Description of the location of the subject. Municipal budgetary general education

The textbook for the course "Informatics and ICT. Grade 11" is aimed at teaching in general education institutions profile course at a basic level in 11th grade. The textbook fully complies with the educational standard approved by the Ministry of Education and Science of the Russian Federation. The textbook discusses computer architecture and information security methods, systems approach to modeling, formalization and its visualization using interactive computer models, databases and DBMS. Much attention is paid to the formation of practical skills in the process of performing practical computer work. The textbook is multi-system, since practical work can be performed in operating rooms Windows systems and Linux. The textbook contains tests for preparing for the Unified State Exam in the course "Informatics and ICT".

Computing in the pre-electronic era. The need to count objects in humans arose in prehistoric times. The oldest method of counting objects consisted of comparing objects of a certain group (for example, animals) with objects of another group, playing the role of a counting standard. For most peoples, the first such standard was fingers (counting on fingers).
The expanding needs for counting forced people to use other counting standards (notches on a stick, knots on a rope, etc.).
Every schoolchild is familiar with counting sticks, which were used as a counting standard in the first grade.
IN ancient world when counting large quantities objects began to be used to designate a certain number of them (for most peoples - ten) new sign, for example, a notch on another stick. First computing device, in which this method began to be used, was the abacus.

Table of contents
Guidelines for Using Textbook 7
Chapter 1. Computer as a means of automating information processes 9
1.1. History of development computer technology 10
Practical work 1.1. Virtual computer museums 15
1.2. Personal computer architecture 19
Practical work 1.2. Understanding Computer Architecture 23
1.3. Operating systems 25
1.3.1. Main characteristics of operating systems 25
Practical work 1.3. About logical disk partitions 28
1.3.2. Operating system Windows 30
Practical work 1.4. Desktop icons and shortcuts 34
1.3.3. Operating system Linux 36
Practical work 1.5. Settings GUI for operating room Linux systems 40
Practical work 1.6. Installing packages on the Linux operating system 41
1.4. Protection against unauthorized access to information 43
1.4.1. Password protection 43
1.4.2. Biometric security systems 45
Practical work 1.7. Biometric protection: identification by speech characteristics 48
1.5. Physical protection of data on disks 49
1.6. Defence from malware 51
1.6.1. Malicious and antivirus programs 51
1.6.2. Computer viruses and protection from them 53
Practical work 1.8. Protection against computer viruses 56
1.6.3. Network worms and protection against them 63
Practical work 1.9. Protection against network worms 66
1.6.4. Trojans and protection from them 71
Practical work 1.10. Trojan protection 72
1.6.5. Hacker utilities and protection from them 75
Practical work 1.11. Defence from hacker attacks 76
Chapter 2. Modeling and formalization 79
2.1. Modeling as a method of cognition 80
2.2. Systematic approach to modeling 82
2.3. Model presentation forms 84
2.4. Formalization 86
2.5. The main stages of developing and researching models on a computer 88
2.6. Research on interactive computer models 89
2.6.1. Study physical models 89
2.6.2. Study of astronomical models 91
2.6.3. Study of algebraic models 92
2.6.4. Study of geometric models (planimetry) 94
2.6.5. Study of geometric models (stereometry) 95
2.6.6. Research of chemical models 97
2.6.7. Study of biological models 98
Chapter 3. Databases. Database Management Systems (DBMS) 101
3.1. Table databases data 101
3.2. Database Management System 104
3.2.1. Main DBMS objects: tables, forms, queries, reports 104
Practical work 3.1. Creating a Tabular Database 106
3.2.2. Using a form to view and edit records in a tabular database 108
Practical work 3.2. Creating a Form in a Tabular Database 109
3.2.3. Finding records in a tabular database using filters and queries 113
Practical work 3.3. Finding records in a tabular database using filters and queries 114
3.2.4. Sorting records in a tabular database. . . 117
Practical work 3.4. Sorting records in a tabular database 118
3.2.5. Printing data using reports 119
Practical work 3.5. Creating a report in a tabular database 119
3.3. Hierarchical bases data 120
3.4. Network databases 124
Practical work 3.6. Creation family tree families 125
Chapter 4. Information society 127
4.1. Law on the Internet. . 127
4.2. Ethics on the Internet 128
4.3. Prospects for the development of information and communication technologies 131
Chapter 5. Repetition. Preparation for the Unified State Exam. Tests on the topics of the course “Informatics and ICT” 137
Topic 1. Information. Encoding of information. 138
Topic 2. Computer structure and software 142
Topic 3. Algorithmization and programming 146
Topic 4. Fundamentals of logic and logical foundations of a computer 156
Topic 5. Modeling and formalization 159
Topic 6. Information technology 161
Topic 7. Communication technologies 168
Answers to tests 170
Topic 1. Information. Information coding 170
Topic 2. Computer structure and software 171
Topic 3. Algorithmization and programming 172
Topic 4. Fundamentals of logic and logical foundations of a computer 181
Topic 5. Modeling and formalization 182
Topic 6. Information technology 184
Topic 7. Communication technologies 188

