Құрастырушы: Құрастырушылар: аға оқытушы Успанова А. И



бет15/15
Дата08.07.2018
өлшемі6,16 Mb.
#48744
1   ...   7   8   9   10   11   12   13   14   15

Networks. Virus can spread if an infected computer is connected to a network. The internet is an example of such network. When a user downloads a file infected with virus from the internet, the virus is copied to the computer. It may infect the files stored on the computer.

Pirated Software. An illegal copy of software is called pirated software. Virus can spread if user installs pirated software that contains a virus. A variety of pirated software is available in CDs and from the internet. Some companies intentionally add virus in the software. The virus is automatically activated if the user uses the software without purchasing license.


The following are some well-known viruses:

1. CodeRed. It is a worm that infects a computer running Microsoft IIS server. This virus launched DOS attack on White House’s website. It allows the hacker to access the infected computer remotely.

2. Nimba. It is a worm that spreads itself using different methods. IT damages computer in different ways. It modified files, alters security settings and degrades performance.

3. SirCam. It is distributed as an email attachment. It may delete files, degrade performance and send the files to anyone.

4. Melisa. It is a virus that is distributed as an email attachment. IT disables different safeguards in MS Word. It sends itself to 50 people if Microsoft Outlook is installed.

5. Ripper. It corrupts data from the hard disk.

6. MDMA. It is transferred from one MS Word file to other if both files are in memory.


7. Concept. It is also transferred as an email attachment. It saves the file in template directory instead of its original location.

8. One_Half. It encrypts hard disk so only the virus may read the data. It displays One_Half on the screen when the encryption is half completed.


Virus infects computer system if latest and updated version of an Antivirus program is not installed. Latest Antivirus software should be installed on Computer to protect it from viruses. A computer system can be protected from virus by following these precautions.

  1. The latest and updated version of Anti-Virus (Kaspersky, Doctor Web, AVAST and ect.) and firewall should be installed on the computer.

  2. The Anti-Virus software must be upgraded regularly.

  3. USB drives should be scanned for viruses, and should not be used on infected computers.

  4. Junk or unknown emails should not be opened and must be deleted straightaway.

  5. Unauthorized or pirated software should not be installed on the computer.

  6. An important way of protection against virus is the use of back up of data. The backup is used if the virus deletes data or modifies it. So back-up your data on regular basis. There are some great softwares that can back up your data automatically.

  7. Freeware and shareware software from the internet normally contain viruses. It is important to check the software before using them.

  8. Your best protection is your common sense. Never click on suspicious links, never download songs, videos or files from suspicious websites. Never share your personal data with people you don’t know over the internet.

Home task

After this lesson, you should be able to write essay (about 250 words):

-Ways of protection information.
Lectures 10. Computing Models – Algorithms.

Computer programming (often shortened to programming or coding) is the process of designing, writing, testing, debugging, and maintaining the source code of computer programs. This source code is written in one or more programming languages (such as Java, C++, C#, python, etc.). The purpose of programming is to create a set of instructions that computers use to perform specific operations or to exhibit desired behaviors. The process of writing source code often requires expertise in many different subjects, including knowledge of the application domain, specialized algorithms and formal logic.

Within software engineering, programming (the implementation) is regarded as one phase in a software development process.

In the late 1880s, Herman Hollerith invented the recording of data on a medium that could then be read by a machine. Prior uses of machine readable media, above, had been for control, not data. «After some initial trials with paper tape, he settled on punched cards...». To process these punched cards, first known as «Hollerith cards» he invented the tabulator, and the key punch machines. These three inventions were the foundation of the modern information processing industry. In 1896 he founded the Tabulating Machine Company (which later became the core of IBM). The addition of a control panel (plug board) to his 1906 Type I Tabulator allowed it to do different jobs without having to be physically rebuilt. By the late 1940s, there were a variety of control panel programmable machines, called unit record equipment, to perform data-processing tasks.

Data and instructions could be stored on external punched cards, which were kept in order and arranged in program decks.

The invention of the von Neumann architecture allowed computer programs to be stored in computer memory. Early programs had to be painstakingly crafted using the instructions (elementary operations) of the particular machine, often in binary notation. Every model of computer would likely use different instructions (machine language) to do the same task. Later, assembly languages were developed that let the programmer specify each instruction in a text format, entering abbreviations for each operation code instead of a number and specifying addresses in symbolic form (e.g., ADD X, TOTAL). Entering a program in assembly language is usually more convenient, faster, and less prone to human error than using machine language, but because an assembly language is little more than a different notation for a machine language, any two machines with different instruction sets also have different assembly languages.

In 1954, FORTRAN was invented; it was the first high level programming language to have a functional implementation, as opposed to just a design on paper. (A high-level language is, in very general terms, any programming language that allows the programmer to write programs in terms that are more abstract than assembly language instructions, i.e. at a level of abstraction «higher» than that of an assembly language.) It allowed programmers to specify calculations by entering a formula directly (e.g. Y = X*2 + 5*X + 9). The program text, or source, is converted into machine instructions using a special program called a compiler, which translates the FORTRAN program into machine language. In fact, the name FORTRAN stands for "Formula Translation". Many other languages were developed, including some for commercial programming, such as COBOL. Programs were mostly still entered using punched cards or paper tape. (See computer programming in the punch card era). By the late 1960s, data storage devices and computer terminals became inexpensive enough that programs could be created by typing directly into the computers. Text editors were developed that allowed changes and corrections to be made much more easily than with punched cards. (Usually, an error in punching a card meant that the card had to be discarded and a new one punched to replace it.)

