The main data on a personal computer and about the organization of computing processes
Structure and functions of the computer. General characteristics and capabilities of the operating system Windows XP, its member programs and functional features. Structure and principles of programming in C ++ Builder IDE, evaluation of results.
Подобные документы
Тhe main authorization methods for the web used to develop and build the logical structure of sites. Justification of the method of secure integration of users of a local network into web authorization, the ability to log in with personal local data.
статья, добавлен 09.10.2018Levels of programming support tools. Elements of windowing systems. Possible software architectures. Using toolkits for objects interaction. Paradigms for programming interfaces in applications. Implementation of user interface management systems (UIMS).
презентация, добавлен 28.12.2013Natural Language Processing as a subfield of computer science and artificial intelligence is concerned with interactions between computers and human languages. The purpose of this paper, is to outline the linguistic and NLP methods for textual processing.
статья, добавлен 18.05.2022The article is intended to analyse the development of the institute of personal data protection in the world identify ways to adapt the national legislation of Ukraine to the current personal data protection standards of the EU. To carry out the research.
статья, добавлен 19.09.2024The Internet - a global association of computer networks. E-mail - system for sending messages between users. Guaranteeing the flow of information between customers, establishment of a virtual connection - the tasks of Transmission Control Protocol.
контрольная работа, добавлен 20.05.2016The analysis of the existing training methods of multilayer neural network of computing structures is carried out. Recommendations of selected methods usage by examples of multilayer approximation tasks for technology of beneficiation were given.
статья, добавлен 28.02.2016Antivirus is used to prevent, detect and remove malware, including computer viruses and worms. Such programs may also prevent and remove adware, spyware and other forms of malware. Identification methods: signature based detection and file emulation.
доклад, добавлен 04.12.2011The complex of program models of technical system of ecological monitoring, its structure and components. Models based on the results of the studied biophysical effects of the influence of certain technical pollutants on the cells of living organisms.
статья, добавлен 22.12.2016Проблема интеграции программного обеспечения инженера: Computer Aided Modeling, Computer Aided Engineering, Computer Aided Design. Объемное конструирование и геометрическое моделирование. Системы разработки рабочих чертежей инженерных конструкций.
реферат, добавлен 10.05.2015The current state of application and development of cloud computing, the main advantages and disadvantages of their use in the states, enterprises and in scientific activity. Guidance documents in the field of cloud computing information security.
статья, добавлен 23.10.2020The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.
статья, добавлен 15.04.2024The problem of information and communication technologies and electronic learning tools and their impact on student achievement is considered. Subjects related to the use of technology in performing tasks with the help of a computer are described.
статья, добавлен 24.08.2022The possibility using systems operational analysis in the organization and management of research and innovation projects in enterprises and Universities. The organizing principle of the multidimensional cube. Data Mining using mathematical apparatus.
статья, добавлен 06.05.2018Disclosure mechanisms that will help to identify lines with Romanian chromatic words on the basis of computer technology, as the first stage in developing the dictionary of poetic meanings of colors. Cooperation of linguists and computer specialists.
статья, добавлен 23.02.2016Bioinformatics Versus Other Disciplines. Further Developments: from Linear Information to Multidimensional Structure Organization. Probability-Generating Functions and Characteristic Functions. Transition Probability Matrix and State Transition Graph.
учебное пособие, добавлен 25.11.2013Alan Mathison Turning - an English computer scientist, mathematician, cryptanalyst. He was highly influential in the development of theoretical computer science, providing a formalisation of the concepts of algorithm, computation with the Turing machine.
презентация, добавлен 29.03.2016Stages of development and analysis of the effectiveness of the mechanism, which will help identify the line with Romanian chromatic words on the basis of computer technology as the first phase of development of the dictionary meanings of poetic colors.
статья, добавлен 23.02.2016Research of the problem of training IT industry specialists, experience in teaching the basics of programming to educational applicants. Description of the Applied Technologies that contribute to the formation of competencies of IT industry specialists.
статья, добавлен 06.04.2023The study of the sequence of stages of reconstruction of graphical images on a computer using decoding dual vectors of the tuple. Decoding code values in software components. Ways of coding information. Methods of the decrypting computer codes cost.
статья, добавлен 25.03.2016История создания операционной системы Windows. Графические интерфейсы и расширения для DOS. Семейство Windows 9x. Ключевые подразделения International Business Machines. MicroSoft Disk Operating System как дисковая операционная система от Microsoft.
презентация, добавлен 16.10.2012Building a full map of the mental activity of the human brain. Various sensors detect the pressure pulses, temperature. Mind reading machine - a coordination of human psychology and computer techniques. Extract safe and confidential information.
презентация, добавлен 30.05.2015The concept and structure of telecommunications, their latest achievements and prospects. Trends in the field of telecommunications, networking model, the interaction of the client and the server. The types of operating systems, external utilities.
учебное пособие, добавлен 11.10.2014Description of technology of off-wire computer networks with the productivity 100 Mb/s in the point of output and maintenance of information. Description of parameters of middle access and determination of multiple entrance. Physical layer, radio, WLAN.
методичка, добавлен 10.08.2011The elements of computer security. Cryptography approaches and attacks. An advanced encryption standard. Key generation and distribution approaches and attacks. The qualities of workable security solutions. The trusted platform module at biometrics.
книга, добавлен 08.03.2014- 100. Software evaluation
Procedure Oriented Programming. Return Type of mai. Example with Class. Creating Source File. Compiling and Linking. Representation of subjects of real problems in system design. Developing module, which are tolerant to any changes in the future.
курс лекций, добавлен 29.09.2014