the Internet Windows Android

Set and processing of information. Basic information processing programs in the office

Information processing technologies

IT are widely used in a wide variety of areas of modern society and, first of all, in the information sphere, they allow you to optimize various PI, ranging from the preparation and publication of printed products and ending with information modeling and forecasting global development processes in childbirth and society. In this case, IT in any subject areas are most commonly used to process data (information).

Processing - the concept is wide, often includes several interconnected smaller operations. Processing includes the operations of calculations, samples, search, association, mergers, sorting, filtering, etc.

It is important to remember that treatment -it is a systematic performance of operations on data (information, knowledge); The process of transformation, calculation, analysis and synthesis of any forms of data, information and knowledge by systematic operations over them.

Usually separately allocate data processing, information and knowledge.

Information processing technology depends on the nature of the solid tasks used computer equipment, user numbers, control systems for processing information, etc. It is used in solving well-structured tasks with existing input data and algorithms, as well as standard procedures for their processing.

The technological processing process of information may include the following operations (Actions): Generation, Collection, Registration, Analysis, Actually Processing, Accumulation, Data Search, Information, Knowledge, etc.

Information processing occurs in the process of implementing the technological process determined by the subject area. Consider basic operations (actions) of the technological process of processing information.

1) data collection, information, knowledge. This operation is the registration process, fixation, record detailed information (Data, knowledge) about events, objects (real and abstract), links, signs and appropriate actions. At the same time, sometimes there is separate operations "Collecting data and information" and "knowledge collection".

Collection of Knowledgethis is obtaining information about the subject area from specialists (experts) and submitting it in the form required to record in the database of knowledge.



There are mechanized, automated and automatic methods for collecting and registering information and data. Option automatic Information Collection Technologiesis RFID (from English Radio Frequency Identification - Radio Frequency Identification) - a special microchip in a size of several centimeters, built into any object. With the help of the RFID antenna existing in it provides an exchange of information with external devices (computer, etc.). It allows you to diagnose equipment, identify components in need of replacement, etc. The introduction of this technology will provide highly efficient methods of accounting and service of various products and objects.

2) Processing data, information, knowledge.Treatment often includes several interconnected smaller operations. Processing include operations such as: Calculation, sample, search, merge, merger, sorting, filtering, etc. Processing is a systematic execution of data operations, the process of conversion, calculation , analysis and synthesis of any forms of data, information and knowledge through systematic performing operations on them.

In determining such an operation, as processing, allocate the concepts of "data processing", "information processing" and "knowledge processing". At the same time note the processing of textual, graphical, multimedia and other information.

Treatment of textsit is one of the electronic office.

Usually the most time-consuming process of working with electronic text is its entry into the computer. It follows the preparation stages (including editing) of the text, its design, preservation and conclusion. This type of processing provides users with a different toolkit, enhancing efficiency and performance of their activities. At the same time, there are programs that recognize scanned text, which significantly facilitates work with similar data.

Image processinggained widespread dissemination with the development of electronic equipment and technologies. When processing images, high speeds are required, large memory volumes, specialized technical and software. At the same time there are means of scanning images that significantly facilitate their input and processing in the computer. IN computer technologies Using vector, raster and fractal graphics. Images have a different look, can be two- and three-dimensional, with dedicated contours, etc.

Table processingit is carried out by special application programs, supplemented by macros, diagrams, analytical and other possibilities. Working with the spreadsheet allows you to enter and update data, commands, formulas, determine the relationship and interdependence between cells (cells), tables, pages, files with tables and database data in the form of functions whose arguments are records in cells.

Data processing can be carried out in interactive and background modes. The main development of this technology received in the DBMS.

The following data processing methods are well known: centralized, decentralized, distributed and integrated.

Centralized data processingthe computer was mainly represented by batch processing information. At the same time, the user delivered its source information to the computing center (hereinafter referred to as), and then received the results of processing in the form of documents and (or) carriers. A feature of such a method is the complexity and complexity of the establishment of fast, uninterrupted work, a large loading of the MC with information (large volume), regulating the time of operations, the organization of system security from possible unauthorized access. Since the complexity of solved tasks is usually inversely proportional to their quantity, then centralized data processing often led to inefficient use of central computer computing resources, limited user access to its resources, but required significant material costs for creating and operating data processing systems.

Principle centralized processing The data earlier did not hear the high requirements for the reliability of the processing process, made it difficult to develop systems, could not provide the necessary temporary parameters with dialogue data processing in multiplayer mode. And even short-term failure of the central computer could lead to serious negative consequences. Now this technology has received a new development in the created high-end and efficient data centers (hereinafter referred to.).

Decentralized data processingit is related to the appearance of PEVM (small computer, microevm), which allowed to automate specific jobs and caused the occurrence of distributed data processing.

Distributed data processing- This processing of data performed on independent, but related computers, representing a distributed system, i.e. in computer information networks. It is realized in two ways. The first suggests installing a computer in each node of the network (or at each system level), while data processing is carried out by one or more computers depending on the real capabilities of the system and its needs for this moment time.

The second way implies the placement of a large number of different processors within one system. Distributed method is based on a complex of specialized processors - each computer is used to solve certain tasks, or its tasks. It is used where the data processing network is necessary (branches, separation, etc.), for example, in banking and financial information processing systems.

The advantages of this method are to be able to: process at a given time for any volume of data with a high degree of reliability (if one technical means fails to instantly replace it on another); reduce the time and costs of data transfer; increase system flexibility; Simplify the development and operation of software, etc.

