- •Г. Э. Маркосян,
- •Введение (introduction)
- •Contents
- •From the history of the computer [2]
- •What is a computer? [2]
- •Computers machine [1]
- •Analogue and digital computers [1]
- •The internet [3]
- •Government to rescue it? [1]
- •Modern computer usage for keeping the computer technology history [1]
- •The development of computers in the usa [1]
- •The comparison of the computer development in the usa and the ukrain [1]
- •The homecity of mesm [1]
- •The main fault of the 70-s or the years of “might have been hopes” [1]
- •Protection of information [2]
- •Computer crimes [2]
- •From the history of computer viruses [1]
- •What is a computer virus? [1]
- •Synopsis [1]
- •Computer versus human brain [2]
- •Popular infection methods used by computer viruses [2]
- •The term “computer security” [1]
- •Is your home computer a target? [1]
- •Thinking about your home computer [1]
- •Shadow data (part 1) [1]
- •Shadow data (part 2) [1]
- •How to protect against shadow data security risks [1]
- •Cryptography [1]
- •I. Basic Terminology
- •II. Basic Cryptographic Algorithms
- •Risk assessment [1]
- •Microcomputer and microprocessor [2]
- •Kinds of programs [2]
- •Independent, stored, user, called, the application programs
- •Cobol [4]
- •Technology of automata – based programming introduction [1]
- •Programming languages [2]
- •In order to, from, with, of, for, by, in
- •Memory or storage unit [2]
- •Monitors [2]
- •The mouse [2]
- •Information, machine words, instructions, addresses and reasonable operations [2]
- •From calculi to modern computer [2]
- •Idea, abacus, hand, troublesome, goes back
- •Miniaturization [2]
- •Artificial intelligence [2]
- •News in the computer field [2]
- •Some facts about robots [2]
- •Robotics and robot generations [2]
- •Amd company [4]
- •Dvd technology [4]
- •Dvd video. Dvd discs [4]
- •Pentium I pentium II pentium III [4]
- •Pentium IV [4]
- •Celeron [4]
- •Athlon 64. Opteron [4]
- •Smart stuff [3]
- •Список рекомендуемой литературы
- •Bibliography
- •Автоматизированные системы обработки информации и управления
- •355028, Г. Ставрополь, пр. Кулакова, 2
Contents
INTRODUCTION……………………………………………………………. FROM THE HISTORY OF THE COMPUTERS …………………………… WHAT IS A COMPUTER .......................................................................... COMPUTERS MASHINE .......................................................................... ANALOFUE AND DIGITAL COMPUTERS .............................................. THE INTERNET ........................................................................................ GOVERMENT TO RESCUE IT .................................................................. MODERN COMPUTER USAGE FOR KEEPING THE COMPUTER TECHNOLOGY HISTORY ........................................................................ THE DEVELOPMENT OF COMPUTERS IN THE USA ............................ THE COMPARISON OF THE COMPUTER DEVELOPMENT IN THE USA AND THE UKRAINE ........................................................................ THE HOMECITY OF MESM ..................................................................... THE MAIN FAULT OF THE 70-s OR THE YEARS OF “MIGHT HAVE BEEN HOPES” ........................................................................................... PROTECTION OF INFORMATION ........................................................... COMPUTER CRIMES ................................................................................ FROM THE HISTORY OF COMPUTER VIRUSES ................................... WHAT IS A COMPUTER VIRUS? ............................................................ SYNOPSIS ................................................................................................. COMPUTER VERSUS HIMAN BRAIN ..................................................... POPULAR INFECTION METHODS USED BY COMPUTER VIRUSES THE TERM “COMPUTER SECURITY” .................................................... IS YOUR HOME COMPUTER A TARGET? ............................................. THINKING ABOUT YOUR HOME COMPUTER ...................................... GETTING INSIDE A COMPUTER SYSTEM ............................................. SHADOW DATA (PART 1) ....................................................................... SHADOW DATA (PART 2) .......................................................................
HOW TO PROTECT AGAINST SHADOW DATA SECURITY RISKS ...... CRYTOGRAPHY ....................................................................................... RISK ASSESSMENT .................................................................................. MICROCOMPUTER AND MICROPROCESSOR DESIGH ......................... KINDS OF PROGRAMMS ......................................................................... COBOL ...................................................................................................... TECHNOLOGY OF AUTOMATE – BASED PROGRAMMING INTRODUCTION ....................................................................................... PROGRAMMING LANGUAGES .............................................................. MEMORY OR STORAGE UNIT ................................................................ MONITORS ................................................................................................ THE MOUSE ............................................................................................. INFORMATION, MASHINE WORDS, INSTRUCTIONS, ADDRESSES AND REASONABLE OPERATIONS ………………………………………. FROM CALCULI TO MODERN COMPUTER ……………………………. MINITURIZATION …………………………………………………………. ARTIFICIAL INTELLIGENCE ……………………………………………... NEWS IN THE COMPUTER FIELD ……………………………………….. SOME FACTS ABOUT ROBOTS ………………………………………….. ROBOTICS AND ROBOT GENERATIONS ……………………………….. AMD COMPANY …………………………………………………………… DVD TECHNOLOGY ………………………………………………………. DVD VIDEO. DVD DISCS …………………………………………………. PENTIUM I, PENTIUM II, PENTIUM III ………………………………….. PENTIUM IV ………………………………………………………………… CELERON …………………………………………………………………… ATHLON 64. OPTERON ……………………………………………………. SMART STUFF ……………………………………………………………… VOCABULARY ……………………………………………………………... BIBLIOGRAPHY ……………………………………………………………. |
3 7 10 12 15 20 23
29 36
41 46
49 52 56 58 65 73 78 81 83 89 93 96 99
108110114118122125
128135139142147
150154158161164167171174177179184188192195199203277 |
LESSON 1