. The most
simple of graphics allow you to quickly find data regularities, trends or anomalies, which
will be guided by the analyst in the further work with the data. Similarly, the journalist,
using charts when viewing the primary data, may formulate questions for themselves,
from which further can lead story for another material.
Second, visualization often play an important role in the presentation of the final
results of analysis. This can be static graphs showing trends; interactive visualization,
allowing users to explore the data; and infographics (static and interactive), clear image is
based on data history.
Questions
1.How to determine the Pearson correlation coefficient?
2. How to solve Data Mining Tasks?
3. What does processing large amounts of data mean?
4. What types have a decision tree?
References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
47
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.
Client. A device or application that uses the services provided by a server is called a
Client in the network. A client may be a PC or a workstation on a network using services
provided from the network file server, or it may be that part of an application program
that runs on the workstation supported by additional software running on the server. One
of the most familiar clients is the Web browser.
Server. Any computer that makes access to files, printing, communications, and
other services available to users of the network is called a Server in the network. In large
networks, a dedicated server runs a special network operating system; in smaller
installations, a non-dedicated server may run a personal computer operating system with
peer-to-peer networking software running on top.
A server typically has a more advanced processor, more memory, a larger cache,
and more disk storage than a single-user workstation. A server may also have several
processors rather than just one and may be dedicated to a specific support function such
as printing, e-mail, or communications. Many servers also have large power supplies,
UPS (uninterruptible power supply) support, and fault-tolerant features, such as RAID
technology. On the Internet, a server responds to requests from a client, usually a Web
browser.
49
Figure shows an enlarged view of an 8-port hub.
Bridges.A network bridge connects multiple network segments at the data link layer
(layer 2) of the OSI model. Bridges do not promiscuously copy traffic to all ports, as
hubs do, but learn which MAC addresses are reachable through specific ports. Once the
bridge associates a port and an address, it will send traffic for that address only to that
port. Bridges do send broadcasts to all ports except the one on which the broadcast was
received.
2.Stack protocols: TCP/IP, OSI. IP addressing. Local and wide area networks.Wire
and wireless network technologies.
- The scale
- The connection method
- The functional relationship (Network Architectures)
- The network topology
The given below classifies the computer networks according to the above different
basis.
The basis Different categories
Scale
Personal Area Network (PAN)
Local Area Network (LAN)
Metropolitan Area Network (MAN)
Wide Area Network (WAN).
Connection
method Optical fiber
Ethernet
Wireless LAN
Home PNA
Network
topology Bus network topology
(Arrangement
of components)
Star network topology
Ring network topology
Mesh network topology
Tree or Hierarchical topology
51
Classification of computer networks by scale
According to the Table 5 above, the networks can be classified into six classes
abbreviated as PAN, LAN, MAN and GAN.
Figure 11- Local Area Network (LAN) Figure 12- LAN in a School
The largest WAN in existence is the Internet. (You will learn about Internet in a
coming section).
53
Figure 15- LAN, MAN, and WAN
Network Topology is the schematic description how the arrangement of the network
is including the nodes, connecting lines, and other devices. As per the above Table 7, the
main network topologies are listed below.
- Bus
- Star
- Ring
- Mesh
- Tree/Hierarchical
Deep discussions on the topologies are beyond the level of this course unit.
However, brief descriptions on each topology and images of them are given below.
Bus Topology
Bus networks (not to be confused with the system bus of a computer) use a common
backbone to connect all devices. A single cable, the backbone, functions as a shared
communication medium that devices attach or tap into with an interface connector. A
device wanting to communicate with another device on the network sends a
broadcast message onto the wire that all other devices see, but only the intended
recipient actually accepts and processes the message.
Star Topology
Many home networks use the star topology. A star network features a central
connection point called a "hub node" that may be a network hub, switch or router.
Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet.
54
Compared to the bus topology, a star network generally requires more cable, but a
failure in any star network cable will only take down one computer's network access and
not the entire LAN. (If the hub fails, however the entire network also fails.)
Ring Topology
In a ring network, every device has exactly two neighbors for communication
purposes. All messages travel through a ring in the same direction (either "clockwise" or
"counterclockwise"). A failure in any cable or device breaks the loop and can take down
the entire network.
Mesh Topology
Mesh topologies involve the concept of routes. Unlike each of the previous
topologies, messages sent on a mesh network can take any of several possible paths from
source to destination. (Recall that even in a ring, although two cable paths exist, messages
can only travel in one direction.) Some WANs, most notably the Internet, employ mesh
routing.
A mesh network in which every device connects to every other is called a full mesh.
As shown in the illustration below, partial mesh networks also exist in which some
devices connect only indirectly to others.
55
Figure 19- Mesh topology
Tree Topology
Tree topologies integrate multiple star topologies together onto a bus. In its simplest
form, only hub devices connect directly to the tree bus and each hub functions as the root
of a tree of devices. This bus/star hybrid approach supports future expandability of the
network much better than a bus (limited in the number of devices due to the broadcast
traffic it generates) or a star (limited by the number of hub connection points) alone.
The Internet
As you are already aware, the Internet is the largest WAN in existence (See Figure
21 below). It is a network of networks that consists of millions of private, public,
academic, business, and government networks, of local to global scope, that are linked by
a broad array of electronic, wireless and optical networking technologies. The Internet
carries an extensive range of information resources and services, such as the inter-linked
hypertext documents of the World Wide Web (WWW) and the infrastructure to support
email.
With the dramatic rise in demand for connectivity, the Internet has become a
communications highway for millions of users. The Internet was initially restricted to
military and academic institutions, but now it is a full-fledged conduit for any and all
forms of information and commerce. Internet websites now provide personal,
educational, political and economic resources to every corner of the planet.
56
Figure 21- Internet: the largest WAN in existence
An intranet can cover a LAN where only staff in the same building or region can use
it. Or it can run over a WAN where staff (authorized people) from around the world can
log in.
What Intranets do
Intranets usually start by publishing web pages about the organization‟s events,
57
health and safety policies, and staff newsletters. Popular applications follow, such as
forms to reclaim expenses or request holidays. All these help eliminate paperwork and
speed up workflows of the organization.
As more features are added, this intranet can become essential to the operation of an
organization. It becomes a portal that provides access to all the things workers need.
A typical intranet may provide the services such as E-mail, File transfer, Real time
chat, web pages, video and audio streaming services. Each service requires at least one
server to provide the service.
Advantages of an Intranet
The Extranet
We can consider an Extranet as an extension to the Intranets what we described
above. Because, the extranets are again private networks that contains information related
to the company and accessible only for the members of the company BUT allowed for
outside individuals as well who have obtained the authority to access. Therefore, an
extranet is partially accessible to authorized outsiders.
An extranet can be configured (set up) either using a direct leased line linking all
intranets or by using a secured separate link created across the participants as a VPN
(Virtual Private Network). The latter method is more cost effective than the firs method.
Advantages of Extranets
- A cost effective method to share and trade information and all other data
effectively at any time to the authorized people (internal and external) such as the
customers, partners, investors, suppliers who are included within the built up
extranet.
58
in strengthening relationships between two or more organizations.
- Useful when the staff of the company works outside the office, from their
homes, or sales sites so that they can still be in with the company network with the
access permission.
Refer to the dhcpd.conf man page for details about the different modes.
There are two types of statements in the configuration file:
59
Parameters — State how to perform a task, whether to perform a task, or what
network configuration options to send to the client.
Declarations — Describe the topology of the network, describe the clients, provide
addresses for the clients, or apply a group of parameters to a group of declarations.
The parameters that start with the keyword option are reffered to as options. These
options control DHCP options; whereas, parameters configure values that are not
optional or control how the DHCP server behaves.
Parameters (including options) declared before a section enclosed in curly brackets
({ }) are considered global parameters. Global parameters apply to all the sections below
it.
Important
If the configuration file is changed, the changes do not take effect until the DHCP
daemon is restarted with the command service dhcpd restart.
Tip
Instead of changing a DHCP configuration file and restarting the service each time,
using the omshell command provides an interactive way to connect to, query, and change
the configuration of a DHCP server. By using omshell, all changes can be made while the
server is running. For more information on omshell, refer to the omshell man page.
Additionally, a subnet can be declared, a subnet declaration must be included for
every subnet in the network. If it is not, the DHCP server fails to start.
In this example, there are global options for every DHCP client in the subnet and a
range declared. Clients are assigned an IP address within the range.
Lease Database
On the DHCP server, the file /var/lib/dhcpd/dhcpd.leases stores the DHCP client
lease database. Do not change this file. DHCP lease information for each recently
assigned IP address is automatically stored in the lease database. The information
includes the length of the lease, to whom the IP address has been assigned, the start and
end dates for the lease, and the MAC address of the network interface card that was used
to retrieve the lease.
All times in the lease database are in Coordinated Universal Time (UTC), not local
time.
The lease database is recreated from time to time so that it is not too large. First, all
known leases are saved in a temporary lease database. The dhcpd.leases file is renamed
dhcpd.leases~ and the temporary lease database is written to dhcpd.leases.
The DHCP daemon could be killed or the system could crash after the lease
database has been renamed to the backup file but before the new file has been written. If
this happens, the dhcpd.leases file does not exist, but it is required to start the service. Do
not create a new lease file. If you do, all old leases are lost which causes many problems.
