Characteristics, types and working principle of operating systems
Control the computer's resources, the hardware, software as one of the operating systems main tasks. The use of a graphical user interface that eliminates the need to learn complex commands - a feature of the operating systems of the Windows family.
Подобные документы
The means of digital communications in the field of public administration and cyber education. The definition of "Instant messages" and "chatbot" is defined. The impact of the COVID-19 pandemic on the development of digital communication systems.
статья, добавлен 03.02.2021Distance learning using spreadsheets. The introduction of Excel-documents in electronic educational resources. Access to information resources of various types using the "cloud" services. Design and implementation of the "ExcelReader" software module.
статья, добавлен 05.04.2019Question classification extracts useful information. Mathematical Machinery and Document Processing. State of the Art Query-based Summarization and Question Answering Systems. Answering Simple and Complex Questions, their experimental evaluation.
дипломная работа, добавлен 22.07.2016Efficient second-order power analysis. Long modular multiplication for cryptographic applications. The leak resistant arithmetic. Compared elliptic curve cryptography. Instruction set extensions for fast arithmetic. Fault analysis of stream ciphers.
курс лекций, добавлен 08.03.2014One Useful Logic That Defines Its Own Truth. On Synchronous and Asynchronous Interaction in Distributed Systems. A Robust Class of Regular Languages. Deterministic Models of Communication Faults. The Maximum Independent Set Problem in Planar Graphs.
книга, добавлен 08.03.2014This paper explores the development and application of a long-short-term memory model for virtual distributed system control optimization using the TensorFlow and Keras frameworks. In the context of the rapid development of information technologies.
статья, добавлен 18.09.2024A flexible system troubleshooting and emergency operation of stepwise refinement priori probability. Ensuring reliability recognition of failure. Automatic search of breaks with step-by-step variations of parameters of tests in communication systems.
статья, добавлен 30.07.2016- 108. Modern office
The role of information technology in human life. The use of personal computers, television monitors, slide projectors, videodisc players, multimedia systems and the Internet. Office furniture. Communication in organizations. As for color harmony.
контрольная работа, добавлен 04.03.2016 Study of method of the adaptive shaping of flows of network traffic and method of tuning of the control systems with an indirect feedback. Analysis of algorithm of multivariable adaptation of shaper to changing the set of parameters of input traffic.
статья, добавлен 27.12.2016The use of specific application packages in the professional field. The integration of mobile technologies and cloud computing. Systems design and automation of scientific research. Educational software packages. Programs in economically viable.
презентация, добавлен 09.03.2016Загальні теоретичні відомості та одержання початкових навичок роботи з WinAPI (Windows Application Programm Interface). Сутність, характеристика та значення функції WinMain, API GetMessage, MainRegister. Приклади завдань для вирішення з даної теми.
контрольная работа, добавлен 29.06.2010The Internet - a global association of computer networks. E-mail - system for sending messages between users. Guaranteeing the flow of information between customers, establishment of a virtual connection - the tasks of Transmission Control Protocol.
контрольная работа, добавлен 20.05.2016Высокая готовность, устойчивость системы. Требования начальной установки. Журнализация файловой системы. Мониторы обработки транзакций. Обзор кластеров: vax-кластер, Alpha/OSF компании DEC, Sequent Computer Systems. Отказоустойчивые решения Data General.
курсовая работа, добавлен 15.06.2013Provide structured information on user identification, presents an overview of today’s security landscape and the specific threats to user authentication. Outlines the process of controlled access to resources by means of authorization and accounting.
книга, добавлен 08.03.2014The main features of non-traditional social engineering. Characteristics of the main non-traditional design, which involves the formation of a number of new types of activities (involvement of users in design, complex management and project expertise).
статья, добавлен 26.04.2023Analysis of the specific features of automatic code generation for diagrams in the Dragon programming language. Computer’s training by creating an expert system as very different form of human learning. The algorithm of a trip by bus on Python 2.7.
статья, добавлен 10.08.2018Analysis of data mining systems, development of document management systems. Development of an integrated system for intelligent information analysis. A model for using various statistical data of any format in the source of a digital organization.
статья, добавлен 01.02.2024This systematic literature review aims to identify the impact of artificial intelligence in foreign language learning using learning management systems by systematically reviewing studies related to the area. Application of the PRISMA block diagram.
статья, добавлен 16.01.2024- 119. The computer technology of expert rules constraction for the technical objects diagnosis systems
Description of the methods of organizing expert rules for the diagnosis of electrical machines using and without expert information. Correction of rules according to the results of causal observations. Using the intellectual potential of an expert.
статья, добавлен 18.11.2018 Improvement of devices containing electronic elements. Application of mechatronic systems in the automotive industry. Using Solidworks software for the design of mobile robot on four or more wheeled chassis. Calculation of stresses of structural parts.
статья, добавлен 13.10.2020Definition of the concept "сybercrime". Analysis of history and cyber threat evolution. Study of the types of cybercrime. Characteristic of hacking, denial of service attack, virus dissemination, computer vandalism, cyber terrorism and software piracy.
презентация, добавлен 24.01.2017Stages of the development of computer technologies for compilation of dictionaries. Determination of the prerequisites that led to the emergence of such a direction in linguistics as computer lexicography. The tasks of the Language and Information Fund.
статья, добавлен 04.09.2024Принцип действия нейрокомпьютерного интерфейса (прямого нейронного или мозгового интерфейса). История его создания и основные области для применения. Технологии и системное описание Brain Computer Interface. Функциональное описание BCI интерфейса.
реферат, добавлен 23.05.2014- 124. Experiences of conducting online exam proctoring in low- resource settings: a Sri Lankan case study
Online proctoring techniques to prevent academic misconduct during online tests. The resources and requirements for the dissemination of online examinations in educational institutions in Sri Lanka. Ways to improve and spread online proctoring systems.
статья, добавлен 16.08.2023 Transactional memory, the interface matters. Programmability is the key motivation for transactional memory. Processors support small (few memory operations) easily. Unlimited transactions are convenient for software. Virtualize transactional memory.
презентация, добавлен 03.06.2012