Integrated information processing methodprovides the creation of an information model of a managed object - RBD. It provides maximum user friendly. On the one hand, the database provides for collective use and centralized management. On the other hand, the amount of information, the variety of tasks solved require the distribution of the database. The technology of integrated information processing makes it possible to improve the quality, accuracy and processing speed, as the processing is performed on the basis of a single information array once entered into a computer.

The peculiarity of this method is the separation of technologically and the time of processing procedures from procedures for collecting, prepare and entering data.

In information networks, information processing is carried out in a different way: in batch and regulatory modes; modes of a real scale of time, separation of time and teleworking, as well as in a request, dialogue, interactive; single-strware and multi-program (multicasting) modes.

Data Processing B. batch mode this means that each portion of not urgently transmitted information (as a rule, in large volumes) is processed without interference from the outside - the formation of reporting data (summaries, etc.). When using it, the user does not have direct communication with the computer. As a rule, these are inoperative tasks, with a long-term validity period of the results of the decision. At the same time, the collection, registration, input and processing of information do not coincide in time. First, the user collects information and forms it in packages in accordance with the type of tasks or another feature. At the end of the receipt of information, it is input and processing. As a result, the processing is delayed.

This mode is sometimes called the background. It is implemented when the resources of computing systems and processing can be interrupted by more urgent and priority processes and messages, at the end of which it resumes automatically. The mode is used, as a rule, with a centralized method of processing information.

In time separation modein one computer, an alternation in time of decision processes is carried out. different tasks. In this mode, the computer resources (system) for optimal use them are immediately provided by a group of users cyclically, for short time intervals. At the same time, the system allocates its resources to the group of users alternately. Since the computer quickly serves each of the users group, the impression of their work simultaneously. Such an opportunity is achieved by using special software.

Real Time Mode -this is a technology. Providing an object management response corresponding to the dynamics of its production processes. It means the ability of the computational system to interact with controlled or controlled processes at the rate of these processes. The reaction time can be measured by seconds, minutes, clock and must satisfy the process of the controlled process or user requirements and have a minimal delay.

In real-time systems, data processing for one message (query) is completed until another appears. As a rule, this mode is used in decentralized and distributed data processing and is used for objects with dynamic processes. For example, customer service in a bank for any service set must take into account the permissible timeout time of the client, simultaneously maintaining several clients and fit at a given time interval (system reaction time).

Interactive modeit assumes the possibility of bilateral interaction of the user with the system, i.e. the user can affect the data processing process. Interactive work is carried out in real time and is usually used to organize a dialog (dialog mode).

Dialog (Required) Modeit is characterized by the user's possibility in the process of working with the computer directly interact with it. Data processing programs can be in the computer memory constantly (computer is available at any time) or for a certain period of time (only when the computer is available to the user).

The user's dialogue interaction with the computer may be multidimed and determined by such factors as: communication language; active or passive user role; Who is the initiator of the dialogue (user or computer); response time; The structure of the dialogue, etc. If the initiator of the dialog is the user, then it must have knowledge and skills of working with procedures, data formats, etc. If the initiator is a computer, then it itself reports that you need to do the user - method "Menu Selection" method.This method provides support for user actions and prescribes their sequence. At the same time, less preparedness is required from the user.

The dialogue mode requires a certain level of the technical equipment of the user: the presence of a terminal or PEVM connected by telecommunications with a central computer. The ability to work in the dialog could be limited in time by the beginning and end of work, and may be unlimited. Mode is used to access information, computing or software resources.

Sometimes distinguished dialog and requesting modes. Under request regimeit is understood to be a one-time access to the system, after which it gives the answer and turns off (for example, a reference system), and under dialogue- The mode in which the system after the request gives and waiting for further actions of the user.

Telerage modeallows a remote user to interact with the computer (it is sometimes called terminal).

Single-strwareor multi-program modescharacterize the ability of the system to work simultaneously on one or more programs.

Regulationsfocused on time-defined sequence of execution of individual user tasks. For example, a regular (monthly, quarterly, etc.) T obtaining the resulting reports and reports, the calculation of wages charges for certain dates, etc. It allocate regular, special, comparative, emergency and other types of reports. Regular reportsusually created at the request of the administration or in case of unplanned situations. These reports may have the form of summarizing, comparative and emergency reports. IN summarizing reportsthe data is combined into separate groups, sorted, represent in the form of intermediate and final results according to individual fields. Comparative reportsinclude data obtained from different sources or qualified by various features and used for comparison purposes. Emergency reportscontain exceptional (emergency) data.

Data processingit implies processing of information of a certain type (textual, sound, graphic, etc.) and transform it into information of another particular type. So, for example, it is customary to distinguish processing text information, images (graphics, photo, video and animation) and sound information (speech, music, other sound signals). Using newest technologies Provides their comprehensive representation. In this case, human thinking can be considered as the process of processing information.

IT Information Processing is intended to solve well-structured tasks for which there are the necessary input data, algorithms and other standard procedures for their processing are known. This technology is applied to automate routine constantly repeating operations, which makes it possible to increase labor productivity, freeing the performers from routine operations, and sometimes reducing the number of employees. In this case, tasks are solved: data processing; creating periodic reports on the state of affairs; Related to receive answers to various current requests and registration of them in the form of documents and reports. At the same time applying. Such IT, as: collection and registration of data directly in the process of production in the form of a document using a central computer or personal computers; data processing in dialogue mode; aggregation (merge) of data; Use of electronic media (for example, discs).