The correct solution is to rename the dhcpd.leases~ backup file to dhcpd.leases and then
start the daemon.
60
Starting and Stopping the Server
Important
When the DHCP server is started for the first time, it fails unless the dhcpd.leases
file exists. Use the command touch /var/lib/dhcpd/dhcpd.leases to create the file if it does
not exist.
If the same server is also running BIND as a DNS server, this step is not necessary,
as starting the named service automatically checks for a dhcpd.leases file.
To start the DHCP service, use the command /sbin/service dhcpd start. To stop the
DHCP server, use the command /sbin/service dhcpd stop.
If more than one network interface is attached to the system, but the DHCP server
should only be started on one of the interfaces, configure the DHCP server to start only
on that device. In /etc/sysconfig/dhcpd, add the name of the interface to the list of
DHCPDARGS:
# Command line options here
DHCPDARGS=eth0
This is useful for a firewall machine with two network cards. One network card can
be configured as a DHCP client to retrieve an IP address to the Internet. The other
network card can be used as a DHCP server for the internal network behind the firewall.
Specifying only the network card connected to the internal network makes the system
more secure because users can not connect to the daemon via the Internet.
Other command line options that can be specified in /etc/sysconfig/dhcpd include:
-p <portnum> — Specifies the UDP port number on which dhcpd should listen.
-f — Runs the daemon as a foreground process. This is mostly used for debugging.
-d — Logs the DHCP server daemon to the standard error descriptor. This is
mostly used for debugging. If this is not specified, the log is written to /var/log/messages.
-cf <filename> — Specifies the location of the configuration file. The default
location is /etc/dhcpd.conf.
-lf <filename> — Specifies the location of the lease database file. If a lease
database file already exists, it is very important that the same file be used every time the
DHCP server is started. It is strongly recommended that this option only be used for
debugging purposes on non-production machines. The default location is
/var/lib/dhcpd/dhcpd.leases.
-q — Do not print the entire copyright message when starting the daemon.
4.Telecommunication technologies.
Telecommunications involves the transmission over long distances of all forms of
information between computers various types of communication lines. By definition, to
ensure prompt and accessible exchange of information files is necessary, that users had
access to the Internet and software for data processing. All modern telecommunication
technologies based on the use of networks.
Network resources are divided into these types:
• Hardware (servers);
61
• Software (provides reception, transmission and processing of information);
• Information (storage of different arrays of information).
There are several services, or types of services that are provided to consumers on the
Internet. For their correct use is necessary to have two computers, one of them is a
workstation user, and the second - the server is the source of network resources. The
work of all services based on the use of application protocols that specify a list of rules to
which all companies to ensure the compatibility of hardware and software. Also the data
transfer is based on a client-server program, which involves client requesting services
from the server.
The Internet can provide the following services:
• Telecommunication (messaging, information of various types and sizes,
teleconference, etc.);
• Information (search for information in any format that the user interests);
• Consulting (training and advice on any matters relating to the use of public
resources);
• Technical services (installation and testing of hardware and software);
• Commercial (all commercial activities on the Internet);
• On-line communication between subscribers;
• Placement of advertisements on various websites, social networks and other sites;
• Cellular and mobile communications.
Questions:
1. Why do we need to connect computers?
2. What is a computer network?
3. Briefly describe the following network components.
4. a. Client b. Server c. Hub d. Router
62
7. Describe the following categories of networks briefly
8. a. PAN b. LAN c. WAN d. MAN
9. Explain the classifications of networks according to the topology.
10. What does it mean Internet and Intranet? Why is it important to use intranet
than internet?
11. What is the most suitable connection method for the following;
a. Computers within a laboratory.
b. Connect two computer laboratories.
References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.
Lecture №8. Cybersafety.
Purpose: Have an idea about e-business and e-government.
Plan:
1.Security risks of information and their classification. Industry of cybersafety.
Cybersafety and control of the Internet.
2.Malicious applications. Measures and means of information protection.
3.Standards and specifications in information security field. The acts of the Republic
of Kazakhstan governing legal relations in the sphere of information security.
4.Digital signature. Encoding.
65
Information security is a confrontation of information security specialists and
hackers. The attacker - a subject who illegally trying to obtain, modify or destroy data of
legitimate users.
66
• Determination of liability in the event of non-compliance with information security
requirements.
Organizational measures alone can not solve the security problem. They should
work in conjunction with physical and technical means of information protection in the
definition of the actions of people.
Physical protection is a set of tools that prevent physical penetration of a potential
intruder in the monitored area. They may be mechanical, electro-mechanical or electronic
devices of various types. Most often, it is with the construction of the physical protection
of security begins in the organization, including the information.
The last and most extensive in its composition echelon protection system is the
technical protection of information. It is this type of protection is dedicated to this course.
Technical protection of information - data protection is to ensure
nekriptograficheskimi methods of safety information (data) to be protection in
accordance with applicable law, the application of technical, software and software and
hardware. It is important to note that technical protection - is not only a protection against
leakage of information through technical channels of leakage, but also protection against
unauthorized access from the mathematical effects, malware, etc. The objects of technical
protection of information can be:
• information of the object;
• Information system;
• resources information system;
• Information Technology;
• software;
• communication network.
We proceed to the review of the standards and specifications of two different types:
3.Standards and specifications in information security field. The acts of the Republic
of Kazakhstan governing legal relations in the sphere of information security.
LAW OF THE REPUBLIC OF KAZAKHSTAN
On National Security of the Republic of Kazakhstan
(With amendments and additions as 26.07.2016 )
Article 4. Types of National Security
5) information security - the state of protection of information space of the Republic
of Kazakhstan, as well as the rights and interests of man and citizen, society and the state
in the information sphere of the real and potential threats, which provides a sustainable
development of the country's independence and information.
68
own version of a hash of the signed document. In the second stage decrypted hash
function, that contain the document. The third step is the comparison of the two hash
functions. Their match is a guarantee of the authenticity of the document and its
authorship.
7. What are the two keys are needed?
In the digital signature system used asymmetric encryption method, in which two
different keys are used, none of which can be obtained from another. One key (open) is
used to encrypt and the other (private) - to decrypt the information. The private key is in
its holder, which ensures high secret key and the public key is distributed to all users of
the system, so that they can carry out the authentication of the received documents and
signatures. This key can not be used to decrypt the information so it makes no sense to
limit its spread.
With the help of the public key of the recipient information, other users information
system encrypts the information and no one but the recipient will not be able to decipher
it, because to decrypt the private key is used, and it is available only from him.
8. Is it possible to check the credentials of the person who signed the document
on behalf of a digital signature?
Yes, it is only necessary to look accessible to all users of electronic signature
certificate owner. When you receive the keys of electronic digital signature in the
employee organization leader confirms the position and powers of the employee
(including the right to sign certain categories of documents). On the basis of the
certificate of the public key signature indicates the position and powers of the electronic
signature of the owner.
9. What if the private key is lost or electronic signature was in the hands of
unauthorized persons?
This is called EDS key compromise. The first task in this situation is the early
notification Certification Authority about what happened to output from the
compromised key actions in the system. Since then, the signature becomes valid and you
can rest easy. Then you can begin to address the issue of getting a new certificate of the
signature key.
What is encryption?
Encryption - the mathematical science of codes, ciphers and secret messages.
Throughout history, people have used encryption to exchange messages, the contents of
which, they hoped, would not be able to read no one except the recipients.
Today, there are computers capable of performing encryption for us. Digital
encryption technology went beyond the simple secrets. Encryption is used for more
complex tasks, such as checking the websites of the individual author's anonymous
browsing or using the Tor network.
Under certain conditions, the encryption can be fully automatic and easy to use. But if
something goes wrong, it is helpful to understand what was going on. Then you will be
better protected from the problems.
Three important concepts in encryption.
69
Private and public keys. One of the most important concepts in the encryption -
key. The common encryption schemes have a private key that is kept secret on your
computer and allows you to read messages addressed to you. Since you can also put the
private key to send messages is protected against forgery digital signature. The public
key - the file that you can share with others or publish. It allows people to share with you
encrypted messages and to verify your signature. Private and public key - pair. They are
like two halves of a stone, two exactly suited to each other, but dissimilar parts.
Safety Certifications. Another very important concept - a security certificate. The
web browser on your computer can establish an encrypted connection with websites via
HTTPS. In such cases, the browser verifies the certificate by checking public keys of
domain names (eg, www.google.com, www.amazon.com and ssd.eff.org). Using
Certificates - one way to confirm the authenticity of your existing public key person or a
website, so you can securely exchange information with him.
The network from time to time you will see a message about a security certificate
error. As a rule, the reason is to try the hotel or an Internet cafe, where you are, "open"
your encrypted data exchange with the website. In addition, this error often occurs
because of bureaucratic problems in the certificate system. But sometimes it occurs when
you try to hacker thief, police authority or the security services to crack your encrypted
connection.
Unfortunately, it is extremely difficult to establish the true cause. Therefore, when a
security certificate error can not take exception to websites where you have an account or
where you get very important information.
Prints keys.
The word "print" in the field of computer security can mean many different things.