Free download e-book V convenient format, watch and read:
Download the book Computer Science and ICT, grade 11, Basic level, Ugrinovich N.D., 2008 - fileskachat.com, fast and free download.

Recommendations for using the textbook. . . . . . . . . . . . . . . 7
Chapter 1. Computer as a means of automation
information processes. . . . . . . . . . . . . . . . 9
1.1. History of the development of computer technology. . . . . . . . . . 10
Practical work 1.1. Virtual computers
museums. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.2. Personal computer architecture. . . . . . . . . . . . 19
Practical work 1.2. Architecture Details
computer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
1.3. OS. . . . . . . . . . . . . . . . . . . . . . . . . 25
1.3.1. Main characteristics of operating rooms
systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Practical work 1.3. Logical Information
disk partitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
1.3.2. Windows operating system. . . . . . . . . . . . . . thirty
Practical work 1.4. Badges and labels on the Workbench
table. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
1.3.3. Linux operating system. . . . . . . . . . . . . . . . . 36
Practical work 1.5. Graphics settings
interface for the Linux operating system. . . . . . . . . . 40
Practical work 1.6. Installing packages
in the Linux operating system. . . . . . . . . . . . . . . . . . . . . . . . . 41
1.4. Protection against unauthorized access
to information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
1.4.1. Password protection. . . . . . . . . . . . . 43
1.4.2. Biometric security systems. . . . . . . . . . . . . 45
Practical work 1.7. Biometric security:
identification by speech characteristics. . . . . . . . . . . . 48
1.5. Physical protection of data on disks. . . . . . . . . . . . . . 49
1.6. Malware protection. . . . . . . . . . . . . . . . . 51
1.6.1. Malicious and antivirus programs. . . . . . . 51
1.6.2. Computer viruses and protection against them. . . . . . . . 53
Practical work 1.8. Computer protection
viruses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
1.6.3. Network worms and protection against them. . . . . . . . . . . . . . . 63
Practical work 1.9. Protection against network worms. . . . . 66
1.6.4. Trojan programs and protection against them. . . . . . . . . 71
Practical work 1.10. Trojan protection
programs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
1.6.5. Hacker utilities and protection against them. . . . . . . . . . . 75
Practical work 1.11. Protection against hacker attacks. . . 76
Chapter 2. Modeling and formalization. . . . . . . . . . . 79
2.1. Modeling as a method of cognition. . . . . . . . . . . . . . . 80
2.2. Systematic approach to modeling. . . . . . . . . . . . . . . . 82
2.3. Model presentation forms. . . . . . . . . . . . . . . . . . . . 84
2.4. Formalization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
2.5. Main stages of development and research of models
on the computer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
2.6. Interactive computer research
models. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
2.6.1. Study of physical models. . . . . . . . . . . . 89
2.6.2. Study of astronomical models. . . . . . . . 91
2.6.3. Study of algebraic models. . . . . . . . . 92
2.6.4. Study of geometric models
(planimetry). . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
2.6.5. Study of geometric models
(stereometry). . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
2.6.6. Study of chemical models. . . . . . . . . . . . 97
2.6.7. Study of biological models. . . . . . . . . . 98
Chapter 3. Databases. Database management systems
data (DBMS). . . . . . . . . . . . . . . . . . . . . . . . . . 101
3.1. Tabular databases. . . . . . . . . . . . . . . . . . . . . . . . 101
3.2. Database management system. . . . . . . . . . . . . . . 104
3.2.1. The main objects of the DBMS: tables, forms,
requests, reports. . . . . . . . . . . . . . . . . . . . . . . . . 104
Practical work 3.1. Creating a table base
data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
3.2.2. Using the form to view and edit
tating records in a tabular database. . . . 108
Practical work 3.2. Creating a form in a table
database. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
3.2.3. Searching for records in a tabular database
using filters and queries. . . . . . . . . . . . . 113
Practical work 3.3. Searching for records in a table
database using filters and queries. . . . . . . . . . 114
3.2.4. Sorting records in a tabular database. . . 117
Practical work 3.4. Sorting entries
in a tabular database. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
3.2.5. Print data using reports. . . . . . . . . . . 119
Practical work 3.5. Create a report
in a tabular database. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
3.3. Hierarchical data model. . . . . . . . . . . . . . . . . . . 120
3.4. Network model data. . . . . . . . . . . . . . . . . . . . . . . . . 123
Practical work 3.6. Genealogical creation
family tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Chapter 4. Information society. . . . . . . . . . . . . . . 126
4.1. Law on the Internet. . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
4.2. Ethics on the Internet. . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
4.3. Prospects for the development of information
and communication technologies. . . . . . . . . . . . . . . . 130
Chapter 5. Repetition. Preparation for the Unified State Exam. Tests
on the topics of the course “Informatics and ICT”. . . . . 136
Topic 1. Information. Encoding of information. 137

