Lecture № 14. Information technologies in the professional sphere. Industrial ICT



Purpose: to train students to use software for solving specialized professional field

Plan:
1.The software for the solution of tasks of the specialized professional sphere.

2.Modern IT trends in the professional sphere: medicine, power, etc.

3.Use of search engines and electronic resources in the professional purposes.

4.Safety issues in industrial information and communication technologies.

 

 

1.The software for the solution of tasks of the specialized professional sphere.

А pplication package- a set of programs designed to meet the challenges of a certain class (functional subsystem, business application)method-oriented.

· the following types of PPP:

· general purpose (universal);

· problem-oriented,

· global networks;

· organization (administration) computing process whole..

IFR general purpose- versatile software designed to automate the development and operation of the user's functional tasks and information systems as a By this RFP class includes:

· text editor (word processor) and graphics,

· spreadsheets,

· database management systems (DBMS);

· integrated

· packages; Case-technology;

· the shell of expert systems and artificial intelligence systems changes.

RFP for creating and text documents, graphics, and illustrations, called the editor.

Text editors designed to handle text and perform mainly the following functions:

record the text file;

insert, delete, replace characters, lines, text fragments,

spell checking,

formatted text, different fonts,

text alignment

preparation tables of contents, splitting the text on the page;

search and replace words and expressions,

the inclusion in the text of simple illustrations;

text printing

The most widely used text editor Microsoft word, word Perfect (currently owned by the company Corel), chiWriter, Multi-Edit And other used.

Graphic editors are for processing graphic documents, including diagrams, illustrations, drawings and tables. Allowed to control the size and font of figures, moving figures and letters, the formation of any image. Among the most famous image editors can be called packages Corel DRAW, Adobe PhotoShop and Adobe Illustrator.

Publishing systems combine the possibilities of text and graphic editors have developed capabilities for formatting strips with graphic materials and then printed. These systems are targeted for use in publishing and typesetting systems are called. Because these systems can be called PageMaker products from Adobe and Ventura Publisher of Corel Corporation.

Spreadsheets. Spreadsheet called RFP for processing tables.

The data in the table is stored in the cells located at the intersection of rows and columns. The cells can be stored numbers, formulas and character data. Formula values are set dependent on the contents of one cell to other cells. Changing the contents of a cell resulting in a change of values in the dependent cells.

The most popular PPP of this class are products such as Microsoft Excel, Lotus 1-2-3, Quattro Pro, and others.

Database Management Systems.To create a database inside the machine information support uses special IFR - database management system-.

Database A set of specially data organized sets stored on disk adding,.

database management includes data entry, their correction and manipulation of data, that is, delete, retrieve, update, etc. Developed database applications to ensure the independence, working with them on the specific organization of information in databases. Depending on how these organizations are distinguished: network, hierarchical, distributed, relational database management system

from the available database the most widely used Microsoft Access, Microsoft FoxPro, Paradox (corporation Borland), and the Oracle database company, Informix, Sybase, Modern etc

 

 

2.Modern IT trends in the professional sphere: medicine, power, etc.

Computers have long been used in medicine. Many modern diagnostic methods based on computer technology. Such methods are surveys, as ultrasound or computed tomography, generally unthinkable without a computer. But in a more "old" methods of examination and diagnostic computers are invading more and more actively. Cardiogram and blood tests, the study of the fundus and dental health ... - It's hard to find an area of medicine in which computers have not been applied to more and more to.

Active, but only diagnostic use of computers in medicine is not limited They are increasingly beginning to be used in the treatment of various diseases -. Starting from the construction of the optimal treatment plan and to manage the various medical facilities during procedures

 

The information economy has changed many aspects of economic reality, in particular, and the function of money, that of a universal equivalent effort gradually turned into a means of calculation. Virtual banks and payment systems -. The fruit of development of information technologies

in economics and business information technology applied to the processing, sorting and aggregating data for the organization of interaction of actors and computer technology, to meet the information needs for operational communications, etc.

It is understood investment decision in the development of information technologies, as well as other management decisions should take into account economic feasibility. But it turns out that this very convenient to calculate the benefit in using all of the same information technologies. There are models of counting the total economic impact, which allows to take into account, among other things, additional benefits of the introduction of information technologies, scalability and flexibility of the systems, as well as potential risks.

 

3.Use of search engines and electronic resources in the professional purposes.

The search engine (Eng. engine) -searchit is a computer system designed tofor search information.One of the most well-known applications of search engines - web services to search for text or graphic information in the World WideWeb.There are also systems that can search for files on the FTP-server, goods inonlinestores, information in the Usenetnewsgroups.

To search for information using a search engine user formulates a search request.The search engine's job is to search for the user to find documents that contain any specified keywords, or words, in any way related to the keyword. In this case the search engine generates a search result page. Such a search listing may comprise various types of results, such as web pages, images, audio files. Some search engines also extract information from the appropriate database and web directory.