One of the options - "print key": a sequence of characters, such as 342e 2309 bd20 0912
ff10 6c63 2192 1928. The print key allows you to securely authenticate the private key
used by anyone on the Internet. If the test print is passed, more likely that the other
person is really who he claims to be. This method is not perfect: the attacker can use the
same print, copy.
Questions:
1. What are the threats to information security and their classification?
2. What is cyber security industry?
3. What are there measures and the protection of the media?
4. Standards and information security specifications.
5. When is founded a law on information security?
6. What is a Digital Signature?
References
70
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.
http://
The "http" stands for HyperText Transfer Protocol and is what enables the browser
to know what protocol it is going to use to access the information specified in the
domain. After the http is the colon( : ) and two forward slashes ( //) that separate the
protocol from the remainder of the URL.
71
www.
Next, www.stands for World Wide Web and is used to distinguish the content. This
portion of the URL is not required and many times can be left out. For example, typing
"http://computerhope.com" would still get you to the Computer Hope web page. This
portion of the address can also be substituted for an important sub page known as a
subdomain. For example, http://support.computerhope.com forwards you to the main
help section of Computer Hope.
computerhope.com
Next, computerhope.com is the domain name for the website. The last portion of the
domain is known as the "domain suffix", or TLD, and is used to identify the type or
location of the website. There are dozens of other domain suffixes available. To get a
domain, you would register the name through a domain registrar.
/jargon/u/
Next, the "jargon" and "u" portions of the above URL are the directories of where
on the server the web page is located. In this example, the web page is two directories
deep, so if you were trying to find the file on the server, it would be in the
/public_html/jargon/u directory. With most servers, the public_html directory is the
default directory containing the HTML files.
url.htm
Finally, url.htm is the actual web page on the domain you're viewing. The trailing
.htm is the file extension of the web page that indicates the file is an HTML file. Other
common file extensions on the Internet include .html, .php, .asp, .cgi, .xml, .jpg, and .gif.
Each of these file extensions performs a different function, just like all the different types
of files on your computer.
The structure of the URL is shown in the figure below.
The Internet uses a variety of languages to transmit information from one place to
the other. These languages are called protocols. Using these protocols we can acquire the
services from the Internet. Each protocol has a specific functionality and www is
considered to be the largest service acquired amongst the services provided by the
Internet.
Browser
A browser is a computer software which can be used to view documents on the
Internet. Web browsers interpret HTML code and display images and text.
Client.A computer which is capable of receiving the information from the server in
the Internet is called a client. A home PC is an ideal example for this.
74
Server.Client computers download files in the Internet from the Server. These
servers are directly linked to the internet and consist of a lot of documents.
Domain
The Domain is the top level identification string for a particular server (yahoo.com).
There are various types of domains. It can be categorized using one or more extensions.
FTP
FTP is a standard Internet protocol which refers to the File Transfer Protocol. Using
this protocol we can transfer files from one computer to the other via Internet. This is the
simplest way to exchange files between computers on the Internet. FTP is an application
protocol that uses the Internet's TCP/IP protocols. FTP is commonly used to transfer Web
page files from their creator to the computer that acts as their server for everyone on the
Internet. It's also commonly used to download programs and other files to your computer
from other servers.
HTML
HTML is the abbreviation for Hyper Text Markup Language. The web pages are
called hypertext documents because when you click a word or a picture which is hyper
linked you can go to another location. From there you can jump to another webpage. This
is made possible because HTML allows the document‟s author to embed hyperlinks.
HTTP
HTTP is the foundation of data communication for the World Wide Web. HTTP
(Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic
images, sound, video, and other multimedia files) on the World Wide Web. When the
browser user enters file requests by either "opening" a Web file (typing in a Uniform
Resource Locator or URL) or clicking on a hypertext link, the browser builds an HTTP
request and sends it to the Internet Protocol address (IP address) indicated by the URL.
The HTTP daemon in the destination server machine receives the request and sends back
the requested file or files associated with the request.
Example URL: http://www.yahoo.com
HTTPS
HTTPS stands for “Hyper Text Transfer Protocol Secure”. This means that the data
transferred electronically is encrypted and cannot be accessed by unauthorized people.
HTTPS provides authentication of the web-site and related web server which is
interacting with thus protecting against Man-in-the middle attacks.
CSS
1. Short for Cascading Style Sheet, CSS is a concept first created by HåkonWium
Lie in 1994. In December 1996, CSS was made a specification by the W3C and today
allows web developers to alter the layout and appearance of their web pages. For
75
example, CSS may be used to change the font used in certain HTML element, as well as
its size and color. A single CSS file may be linked to multiple pages, which allows a
developer to change the appearance of all the pages at the same time.
Using emails
Email address. An Email address has 3 parts in it. If we type an email address, it
will be in the following format.
Eg: username@hostname
1 2 3
76
4. SMTP, POP3, IMAP protocols.
Every email has the sender‟s address (e.g. [email protected]) and the
recipient‟s in the To
Field (e.g. [email protected]). When an email is sent, the email client
connects to the
SMTP server of the sender‟s email service (e.g. mailserver.sendermail.com). The
client transmits the address of the sender, the address of the recipient and the content of
the message.
The SMTP server goes to work at locating the whereabouts of the recipient. Using
the recipient‟smail ID (i.e. [email protected]) it locates the domain name–
e.g.recipientmail.com.
Each domain name represents a unique Web address, called an Internet protocol
(IP) address. Think of it as postal addresses of the internet. The link between domain
names to their IP addresses is stored in the Domain Name Registry. The SMTP server
then contacts the server where the registry is kept (The DNS Server). The DNS server
sends back the address to the SMTP server.
The SMTP server then proceeds to hand over the email to the SMTP server of the
recipient‟s email service (let‟s call it mailserver.recipientmail.com). This SMTP server
checks and confirms that the mail addressed to [email protected] belongs to
it and hands it over to its counterpart, the POP3 server (or the IMAP server).
Questions:
1. What is a „mail server‟? Describe how to send an e-mail between two
people.
2. What is an e-mail client? Name two types of e-mail clients with examples.
3. Definethefollowingterms.
SMTP
DNS Server
4. What are the advantages of POP sever and IMAP server?
5. When sending an e-mail what is the difference between CC and BCC?
6. How can you attach a document to your e-mail?
7. List three e-mail etiquettes and give reasons for doing them.
8. What are the three parts of an e-mail address?
9. When creating an e-mail account what is the purpose of typing a given code
in the cage provided?
10. What is the purpose of “inbox” in an e-mail account?
References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.
78
1.Date centres. Tendencies of development of the modern infrastructure
decisions.
2. Principles of cloud computing. Technologies of virtualization. Web service in the
Cloud.
3.Main terms and concepts of mobile technologies. Mobile services. Standards of
mobile technologies.
79
with the advent of blade servers, was the emergence of specialized systems and storage
area networks. Internal storage subsystem servers often could not provide the required
level of scalability and performance under a cascade of increasing the volume of
information processed. As a result, there were external storage systems focused
exclusively on the decision of the data storage tasks and providing data access interface
for their use.
Data Storage System (NAS) - a hardware and software solution for the
organization of a reliable storage of information resources and providing them
secure access.
Data storage systems are reliable storage device, into a separate unit. The data
storage system may connect to the server in many ways. The most productive is the
connection for optical channels (Fiber Channel), which makes it possible to access the
storage system with speeds of 4-8 Gbit / s. Storage systems also have reservations major
hardware component - several power supplies, raid controllers, FC adapters and optical
patch cords to connect to the FC switches
Storage Area Networks
SAN - a high-speed switched data transmission network of servers, workstations,
disk storage and tape libraries. Data exchange takes place according to the protocol
Fibre, Channel, optimized for fast and guaranteed messaging allows you to send
information over a distance of several meters to hundreds of kilometers.The driving
force for the development of storage networking has become an explosive growth in the
volume of business information (such as e-mail, database and file servers highly loaded),
which requires high-speed access to disk devices at the block level. SANs help to
increase the efficiency of use of storage resources, providing opportunities to allocate any
resource to any node on the network.
Consolidation of IT infrastructure
Consolidation - an association of computing resources or management structures in
a single center.
Analysis of international experience allows us today to talk about a clear trend
towards consolidation of corporate IT resources. That she is able to significantly reduce
IT costs. Savings same tools can be directed to improving the quality of available
information services, and the introduction of new ones. In addition to optimizing IT
costs, consolidate IT resources, improves manageability enterprises through more current
and complete information about their functioning. Usually they talk about consolidation:
a)servers - moving decentralized applications distributed on different company
servers in one cluster of centralized homogeneous servers;
b) Storage - sharing of centralized storage multiple heterogeneous hosts;
c) Application - accommodation of multiple applications on a single host.
2. Principles of cloud computing. Technologies of virtualization. Web service in the
Cloud.
Terms such as "cloud" and "cloud computing" since the beginning of zero began to
be used quite often by the general public and actively Force IT-startups. For many of
these concepts are abstract and vague. Let's see, what, specifically, is the - cloud
computing.
80
Cloud computing - the public, the term that is defined in the authoritative sources
like the following:
Cloud computing - a principle (model), according to which computing resources
such as servers, storage and data processing device (or the services of the program - in
other sources) are available on request from the customer, are provided with a network
connection.