As time has progressed, computers have made giant leaps in the area of processing power. This has brought about newer programming languages that are more abstracted from the underlying hardware. Although these high-level languages usually incur greater overhead, the increase in speed of modern computers has made the use of these languages much more practical than in the past. These increasingly abstracted languages typically are easier to learn and allow the programmer to develop applications much more efficiently and with less source code. However, high-level languages are still impractical for a few programs, such as those where low-level hardware control is necessary or where maximum processing speed is vital.

Throughout the second half of the twentieth century, programming was an attractive career in most developed countries. Some forms of programming have been increasingly subject to offshore outsourcing (importing software and services from other countries, usually at a lower wage), making programming career decisions in developed countries more complicated, while increasing economic opportunities in less developed areas. It is unclear how far this trend will continue and how deeply it will impact programmer wages and opportunities



Whatever the approach to software development may be, the final program must satisfy some fundamental properties. The following properties are among the most relevant:

Reliability: how often the results of a program are correct. This depends on conceptual correctness of algorithms, and minimization of programming mistakes, such as mistakes in resource management (e.g., buffer overflows and race conditions) and logic errors (such as division by zero or off-by-one errors).

Robustness: how well a program anticipates problems not due to programmer error. This includes situations such as incorrect, inappropriate or corrupt data, unavailability of needed resources such as memory, operating system services and network connections, and user error.

Usability: the ergonomics of a program: the ease with which a person can use the program for its intended purpose, or in some cases even unanticipated purposes. Such issues can make or break its success even regardless of other issues. This involves a wide range of textual, graphical and sometimes hardware elements that improve the clarity, intuitiveness, cohesiveness and completeness of a program's user interface.

Portability: the range of computer hardware and operating system platforms on which the source code of a program can be compiled/interpreted and run. This depends on differences in the programming facilities provided by the different platforms, including hardware and operating system resources, expected behavior of the hardware and operating system, and availability of platform specific compilers (and sometimes libraries) for the language of the source code.

Maintainability: the ease with which a program can be modified by its present or future developers in order to make improvements or customizations, fix bugs and security holes, or adapt it to new environments. Good practices during initial development make the difference in this regard. This quality may not be directly apparent to the end user but it can significantly affect the fate of a program over the long term.

Efficiency/performance: the amount of system resources a program consumes (processor time, memory space, slow devices such as disks, network bandwidth and to some extent even user interaction): the less, the better. This also includes correct disposal of some resources, such as cleaning up temporary files and lack of memory leaks.

Debugging



The bug from 1947 which is at the origin of a popular (but incorrect) etymology for the common term for a software defect.

Debugging is a very important task in the software development process, because an incorrect program can have significant consequences for its users. Some languages are more prone to some kinds of faults because their specification does not require compilers to perform as much checking as other languages. Use of a static code analysis tool can help detect some possible problems.

Debugging is often done with IDEs like EclipseKdevelopNetBeansCode: Blocks, and Visual Studio. Standalone debuggers like gdb are also used, and these often provide less of a visual environment, usually using a command line.

A programming language is an artificial language designed to communicate instructions to a machine, particularly a computer. Programming languages can be used to create programs that control the behavior of a machine and/or to express algorithms precisely.

The earliest programming languages predate the invention of the computer, and were used to direct the behavior of machines such as Jacquard looms and player pianos. Thousands of different programming languages have been created, mainly in the computer field, with many more being created every year. Most programming languages describe computation in an imperative style, i.e., as a sequence of commands, although some languages, such as those that support functional programming or logic programming, use alternative forms of description.

The description of a programming language is usually split into the two components of syntax (form) and semantics (meaning). Some languages are defined by a specification document (for example, the C programming language is specified by an ISO Standard), while other languages, such as Perl 5 and earlier, have a dominant implementation that is used as a reference.

All programming languages have some primitive building blocks for the description of data and the processes or transformations applied to them (like the addition of two numbers or the selection of an item from a collection). These primitives are defined by syntactic and semantic rules which describe their structure and meaning respectively.



Syntax



Parse tree of Python code with inset tokenization


Syntax highlighting is often used to aid programmers in recognizing elements of source code. The language above is Python.

The term Semantics refers to the meaning of languages, as opposed to their form (syntax).


Home task

After this lesson, you should be able to write essay (about 250 words):



  • Modern programming languages.


Lecture 11. Creating program by Turbo Pascal
Turbo Pascal is a software development system that includes a compiler and an integrated development environment (IDE) for the Pascal programming language running on CP/MCP/M-86, and DOS, developed by Borland under Philippe Kahn's leadership. From version 6 both a lower-priced Turbo Pascal and more expensive Borland Pascal were produced; Borland Pascal had more libraries and standard library source code. The name Borland Pascal is also used more generically for Borland's dialect of Pascal.

Borland has released three old versions of Turbo Pascal free of charge because of their historical interest: the original Turbo Pascal (now known as 1.0), and versions 3.02 and 5.5 for DOS

In a program, you must always obey the rules of the language, in our case, the Pascal language. A natural language has its own grammar rules, spelling and sentence construction. The Pascal programming language is a high level language that has its own syntax rules and grammar rules. As you go along with the lessons, you must note what you can do and what you cannot do in writing a Pascal program. A very simple program is shown below: 


Program Lesson1_Program1;

Begin

Write('Hello World. Prepare to learn PASCAL!!');

Readln;

End.