The search engine is better than more documents that are to relevant the user's request, it will return. Search results may become less relevant due to the nature of algorithms or due to human error. Мost popular search engine in the world is Google.

According to the methods of research and service shared by four types of search Systems using crawlers, systems controlled by a person, the hybrid system and the meta-system. The search system architecture typically includes:

· crawler that collects information from Internet sites or from other documents,

· indexer, provides a quick search on the stored information, and

· the search engine - a graphical interface for the user

How does search engine

Figure 24- job of search engine

 

 

High-level architecture of the standard crawler

Main components of a search engine crawler, indexer, search engine:.

As a rule, the system works in stages. First, the crawler receives the content, then the indexer generates a searchable index, and finally, the search engine provides the functionality to search for the indexed data. To update the search engine indexing of the loop is executed again.

Search engines work by storing information about many web pages, which they receive from HTML pages. Crawler or "crawler"(eng. -Crawler)a program that automatically runs through all the links found on the page, and makes them stand out. Crawler based on references or on the basis of a predetermined list of addresses, searches for new documents, not yet well-known search engine. The site owner can exclude certain page using a robots.txt, using which you can prevent the indexing of files, pages or the site directory.

Searcher operates to output files received from the indexer. The search engine receives user requests, processes them using the index and returns search results

 

4.Safety issues in industrial information and communication technologies.

Vision of information security of the Republic of Kazakhstan
Information Security Concept of the Republic of (Hereinafter - the Concept) is designed to ensure that the interests of society and state in the information sphere.
recently updated issue of equal participation of the Republic of Kazakhstan in the international exchange of information and processes in the international regulation of information security. The need to defend the national interest requires an increase in the activity of state bodies in the framework of existing international organizations introduction.
Thus, the current state of information security is characterized by the following threats:
1) the imperfection of information security system and dysfunction of critical facilities information;
2) low level of production, the and the use of modern information and communication technology that does not meet the objective needs of and
society,

3) depending on the Republic of Kazakhstan on import of information technologies, informatization and protection of information, the use of which may cause damage to the national interests of the country;
4) the rise of information warfare between the world's leading centers of power, preparation and conduct of foreign states struggle in the information space;
5) non-constructive policy of foreign countries in the field of global information monitoring, dissemination of information and the new information technologies;
6) the development of information manipulation technologies;
7) the possibility of destructive information impact on the public consciousness and public institutions, the applicator damage to the country's national interests;
8) dissemination of false or deliberately distorted information that could harm the national interests of the Republic of Kazakhstan;
9) openness and vulnerability of the national information space from external influence;
10) lack of effectiveness of information support of public policies;
11) a weak protection and low competitiveness national information space;
12) non-compliance of national content quality of the objective requirements of Kazakhstan's society and world level;
13) increase in crime, including transnational crime, as well as extremist and terrorist activities, using information and communication technologies;
14) attempts unauthorized access to information resources Republic of Kazakhstan, resulting in damage to its national interests;
15) activities of foreign intelligence and special services, as well as foreign political and economic structures, aimed against the interests of the Republic of Kazakhstan;
16) violations of secrecy when working with information constituting state secrets of the Republic of Kazakhstan, as well as willful misconduct and unintentional errors and irregularities in the handling of information of restricted access;
17) lack of legal regulation of information sphere system;
18) natural disasters and catastrophes;
19) unlawful actions of state structures, leading to a violation of the legitimate rights and interests of individuals and legal entities, the state in the field of information
Aims and objectives
The aim of the Concept is creation of a national information security system that guarantees the protection of the national interests of the Republic of Kazakhstan in the field of information
to achieve this goal it is necessary to solve the following set of tasks:
1) the development of information security management system that enables ensure security of the country's national information infrastructure, and a single national information space;
7) 2016, the level of maintenance to eliminate downtime of information systems for information security will be reduced to 20 minutes;
8) will be provided by the production of the domestic computer hardware, accessories, peripherals and software
9)increase the level of innovative activity of industrial enterprises;
10) legal framework governing the information sector will be improved, including through international cooperation;
11) will improve the system of staffing in the field of information security and the protection of state secrets.

Questions:

5. What is the software for the solution of tasks of the specialized professional sphere?

6. Safety issues in industrial information and communication technologies

7. What is the modern IT trends in the professional sphere?

8. What are the differences between using of search engines and electronic resources in the professional purposes?

 

References

1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th Edition - Comprehensive, Thomson Course Technology, a division of Thomson Learning, Inc Cambridge, MA, COPYRIGHT © 2014.

2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski (University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.

3. Craig Van Slyke Information Communication Technologies: Concepts, Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008, Pages: 4288

4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer science”, Shimkent 2008, 84 pages.

 

 


Дата добавления: 2018-11-24; просмотров: 733; Мы поможем в написании вашей работы!

Поделиться с друзьями:






Мы поможем в написании ваших работ!