At the same time there are a few characteristics that the system should have recognition
for its cloud. Here are the most common ones:
. The same resources (service data) can be obtained regardless of which device and
how the customer uses the network node;
2. Ability to identify client's resources that it uses;
3. Price calculation depending on the volume of services used;
4. Flexibility - the ability for a customer at any time to change the amount of resources
used by it in the automatic mode;
5. The presence of a service that provides computing services, API.
6. pooling of resources allocated among the clients in a single system.
Virtualization Technology
According to statistics, the average processing capacity utilization at the server running
Windows does not exceed 10%, in Unix-based systems, this figure is better, but still an
average of less than 20%. Low server utilization is due to widely used since the early 90s
approach "one application - one server".., Ie, every time the company acquires a new
server for the deployment of a new application. It is obvious that in practice this means a
rapid increase in server park and as a consequence - increase in costs for its
administration, power and cooling, as well as the need for additional space for the
installation of all new servers and the acquisition of licenses for the server operating
system.
Virtualization of resources of the physical server, allows the flexibility to distribute
them between applications, each of which is thus "sees" only the resources dedicated to it
and "thinks" that it a dedicated server, ie in this case implemented a "one server - several
applications.". but without compromising performance, availability and security of server
applications. In addition, virtualization solutions make it possible to run in different
sections of the operating system via emulation of system calls to the hardware resources
of the server.
The virtual car will be called the software or hardware environment that hides the
real implementation of a process or an object from presentation.
Virtual car - a fully isolated software container that works with its own operating system
and applications, like a physical computer. The virtual machine acts just like a physical
computer and contains its own virtual (ie, software) of RAM, hard drive and network
adapter.
Web services in the Cloud.
Often there are three options, three service models (eng. service — services, services) in
the cloud:
1. IaaS — infrastructure as a service. This infrastructure consists of all neobhodimyh
81
computer parts and provided so that it can be customised almost as iron in the form of a
computer. Of course, it is served in the abstract after virtualization.
2. PaaS — platform as a service. In this case, the client works with the system at a higher
level. If we compare these two services with standard hosting services, the difference
between PaaS and IaaS can be thought of as the difference between normal shared
hosting and VDS.
3. SaaS — software as a service. The user is given only implemented in the framework of
service opportunities.
3.Main terms and concepts of mobile technologies. Mobile services. Standards of
mobile technologies.
Mobile device’s technology
Technology and technical devices of mobile commerce make user a large extent
independent of stationary computing devices, providing all of the above possibilities for
mobile phone or handheld computer available. This independence is very important for a
business person: often the decision is released for a limited time, and it should not
interfere with such factors as the inability to rapid clearance of the transaction or the lack
of access to information channels.
Below listed are the mobile devices that are the most common nowadays, which
allow to work in the area of mobile commerce.
Mobile phone with WAP function, GPRS or own microbrowser. Mobile
(smartphone) has become a significant phenomenon of the late XX - early XXI century.
Advances in technology and communication standards chips lowered the price of the
phone for fifteen years, more than twenty times. This functionality has increased many
times over - a modern smartphone is a powerful computing device with a flexible
operating system, large memory, database, built-in frequency and time standard
multimedia features, the ability to communicate with other electronic devices, and exit
the Internet.
Mobile access to the Internet can take place via a wireless modem, built-in WAP-
browser, or by synchronizing the device
82
therefore, the development of standard communication between them is one of the most
popular solutions. WAP is a set of the following protocols:
• protocol ensuring the data exchange between the client and the server (Wireless
Session Protocol - WSP);
• ensuring of transactions based on the protocol of the transport mechanism of
requests and responses (Wireless Transaction Protocol - WTP, Request and Reply);
• wireless transmission Datagram Protocol (Wireless Datagram Protocol - WDP);
• to ensure the safety protocol (Wireless Transport Layer Security - WTLS).
Information is transmitted between the client and the WAP-WAP-server. In a
typical mobile WAP-phone can act as a client. With microbrowser-program request is
sent to the wireless access network, which is received by the WAP-gateway. WAP-
gateway, in turn, sends the URL-request using the HTTP protocol the requested Web-
site, with the requested Web-page to be written in a language WML (Wireless Markup
Language). Web-site generates a response in WML format, sends it at WAP-gateway and
from there, the requested information is transmitted to the mobile phone in the client
binary format. After that, the information is decrypted and presented in a convenient
form for the customer - audio, video, text message.
Mobile services on the Microsoft Azure platform - one of the most modern types of
applications that can be developed in Visual Studio. Mobile service on the Azure
platform - is a server application that manages cloud database used them to store
information received from the mobile application on your mobile device. The scheme of
the chain "mobile app- mobile service" next. The user (mobile client) on your
smartphone can run a mobile application that interacts with the mobile cloud service in
the Azure cloud. The mobile client enters the required information in the form of on-
screen on a smartphone, and refers to the mobile service, stores the information in the
cloud database. After this possible treatment
This scheme is useful in many areas: for example, a visit to the patient's doctor, who
inspects the patient and transmits the data via their smartphone to the cloud database.
This cloud-based database, in turn, can be quickly accessed by other doctors and clinic
management, etc. In this respect, the use of cloud computing Azure platform provides a
huge opportunity, both in terms of the volume of information stored in the cloud, and in
terms of ease of use.
Mobile technology standards.
Nowadays, there are three standards for mobile communications: CDMA, GSM and
UMTS.
GSM-standard
Customer’s growing demand forced manufacturers to develop a variety of
technologies to increase the data rate. Thus, initially, the data transmitted in GSM at a
rate of 9.6 kilobits per second. But with the advent of GPRS-technology, subscribers
receive a decent alternative to the Dial-Up for mobile Internet access. Almost all
Ukrainian operators, the average speed of GPRS-connection is about 40-50 kilobits per
second and can vary significantly depending on various conditions.
83
The next step in the development of high-speed capabilities of GSM has been the
development of EDGE technology. Initially it had pinned great hopes up to support
streaming video and online TV. But in practice the stated rate was virtually unattainable,
thus, EDGE technology was simple, which increases the speed of access to the Internet
from a mobile phone compared to GPRS.
UMTS - a new communication standard, which allows you to get in addition to
standard services, available in the second-generation networks, and more features such as
video calls, online TV and a high-speed Internet access. This technology is recognized as
a 3G-standard. UMTS is realized in four frequency bands 850/1700/1900/2100 MHz.
However, it is possible that this number may soon be extended. In Ukraine, a UMTS
connection is available only at a frequency of 2100 MHz, and is only one provider - Utel,
two other operators, "Kyivstar" and Beeline offer their subscribers roaming access to the
network.
The rates offered UMTS standard, not long satisfied customers, so was soon
developed and implemented HSDPA technology by which data transfer rate has
increased nearly 10 times. However, with such a substantial increase in injection rate, the
reverse flow was too small. Thus was born the HSUPA technology, which is at the same
high injection rate, almost 10 times increased the rate of outgoing data flow. At this point
in Ukraine is only implemented HSDPA technology with a peak speed of 3.6 Mb / s
technology capabilities allow it to increase to 14 MB / s.
In the 4G technology standards are used LTE and WiMAX.
Many providers often use the 4G term to describe the technologies offered today,
sometimes even at the same time distorting reality. However, current 4G implementation
mostly relates to the pre-4G, since they do not fully meet the requirements of high-speed
4G - to 1Gbit / s for stationary reception and 100Mbit / s to mobile.
In addition to speed, to qualify as a 4G network, it must satisfy a number of other
principles. In short, the network must be extremely spectrally efficient, must dynamically
allocate and use their resources to support large numbers of simultaneous users per cell,
should offer a high quality of service for next generation multimedia support, and should
be based on a switched network all-IP.
LTE -standard LTE Long-Term Evolution (LTE) is regarded by many as the natural
successor to the current 3G technologies. This is partly due to the fact that it updates the
UMTS network to a significantly higher data transmission rates, as in downloading, and
the injection. The specification provides a peak download speed at the level of 100 Mbps
/ sec, and the injection - to 50Mbit / sec. However, tests in the real world data rate will
likely be in the area 5-12 Mbit / sec for downloading and 2-5Mbit / sec per injection.
In general, the LTE standard developed by a consortium 3rd Generation Partnership
Project (or 3GPP) as the eighth edition of what has evolved from the GSM family of
standards since 1992.
WiMAX - is a broadband wireless standard, which is based on the IEEE 802.16
standard. As the name implies, WiMAX can be considered an extension of the standard
Wi-Fi, designed to provide a wide range of devices (from laptops to smartphones) high-
speed mobile internet access. The current implementation is based on the WiMAX
84
802.16e specification, which is a 30-mile range (48,27km) theoretically offers transfer
speeds of up to 70Mbit / sec.
Questions:
1. What is Data Center?
2. What are the principles of cloud computing?
3. What is Virtualization Technology?
4. What are the Web-service Cloud?
5. What are the differences between a standard as LTE and WiMAX?
References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.