The program is written only to display the message : 'Hello World. Prepare to learn PASCAL!!' - an introductory message that is displayed to you whenever you are going to learn a new programming language. This is simply shown on the screen. So, to display any message on the screen, you should use 'write' (or 'writeln'). The 'readln' statement, here is used as to 'stop' the program and wait until the user presses enter. If the 'readln' statement is missing in this program, then the message is displayed on the screen without giving any chance for the user to read it and obviously halts! Try running this program with and without the 'readln' statement and notice the difference. I suggest you see it!! Now, look at this:




Program Lesson1_Program1;

begin

Write('Hello World. Prepare to learn PASCAL!!');

Readln;

End.

This program also runs perfectly as the previous one. The only difference is: neatness and friendliness. 

This first program is, what is commonly referred to in programming, as 'indented'. Indentation is a must in writing programs as it aids in the way the code is written ie. neater. Indentation also helps with debugging and code presentation. You will note how I indent programs.

A program in Pascal always starts by the reserved word 'Program' following the title of the program. In the following program, the computer must prompt the user to enter a number, then the latter is added to the second number input by the user.




Program Lesson1_Program2;

Var

Num1, Num2, Sum : Integer;


Begin {no semicolon}

Write('Input number 1:');

Readln(Num1);

Writeln('Input number 2:');

Readln(Num2);

Sum := Num1 + Num2; {addition}

Writeln(Sum);

Readln;


End.

Now we must take a look at the program. A program in Pascal starts with the reserved word 'Program' (although it is not explicitly required) and ends with 'End', following a full stop (this is required though). A full-stop is never used within the program, except when dealing with records (later topics) and at the end of the program as seen in the example above.

The 'Var' statement, is used to introduce any suitable variables which will be used later in the program.

After declaring all the variables which are required to be used later in the program, the main program always starts with the reserved word 'Begin'. Without this word, the compiler will display a diagnostic (error message). In the program above, both of the two types of 'write' are used. These are 'write' and 'writeln'. Both has the same function, except that the 'write' function, does not proceed to the following line when writing a statement. If you run this program, you will notice the difference between them. When using these two terms, any message that will be typed in between the brackets and the inverted commas '(' ')', is displayed on the screen. However, if a variable is used instead of a message, without using the inverted commas, the CPU will display the stored variable in the memory, on the screen. In line 9, the CPU will notdisplay 'Sum' on the screen, but the stored number in the memory. Another important thing which must be noticed is the semi-colon (;). The semicolon is used after each statement in the program, except those that you will learn later. However, in the example above, there isn't a semicolon after a 'begin' statement. This is because the flow of the program has just started and must not be stopped by a ';'.

The messages in between the braces ({ }) are called comments or in-line documentation. I guess you consider the comments to be 'extra'. Very long programs which include thousands of lines, have already been felt in need of describing certain functions or even complicated functions. In my experiences, I have already met many problems, when refusing to write a program for a long time, and then resuming again writing it! I've made a long time trying to understand what I have done. You must keep it into your mind that comments within the braces are not read or compiled by the compiler/interpreter.



The 'readln' statement is another reserved word for input purposes, which enables the user to input a number or text only i.e.: using the keyboard. But in our case the 'readln' statement is used to input numbers only (letters are accepted but will cause a run-time error because it is not the input we want) and store them in the variables 'Num1' and 'Num2'. This is because both variables are assigned to as integers, and integer variables do not store strings. A run-time error is detected by the OS (Operating System; ex. Windows or Linux) if something goes wrong with the input. Later in the course, you will also learn how to control input and output exceptions - unexpected runtime errors. One last thing on errors is this: there are 2 major error types which are - Runtime Errors and Compilation Errors. Runtime errors are those which occur unexpectedly during the execution of the program, whereas a Compilation error is one which is detected during the compilation process. Note that a decimal number is also considered as a wrong input; a decimal number must not be input, since it is a real number (more on this later).

Task 1. Algorithms do not only exist within the realm of computer science. Beginners may find it helpful to recognize the algorithmic thinking they already apply for daily life.

On a separate sheet of paper, list all the known possible steps in preparing/performing the following activities, be as descriptive and specific as you can be:



  1. Cooking/Frying an egg, sunny-side up

  2. The activities you do and the vehicles you ride on your way to school

  3. Walking your dog at the park

These activities above might seem easy, but as you perform the tasks, you will encounter a series of trial-and-error sub-activities. For beginners, this is normal and you may tend to miss a few steps.

Task 2. Assignment Solution and Discussion. As you were able to see in the assignments above, Algorithms are lists of instructions which are followed step by step.

Your solution to the case of egg frying should look like this:

1. Get the frying pan.

2. Get the oil.

a. Do you have oil?

1) If yes, put it in the pan.

2) If no, do you want to buy oil?

a) If yes, then go out and buy.

b) If no, you can terminate.

3. Turn on the stove.

4. Etc...

For the case of Frying an egg sunny side-up, have you forgotten to state that you will heat up the pan? Or maybe put in some oil? Should you put some oil in first before heating the pan, or should you heat the pan and then put some oil in? These are the possible conditions that you may encounter in preparing the algorithms for this task.

Once you have gotten used to writing simple algorithms, you can attempt to write pseudocode. Pseudocode is simply an algorithm which is written in a way that resembles computer code - it does not have to be in any particular programming language. People write algorithms in pseudocode because it is easier to see what a computer program will look like after it is written, and it may also be easier to notice logical problems in the algorithm.

Pseudocode doesn't lend itself well for non computerized tasks, but let's try writing some for the algorithm above:

Get(frying_pan)

if have(oil)

then get(oil)

else if want_to(buy(oil))

then buy(oil)

else terminate

turn_on(stove)

Spend some time reading that pseudocode. If you are acquainted with programming languages then the format above should seem familiar.



Required Assignment 2

Try writing psuedocode for the algorithms you wrote in the first assignment.