security. . . . . . . . . . . . . . . . . . . . . . . 141
Topic 3. Algorithmization and programming. . . 145

computer. . . . . . . . . . . . . . . . . . . . . . . 155
Topic 5. Modeling and formalization. . . . . . . 158
Topic 6. Information technologies. . . . . . . . . 160
Topic 7. Communication technologies. . . . . . . 167
Answers to tests. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Topic 1. Information. Coding
information. . . . . . . . . . . . . . . . . . . . . . 169
Topic 2. Computer structure and software
security. . . . . . . . . . . . . . . . . . . . . . . 170
Topic 3. Algorithmization and programming. . . 171
Topic 4. Fundamentals of logic and logical foundations
computer. . . . . . . . . . . . . . . . . . . . . . . 180
Topic 5. Modeling and formalization. . . . . . . 181
Topic 6. Information technologies. . . . . . . . . 183
Topic 7. Communication technologies. . . . . . . 187

annotation

You will gain practical skills in processing information and solving problems using a computer by performing laboratory work in computer class. A description of these works is also given in the textbook as a separate section.

Textbook example

The computer in your hands should become a tool for studying the properties of information, algorithms for processing it, and the effectiveness of the models used. Therefore, in the text accompanying the description of tasks for this or that laboratory work, we repeatedly urge you to reflect on the results obtained, systematize them in one way or another, and draw the necessary conclusions. Sometimes such reflections require time that does not necessarily need to be spent sitting at the computer. We hope that you will not feel like a slave to a computer, communication with which boils down to entering information (even if it is a program you wrote) and expecting results from it, but, first of all, a thinking person, for whom the computer is only a means of enhancing intellectual abilities.
In our book, as in any other textbook, you will encounter new concepts and terms. Terms are printed in bold. Definitions, properties and rules are enclosed in a box. It is not at all necessary to memorize properties and rules, but it is very important to understand their meaning and be able to apply them in practice.
Learning is impossible without self-control. To help you implement it, the textbook contains a variety of questions and tasks. Questions will help you understand whether you have learned well theoretical material. By completing assignments, you will test how well you can apply the knowledge you have acquired. Some tasks will be simple for you, others will be more difficult. The most difficult ones (in our opinion) are marked with a sign. At the end of the textbook there are tasks that are similar in form and content to those offered to graduates of secondary schools at the Unified State Exam in computer science.