Resources:
1. http://www.intuit.ru/studies/courses/673/529/lecture/11914?page=2
85
code, i.e. the two alphabet is used (only two symbols 0 and 1). It is connected with the
fact that it is convenient to present information in the form of the sequence of electric
impulses: the impulse is absent (0), the impulse is (1). It is accepted to call such coding
binary, and the logical sequences of zero and units - computer language. Each figure of
a machine binary code bears amount of information equal to one bit.
This conclusion can be drawn, considering figures of the machine alphabet as
equiprobable events. At record of binary figure it is possible to realize the choice only of
one of two possible states, and, so she bears amount of information of equal 1 bits.
Therefore, two figures bear information 2 bits, four categories - 4 bits etc. To define
amount of information in bits, it is enough to define the number of figures in a binary
machine code.
Depending on in what object the data which are subject to compression are placed
distinguish:
1. Compression (archiving) of files: it is used for reduction of the sizes of files by
preparation them to transfer by communication channels or to transportation on external
carriers of small capacity;
2. Compression (archiving) of folders: it is used as means of reduction of volume of
folders before long storage, for example, at backup;
3. Compression (consolidation) of disks: it is used for increase in efficiency of use
disk spacious by compression of data in case of record them on the data carrier (as a rule,
means of an operating system).
There are many practical algorithms of compression of data, but all of them are based on
three theoretical ways of reduction of redundancy of data. The first way consists in
change of contents of data, the second - in change of structure of data, and the third - in
simultaneous change of both structure, and contents of data. If at compression of data
there is a change of their contents, then the method of compression is called irreversible,
that is at recovery (extraction) of data from archive there is no complete recovery of
information. Such methods often are called compression methods with the regulated
losses of information. It is clear, that these methods can be applied only to such types of
data for which loss of a part of contents doesn't lead to essential distortion of information.
Video and audiodata, and also graphic data belong to such types of data. Compression
methods with the regulated losses of information provide considerably big extent of
compression, but they can't be applied to text data. Can be examples of formats of
compression with losses of information:
• JPEG - for graphic data;
• MPG - for video data;
• MP3 - for audiodata.
If at compression of data there is only a change of structure of data, then the method of
compression is called reversible. In this case, from archive it is possible to restore
information completely. Examples of formats of compression without loss of
information:
• GIF, TIFF - for graphic data;
• AVI - for video data;
• ZIP, ARJ, RAR, CAB, LH - for any types of data.
86
There are many different practical methods of compression without loss of information
which, as a rule, have different efficiency for different types of data and different
volumes. However, three theoretical algorithms are the cornerstone of these methods:
• RLE algorithm (Run Length Encoding);
• KWE group algorithms (Key Word Encoding);
• Huffman's algorithm.
RLE algorithm
The idea of detection of the repeating sequences of data and replacement with their
simpler structure in which the code of data and coefficient of repetition is specified is the
cornerstone of an algorithm of RLE. For example, let such sequence of data is set that is
subject to compression:
1111223444
In an algorithm of RLE it is offered to replace it with the following structure: 1 4 2 2 3 1
4 3 where the first of each couple of numbers is a code of data, and the second -
repetition coefficient. If for storage of each element of data of the entrance sequence 1
byte is taken away, then all sequence will occupy 10 bytes of memory whereas the output
sequence (the compressed option) occupies 8 bytes of memory. The compression
coefficient characterizing extent of compression can be calculated on a formula:
where Vx-memory size necessary for storage of the output (resultant) sequence of data,
Vn-of the entrance sequence of data.
The value of coefficient of compression is less, the compression method is more
effective. It is clear, that the algorithm of RLE will give the best effect of compression
with a bigger length of the repeating sequence of data. In case of the example reviewed
above if the entrance sequence has such appearance: 1 1 1 1 1 1 3 4 4 4, the coefficient of
compression will be equal to 60%. In this regard big efficiency of an algorithm of RLE is
reached at compression of graphic data (in particular for monophonic images).
KWE group algorithms
At the heart of a compression algorithm according to keywords the principle of coding of
lexical units by groups of bytes of the fixed length is put. The usual word can be an
example of a lexical unit. In practice, the repeating sequences of symbols which are
coded by a chain of symbols (code) of smaller length get out to a role of lexical units.
There are many implementations of the algorithm, among which the most common
are the Lempel-Zіva (LZ algorithm) and a modification of Lempel-Zіva-Welch (LZW
algorithm). Glossary This algorithm is a potentially endless list of phrases. The algorithm
starts with an almost empty dictionary, which contains only one encoded string, so-called
NULL-line. When reading the next data sequence symbol input, it is added to the current
line. The process continues as long as the current line matches any entry in the
dictionary. But sooner or later, the current line has ceased to fulfill any phrase dictionary.
At a time when the current line is the last match with the dictionary plus just read the
character of the message, the encoder outputs the code, which consists of an index of
coincidence, and it follows the character that broke the strings match. The new phrase,
consisting of matching index and the next character after him, added to the dictionary.
The next time, if the phrase appears in the message, it can be used to build longer phrases
increases the extent that data compression.
87
LZW algorithm is built around a table phrases, which replaces the character string
compressed messages in a fixed-length codes. The table has a so-called property of
timing, that is, for each phrase dictionary, consisting of a phrase w and the symbol K, w
also entered the phrase in the dictionary. If all parts of the dictionary is completely filled,
it stops being adaptive coding (encoding takes place on the basis of existing phrases in
the dictionary).
Compression algorithms in this group are most effective for text data of large volumes
and are ineffective for small file sizes (due to the need to preserve the dictionary).
Huffman algorithm
The Huffman algorithm based on the idea of coding bit groups. First, the frequency
analysis is performed the input data sequence, i.e set the frequency of occurrence of each
character occurring in it. Thereafter, the symbols are sorted to reduce occurrence
frequency.
The basic idea is this: the more common symbol, the smaller the number of bits is
encoded. coding result is stored in the dictionary required for decoding. Here is a simple
example that illustrates how the Huffman algorithm.
Suppose we are given a text in which burva 'A' consists of 10 times, the letter 'B' - 8
times, 'c'- 6 times, 'the D' - 5 times, 'E' and 'F' - 4 times. Then one of the possible coding
options Huffman given in Table 1.
Sy frequency b
mbol of occurrence it
code
A 10 0
0
B 8 0
1
C 6 1
00
D 5 1
01
E 4 1
10
F 4 1
11
Table 11- Possible coding options Huffman
see Table 1, the size of the input text before compression is 37 bytes, whereas after
compression - 93 bits, which is about 12 bytes (excluding the length of the dictionary).
The compression ratio is 32%. Huffman algorithm is universal, it can be used to
88
compress data of any type, but it is not very effective for small file sizes (due to the need
to preserve the dictionary).
In practice, software data compression synthesize these three "clean" algorithms because
their effectiveness depends on the type and amount of data. Table 2 shows the common
compression formats and their corresponding archiver Programs that are used in practice.
Format MS DOS operating Windows operating
compression system system
Utility unzippi Utility unzippi
program ng program program ng program
ARJ Arj.exe Arj.exe WinAr WinArj
j.exe .exe
RAR Rar.exe Unrar.exe WinR WinRar
ar.exe .exe
ZIP Pkzip.exe Pkunzip.exe WinZi WinZip
p.exe .exe
Questions
1. What is data center?
2. What is the principles of cloud computing?
3. Virtualization technology?
4. What are Web services in the Cloud?
5. What are the differences between a standard such as LTE and WiMAX?
6. What is the purpose of modeling? What types of modeling do you know?
7. What types of computer simulation can be carried out in environments of three-
dimensional graphics?
8. What factors influence the degree of data redundancy?
9. What is an archive? What kind of software are called archivers?
Why compression techniques in which there is a change in data content, called
irreversible?
10. Give examples of compression formats with loss of information.
References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.
Resources:
1. http://ru.wikipedia.org/wiki/
2. http://ru.wikipedia.org/wiki/
3. http://www.intuit.ru/studies/courses/673/529/lecture/11914?page=2
92
1.Internet of things. Big data. Technology Block Chain. Artificial intelligence.
2.Use of Smart-services. Green technologies in ICT.
3.Teleconferences. Telemedicine.
93
in 2010, the number of connected devices has increased to 12.5 billion, while the
world population was 6.8 billion people as a result of the rapid spread of smartphones
and tablet computers. Thus, for the first time in the history of every person to have to
become more than one connected device (1.84 unit per capita).
Big data begin information technology- a set of approaches, tools and methods for
handling structured and unstructured data of huge volume and considerable variety for
perceived human results, effective in the conditions of continuous growth, the
distribution across multiple nodes of a computer network,formed at the end of
2000s,alternative to traditional database management systems and solutions-class
Intelligence. Business In this series include funds massively parallel processing vaguely
structured data, primarily solutions NoSQL category,algorithms, the MapReduce
software frameworks and libraries project Hadoop
Methods of analysis
methods and analysis techniques applicable to big data, allocated at McKinsey
report:.