Required Assignment 3

Pseudocode (and programs in general) are best suited for mathematical problems. Try to write an algorithm in pseudocode for this math problem:



(x4 + 25y2 + 2z) − 13




Algorithms are a series of step by step instructions for solving a problem. Pseudocode is an algorithm written in a way that resembles computer code. To practice writing algorithms in pseudo code, you first think of a complex problem and consider the logical solution before writing it out.


Home task

After this lesson, you should be able to write essay (about 250 words):



  • Features of creating program.


Lecture 12 Power Point and Prezi
Microsoft Power Point is the name of a proprietary commercial software presentation program developed by Microsoft. It was officially launched on May 22, 1990 as a part of the Microsoft Office suite, and runs on Microsoft Windows and Apple's Mac OS X operating system. The current versions are Microsoft Office PowerPoint 2010 for Windows and Microsoft Office PowerPoint 2011 for Mac.

Originally designed for the Macintosh computer, the initial release was called "Presenter", developed by Dennis Austin and Thomas Rudkin  of Forethought, Inc.  In 1987, it was renamed to "PowerPoint" due to problems with trademarks, the idea for the name coming from Robert Gaskins. In August of the same year, Forethought was bought by Microsoft for $14 million USD ($28.6 million in present-day terms), and became Microsoft's Graphics Business Unit, which continued to develop the software further. PowerPoint was officially launched on May 22, 1990, the same day that Microsoft released Windows 3.0.

PowerPoint changed significantly with PowerPoint 97. Prior to PowerPoint 97, presentations were linear, always proceeding from one slide to the next. PowerPoint 97 incorporated the Visual Basic for Applications (VBA) language, underlying all macro generation in Office 97, which allowed users to invoke pre-defined transitions and effects in a non-linear movie-like style without having to learn programming.

Power Point 2000 (and the rest of the Office 2000 suite) introduced a clipboard that could hold multiple objects at once. Another change was that the Office Assistant was changed to be less intrusive.

As of 2012, various versions of PowerPoint claim ~95% of the presentation software market share, having been installed on at least 1 billion computers; the frequency of use in presentations had been estimated at around 350 per second globally.

PowerPoint provides three types of movements:



  1. Entrance, emphasis, and exit of elements on a slide itself are controlled by what PowerPoint calls Custom Animations.

  2. Transitions, on the other hand, are movements between slides. These can be animated in a variety of ways.

  3. Custom animation can be used to create small story boards by animating pictures to enter, exit or move.

Figure 38 - A PowerPoint presentation in progress


Supporters say that the ease of use of presentation software can save a lot of time for people who otherwise would have used other types of visual aid—hand-drawn or mechanically typeset slides, blackboards or whiteboards, or overhead projections. Ease of use also encourages those who otherwise would not have used visual aids, or would not have given a presentation at all, to make presentations. As PowerPoint's style, animation, and multimedia abilities have become more sophisticated, and as the application has generally made it easier to produce presentations (even to the point of having an "AutoContent Wizard" (discontinued in PowerPoint 2007) suggesting a structure for a presentation), the difference in needs and desires of presenters and audiences has become more noticeable.

The benefit of PowerPoint is continually debated, though most people believe that the benefit may be to present structural presentations to business workers, such as Raytheon Elcan does. Its use in classroom lectures has influenced investigations of PowerPoint’s effects on student performance in comparison to lectures based on overhead projectors, traditional lectures, and online lectures. Not only is it a useful tool for introductory lectures, but it also has many functions that allow for review games, especially in the younger grades. There are no compelling results to prove or disprove that PowerPoint is more effective for learner retention than traditional presentation methods. The effect on audiences of poor PowerPoint presentations has been described as PowerPoint hell.

Although PowerPoint has the aforementioned benefits, some argue that PowerPoint has negatively affected society. The terms "Death by PowerPoint" and "PowerPoint Hell" refer to the poor use of the software. Many large companies and branches of the government use PowerPoint as a way to brief employees on important issues that they must make decisions about. Opponents of PowerPoint argue that reducing complex issues to bulleted points is detrimental to the decision making process; in other words, because the amount of information in a presentation must be condensed, viewing a PowerPoint presentation does not give one enough detailed information to make a truly informed decision.

Death by PowerPoint” is a criticism of slide-based presentations referring to a state of boredom and fatigue induced by information overload during presentations such as those created by the Microsoft application PowerPoint.

The phrase was first coined by Angela R. Garber. Further criticisms of the cognitive effects of PowerPoint have been expounded by others, for example, Edward Tufte (2006) and Kalyuga et al. (1991). Wright (2009) suggests PowerPoint is a convenient prop for poor speakers, it can reduce complicated messages to simple bullet points and it elevates style over substance; and that these three things contribute to its popularity. It can also be called “PowerPoint Poisoning” a term originated by Scott Adams of Dilbert fame.

Microsoft Office PowerPoint Viewer is a program used to run presentations on computers that do not have PowerPoint installed. Office PowerPoint Viewer is added by default to the same disk or network location that contains one or more presentations packaged by using the Package for CD feature.

Power Point Viewer is installed by default with a Microsoft Office 2003 installation for use with the Package for CD feature. The Power Point Viewer file is also available for download from the Microsoft Office Online Web site.

Presentations password-protected for opening or modifying can be opened by Power Point Viewer. The Package for CD feature allows packaging any password-protected file or setting a new password for all packaged presentations. PowerPoint Viewer prompts for a password if the file is open password-protected.

Power Point Viewer supports opening presentations created using PowerPoint 97 and later. In addition, it supports all file content except OLE objects and scripting. PowerPoint Viewer is currently only available for computers running on Microsoft Windows.

