Devices for storing and retrieving information from the computer
A random access memory. Examples of peripheral devices: expansion card, video card, image scanners, tape drives, microphones, speakers, web and digital cameras. Network or shared printers. Print three-dimensional objects. Printing 3D models from STL file.
Подобные документы
Protection from disclosure to unauthorised persons integrity. Maintaining data consistency. Assurance of identity of person or originator of data non-repudiation. Conventional encryption: uses a shared key. Digital Signatures and especially their use.
учебное пособие, добавлен 08.03.2014- 102. The computer technology of expert rules constraction for the technical objects diagnosis systems
Description of the methods of organizing expert rules for the diagnosis of electrical machines using and without expert information. Correction of rules according to the results of causal observations. Using the intellectual potential of an expert.
статья, добавлен 18.11.2018 The role of linguistic means as backbone elements of any information and library system, a consolidated information resource of institutions of social memory. Criteria for the selection of linguistic tools for the development of their descriptions.
статья, добавлен 12.07.2021Disclosure mechanisms that will help to identify lines with Romanian chromatic words on the basis of computer technology, as the first stage in developing the dictionary of poetic meanings of colors. Cooperation of linguists and computer specialists.
статья, добавлен 23.02.2016- 105. Providing access to information systems of higher education in the case of loss of key information
Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.
статья, добавлен 06.05.2018 Fair Blind Signatures without Random Oracles. Fair Partially Blind Signatures. Parallel Shortest Lattice Vector Enumeration on Graphics Cards. Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes. Side-Channel, Fault Attacks.
книга, добавлен 08.03.2014The concept of human-machine interface. Three types of human-machine interface. The picture of human-machine interaction. The history of the development of human-computer interaction. The first generation of computers Areas and examples of application.
презентация, добавлен 24.11.2016Mathematical model of transformation of stochastic and fuzzy information in quantum information in the form of multiplication of unitary operators from not commutative von Neumann group. Theoretical basis of information technologies of quantum-logic.
статья, добавлен 29.01.2016Analysis of the model for creating irregular 3D objects. Structural model of a compact reverse engineering system. The possibilities of formalizing and automating the creation of complex 3D objects. Mathematical model of digitization of complex objects.
статья, добавлен 03.02.2019Research of the effectiveness of using the Blender 3D software for independent and individual work of students. Creating videos, creating and editing videos with video resources. Organization of video conferencing during online classes and seminars.
статья, добавлен 01.04.2022Target Server Memory Pool. A pool of memory on the target reserved for use by the Tornado tools. The target server manages the pool, keeping overhead such as block lists on the host. Additional memory is allocated from the system memory pool if needed.
презентация, добавлен 03.06.2012Особенности использования компьютеров в медицине. Специфика выполнения роботами обязанностей персонала больниц. Создание и усовершенствование роботизированных протезов, управляемых "силой мысли". Применение компьютерной системы "Dent Card" в больницах.
реферат, добавлен 19.03.2016Building a full map of the mental activity of the human brain. Various sensors detect the pressure pulses, temperature. Mind reading machine - a coordination of human psychology and computer techniques. Extract safe and confidential information.
презентация, добавлен 30.05.2015A computational complexity based theory of modern encryption. Generating pseudo-random bit or number sequences. Generic encryption with pseudorandom functions. Problems with deterministic encryption in general. Required properties for digital cash.
книга, добавлен 08.03.2014Analysis of the model of dynamic classification software applications included in the business critical systems for security access. Information technology, allowing to distinguish three basic classes of safety-critical access software applications.
статья, добавлен 22.12.2016Development of a new algorithm for registration of remote sensing images based on landmarks. Mathematical model of elementary and flat objects of the image based on contour analysis. An solution that allows you to analyze a specific image object.
статья, добавлен 27.05.2021- 117. Database
Characteristics and purpose of computer databases. Database features for web e-Commerce site. Application storage archive them to external sources. The process of loading and managing data. To determine the basis for access to online registration systems.
контрольная работа, добавлен 14.05.2017 Theory and tools communication. Effect of employees at computer system. The importance of accurate pronunciation and eye contact. Gestures and body language programs. Back channels and turn-taking. Multiplexing – several topics in one utterance.
лекция, добавлен 28.12.2013A problem of binary pseudo random sequences creation of cryptographic security system for sequences of maximal length, with static characteristics. The questions of Galois and Fibonacci of creation primitive matrices random size over the simple field.
статья, добавлен 22.12.2016- 120. CISSP Certification
Information security and risk management. Business continuity and disaster recovery. Legal, regulations, compliance and investigations. Operating system architecture. Information technology security evaluation criteria. LAN media access technologies.
учебное пособие, добавлен 08.03.2014 - 121. Internal Memory
Semiconductor Memory Types. Memory Cell Operation. Dynamic and Static RAM. DRAM Operation. SRAM v DRAM. Read Only Memory (ROM). Organisation in detail. Interleaved Memory, Error Correction. Synchronous DRAM (SDRAM) and RAMBUS. DDR SDRAM Read Timing.
презентация, добавлен 03.06.2012 - 122. Strategies of information and innovation activity development at enterprise in digital conditions
The robotics complex as a strategy for the development of information and innovation activity in the enterprise in terms of digitalization. The digital recording, chronology, accessibility and openness, globality - the main benefits of blockchain.
статья, добавлен 08.04.2022 - 123. Anonymous
Usage of the term Anonymous on imagebords, particularly the board of chan, dedicated to random content. Idea of exposing corruption within the system. Limiting information and enlarging author rights. Hacked many oil companies servers in order.
презентация, добавлен 19.12.2014 The comparison of the computer development in the USA and Ukraine. At the time when the computer science was just uprising this two countries were one of the most noticeably influential. Howard Aiken's contributions to the development of the computer.
эссе, добавлен 13.09.2011Analysis of data mining systems, development of document management systems. Development of an integrated system for intelligent information analysis. A model for using various statistical data of any format in the source of a digital organization.
статья, добавлен 01.02.2024