The technological processing process of information using computers includes the following operations:

1) Reception and acquisition of primary documents (checking the completeness and quality of their fill, completeness, etc.);

2) preparation of electronic media and control of its condition;

3) data entry in computer;

4) control, the results of which are issued to external devices (printer, monitor, etc.).

There are other similar technologies, but pay attention to IT (operations) data controlrarely considered in the special educational literature. In various situations, you have to control the data obtained or distributed and information. For this purpose, IT is widely used. There are visual and software control that allows you to track information on the completeness of input, violation of the structure of the source data, coding errors. Control is not an end in itself. When the error is detected:

· Correction of entered data, adjustment and re-input;

· Recording input information to source arrays;

· Sorting (if there is a need for this);

· Data processing;

· Repeated control and issuance of final information.

Consider in more detail the processing of various types named above (species) of information.

In the modern world, it is very important to obtain accurate information on time. The vital activity of people depends on it. For this reason, every day there are more and more different devicesthat collect and process data. What should be understood under these processes?

Procedure for obtaining data from the outside world

The collection of information can be engaged in a person. And you can use technical means and systems. In such situations, this process will occur hardware. For example, the user managed to obtain data on the routes of trains on their own, with the study of schedule at the station. He can do the same with a phone or computer.

This suggests that the procedure for collecting information is a rather complicated software and hardware complex. What should be understood under such a process? This is the procedure for obtaining any data coming from the outside world. Such information is provided to standard for applied systems. Modern technical devices not only collect data, encode them and output. Information is also processed.

Use of various ways to work with data. Technology work with them

Under processing, you should understand the ordered process for obtaining the required information from the set of certain data using special algorithms. This procedure can be performed in several ways. There are information processing tools such as centralized, decentralized, distributed and integrated.

Using computing centers for data processing

Centralized processing implies that there should be a computing center (HC). With this method, the source data is delivered by the user. After that, he is given the result in the form of a certain documentation.

Distinctive feature this method is laborious. It is enough difficult to establish a quick uninterrupted connection. In addition, there is a big load of the center of information. In addition, the timing of the tasks of the tasks is regulated, and they are not always obtained on time. Such processing of information is also complicated because of the availability of security tools that prevent possible unauthorized access.

What is the meaning of a decentralized method?

At the time of the appearance of the PEVM, a decentralized way arose. It provides the ability to automate a certain workplace. To date, there are 3 varieties of technology such processing. The first is based on personal computers, not combined into the local network. Similar information processing technology implies data storage in separate files. In order to get indicators, it is necessary to rewrite files to a computer. To the negative points include the fact that there is no intercourse of tasks. It is impossible to handle large amounts of information. In addition, this processing of information is characterized by low burglary protected.

The second technology is based on computers that are combined into a local network, which leads to the formation of single data files. However, with a large flow of information, it will not work in such a situation. The third technology is based on computers united in the local network, which also includes servers.

Work with a large amount of data

Distributed information processing is based on the fact that functions are divided between different computers that are connected to the same network. This method can be implemented at the expense of two ways:

  1. It is necessary to install a computer in each individual network node. In such a situation, processing will occur with one or more computers. It all depends on the real capabilities of the system, as well as from needs.
  2. It is necessary to place most of the varied processes within one system. Such a path is used in the processing of banking information in the presence of branches or departments.

Distributed information processing allows data to operate in any amount on specified time. There is a fairly high level of reliability. Significantly reduces the time and costs of transmitting information. The flexibility of systems increases and development is simplified using software. The distributed method is based on specialized processes. In other words, each computer is designed to solve its task.

Using databases for storing and processing information

Integrated method implies the formation of an information model of a managed object. In other words, a distributed database is created. A similar method allows you to make information processing the most convenient for the user. A database simultaneously apply may not be one person. But a large amount of information requires distribution. Due to this method You can noticeably improve the quality, accuracy and speed of processing. This is due to the fact that the technique is based on a single information array, which is first introduced into the computer.

The above describes information processing methods. But with what technical means This process takes place? You should also dwell on this issue.

What do the technical means mean?

Under technical means it is necessary to understand the range of autonomous types of equipment, allowing to collect, accumulate, transmit, process and output data, as well as a set of office equipment, management tools, repair and preventive devices, etc. To all of the above systems, the following requirements are imposed:

  1. Technical means based on miscellaneous methods Information processing should ensure the solution to the minimum possible loss. It is necessary to achieve maximum accuracy and reliability.
  2. Technical compatibility, devices aggregate required.
  3. High reliability must be ensured.
  4. Purchase costs should be minimal.

The domestic and foreign industry produces a huge set of technical means to help handle information. They may differ from each other in element base, design, use of various data carriers, as well as operational parameters, etc.

Technical means can be:

  1. Auxiliary.
  2. Main.

What should be understood under auxiliary types of devices?

In the first case, this equipment that ensures the performance of basic means. Also, the auxiliary includes devices contributing to the simplification of managerial labor. They make it more comfortable. It can be office equipment and repair and preventive measures. Organizational devices include a large number of Nomenclature, starting from stationery and ending with delivery devices, reproduction, delete, search and storing data. We are talking about all types of equipment, at the expense of which the managerial activity becomes easier, more convenient and more comfortable.

What is included in the complex of basic types of devices?

Information processing technology can be based on fixed assets. Under them should be understood by the devices aimed at automating data with the data. In order to be able to establish control over certain processes, it is required to have some managerial data. Due to them, it will be possible to characterize the state, parameters of technological processes, quantitative and cost indicators.