Preface
Chapter 1. Information culture of society and the individual
§ 1. The concept of information culture
§ 2. Information literacy - base element information culture
§ 3. Social effects of informatization
§ 4. Methods of working with information
§ 5. Methods for collapsing information.
§ 6. Modeling is the cornerstone of the information worldview
§ 7. Information models in control problems
§ 8. Model economic problem
§ 9. International studies PISA
Chapter 2. Information coding. Presenting information on a computer
§ 10. Number systems
§ 11. Converting integers from one number system to another
§ 12. Translation fractional numbers from one number system to another
§ 13. Code tables
§ 14. Coding of color information
§ 15. Color model H.S.B.
§ 16. Obtaining images on paper
§ 17. Codes that detect and correct errors
§ 18. Economy codes. Compression algorithms
§ 19. Irreversible compression algorithms
§ 20. Information processing using a computer
§ 21. Boolean functions
§ 22. Logic of RAM
§ 23. Representation of integers in computer memory
§ 24. Presentation real numbers in computer memory
§ 25. Features of computer arithmetic
Chapter 3. Basic information objects. Their creation and computer processing
§ 26. Creating and formatting text
§ 27. Inserting objects into document text
§ 28. Hypertext
§ 29. HTML Basics
§ 30. Hyperlinks in HTML
§ 31. Design of an HTML page
§ 32. Objects of other applications in HTML
§ 33. Computer dictionaries and text translation systems
§ 34. Computer processing graphic information objects
§ 35. Computer processing digital photos
§ 36. Computer presentations
Chapter 4. Telecommunication networks. Internet
§ 37. Local computer network
§ 38. Global computer networks
§ 39. Internet addressing
§ 40. Search engines Internet
§ 41. Internet as a source of information
§ 42. Internet services
§ 43. Internet telephony
§ 44. Internet ethics. Internet Safety
§ 45. Information Security and protection of interests of subjects information relations
§ 46. Information protection
Chapter 5. Study of algorithms using mathematical methods
§ 47. Once again about the concept of “algorithm”
§ 48. How to prove the applicability of an algorithm
§ 49. Limiting function
§ 50. Cycle invariant
Chapter 6. Graphs and graph algorithms
§ 51. The simplest properties of graphs
§ 52. Methods of representing graphs
§ 53. Algorithms for traversing a connected graph
§ 54. Bridges and points of articulation
§ 55. Trees
§ 58. Frames of minimum weight
Chapter 7. Games and strategies
§ 57. Game tree
§ 58. Building a strategy
§ 59 Invariant of strategy
§ 60. Game as a control model
Computer workshop
Laboratory work No. 1 (to § 6)
Model of the slide. Checking the adequacy of the model
Laboratory work No. 2 (to § 8)
Pricing problem
Laboratory work No. 3 (to § 11)
Number systems with a base equal to the power of 2.
Laboratory work No. 4 (to § 17)
Codes that detect and correct errors
Laboratory work No. 5 (to § 23)
Representation of integers in computer memory. Features of computer arithmetic
Laboratory work No. 6 (to § 24 and 25)
Representation of real numbers in computer memory. Features of computer arithmetic
Laboratory work No. 7 (to § 26)
Creating text information objects
Laboratory work No. 8 (to § 27)
Inserting objects into text
Laboratory work No. 9 (to § 28)
Creating hyperlinks in text
Laboratory work No. 10 (to § 29 and 30)
Introduction to HTML
Laboratory work No. 11 (to §31 and 32)
Using a tag to generate an HTML page. Publication of documents prepared in Microsoft Word, in the Internet
Laboratory work No. 12 (to § 34)
Introduction to Adobe Photoshop
Laboratory work No. 13 (to § 34)
Working with layers
Laboratory work No. 14 (to § 35)
Photo editing
Laboratory work No. 15 (to § 36)
Create a presentation in PowerPoint
Laboratory work No. 16 (to § 37 and 39)
Getting to know computer networks
Laboratory work No. 17 (to § 40)
Traveling through the Internet
Laboratory work No. 18 (to § 40)
Search on the Internet
Laboratory work No. 19 (to § 41)
Choosing a profession and finding employment via the Internet
Laboratory work No. 20 (to § 48)
Research of algorithms and programs
Laboratory work No. 21 (to § 52)
Methods of representing graphs
Laboratory work No. 22 (to § 53)
Depth First Search
Laboratory work No. 23 (to § 53)
Breadth first search
Laboratory work No. 24 (to § 53)
Wave algorithm
Laboratory work No. 25 (to § 54)
Bridges and articulation points
Laboratory work No. 26 (to § 55 and 56)
Building wireframes
Laboratory work No. 27 (to § 58)
Building a strategy based on a list of losing positions Laboratory work No. 28 (to § 59)
Building a strategy based on an invariant
Laboratory work No. 29 (to § 60)
Building a strategy based on the evaluation function
Preparing for the Unified State Exam in Informatics
Epilogue
Literature for further reading
Subject index

Along with this also read:


Recommended by the Ministry of Education and Science Russian Federation for use in educational process in those that have state accreditation and implement educational programs general education educational...

Read completely

The textbook is focused on teaching the course “Informatics and ICT” in 11th grade at a basic level in general education institutions. The textbook fully complies with the educational standard approved by the Ministry of Education and Science of the Russian Federation. The textbook discusses computer architecture and information security methods, a systematic approach to Modeling, formalization and its visualization using interactive computer models, databases and DBMSs. Much attention is paid to the formation of practical skills in the process of performing practical computer work. The textbook is multi-system, since practical work can be performed in Operating systems Windows and Linux. The textbook contains tests for preparing for the Unified State Exam in the course "Informatics and ICT".
Recommended by the Ministry of Education and Science of the Russian Federation for use in the educational process in educational institutions that have state accreditation and implement educational programs of general education
7th edition

Hide