Class Methods Data Mining:rule learning,association classification (methods
of categorization of new data on the basis of previously Applied on the longer is
there data), cluster analysis, regression analysis,
crowdsourcing- categorization and enrichment of data forces wide, an
indefinite number of people, attracted on the basis of a public offer, without entry
labor relations;
fusion and integration-data a set of techniques for integrating disparate data
from a variety of sources to enable in-depth analysis, as examples of such
techniques, composing this class of methods provides digital signal processing,and
natural language processing (including tone analysis),
Machine learning,including training with the teacher without the teacher,as
well as learning Ensemble- the use of models built on the basis of statistical
analysis and machine learning for complex projections based on basic models
constituent Wed. with a statistical ensemble in statistical mechanics),
artificial neural networks, network analysis, optimization,including genetic
algorithms,
Pattern recognition,
Predictive analytics,
Simulation modeling,
spatial analysi- the Spatial class methods using topological, geometric and
geographic information data,
Statistical analysis,as examples of methods are A / B-testing and time-series
analysis,
visualization of analytical data- presentation of information in the form of
drawings, diagrams, using interactive features and animation for the results, and
for use as raw data for further analysis of-the transaction chain blocks built
according to certain rules of a chain of transactions generated blocks. For the first
time the term appeared as the title of a distributed database implemented in
94
cryptocurrency"Bitcoin".Also widely used term Blockchain as a transliteration
from(Eng. Block chain Blockchain,Block - a block, chain- chain)
Block Transaction
Transaction Block - a special structure for the transaction group records in the
system Bitcoin:..and others like it
Тransaction is considered to be accurate ( "the confirmed"), its format and the
signature must check and then a group of transactions recorded in a special structure - the
block.The information in the blocks, you can quickly double-check. Each block always
contains information about the previous block. All units can be built in a single chain,
which contains information about all committed transactions ever in this database. The
first unit in the chain - the primary unit ( block) -genesis is regarded as a special case,
because it does not have the parent unit transactions..
The block consists of a header and a list of Title block includes a hash, hash of the
previous block, hash transaction and additional service information. The system first
Bitcoin transaction in a block is always specified to obtain a commission that will reward
the user for the established flow.
Then go all or some of the recent transactions that have not yet been recorded in the
previous blocks. For transactions in the block using a tree hashing,similar to the
formation of hash sums for the file in the BitTorrent protocol.Transaction fees for
charging besides creating unit contained within the attribute input the reference to
transaction data from the previous state (at Bitcoin system, for example, reference is
made to the transaction for which consumable bitcoins were obtained). Transaction Fees
may contain any information in the attribute (for which this field is known as the
English. parameter),Coinbase because they have no parent transaction.
Created block is adopted the other users, if the numerical value of the header hash is
equal to or below a certain number, the value of which is adjusted periodically. As a
result of the hash (SHA-256 function) is irreversible,there is no algorithm for obtaining
the desired result, in addition to random search. If the hash does not satisfy the condition,
then the title is changed parameter nonce and the hash is recalculated. Typically, a large
number of calculations of the original is required. When the option is found, the node
sends the resulting unit is connected to other nodes that test unit. If there are no errors,
then the block is considered to be added to the chain, and the next block should include a
hash of it.
The value of the target number, which is compared to the hash in Bitcoin system is
adjusted every 2016 blocks. It is planned that the entire system Bitcoin network must
spend a generation unit for about 10 minutes, at blocks 2016 - about two weeks. If block
2016 formed faster, the goal is slightly reduced, and it becomes difficult to achieve
otherwise target increases. Changing the computational complexity does not affect the
reliability of Bitcoin network and only need to system generated blocks with almost
constant speed, independent of the processing power of network members.
Block chain
95
Figure 23-Block chain
Primary sequence of blocks (black) is the longest of the initial (green ) to the
current. The side branches (purple) are cut off.
Artificial intelligence Science and technology for creating intelligent
machines,especially intelligent computer programs;
2) the property of intelligent systems to perform creative functions that are
traditionally considered the prerogative of the human
AI is associated with a similar task of using computers to understand human
intelligence,but not necessarily limited to biologically plausible methods AI:..
We can distinguish two directions of development of
Problem solving associated with the approach of the specialized AI systems
to human capabilities and their integration, which realized the nature of man;.the
creation of artificial intelligence, which represents the integration of already
existing AI systems into a single system capable of solving the problems of
mankind,but at the moment there is the involvement of many people in the field of
artificial intelligence domains that have more practical relevance to AI rather than
fundamental. Many approaches have been tried, but the emergence of artificial
intelligence, no research team has not yet been reached. Below are just some of the
most well-known developments in the field of AI
Application
Blue -Deep Defeated world chess champion.match Kasparov against a
supercomputer is not brought satisfaction neither computer scientists or chess
players, and the system was not recognized Kasparov(see. The person against the
computer). Then IBM supercomputer line was manifested in projects brute force
Blue Gene (molecular modeling) and simulation system of pyramidal cells the
incenter of the Swiss Brain
IBM development perspective, the ability to perceive human speech and to
produce probabilistic search, using a large number of algorithms. To demonstrate
the Watson took part in the American game«Jeopardy!»,Analogue"of the game"in
Russia, where the system was able to win in both games
-MYCIN One of the earliest expert systems that can diagnose a small set of
diseases, often just the same as Dr.
20Qa project based on the ideas of AI, based on the classic game of "20
questions." He became very popular after the appearance on the Internet at 20q.net
site.
96
Speech Recognition.Systems such as the ViaVoice able to serve consumers.
Robots in the annual tournament, RoboCup compete in simplified form of
football.
Banks use artificial intelligence systems (AIS) in the insurance business (actuarial
mathematics), while playing at the stock exchange, and management of the property.
Pattern recognition methods (including more complex and specialized, as well as neural
networks) are widely used in optical and acoustic recognition (including text and speech),
medical diagnostics, spam filters, air defense systems (goals definition), as well as to
provide a number of other national security issues.
One of the D TV manufacturers are additional possibilities of television sets under the
name Smart TV. These television sets are also called "smart TVs", and they provide
access to the Internet and install additional applications, as well as provide additional
opportunities for media content (video files, photos, music) to the TV.
This feature will allow you to download a variety of applications to search for
television content chat while watching programs on the air, to search for information on
the Internet from your couch, keep in touch with friends and family, find reviews about
movies and much moreTV:.
Hub - Smart is a service in which all advanced features Samsung application store
browser, search, and, of course, the applications themselves. The number of available
Smart Hub features may vary from series to which television belongs.
3.Teleconferences. Telemedicine.
On the Internet, there are tens of thousands of conferences or newsgroups (news),
each of which is devoted to the discussion of any problems. Each conference is allocated
to your mailbox on Web servers that support the work of this conference call.
Users can send their messages to any of these servers. Server periodically
synchronized, that is, exchange mailbox content teleconferencing, conference
proceedings therefore fully accessible to the user on any such server.
97
How it works in teleconferences is not much different from the principle of e-mail.
The user can send their messages to any newsgroup and read messages sent by other
participants.
To work in newsgroups are usually used the same e-mail programs, and that when
working with e-mail, such as Outlook Express. Setting up Outlook Express to work with
newsgroups is similar to configuring e-mail, you have created an account for the news,
such as "Conference". Outlook Express creates the same name off older the Conference
of the that is initially empty
Telemedicine - one of the areas of medicine, based on the use of modern
communication technologies for remote medical care and timely advice
Basic telemedicine direction follows:Among the major telemedicine areas should
be allocated as Telemedical consultations, tele-education, online broadcast operations,
remote biomonitoring and home telemedicine.
Тelemedicine consultations. The telemedicine is remote consultation and diagnosis
of patients are considered to be the most common and popular service. With the help of
video conferencing systems between vrachёm consultant and the patient is getting better
full audiovisual contact. Thus, the patient and the doctor can not only see and hear each
other, but also to share graphics and text data (eg, x-ray of the patient picture doctor or
license).
The medical tele-education. Health seminars, conferences and lectures broadcast
videoconferencing system enable professionals of a higher level to share their knowledge
and skills not only in theory but also in practice. Thus, more experienced professionals
can even remotely monitor the progress of operations and to give practical advice to their
colleagues.
The online broadcast of surgery. The use of webcams to transmit over the Internet
a variety of information, allows for broadcast operations. This area is also used
telemedicine for Tele-mentoring when a more experienced expert to remotely control the
actions of their colleagues in the online mode. During the operation, one person can
transmit different image medtechnics (microscope, endoscope or an operating table),
applied to digital video cameras, his colleague. In addition, you can transfer and
telemetry information (about the patient's state of the pressure, the frequency of its pulse
rate and many others. Al.).
98
Questions:
1.What is Internet of things?
2. What is Big data, technology Block Chain?
3.Give exampies to Artificial intelligence.
4.How correctly use Smart-services?
5.What are there Green technologies in ICT?
6. What advantages of ICT in teleconferences, telemedicine.?
References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.
99
An important part of e-business is e-commerce.Under the e-commerce (e-
commerce) refers to all forms of business transactions that are carried out with the
help of information networks definitions:.
in the dictionary e-business terms by PriceWaterhouseCoopers and eTopS
Consulting companies are given the following
E-business -improving the efficiency of the business, based on the use of
information technology for in order to ensure interoperability of business partners and
create an integrated value chain-..
E-commerce marketing, submission of proposals, sales, rental, licensing, supply
of goods, services or information through computer networks or the Internet
Internet business can be described as medium which allows companies to
increase revenues · because created new channels of income and an increase in
sales volumes;
· reduce costs by reducing the costs of transactions and overheads needs;.