Prezi is a cloud-based (SaaS) presentation software and storytelling tool for presenting ideas on a virtual canvas.[1][2][3][4][5] The product employs a zooming user interface (ZUI), which allows users to zoom in and out of their presentation media, and allows users to display and navigate through information within a 2.5D or parallax 3D space on the Z-axis. Prezi was officially established in 2009 by co-founders Adam Somlai-Fischer, Peter Halacsy and Peter Arvai.

Prezi (or Prezi.com) was created by the support of Kitchen Budapest and Magyar Telekom in 2008 in order to replace the ordinary slide based presentations. Today the project is assisted by Sunstone Capital. The actual development was done by Zui Labs led by its three Hungarian founders Péter Árvai, Szabolcs Somlai-Fischer and Péter Halácsy. The word prezi is the Hungarian short form of presentation.

The Prezi online and offline ZUI editors employ a common tool palette, allowing users to pan and zoom, and to size, rotate, or edit an object. The user places objects on a canvas and navigates between videos, images, texts and other presentation media. Frames allow grouping of presentation media together as a single presentation object. Paths are navigational sequences that connect presentation objects for the purposes of structuring a linear presentation.

Prezi Desktop allows Prezi Pro or Edu Pro subscribers to work off-line and create and save their presentations on their own Windows or Mac systems. Prezi Desktop Editor allows users to work on the presentation off- line which come in .pez file format. Users can have files up to 500 MB in size when signing up using a school login e-mail address. This storage capability doesn't affect when users use an appropriate third-party conversion software with FLV or SWF format.

Prezi Collaborate is an online collaboration feature that allows up to ten people (co-located or geographically separated) to co-edit and show their presentations in real time. Users participate in a prezi simultaneously, and each is visually represented in the presentation window by a small avatar. Although Prez Meetings can be done simultaneously that is not the only option. Participants can be invited to edit the Prezi presentation at a later time if they wish. A link will be sent and the participant has up to ten days to edit the presentation. Prezi Meeting is included in all license types.

Prezi Viewer is an app developed for the iPad for viewing prezis created on one's Prezi online account. The iPad touchscreen and multi-touch user interface enables users to pan, and pinch to zoom in or out of their media.

Prezzip also offers templates for PreziU, with tool kits and visuals for file presentations

Prezi is developed in Adobe Flash, Adobe AIR and built on top of Django. It is therefore compatible with most modern computers and web browsers. However, it does not comply with web standards, since it is still necessary to install the Adobe Flash plug-in.

From July 2014 viewing Prezi is also possible without Adobe Flash, using only Javascript


Home task

After this lesson, you should be able to write essay (about 250 words):



  • Making presentation.


Lecture 13 The Acquaintance with Corel Draw
Corel DRAW is a vector graphics editor developed and marketed by Corel Corporation of Ottawa, Canada. It is also the name of Corel's Graphics Suite, which bundles Corel Draw with a bitmap image editor, Corel PhotoPaint, and other graphics-related programs (see below). The latest version is designated X6 (equivalent to version 16), and was released in March 2012.

In 1987, Corel hired software engineers Michel Bouillon and Pat Beirne to develop a vector-based illustration program to bundle with their desktop publishing systems. That program, Corel DRAW, was initially released in 1989. Corel DRAW 1.x and 2.x runs under Windows 2.x and 3.0. Corel DRAW 3.0 came into its own with Microsoft's release of Windows 3.1. The inclusion of TrueType in Windows 3.1 transformed Corel DRAW into a serious illustration program capable of using system-installed outline fonts without requiring third-party software such as Adobe Type Manager; paired with a photo editing program (PhotoPaint), a font manager and several other pieces of software, it was also part of the first all-in-one graphics suite.

The first book devoted to Corel DRAW was Mastering Corel DRAW by Chris Dickman, published by Peachpit Press in 1990, with a contribution by Rick Altman. Dickman also founded and published the independent Mastering CorelDRAW Journal publication, and created and ran the first site dedicated to CorelDRAW, CorelNET.com, from 1995 to 1997.

CorelDRAW was originally developed for Microsoft Windows 3 and currently runs on Windows XPWindows Vista, and Windows 7. The current version, X6, was released on 20 March 2012.

Several innovations to vector-based illustration originated with Corel DRAW: a node-edit tool that operates differently on different objects, fit text-to-path, stroke-before-fill, quick fill/stroke color selection palettes, perspective projections, mesh fills and complex gradient fills.

Corel DRAW's competitors include Adobe Illustrator and Xara Photo & Graphic Designer. Although all of these are vector-based illustration programs, the user experience differs greatly between them. While these programs will read their native file types and vice versa, the translation is rarely perfect. Corel DRAW can open Adobe PDF files: Adobe PageMaker, Microsoft Publisher and Word, and other programs can print documents to PDF using the Adobe PDF Writer printer driver, which Corel DRAW can then open and edit every aspect of the original layout and design. Corel DRAW can also open PowerPoint Presentations and other Microsoft Office formats with little or no problem Over time, additional components were developed or acquired and bundled with Corel DRAW. The list of bundled packages usually changes somewhat from one release to the next, though there are several mainstays that have remained in the package for many releases now, including Power TRACE (a bitmap to vector graphic converter), PHOTO-PAINT (a bitmap graphic editor), and CAPTURE (a screen capture utility).