The main information processing systems may include:

  1. Devices registering and collecting data.
  2. The equipment that accepts and transmits data.
  3. Tools prepare data.
  4. Data input, processing and display devices.

Conclusion

This article covered such a topic as collecting and processing information. It was decided to focus on how to work with the data. This is a fairly relevant and complex task that requires high reliability, accuracy and reliability. We hope that this review helped figure out what is the process of processing information.

The file is called a set of logically related data, which is in the form, convenient for storing and processing by computing system. The file is a set of logical records.

When it comes to records that are part of the file, the word "logical" is often lowered. Each file entry contains data that has a specific purpose. In files used to account for stocks, each entry may represent a set of data related to one product name. In an organized administration educational institution Student performance file The entry may contain a student name, its account number, course number and examination. The records of bank accounting files may contain, for example, data such as the client number, its name, current account and information about the operations they have done over the last month. Tax management files may consist of sums charged with certain taxpayers in the current year. Currently, many programming tasks are related to the organization and management of files.

A significant part of the operating system is designed to facilitate the user management and data processing tasks. However, the operating system has to deal with a large number of other information. This includes the texts of the source programs on the machine language, the routine libraries, the input data of the tasks performed and their output. Data for processing operating system Can be presented in the form of data sets. The data set is the largest set of information with which the system operates, and is a set of data presented in memory in some special way, along with additional control information that provides access to an arbitrary element of this set. Each operating system works with sets that have one of several permissible structures.

Users usually use the capabilities of the operating system to manage their own files. The type of structure used determines how to organize the data set itself. We briefly characterize ways to organize data sets, however, we will first try to look more carefully to consider the relationships that exist between individual logical file entries and I / O operations.

Block and recording

As already mentioned, files consist of one or more logical records. As a recording, a string or contents of one punching can be displayed as a record. If we are talking about the program in the assembler language, then the entry is the proposal of the original language, which has a length of 80 bytes. A file entry containing information about some student can take 500 bytes. Generally speaking, the length of entries, as well as the content, is determined by the destination of the file.

The physical entry, or block, is the information transmitted by the input device or output for one operation. For the reader of the reader from the punch or output perforator, the block consists of 80 bytes, since it is 80 bytes are encoded by one perfocamp. A block for printing device is usually a 132-byte string. In this kind of devices, i.e. devices where the size of the block is strictly defined by the hardware itself, the number of logical entries in the block cannot change and one block always accounts for exactly one entry. Such devices are called devices for single records. On other devices, for example, such as magnetic disk and magnetic tape are, the size of the block is strictly not defined. In these cases, they are selected by the programmers themselves. Physical recordings do not necessarily coincide in size with logical. The format of records in the data set is set by the ratio between the sizes of the corresponding entries and blocks.

Fig. 17.1. Record formats.

In cases where physical and logical records in size coincide, it is said that the records are not closed. About the selected data format is spoken if one physical record accounts for more than one logical. There may also be a case when the sizes of individual records exceed the size of the blocks. Records in such a set are called overgoing.

The block size in the data set is not necessarily a permanent value. In this case, they are talking about the blocks of variable length, and the values \u200b\u200bcharacterizing the size of the blocks are recorded inside the blocks themselves. If all blocks in the size set are the same, they are talking about a set of data with fixed length blocks.

In practice, there are a wide variety of combinations of block sizes and individual records. Some possible cases are shown in Fig. 17.1. Data set shown in Fig. 17.1, and may correspond, such as the performance file. The length of each block is 80 bytes, each of them is exactly one logical record. Set shown in Fig. 17.1.6, composed of 100-byte records. The blocks of this set have a length of 300 bytes. This means that in the process of entering or outputting this set, within the framework of a single operation, an information that makes up 300 bytes will be introduced accordingly. When processing a user program or operating system software, the blocks will be divided into separate records. In fig. 17.1, a set of data with passing records of constant length is depicted. Entering or output of an arbitrary record involves the execution of two I / O operations. Data set Fig. 17.1, g is composed of variable length records. Moreover, the variables in this case are the length of the individual block, and the number of entries in it. The task of splitting each block on the recordings is again pinged on the processing program.

Methods for organizing data sets

Having become acquainted with the various possibilities of splitting data sets into composite parts - blocks and recordings, we now turn to the consideration of issues related to the overall structure of the set. Under the organization of the set refers to the mutual location of the components of its blocks and relationships that bind each of the blocks and the set of data as a whole. The choice of some specific method of organizing a set depends on several factors. This includes the type of device on which the set is stored, and the order of reading individual records and, finally, the goal that is pursued when creating a set.

Sequential organization. Some peripheral devices, such as magnetic ribbon drives or device with single records, uniquely define the method of organizing the corresponding dataset. Entries in this case are processed precisely in the order in which they are stored. The reader with perfocrais introduces the original array of the card for the card for the one in the sequence in which it is prepared for input. The printing device prints the string per line in the order in which they come to it. On the magnetic tape, the incoming information is recorded in the form of blocks also in order of receipt. The subsequent entry from the tape will pass in the order of placement of blocks on it.

Fig. 17.2. File with a consistent organization.

On the other hand, direct access devices, such as, for example, storage devices on magnetic disks, make it possible to record and read blocks located in an arbitrary location. To do this, you only need to specify the address of the record. In other words, the processing of recording records can be held in an arbitrary order, provided, of course, that we know the addresses of their placement or addresses by which they must be placed. However, in most applications, the physical order of entries in the set coincides with the order in which it is desirable to produce their processing. It is extremely rarely considered by the individual records that make up the proposals of the source program, it is required not to be carried out in the order in which they are written. The same can be said in relation to the object and boot modules written in the machine.