· improve the quality of services, improving the service offered to customers and
better meet their
· Improve conditions for investment;
· ensure corporate company information all over the world or just a target group
of customers;
· automate and optimize business processes both internally and in its relations
with suppliers, dealers and partners;
· ensure business continuity (7 days a week, 24 hours a day).
The basic model of Internet business models There are pure e-business.
The state Business (B) Citizen (C)
(G)
Sta G2G G2B information and sale of illiquid G2C
te coordination assets
Bu B2B supply B2Ge-commerce B2C E-
siness of Commerce
Citi C2G taxes C2B price comparisons C2C
zen Auctions
100
2.internet incubator (a company specializing in the creation of start-up
companies with a view to their subsequent sale to
3.investors;.Internet marketing
Internet marketing is an important tool for effective Internet business Internet
enables companies. more automated marketing through the use of databases-..
1. Commodity market
infrastructure - a mandatory component of any integrated economic system. The
word "infrastructure" refers to the base, the internal structure of the economic system.
The infrastructure business is a set of components that provide the free flow and overflow
of various resources: financial, trade, labor, information, etc. and linking the movement
together. Business infrastructure ensures its successful functioning control.
2. Financial market
Modern financial markets this is an extremely complex structure with multiple
participants - financial intermediaries, operating with a variety of financial instruments,
and perform a wide range of functions for the maintenance of economic processes and
management. In the financial market presented a special commodity - money provided
102
for use at a time, in the form of loans under the obligation or permanently, under the
action
3. Labor market
Jobs Ways, public organizations and mechanisms that allow people to find a job
according to their abilities and skills, and employers to hire workers they need for the
organization of the business or other activity.
Wages the value of remuneration paid to the employee for the performance of a specific
task, the amount of work or the performance of their duties for some time
The market has two unique features that leave their mark on the action of the common
market mechanisms -. the universality of goods sold there and the desire for social justice
sellers
product versatility workforce due to the fact that the person is fit to master different
professions and retrained for life, if it is profitable and justify the investment of time,
effort and money. In developed countries, is not uncommon, when changing profession
even people with higher education.
4.Information market
103
independent work with electronic materials, using a personal computer,
PDA, mobile phone, DVD-player,TV and other,
obtaining advice, tips, ratings from a remote (geographically) expert
(teacher), for remote interaction, theof
Creation a distributed user community (social networks), leading the overall
virtual learning activities,
timely Hour delivery of e-learning materials; standards and specifications for
electronic learning materials and technology, distance learning tools,
formation and improvement of information culture for all heads of
enterprises and divisions of the group, and the mastery of modern information
technology, improving the efficiency of its ordinary activities,
the development and promotion of innovative educational technologies, the
transfer of their teachers;
to develop educational web-resources;
the opportunity at any time and in any place to get modern knowledge, are
available in any part of the world access to higher education for persons with special
needs
related to e-learning, electronic textbooks, educational services and technology. In
fact, e-learning began with the use of computers in education. Initially training with the
use of computers alternated conventional, classic practical exercises. E-learning and now
does not exclude communication with the teacher face to face.
ELearning modern sample concept has evolved along with the Internet connectivity
technologies, and includes the ability to virtually anywhere download additional
materials underpinning received by electronic aids theory, pass the completed task ,
consult with the instructor. The main thing is that all these features are supported
electronic media programs. Now the development of e-learning depends on the
development of the media, but electronic books, fully revealing its potential, are still in
the development stage of traditional:.
e-education has a number of advantages
1. Freedom of access- the student can do almost anywhere. Not all e-learning is
available through the Internet. Adult students can study without interruption from work
2. Reduced training costs The student bears the cost of media, but it does not
bear on the methodological literature. In addition, the economy is growing at the expense
of wages, which do not need to pay teachers, the content of education and so on.
Production of e-learning materials does not imply deforestation
3. Flexibility training- duration and sequence of study materials listener
chooses, completely adapting the whole learning process to fit their capabilities and
needs courses
4. The opportunity to develop in step with the times- users of electronic And
the teachers and students develop their skills and knowledge in accordance with the latest
modern technology and standards. Electronic courses also allow you to update the study
materials timely and promptly.
104
5. Potentially equal opportunities obucheniya- training becomes independent of
the quality of teaching in a particular school.
6. The ability to define the criteria for assessment of Knowledge in e-learning
has the opportunity to exhibit clear criteria by which to assess the knowledge gained in
the process of student learning.
Electronic textbook- a special device libo program software used in the educational
process and replaces the traditional paper book. Currently, treatment of the phrase
"electronic textbook" is very broad: in some cases it means the electronic version of the
paper textbook, in some - a complex program on electronic devices, allowing to show
students, in addition to the text, studies multimedy material containing a interactive
units of examination updating from a central source and so on. Electronic textbooks
latter species are still under development, so basically modern electronic textbooks are
electronic text with illustrations. Almost all teachers celebrate the simplicity of using
the electronic textbook students, increase students' motivation and interest in working
with academic subject with the help of a technical device, the pleasure when using ET
in the classroom and at home.
Questions:
1. What is Electronic business?
2. What are the principles of еlectronic government?
3. What are the еlectronic trainings?
What are the differences between еlectronic training and еlectronic textbooks?
4. What are formats of implementation of the electronic government in developed
countries an archive?
References
105
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 2015,
576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2012,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.
5. Business Fundamentals: Hands-on training manual / Ed. YB Rubin, M-2014
6. Mushroom VD Business Basics: A Tutorial. - M .: Finance and Statistics, 2016
7. Fundamentals of business activities. Financial management. Marketing / Ed. VM
Vlasova - M .: Finance and Statistics, 2015.
Resources:
1.http: //refleader.ru/jgeujgrnayfsyfs.html
2.http://ru.wikipedia.org/wiki/
3.http://ru.wikipedia.org/wiki/
4.http://www.intuit.ru/studies/courses/673/529/lecture/
Lecture №14. Information technologies in the professional sphere. Industrial
ICT
Purpose: to train students to use software for solving specialized professional field
Plan:
1.The software for the solution of tasks of the specialized professional sphere.
2.Modern IT trends in the professional sphere: medicine, power, etc.
3.Use of search engines and electronic resources in the professional purposes.
4.Safety issues in industrial information and communication technologies.
1.The software for the solution of tasks of the specialized professional sphere.
Аpplication package- a set of programs designed to meet the challenges of a
certain class (functional subsystem, business application)method-oriented.
the following types of PPP:
general purpose (universal);
problem-oriented,
global networks;
organization (administration) computing process whole..
IFR general purpose- versatile software designed to automate the development and
operation of the user's functional tasks and information systems as a By this RFP class
includes:
106
text editor (word processor) and graphics,
spreadsheets,
database management systems (DBMS);
integrated
packages; Case-technology;
the shell of expert systems and artificial intelligence systems
changes.
RFP for creating and text documents, graphics, and illustrations, called the editor.
Text editors designed to handle text and perform mainly the following functions:
record the text file;
insert, delete, replace characters, lines, text fragments,
spell checking,
formatted text, different fonts,
text alignment
preparation tables of contents, splitting the text on the page;
search and replace words and expressions,
the inclusion in the text of simple illustrations;
text printing
The most widely used text editor Microsoft word, word Perfect (currently owned by
the company Corel), chiWriter, Multi-Edit And other used.
Graphic editors are for processing graphic documents, including diagrams,
illustrations, drawings and tables. Allowed to control the size and font of figures, moving
figures and letters, the formation of any image. Among the most famous image editors
can be called packages Corel DRAW, Adobe PhotoShop and Adobe Illustrator.
Publishing systems combine the possibilities of text and graphic editors have
developed capabilities for formatting strips with graphic materials and then printed.
These systems are targeted for use in publishing and typesetting systems are called.
Because these systems can be called PageMaker products from Adobe and Ventura
Publisher of Corel Corporation.
Spreadsheets. Spreadsheet called RFP for processing tables.
The data in the table is stored in the cells located at the intersection of rows and
columns. The cells can be stored numbers, formulas and character data. Formula values
are set dependent on the contents of one cell to other cells. Changing the contents of a
cell resulting in a change of values in the dependent cells.
The most popular PPP of this class are products such as Microsoft Excel, Lotus 1-2-
3, Quattro Pro, and others.
Database Management Systems.To create a database inside the machine
information support uses special IFR - database management system-.
Database A set of specially data organized sets stored on disk adding,.
database management includes data entry, their correction and manipulation of data,
that is, delete, retrieve, update, etc. Developed database applications to ensure the
107
independence, working with them on the specific organization of information in
databases. Depending on how these organizations are distinguished: network,
hierarchical, distributed, relational database management system
from the available database the most widely used Microsoft Access, Microsoft
FoxPro, Paradox (corporation Borland), and the Oracle database company, Informix,
Sybase, Modern etc
109
Searcher operates to output files received from the indexer. The search engine
receives user requests, processes them using the index and returns search results
110
17) lack of legal regulation of information sphere system;
18) natural disasters and catastrophes;
19) unlawful actions of state structures, leading to a violation of the legitimate rights and
interests of individuals and legal entities, the state in the field of information
Aims and objectives
The aim of the Concept is creation of a national information security system that
guarantees the protection of the national interests of the Republic of Kazakhstan in the
field of information
to achieve this goal it is necessary to solve the following set of tasks:
1) the development of information security management system that enables ensure
security of the country's national information infrastructure, and a single national
information space;
7) 2016, the level of maintenance to eliminate downtime of information systems for
information security will be reduced to 20 minutes;
8) will be provided by the production of the domestic computer hardware, accessories,
peripherals and software
9)increase the level of innovative activity of industrial enterprises;
10) legal framework governing the information sector will be improved, including
through international cooperation;
11) will improve the system of staffing in the field of information security and the
protection of state secrets.