The current version of CorelDRAW Graphics Suite X6 (version 16), contains the following packages:


  • CorelDRAW X6, an intuitive vector-illustration and page-layout application

  • Corel PHOTO-PAINT X6, an image-editing application

  • Corel PowerTRACE X6, a utility to convert bitmaps into editable vector graphics

  • Corel CONNECT, a full-screen browser to search the suite’s digital content

  • Corel CAPTURE X6, a screen capture utility

  • Corel Website Creator X6, new website creation software

  • CDR file format is a proprietary file format developed by Corel Corporation and primarily used for vector graphic drawings. There is no publicly available CDR file format specification.

  • Other CorelDRAW file formats include CorelDRAW Compressed (CDX), CorelDRAW Template (CDT)  and Corel Presentation Exchange (CMX).

Adobe Photoshop is a graphics editing program developed and published by Adobe Systems.

Adobe's 2003 "Creative Suite" rebranding led to Adobe Photoshop 8's renaming to Adobe Photoshop CS. Thus, Adobe Photoshop CS6 is the 13th major release of Adobe Photoshop. The CS rebranding also resulted in Adobe offering numerous software packages containing multiple Adobe programs for a reduced price. Adobe Photoshop is released in two editions: Adobe Photoshop, and Adobe Photoshop Extended, with the Extended having extra 3D image creation, motion graphics editing, and advanced image analysis features. Adobe Photoshop Extended is included in all of Adobe's Creative Suite offerings except Design Standard, which includes the Adobe Photoshop edition.

Alongside Photoshop and Photoshop Extended, Adobe also publishes Photoshop Elements and Photoshop Lightroom, collectively called "The Adobe Photoshop Family". In 2008, Adobe released Adobe Photoshop Express, a free web-based image editing tool to edit photos directly on blogs and social networking sites; in 2011 a version was released for theAndroid operating system and the iOS operating system.

Adobe only supports Windows and Macintosh versions of Photoshop, but using Wine, Photoshop CS5 can run reasonably well on Linux.

In 1987, Thomas Knoll, a PhD student at the University of Michigan began writing a program on his Macintosh Plus to display grayscale images on a monochrome display. This program, called Display, caught the attention of his brotherJohn Knoll, an Industrial Light & Magic employee, who recommended that Thomas turn it into a full-fledged image editing program. Thomas took a six-month break from his studies in 1988 to collaborate with his brother on the program. Thomas renamed the program ImagePro, but the name was already taken.[8] Later that year, Thomas renamed his program Photoshop and worked out a short-term deal with scanner manufacturer Barneyscan to distribute copies of the program with a slide scanner; a "total of about 200 copies of Photoshop were shipped" this way.

During this time, John traveled to Silicon Valley and gave a demonstration of the program to engineers at Apple and Russell Brown, art director at Adobe. Both showings were successful, and Adobe decided to purchase the license to distribute in September 1988. While John worked on plug-ins in California, Thomas remained in Ann Arbor writing code. Photoshop 1.0 was released in 1990 for Macintosh exclusively.


Cropping and Slicing. The crop tool can be used to select a particular area of an image and discard the portions outside of the chosen section. This tool assists in creating a focus point on an image and excluding unnecessary or excess space.


The "slice" and slice select tools, like the crop tool, are used in isolating parts of images. The slice tool can be used to divide an image into different sections, and these separate parts can be used as pieces of a web page design once HTML and CSS are applied. The slice select tool allows sliced sections of an image to be adjusted and shifted.

Drawing. Photoshop includes a few versions of the pen tool. The pen tool creates precise paths that can be manipulated using anchor points.[24] The freeform pen tool allows the user to draw paths freehand, and with the magnetic pen tool, the drawn path attaches closely to outlines of objects in an image, which is useful for isolating them from a background.

Measuring and Navigation. The eyedropper tool selects a color from an area of the image that is clicked, and samples it for future use. The hand tool navigates an image by moving it in any direction, and the zoom tool enlarges the part of an image that is clicked on, allowing for a closer view.

Selection. The marquee tool can make selections that are single row, single column, rectangular and elliptical. Once an area of an image is highlighted, the move tool can be used to manually relocate the selected piece to anywhere on the canvas. The lasso tool is similar to the marquee tool, however, the user can make a custom selection by drawing it freehand. In addition, the lasso tool can make magnetic and polygonal selections.

Typing. Photoshop also provides tools for adding and editing text. The type tools create an area where text can be entered, and the type mask tools create a selection area that has the shape of text. The type tool creates vector-based text, so symbols, letters and numbers in various fonts and colors can be re-sized while maintaining the same resolution.

Retouching. There are several tools that are used for retouching, manipulating and adjusting photos, such as the clone stamperaserburndodgesmudge and blur tools. The clone stamp tool samples a selected portion of an image, and duplicates it over another area using a brush that can be adjusted in size, flow and opacity.The smudge tool, when dragged across part of an image, stretches and smudges pixels as if they are real paint, and the blur tool softens portions of an image by lowering the amount of detail within the adjusted area. The eraser tool removes pixels from an image, and the magic eraser tool selects areas of solid color and erases them.[24] The burn and dodge tools, which are derived from traditional methods of adjusting the exposure on printed photos, have opposite effects; the burn tool darkens selected areas, and the dodge tool lightens them.

Content-aware. Content-awareness is a useful aspect of Photoshop where image editing is done automatically and intelligently. It comes in two forms, content-aware scaling, and content-aware filling, in which elements in a background automatically recompose according to the areas a user of the program decides to fill or scale. More specifically, content-aware scaling works by rescaling an image and causing its content to adapt to the new dimensions and preserving important areas of it. Content-aware filling functions by matching tone, color, and noise of an area of the image that contained an object or detail in which the user decides to remove.