Files in which the processing of individual records passes in the order of their physical placement, are called sequential. When creating a serial file or adding new records to it, the procedure for recording information coincides with the order of its arrival on the peripheral device. Read records of the serial file occurs in the order of their location in it. Processing information in order to place it on the device or in memory is called sequential processing.

Serial files are stored in data sets with a serial organization. In fig. 17.2 shows an example of a sequentially organized dataset. Behind the last dialing unit follows a special block called a belt brand and being a sign of the end of the data set. When adding to a sequential set of the next block, the tape mark is overlapped by this block and new Mark. Recorded immediately behind it. When entering a set of data, the reading records occurs in the order in which they are recorded in the set, the input occurs until the ribbon brand is met.

Library organization. We have already mentioned the existence of some system libraries having great importance For users. This includes a systemic macrobillek, a library of catalized procedures, system program libraries and test examples. Each section of the library is a serial data set. For example, the library of catalized procedures of the OS system contains sections such as ASMFCLG, FORTGCLG and COBUCG.

The library content request occurs using partition names. For example, when processing the initial macro, the assembler requests a section with the name of the initial in the system macrobiliot. A data set consisting of one or more partitions and is organized in such a way that access to separate sections is carried out by their names, is called library, set.

Fig. 17.3. The structure of the library dataset containing special macro used in this book.

Library data sets are stored on direct access devices. This allows you to request separate sections, indicating only the addresses of their start. To facilitate the search for the library section, a special table is created, called the table of contents in which the name of each dataset partition corresponds to the address of its start. In fig. 17.3 An example of a library set structure is given. If some section of the library is requested, the system looks at the table of contents in search of the relevant name. Then the address associated with this name is determined and it is already directly used to locate the sequential data set, which represents the desired partition.

The operating system provides the user special programs To create and maintain your own library sets. OS also uses library data sets to maintain their own libraries. Working with libraries in the DOS system is not much different from the provided in OS, however, DOS does not contain special tools that allow users to create their own library sets and perform work on their maintenance.

Index and consistent organization. In some applications, it is very convenient to use "as a sequential processing of a set, choosing individual entries in the order in which they are stored in some device and arbitrary processing out of connection with the location of individual records, reading by adding and changing the records. Recall our processing program account information. We had to store in memory recording, corresponding to each available product name, on one entry for each name. Each name was associated with the corresponding number used as a key. Records in the file at the same time were arranged in ascending order of numeric The keys value. At the end of each week, a file status report was issued at the moment. The report was recorded in a sequential order. Since the entries in the file were ordered by increasing the keys, the order of entries in the report, of course, was the same thing that facilitated the search in it is a string corresponding to certain naipes Ayia.

During the week, the situation, however, could change: the company could produce or purchase completely new products, the old goods could be gradually sold. All this requires making changes in the records of the account. In order to make a change in some record, it first needs to be found. To find recording, you can organize the view from the entire file from the very beginning until the desired entry is detected. However, if the file already contains several thousand records, such a view whenever it is required to make a change in some record, it may be too wasteful in terms of machine time.

Fig. 17.4. File structure with an index-consistent organization.

In fact, this method of organizing a data set is needed, in which access to individual entries in it can be carried out both in series and using keys.

In this way of organizing data is an index-consistent organization. When creating an index-serial data set, the file entry first is ordered by keys. In our example related to the processing of credentials, the appropriate account number will be used as the record key. Then serial output of entries. They are placed by a system on a direct access device. At the same time, one or more indexes are built. If it is convenient, the processing of the set created in this way can be carried out sequentially in order of receipt of entries to the appropriate device. On the other hand, each specific record can be requested by key, and the indices built by the system to speed up the search for the required recording are used.

In fig. 17.4 An example of a single-purpose organization of a dataset is given. The source file is divided into subfiles, each of which corresponds to a specific string in the index table. This line contains information about the key to the last and address of the first record of the subfile. If you receive a recording with some specified key value, the system first views the index table in search of the first string containing more or equal to this value. The required entry belongs to the subfile corresponding to this line, so further search is made only among the elements of this subfile.

The system has the ability to add new entries to the appropriate file location and delete old records. Thus, the index-consistent organization significantly expands the capabilities of processing files. Entries can be processed both in series and randomly. All this implies, however, the ordering of entries in the source file.

Direct organization. If direct addresses for which individual file entries are placed are set by the user itself, they are talking about a direct organization of data set. Typically, the keys are used to define either the exact address of the record, or the area, within which the record may be located. Direct organization makes it possible quick access Separate file entries, but at the same time all responsibility for creating and maintaining a data set is assigned to the user. A direct organization is used in cases where it is necessary to work with files that have the structure different from the operating system created.

Access methods

In section. 17.4 Peripheral devices and methods of direct programming of these devices will be described. However, in fact, it is extremely rare to program at such a low level. Instead, for organizing various types of exchanges between memory and peripheral devices, as well as to create and maintain data sets of various organizations, special system programs are used, which are called access methods. The I / O command using access methods is an appeal to a certain system of system programs called the I / O Supervisor. The I / O operations themselves are already directly directly by the I / O Supervisor using the associated subroutines. In fact, this means that when using access methods, the need disappears the need to take care of the specific details related to the implementation of I / O operations, the access methods themselves are taken care.

Each operating system provides several access methods. The choice of a particular method depends on the operating system itself, from the organization of the processed data set and, finally, from the desired buffering method.

