Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
2010 пособие для ФИТТ1.doc
Скачиваний:
305
Добавлен:
10.06.2015
Размер:
2.81 Mб
Скачать

Contents

INTRODUCTION…………………………………………………………….

FROM THE HISTORY OF THE COMPUTERS ……………………………

WHAT IS A COMPUTER ..........................................................................

COMPUTERS MASHINE ..........................................................................

ANALOFUE AND DIGITAL COMPUTERS ..............................................

THE INTERNET ........................................................................................

GOVERMENT TO RESCUE IT ..................................................................

MODERN COMPUTER USAGE FOR KEEPING THE COMPUTER TECHNOLOGY HISTORY ........................................................................

THE DEVELOPMENT OF COMPUTERS IN THE USA ............................

THE COMPARISON OF THE COMPUTER DEVELOPMENT IN THE USA AND THE UKRAINE ........................................................................

THE HOMECITY OF MESM .....................................................................

THE MAIN FAULT OF THE 70-s OR THE YEARS OF “MIGHT HAVE BEEN HOPES” ...........................................................................................

PROTECTION OF INFORMATION ...........................................................

COMPUTER CRIMES ................................................................................

FROM THE HISTORY OF COMPUTER VIRUSES ...................................

WHAT IS A COMPUTER VIRUS? ............................................................

SYNOPSIS .................................................................................................

COMPUTER VERSUS HIMAN BRAIN .....................................................

POPULAR INFECTION METHODS USED BY COMPUTER VIRUSES

THE TERM “COMPUTER SECURITY” ....................................................

IS YOUR HOME COMPUTER A TARGET? .............................................

THINKING ABOUT YOUR HOME COMPUTER ......................................

GETTING INSIDE A COMPUTER SYSTEM .............................................

SHADOW DATA (PART 1) .......................................................................

SHADOW DATA (PART 2) .......................................................................

HOW TO PROTECT AGAINST SHADOW DATA SECURITY RISKS ......

CRYTOGRAPHY .......................................................................................

RISK ASSESSMENT ..................................................................................

MICROCOMPUTER AND MICROPROCESSOR DESIGH .........................

KINDS OF PROGRAMMS .........................................................................

COBOL ......................................................................................................

TECHNOLOGY OF AUTOMATE – BASED PROGRAMMING INTRODUCTION .......................................................................................

PROGRAMMING LANGUAGES ..............................................................

MEMORY OR STORAGE UNIT ................................................................

MONITORS ................................................................................................

THE MOUSE .............................................................................................

INFORMATION, MASHINE WORDS, INSTRUCTIONS, ADDRESSES AND REASONABLE OPERATIONS ……………………………………….

FROM CALCULI TO MODERN COMPUTER …………………………….

MINITURIZATION ………………………………………………………….

ARTIFICIAL INTELLIGENCE ……………………………………………...

NEWS IN THE COMPUTER FIELD ………………………………………..

SOME FACTS ABOUT ROBOTS …………………………………………..

ROBOTICS AND ROBOT GENERATIONS ………………………………..

AMD COMPANY ……………………………………………………………

DVD TECHNOLOGY ……………………………………………………….

DVD VIDEO. DVD DISCS ………………………………………………….

PENTIUM I, PENTIUM II, PENTIUM III …………………………………..

PENTIUM IV …………………………………………………………………

CELERON ……………………………………………………………………

ATHLON 64. OPTERON …………………………………………………….

SMART STUFF ………………………………………………………………

VOCABULARY ……………………………………………………………...

BIBLIOGRAPHY …………………………………………………………….

3

7

10

12

15

20

23

29

36

41

46

49

52

56

58

65

73

78

81

83

89

93

96

99

108110114118122125

128135139142147

150154158161164167171174177179184188192195199203277

LESSON 1

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]