Healing Tools. With improvement retouching tools like the Clone Stamp tool and Healing Brush tool, imperfections of an image can easily be removed. These tools essentially function by locating a source point (or multiple source points) that can be scaled or rotated in order to cover an imperfection or unwanted detail in a specific area of an image.

Puppet Warp. Similar to the content-aware tool, the puppet warp tool reveals Photoshop’s intelligence by allowing a user to reposition an object in an image such as a flower or arm. This is done by using points that outline the structure of an object and easily repositioning in the wanted orientation.

Video Editing. In Adobe CS5 Extended edition, video editing is comprehensive and efficient with a broad compatibility of video file formats such as MOVAVIFLCMPE

G-4, and FLV formats and easy workflow. Using simple combination of keys video layers can easily be modified, with other features such as adding text and the creation of animations using single images.

3D. With the Extended version of Photoshop CS5, 2D elements of an artwork can easily become three-dimensional with the click of a button. Extrusions of texts, an available library of materials for three-dimensional, and even wrapping two-dimensional images around 3D geometry are all possible with this version of Photoshop. Realism can also be added to an image using the 3D features of Photoshop such as animating image-based lights and depth of field.

Mobile Integration. Third-party plugins have also been added to the most recent version of Photoshop where technologies such as the iPad have integrated the software with different types of applications. Applications like the Adobe Eazel painting app allows the user to easily create paintings with their fingertips and use an array of different paint from dry to wet in order to create rich color blending.

Camera Raw. With the Camera Raw plug-in, RAW images can be processed without the use of Adobe Photoshop Lightroom, along with other image file formats such as JPEGs, TIFFs, or PNGs. The plug-in allows users to remove noise without the side-effect of over-sharpening, add grain, and even perform post-crop vignetting.



Home task

After this lesson, you should be able to write essay (about 250 words):



  • Computer graphics.



Lecture 14 Global network Internet
It is common to connect computers together to form a network. This is usually done by connecting cables to an electronic board called a network interface card (NIC) in each computer. Networks make communication between users possible and allow software and hardware to be shared. They also make it easier to maintain and control a large number of computers. A network that is connected over a small area - e.g. one building - is called a local area network (LAN), and a network connected over a large area - e.g. different buildings, different cities, or even different countries, is known as a wide area network (WAN).The most common network arrangement is known as a client/server system. The main computers that provide a service on the network are called servers, and the other computers that use the services are called clients.

The physical arrangement the network is known as the network topology. Three common topologies are known as star, ring, and bus. A star topology has each computer individually connected to a central hub. The hub may be the main server computer, but is more often an electronic device that is used for connecting all the computers together. A ring topology has all the computers connected in a closed loop, and a bus topology has all the computers connected to a main cable that is terminated at each end. A mesh topology, where every computer is connected to every other computer, is not commonly used. Most networks use a mixture of topologies since each arrangement has its own advantages and disadvantages.

Passwords are commonly used to restrict access to a network and keep the system secure. Each user of a network is given an account name and password, which determine what services are made available to them. Passwords are supposed to prevent unauthorized users, or hackers, from breaking into the system, so they must not he easy for outsiders to guess. At the same time, they should not be too difficult for the user to remember. Ideally, they should have a minimum of six characters, and be composed of a mixture of capital and small letters, numbers, numbers, and symbols. Certain symbols have to be avoided because they have special meaning in computer systems. It is better not to use words in the dictionary or proper names, since some hackers use special computer programs which automatically try all the words and combinations of words in a computerized dictionary to try to discover or crack other users' passwords. It is also useful to change passwords frequently.

Users often want to send messages from one network to another or to computers at the other side of the world. This can be done using a variety of communications links. Normal copper telephone wires can be used over short distances but shielded cable called coaxial cable or coax can be used for longer distances. However, coax has largely been replaced by even faster cable known as fibre optics or fibre optic cable. (Note that the American spelling of fibre is fiber,) Fibre optic cable uses glass fibres to conduct abeam of laser light. To transmit signals long distances around the world satellites are often used. The signal is transmitted and received by earth-satellite stations positioned at suitable locations over the earth's surface. Microwave transmissions are another means of transmitting signals from one microwave station to another.

An increasingly popular way of communicating using computers is voicemail. In this system, spoken messages are sent to a server computer where they are stored in areas called voice mailboxes. When the user connects to Their can listen to the stored messages.

Video conferencing is a more advanced form of communication by computer, which enables meetings to take place over Ions distances, video cameras are used at each end of the c communications link so that the participants can see and hear each other. The end of the link nearest a user is called Near End and the end of the link furthest from the user is called Far End. Each user has a keypad that enables them to control features of the system, for example to make or end a call, adjust the sound volume, and zoom the camera in to get close-up views, or zoom it back for a broader perspective. An additional display feature, called picture-in-picture, allows one image to be displayed inside another image.

When a piece of text is scanned using a scanner input device, an image of the text is input to the computer and displayed on the screen. It is not possible to change or edit the displayed text using a word processor, however, because the image is graphical, not digital. An optical character recognition (OCR) program must be used to convert the text image into digital text characters that can be edited. To identify a scanned text character, the software compares the character image to stored data about the shape of standard characters. It is easier for the OCR software to recognize the scanned characters if they are printed using block capitals and are not too small. If a text is written in 'joined-up' writing, it is more difficult for the OCR to identify because there are extra lines and loops between the letters.

The Internet is the worldwide "network of networks" that links millions of computers together via copper wires, fiber-optic cables, wireless connections, and other telecommunications channels. This publicly accessible network of interconnected computer networks communicate using a set of protocols and standards, the most basic of which are TCP/IP.