Fig. 17.5. (a) Simple buffering delays the execution of the program before filling the buffer, (b) the use of multiple buffers provides combining program and transfer program.

Buffers. The buffers are called the memory areas intended for the placement of information entered from the peripheral device or information prepared for the output to the peripheral device. At the most common case, together with the request for entering the address of the buffer is set. I / O supervisor performs directly input block from some device to the buffer. If we want to make a conclusion, we need to take care of the corresponding buffer content. When the data is prepared, a request is sent to execute an output equipped with a buffer address; The output itself is carried out directly by the system.

In fig. 17.6, and the sequence of events occurring at a periodic input request to a single buffer is depicted. Enter is requested by the user program. Since, most likely, the user's work program cannot be continued until the end of the exchange, the supervisor temporarily suspends its execution until the end of the exchange.

Performing I / O operations even by thedium fast devices It takes relatively slow, during this time the processor can usually perform thousands of operations. Thus, the use of just one buffer significantly slows down the execution of the program. However, it is not necessary to think that while the input-output is passed, the processor is not able to perform any other operations. As we will see in the section. 17.4, computer systems 360 and 370 admit the processor simultaneous operation and peripheral devices. In such cases, they talk about combining I / O operations with the execution of regular program commands.

The possibility of such combination can be successfully used, producing exchanges, for example, with two buffers. An example of such use is depicted in Fig. 17.5.6. With consistent processing, the supervisor organizes input information in the order in which it is in the file. Thus, the system actually may, "anticipating" the following requests, fill the buffer even before receiving an order for input. In fact, if the data processing is performed by the user's program is no faster than the system can fill and release buffers, the use of several buffers can be reduced to a minimum of losses arising from the need to perform an I / O operations. The use of multiple buffers also allows you to increase the total information output rate.

However, only with sequential data processing, the use of multiple buffers can give a time gain. If data processing is performed in an arbitrary, random sequence, the fact that we called the "anticipation" of the system, loses meaning.

Each operating system provides for several access methods. The degree of the necessary participation of the programmer in solving many issues related to the use of buffers, to a large extent depends on the use of the access method. Some access methods allow users to do not take care at all, performing all the necessary work automatically. In other cases, the buffer management can be completely naked for the user. There are methods that provide the user choosing as to use the services of the system to manage buffers or not.

DOS System Access Methods. All methods of access of the disk operating system involve semi-automatic buffering control. To ensure the work of the system, you must reserve one or two buffer areas within its program. If the work is made with two buffer areas, then the execution of all I / O operations when working with serial files is performed by the system before receiving real requests. The user can order data blocking when displaying and unlocking when entering. The DOS system features the following ways to organize data sets: serial, index-serial and direct. The main access methods of the DOS system are:

Serial Access Method (SAM)

Index and sequential access method (ISAM)

Direct Access Method (DAM)

Table 17.1 Some OS System Access Methods

Name

Mnemonics

Queued Sequential Access Method

Sequential data organization, access method with queues

Basic Sequential Access Method

Sequential data organization, basic access method

Queued Indexed Sequential Access Method

Creating and sequential processing of index-serial files

Basic Indexed Sequential Access Method

Arbitrary processing of index-serial files

BasicPartitioned Access Method

Creating and processing library data sets

Basicdirect Access Method.

File processing with direct organization

TelecommunicationsSaccess Method.

Interaction with remote terminals

Access methods of the OS system. The access methods of the OS operating system are disintegrated into two classes: basic access methods and access methods with queues. Access methods with queues provide fully automatic buffering control. The system itself takes care of the maintenance of buffer regions. The system also blocks and unlock records. Access methods with queues are used when processing consecutive and index-serial files. These methods allow you to achieve maximum processing efficiency at a minimum of the requirements for the user program.

Compared to methods with queues, the basic access methods are much more primitive. Nevertheless, they allow you to achieve greater flexibility to work with data. Part of the responsibilities for managing buffering is now pinned with the user, in addition, the user is assigned to the records. The basic access methods are used mainly when they have to deal with inconsistent processing of data sets. The list of the most common access methods of the OS system is given in Table. 17.1.

In its consideration, we only touched on issues related to data structures and provided by the operating system the possibilities of performing I / O operations. However, this material is enough in order to proceed to discuss the use of access methods when programming an I / O programming. In the future, we will only be interested in serial access methods with queues OS and DOS systems. Despite the fact that the principle of using a sequential method of access with queues is common to the two systems we study, specific details are still quite volatile. It is advisable to consider only the material associated with programming I / O programming in your particular system. After that, however, you can view and another section with the goal of dating at similar moments in working with two systems.

Introduction

To write a graduation work, I chose the topic "Information processing technology". I consider this topic of the most relevant, since the information is a conscious information about the environment, which are the object of storage, transformation, transmission and use. Any human activity is a process of collecting and processing information, making decisions on it and their implementation. With the advent of modern funds of computational technology, the information began to act as one of the most important resources of scientific and technological progress.

Information is knowledge expressed in signals, messages, news, notifications, etc. Each person in the world surrounds the sea of \u200b\u200binformation of various species.

The purpose of my graduation work is to study the principles of information processing on its form of submission, methods for its coding and storage. To do this, it is necessary to explore the concept of information that is the fundamental concept of informatics.

For a more detailed study of this topic, work must be divided into several stages. First, familiarize yourself with the concept of "information processing", namely to study: goals, objectives and types of information processing; information processing methods; information processing scheme; Modern information processing systems; Problems associated with computer information processing methods; the differences of computer data processing from non-automatic; Technological process processing information. Secondly, to investigate the classification of technical data processing. These include: data processing modes; Data processing methods; a complex of technical information processing; Classification of technical information processing.