Questions:
5. What is the software for the solution of tasks of the specialized professional
sphere?
6. Safety issues in industrial information and communication technologies
7. What is the modern IT trends in the professional sphere?
8. What are the differences between using of search engines and electronic resources
in the professional purposes?
References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.
111
Lecture №15. Prospects of development of ICT
Purpose: to prepare students to use programs of acceleration and incubation
Plan:
1.Prospects of development in the sphere of the IT market: development of the free
software. Forming of an ecosystem of IT of entrepreneurship and support small startup of
the companies.
2.Programs of acceleration and incubation.
3.Development of necessary infrastructure of electronic payments and logistics.
4.Prospects of development of E-technologies.
The free software (SPO, eng. free software also software libre or libre software),
free software software, where users have rights ("freedom") on its installation, start-up,
free use, study, dissemination and change (improvement) and distribution of copies and
results of any changes. If the software has the exclusive rights, the freedom, are declared
using the free license.
As a free (freeware) and free software, SPO can be used to obtain and usually free
(but the distributor can charge for the obtaining of his copies, delivery channels, media
CD-ROMs or additional services). However, freeware is usually distributed as
executables without source code is proprietary, and to be free (free software), recipients
must be available in source code from which you can create executable files together
with the appropriate licenses. Due to the fact that the word "sale" and called the original
sale, and distribution of copies for the money, and paid licensing (usually proprietary
conditions), some still believe free software is a subset of the free.
Often distinguish between free and open source software (open source) — although
the availability of source code for the SPO is required and many open programs are both
free. The choice of the name is often associated with the language and purpose of
vacancy or openness.
The free software movement began in 1983 when Richard Stallman formed the idea
of having freedom to use the software (eng. software freedom) users. In 1985 Stallman
founded the free software Foundation to provide organizational structure to promote their
ideas.
The business model of the SPO, as a rule, based on the principle of empowerment
— for example, new objects of application, training, integration, configuration or
certification. At the same time, some business models which work with proprietary
112
software that is not compatible with free software, especially those that force users to pay
for the license to legally use a software product.
2.Programs of acceleration and incubation.
Accelerator — a company the business of which is to help other companies
(residents of the accelerator).
Accelerators offer residents a structured program that helps the team to hone the
business model to get the necessary contacts and increase sales. The program lasts from 3
months to half a year. The accelerator typically is a coworking space, where resident
companies can be during acceleration.
For example, the accelerator received a share in the amount of 10% of the project N.
a Project N went through the acceleration program, has grown to become a significant
player in the market. Google decided to buy the startup for $10 million In this case, the
accelerator receives 10% of the purchase amount is $1 million.
113
3.Development of necessary infrastructure of electronic payments and logistics.
Electronic payment systems are a sub-set of payment systems that ensure the
implementation of electronic transfer of payments through the payment network or the
chips.
In an average day through the payment system of Kazakhstan is of 119.3 thousand
transactions in the amount of 753,8 billion tenge.
The largest payment systems are WebMoney — system of instant payments,
Yandex.Money, Qiwi payment service, payment terminals (indoor and outdoor).
WebMoney is a universal tool for calculations in the Network, the whole financial
relationships, which today are used by millions of people around the world. Kazakhstan
takes the 4th place in the number of registrations and probably other indicators too.
Kazakhstan is ahead of only Russia, Ukraine and Belarus.
114
Yandex.Money is the largest electronic payment system in Runet, which offers
simple secure methods of payment for goods and services. Are the offices of Alliance
Bank and branch transfer system CONTACT, as well as terminals Quickpay. Most
Kazakhstanis pay via Yandex.Money online game, entertainment, extra opportunities in
social networks and online advertising.
Qiwi payment service designed to pay for everyday services from mobile
communications and utilities to Bank loans.
The peculiarity of Qiwi service is that payments can be made in cash in the network
of QIWI payment terminals and via the Internet service and the app for mobile devices.
In fact, the user can make a payment from your account in the system being in a
convenient place and in convenient time.
At the moment, with the help of the payment system in Kazakhstan will be possible
to replenish the account in favor of the 157 companies-providers such as utilities,
Internet, cellular communication, IP-telephony, various products through catalogs,
including the services of the three thousand companies that are connected to QIWI-
wallet.
Also on the territory of Kazakhstan has a QIWI-purse in two languages.
Using terminal you can pay for mobile communication, utility services, Internet
service providers, repay loans, replenish the Bank account.
Kazakhstan companies providing services in the field of payment terminals:
Quickpay, Taulink of Asia Terminal ComepayCyberPlat, TelePay.
Quickpay — the company was founded in 2003. The company started its activity as
a software developer. For the first time in Russia the company developed software for
touch-screen payment terminals on the operating system "Linux". In 2007, the company
entered the market of Kazakhstan.
Taulinkcompany started its activity in the Republic of Kazakhstan in 2006 by the
commercial launch of the first business decisions within the international
telecommunications exhibition KITEL-2006. System for accepting payments TAULINK
represented in more than 8 200 sales and service outlets in 507 settlements of
Kazakhstan.
"Asia Terminal" company exists on the market since 2006. Under the brand "Asia
Terminal" has been known since 2008. Is the production of a full (closed) cycle – from
design and cutting to sales, software and service.
115
Comepay (Kampey) — the company was founded in 2006, operates in the market
under the registered brand name "Comepay" and is one of the leading companies of the
Russian Federation for reception of instant payments.
Organized more than 2000 service providers — from utilities companies to leading
domestic banks that are connected to more than 38 000 points of payment and more than
25 000 payment terminals.
TelePay — the company exists since 2004. The system used the latest in
telecommunications and banking technology.
So far we have implemented only a small part of what you planned, but every day
we are working on new services, add features and remove bugs. Every week on the
website filled with changes and services become more convenient. Anyone interested —
sign up, enjoy and stay tuned. And on all issues, you can contact our customer service
Department.
116
1) the Development of it
2) ensure the availability of information and communication
infrastructure
3) automation of the activities of state bodies and e-services
4) open government
5) the Development of domestic information space.
Target indicators:
1) the share of the ICT sector in GDP in 2020 - 4 %
2) quantity updated standard curricula of it professions in accordance
with professional standards: technical and vocational UNIVERSITY in 2020 – 6
3) the level of digital literacy in 2020 - 80 %
4) density of Internet users per 100 inhabitants in 2020 - 75 %
5) the coverage of digital terrestrial television of Kazakhstan's population
in 2020 – 95%
6) the coverage of the state radio channels in the FM band "Kazakh
radio" and "Shalkar", in 2020 - 95%
7) the effectiveness ratio of use of information technologies, which
developed the target architecture (ROA-return on IT assets) to the year 2020 – 30
8) the level of Kazakhstan's development index of "e-government" in
2020 - among the first 25 countries
9) index the e-participation of the Republic of Kazakhstan in 2020 -
among the first 20 countries
10) the number of available local media in Kazakhstan to 2020 – 2280
11) the proportion of the population satisfying the basic information needs
at the expense of the domestic media (according to sociological research), in 2020
– 53%
Questions:
1. What are the differences between programs of acceleration and incubation?
2. What are prospects of development of E-technologies?
3. Are there prospects of development in the sphere of the IT market?
4. Development of necessary infrastructure of electronic payments and
logistics.
References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
117
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.
References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th
Edition - Comprehensive, Thomson Course Technology, a division of Thomson
Learning, Inc Cambridge, MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and Technology, 2015,
576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2012,
Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.
5. Business Fundamentals: Hands-on training manual / Ed. YB Rubin, M-2014
6. Mushroom VD Business Basics: A Tutorial. - M .: Finance and Statistics, 2016
7. Fundamentals of business activities. Financial management. Marketing / Ed. VM
Vlasova - M .: Finance and Statistics, 2015.
8. Указ Президента Республики Казахстан от 1 февраля 2010 года № 922 «О
Стратегическом плане развития Республики Казахстан до 2020 года»
Resources:
1. http: //refleader.ru/jgeujgrnayfsyfs.html
2. http://ru.wikipedia.org/wiki/
3. http://ru.wikipedia.org/wiki/
http://www.intuit.ru/studies/courses/673/529/lecture/
4. http://www.openbookproject.net/courses/intro2ict/hardware/internal.ht
ml
5. http://www.irma-international.org/chapter/supporting-self-regulated-
learning-ict/13429/
6. http://bookboon.com/en/it-programming-ebooks
7. http://www.e-booksdirectory.com/listing.php?category=475
8. http://www.freebookcentre.net/
118
119
120