The Internet and the World Wide Web are everywhere. They can provide answers to questions and hours of entertainment. The Internet can allow people from all over the world to talk to each other. But what exactly are the Internet and the World Wide Web?

This resource is intended to function as a general overview of the workings of the internet, which may cover social, economic, historical and other aspects. For a more detailed and step by step approach to learning about networking, consider visiting the topic on computer networking.

The internet started out as a US Department of Defence project called ARPANET, which slowly expanded with the integration of packet switching networks over switching networks. ARPANET could be considered the original heart of the internet, with additional bits and pieces being added on until certain standards were needed to unify them all. These standards eventually came to be known as Protocols. As of July 2008, there were close to 600 million hosts connected to the world wide web, linked together by a series of switches and communication links.

Protocols. A protocol is a definition of the format and order of messages that are exchanged between two or more hosts. For example, if person A wanted to know the time from person B in England, person A may approach person B and ask "What is the time?". Person B may then reply with the current time. Some important things to note in this example is that both assume they will be communicating in English, and have a concept of time. While these are things that we as human beings may take for granted, machines have no idea what and how they will be communicating with each other until a set of rules is specified. As mentioned above, one of the most original and common protocols in use today is the TCP/IP protocol.


TCP/IP consists of the Transmission Control Protocol in conjunction with the Internet Protocol. Other protocols such as DHCPDNSFTPHTTPIRCMIMEPOP3SMTPSSH,TELNETRTP and many more help hold the whole thing together.

Protocols are only a subset of the entire design of the internet. Proposals for existing and new standards are made through Requests for Comments (RFCs), hosted by the Internet Engineering Task Force. RFCs are highly technical and detailed documents that specify each and every operation of the standard being proposed. Comments (hence the name) are sought after regarding the standard and the process carries on until most are satisfied. The standard is then published.


OSI Model. A popular way to visualize the complexity of the Internet is to see it as a stack of layers known as the OSI model, short for Open Systems Interconnection model.


OSI Layers:

Layer 7: Application Layer – the main interface for the user(s) to interact with the application and therefore the network

Layer 6: Presentation Layer – transforms data to provide a standard interface for the Application layer

Layer 5: Session Layer – controls the dialogues (sessions) between computers

Layer 4: Transport Layer – provides transparent transfer of data between end users and machines

Layer 3: Network Layer – provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks

Layer 2: Data Link Layer – provides the functional and procedural means to transfer data between network entities and to detect and possibly correct errors that may occur in the physical layer

Layer 1: Physical Layer – defines all the electrical and physical specifications for devices and the communications media



The Internet, a global computer network which embraces millions of users all over the world, began in the United States in 1969 as a military experiment. It was designed to survive a nuclear war. Information sent over the Internet takes the shortest path available from one computer to another. Because of this, any two computers on the Internet will be able to stay in touch with each oilier as long as there is a single route between them. This technology is called packet swithing. Owing to this technology, if some computers on the network are knocked out (by a nuclear explosion, for example), information will just route around them. One such packet - switching network already survived war. It was the Iraqi computer network which was not knocked out during the Gulf War.

Home task

After this lesson, you should be able to write essay (about 250 words):



  • Internet tomorrow.


Lecture 15. Introduction to HTML
Hyper Text Markup Language (HTML) is the main markup language for displaying web pages and other information that can be displayed in a web browser.

HTML is written in the form of HTML elements consisting of tags enclosed in angle brackets (like ), within the web page content. HTML tags most commonly come in pairs like 

and 

, although some tags, known as empty elements, are unpaired, for example . The first tag in a pair is the start tag, the second tag is the end tag (they are also called opening tags and closing tags). In between these tags web designers can add text, tags, comments and other types of text-based content.

The purpose of a web browser is to read HTML documents and compose them into visible or audible web pages. The browser does not display the HTML tags, but uses the tags to interpret the content of the page.

HTML elements form the building blocks of all websites. HTML allows images and objects to be embedded and can be used to create interactive forms. It provides a means to create structured documents by denoting structural semantics for text such as headings, paragraphs, lists, links, quotes and other items. It can embed scripts in languages such as JavaScriptwhich affect the behavior of HTML webpages.

Web browsers can also refer to Cascading Style Sheets (CSS) to define the appearance and layout of text and other material. The W3C, maintainer of both the HTML and the CSS standards, encourages the use of CSS over explicitly presentational HTML markup.

HyperText Markup Language is a markup language that web browsers use to interpret and compose text, images and other material into visual or audible web pages. Default characteristics for every item of HTML markup are defined in the browser, and these characteristics can be altered or enhanced by the web page designer's additional use of CSS. Many of the text elements are found in the 1988 ISO technical report TR 9537 Techniques for using SGML, which in turn covers the features of early text formatting languages such as that used by the RUNOFF command developed in the early 1960s for the CTSS (Compatible Time-Sharing System) operating system: these formatting commands were derived from the commands used by typesetters to manually format documents. However, the SGML concept of generalized markup is based on elements (nested annotated ranges with attributes) rather than merely print effects, with also the separation of structure and processing; HTML has been progressively moved in this direction with CSS.

HTML markup consists of several key components, including elements (and their attributes), character-based data typescharacter references and entity references. Another important component is the document type declaration, which triggers standards mode rendering.

The following is an example of the classic Hello world program, a common test employed for comparing programming languagesscripting languages and markup languages. This example is made using 9 lines of code:







Hello HTML





Hello World!







(The text between and describes the web page, and the text between and

Достарыңызбен бөлісу:
1   ...   7   8   9   10   11   12   13   14   15




©engime.org 2024
әкімшілігінің қараңыз

    Басты бет