1. Information processing

Maintenance types of information According to her presentation, methods for its coding and storage, which has the greatest value for informatics, this is:

§ graphic or pictorial - The first form for which a method for storing information about the world around the world in the form of rock paintings, and later in the form of paintings, photos, diagrams, drawings on paper, canvas, marble, etc. The materials depicting the paintings of the real world;

§ sound - the world around us is full of sounds and the task of their storage and replication was solved with the invention of sound recording devices in 1877. Its variety is musical information - for this species, a method of coding using special characters was invented, which makes it possible to store it similarly graphic information;

§ text - way of coding a human speech special symbols - letters, with different nations have different languages \u200b\u200band use various sets of letters to display speech; This method has become especially important, after the invention of paper and typography;

§ number - quantitative measure of objects and their properties in the environment; Especially important acquired with the development of trade, economics and money exchange; Similarly, the text information for its display uses the coding method with special characters - numbers, and the coding system (surcharge) can be different;

§ video information - The method of preserving the "living" paintings of the surrounding world, which appeared with the invention of cinema.

There are also types of information for which the methods of encoding and storage are still not invented are not invented, these are tactile information transmitted by sensations, organoleptic, transmitted by smells and tastes, etc.

Claude Shannon is considered the creator of the general information theory and the founder of the digital communication (Claude Shannon). Worldwide Fame He brought the fundamental work of 1948 - "Mathematical theory of Communication" (A Mathematical Theory of Communication), in which the possibility of application is justified for the first time. binary code For information transfer.

The unity of the laws of processing information in the systems of practical application (physical, economic, biological, etc.) is the fundamental basis of the theory of info-making PPCs, which is developing its entirety and specificity. The object of studying this theoo is information - the concept is largely arabic, a desolation "in itself" out of connection with the conquering area of \u200b\u200bknowledge in which it is used.

Info-motive drugs in the owned society are not smaller than, and inappropriate and greater than the paths of matte. Knowledge, to whom, when and where to use the commodity, can be valued at least than the actual commodity. In this regard, a large role is assigned to information processing methods. More and more advanced computers, new, convenient programs, modern storage, transmission, and information protection methods appear.

From standpoints, info-motion has long already become a commodity and this circumstance tries intensive intensive pages of PPAKAKA, the industrial and the theoes of the Company's computer. Computers as an infomentational manner not only allowed to comply with high-quality races in the internationalization of the integrity, science and mine, but it turned out to be new self-concrete areas of manner: computing equipment, telecommunications, and podpammnoye.

The trends of computerization of society are associated with the emergence of new PPOFESSIONS associated with computing equipment, and various categories of computer users. If in the 60-70 and the years in this area, specialists in computing equipment (electronic engineering and programmers and programmers) were dominated, creating new methods of computing equipment and new application packages, then today the categories of computer users are intensively used - the most practical areas of knowledge that are not experts On computers in a narrow sense, but able to use them to suspect their specific tasks.

Figure 1.1 Information processing cycle

The user of the computer should know the general application of the formation of info-making PPCs in a computer will be able to select the informational system necessary for it and technical privacy and will quickly master them simply to their forefront.

1.1 Goals, tasks and types of information processing

Information processes (The collection, processing and transfer of information) has always played an important role in science, technology and society. During the evolution of mankind, a steady tendency to automate these processes is currently visible, although their internal content is essentially unchanged.

Collection of information- This is the activities of the subject, during which he receives information about the object you are interested in.

The collection of information can be made by either a person or with the help of technical means and systems - hardware. For example, the user can get information about the movement of trains or aircraft himself, having studied the schedule, or from another person directly, or through some documents drawn up by this person, or with the help of technical means (automatic reference, phone, etc.) . The task of collecting information cannot be solved in the separation from other tasks, in particular, the tasks of exchange of information (transmission).

Information exchange - This is a process, during which the source of information transmits it, and the recipient accepts.

If errors are detected in the transmitted messages, it is organized by re-transmitting this information. As a result of the exchange of information between the source and the recipient, a kind of "information balance" is established, in which, in the ideal case, the recipient will have the same information as the source.

The exchange of information is made using the signals that are its material carrier. Sources of information can be any real world objects with certain properties and abilities. If the object refers to an inanimate nature, it produces signals directly reflecting its properties. If the source object is a person, then the signals produced by them can not only directly reflect its properties, but also correspond to those signs that a person produces in order to exchange information.

Adopted information Recipient can use repeatedly. For this purpose, he must fix it on the material carrier (magnetic, photo, cinema, etc.).

Accumulation of information - This is the process of forming an initial, uniseumatized information array.

Among the recorded signals may be such that reflect valuable or frequently used information. Part of the information at the moment of the time of particular value may not be submitted, although it may be necessary in the future.

Data storage- This is the process of maintaining source information in the form that provides data issuing on requests for end users on time.

Data processing - This is an ordered process of its conversion in accordance with the problem solving algorithm.

After solving the processing task, the result must be issued to end users in the desired form. This operation is implemented during the solution of the problem of issuing information. The issuance of information is usually made using EUM external devices in the form of texts, tables, graphs, etc.

Properties of information.

Like any object, information has properties. Characteristic a distinctive feature Information from other objects of nature and society is dualism: the properties of information affect both the properties of the source data constituting its meaningful part and the properties of methods that fix this information.

