???????? ??????? ?????????? ?????????? ? ?????????? ? ????? ?? ?? ??????? ???????????????? "OCTAGONSYSTEMS"
?????????? ????????? ????????? ?? ????? ???????????????? CAMBASIC, ??????????? ?????????? ?????????? ? ?????????? ? ????? ?? ?? ??????? ???????????????? OCTAGON SYSTEMS. ?????? ??????????? ?? ??????? ???????????????? ???? ??????? ??????? ? ?? ???????.
Подобные документы
The basic approaches to developing application software and computer system components. The generations of object-oriented programming languages. Types of computer systems and secondary storage, storage area network and output devices of information.
???????????, добавлен 10.06.2016Programming of Intel microprocessors. Studying systems on universal microprocessors and problems of its programming. The scheme and the description of laboratory installation, variants of tasks and order of the laboratory work execution are presented.
???????????? ??????, добавлен 11.10.2014Analysis of the specific features of automatic code generation for diagrams in the Dragon programming language. Computer’s training by creating an expert system as very different form of human learning. The algorithm of a trip by bus on Python 2.7.
??????, добавлен 10.08.2018The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.
??????, добавлен 15.04.2024Software system documentation is the most critical during maintenance tasks, where tremendous amounts of time are spend understanding the software and its documentation. The status of current documentation practices as well as a view on its quality.
??????, добавлен 23.02.2016Description of the developed energy saving algorithm for autonomous heating systems installed in heated premises. Determination of the moment of switching on for the transition to the specified nominal temperature after maintaining the set temperature.
??????, добавлен 03.12.2018Sensor - a device that measures physical quantity and converts it into a signal. The context-aware systems a combination of hardware and software that analyze the state of the user and the environment and adapt their work to the changing condition.
??????, добавлен 30.04.2019Kompyutinhove storage as one of the paradigms of periodic training neural networks through the use of rekurrentnoyi other indicators. The new approach, which focuses on learning fuzzy systems thatand its parameters are adapting their structure online.
??????, добавлен 20.01.2017The study of the problems and solutions of insufficient quantity and quality of documentation that is created for software in recent decades. Create a discussion of current practices documentation to facilitate a detailed discussion in the future.
??????, добавлен 23.02.2016Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.
?????, добавлен 08.03.2014??????? IP ????????? ? ???? ???????? ?????. ????????? ????? Cisco Systems. ?????????? ????? Catalyst. ??????? ? ???????? ?????? ??????????. ???????? ??????????????? ?????? ?? ??????. ??????????? ? ???????????? ?????????? ??????????????? ??????? ??????.
????????? ??????, добавлен 22.02.2016Automation of the process of keeping a diary and converting it into digital form. Software solutions that allow the user to systematize their hobby experience and find something new for themselves. Evaluation of the functionality of compared systems.
??????, добавлен 19.03.2024Computer facilities and microprocessor systems and data manipulation. Digital automata synthesis. Programming of Intel microprocessors, generic architecture. Construction principles of telecommunications nodes. Initialization of purpose registers.
?????????, добавлен 11.10.2014In this book - notions from three different areas: how digital information has to be designed, how artifacts or systems containing digital content should maximize usability, how context can influence the nature and efficiency of digital communication.
?????, добавлен 09.04.2013Find and analysis a way for data protection when a person uses e-platforms. Based on the General Data Protection Regulation, the measure for the data protection is assumed to comply when data systems go along with technical and organizational safeguards.
??????, добавлен 13.08.2023Implementing IT technologies in university libraries of Ukraine in the context of foreign experience. The retrospective of development of library information systems and problematic issues related to the transition of library staff to work with them.
??????, добавлен 13.04.2023In a scientific article, attention is paid to a subject that has evolved from the stage of a futuristic description as a buzzword to the realization of its emergence and consistent deployment - artificial intelligence (hereinafter referred to as AI).
??????, добавлен 03.05.2022The use of the NRL Protocol Analyzer and Gavin Lowe’s use of the model checker FDR to analyze the Needham-Schroeder public key protocol. This is used as a basis to compare and contrast the two systems and out possible future directions for research.
??????, добавлен 15.09.2012- 94. The computer technology of expert rules constraction for the technical objects diagnosis systems
Description of the methods of organizing expert rules for the diagnosis of electrical machines using and without expert information. Correction of rules according to the results of causal observations. Using the intellectual potential of an expert.
??????, добавлен 18.11.2018 Efficient second-order power analysis. Long modular multiplication for cryptographic applications. The leak resistant arithmetic. Compared elliptic curve cryptography. Instruction set extensions for fast arithmetic. Fault analysis of stream ciphers.
???? ??????, добавлен 08.03.2014- 96. Network topology
Study the ways in which computer systems or network devices connect to each other. Possibilities of using network topology. Features and issues of bus topology, star topology, ring topology, mesh topology, tree topology, daisy chain and hybrid topology.
???????, добавлен 11.10.2017 Computer science as the theory of representation, processing and use of the information, main directions of development of science, its subject, ikomponenty. Properties and coding information. Rules of conversion from binary to decimal number system.
???????????, добавлен 18.11.2015- 98. Experiences of conducting online exam proctoring in low- resource settings: a Sri Lankan case study
Online proctoring techniques to prevent academic misconduct during online tests. The resources and requirements for the dissemination of online examinations in educational institutions in Sri Lanka. Ways to improve and spread online proctoring systems.
??????, добавлен 16.08.2023 The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.
???????, добавлен 20.03.2016Analysis on the Geographic Information System. Monitoring of the environment in the vicinity of the airport. Modeling control air pollution, noise. Operation of aircraft in the conditions of the implementation of intelligent transport management systems.
??????, добавлен 12.08.2016