From the point of view of computer science, the following general qualitative properties are most important: objectivity, accuracy, completeness, accuracy, relevance, utility, value, timeliness, clearer, accessibility, brevity, etc.

Objectivity of information . Objective - existing out and regardless of human consciousness. Information is a reflection of an external objective world. Information is objective if it does not depend on the methods of its fixation, someone's opinion, judgment.

Example. The message "The Street Heat" carries subjective information, and the message "On the street 22 ° C" is an objective, but with accuracy depending on the error of the measurement means.

Objective information can be obtained using good sensors, measuring instruments. Reflecting in the consciousness of a person, the information may be distorted (more or less) depending on the opinion, judgment, experience, knowledge of a specific subject, and, thus, stop being objective.

Reliability information . Information is reliable if it reflects the true state of affairs. Objective information is always reliable, but reliable information can be both objective and subjective. Significant information helps to take us the right decision. Unreliable information may be for the following reasons:

§ deliberate distortion (disinformation) or unintentional distortion of subjective properties;

§ Distortion as a result of the impact of interference ("spoiled phone") and not enough accurate funds for its fixation.

Fullness of information . Information can be called complete if it is enough to understand and make decisions. Incomplete information can lead to an erroneous conclusion or solution.

Accuracy of information It is determined by the degree of its proximity to the real state of the object, the process, phenomena, etc.

The relevance of information - Importance for the present, topicality, urgency. Only on time the information obtained may be useful.

Usefulness (value) of information . Usefulness can be appreciated in relation to the needs of specific consumers and is assessed by the tasks that can be solved with its help.

The most valuable information is an objective, reliable, complete, and up-to-date. It should be borne in mind that the biased, inaccurate information (for example, fiction), has greater importance to humans. Social (public) information has also additional properties:

§ has semantic (semantic) character, i.e. Conceptable, since it is in the concepts that the most significant signs of objects, processes and phenomena of the surrounding world are generalized.

§ has a linguistic nature (except for some types of aesthetic information, such as fine art). The same content can be expressed on different natural (conversational) languages, recorded in the form of mathematical formulas, etc.

Over time, the amount of information is growing, the information is accumulated, its systematization, assessment and generalization occurs. This property was named growth and cumulating information. (Cumulation - from Lat. Cumulatio - an increase, accumulation).

The aging of information is to reduce its value over time. Starting information is not the time itself, but the emergence of new information, which clarifies, complements or rejects completely or partially earlier. Scientific and technical information makes faster, aesthetic (works of art) - slower.

Logicality, compactness, a convenient form of representation facilitates understanding and assimilation of information.

The concept of information processing is quite wide. We are talking about processing information, the concept of processing invariant should be given. Usually it is the meaning of the message (meaning of information concluded in the message). With automated processing of information, the processing object is the message, and here it is important to process in such a way that the invariants of the message conversion corresponded to invariants of information conversion.

The purpose of the processing of information as a whole is determined by the purpose of the functioning of some system with which the information process under consideration is associated. However, to achieve a goal always have to solve a number of interrelated tasks.

For example, the initial stage of the information process is a reception. In various information systems, the reception is expressed in such specific processes as selecting information (in systems of scientific and technical information), transformation of physical quantities into a measuring signal (in information and measuring systems), irritable. and sensations (in biological systems), etc.

The reception process begins on the border separating the information system from the outside world. Here, on the border, the signal of the outside world is converted into a form, convenient for further processing. For biological systems and many technical systems, such as reading machines, this boundary is more or less pronounced. In other cases, it is largely conditional and even vague. As for the internal border of the reception process, it is almost always conditional and selected in each case on the basis of the convenience of researching the information process.

It should be noted that, regardless of how "deeply" the inner boundary will be moved down, the reception can always be considered as a classification process.

Formalized information processing model

Let us now turn to the question of what the similarities and the difference in information processing processes associated with different components of the information process using the formalized processing model. First of all, we note that it is impossible to tear this question from the consumer of information (addressee), from the semantic and pragmatic aspects of information. The presence of a destination for which the message (signal) is intended, determines the lack of one-to-one match between the message and the information contained in it. It is clear that the same message may have a different meaning for different addresses and various pragmatic importance.

· General scheme of information processing process.

· Setting the processing problem.

· Processing performer.

· Processing algorithm.

· Typical information processing tasks.

1.2 Information processing methods

There are many methods of information processing, but in most cases they are reduced to processing textual, numeric and graphic data.

Text information processing

Text information may occur from various sources and have a different degree of complexity in the form of representation. Depending on the form of submission to handle text messages, various information technologies use a variety of information technology. Most often as a textual processing tool electronic information Apply text editors or processors. They represent a software product providing users with special means designed to create, process and store text information. Text editors and processors are used to compile, edit and process various types of information. The difference of text editors from processors is that editors are usually designed to work only with a certain type of information (texts, formula, etc.), and processors allow us to use other types of information.

The editors intended to prepare texts can be divided into ordinary (preparation of letters and other simple documents) and complex (paperwork with different fonts, including graphics, drawings, etc.). The editors used for automated work with the text can be divided into several types: the simplest, integrated, hypertext editors, text recognition, editors scientific texts, Publishing systems.

In the simplest format editors (for example, "Notepad"), additional codes are not used for internal text presentation, the texts are usually formed based on the ASCII code table signs. Text processors represent a text preparation system (Word Processor). MS Word program uses the greatest popularity among them.

Text information processing technology using such programs usually includes the following steps:

) Creating a text information file;

) Saving text presented in electronic form;

) Opening a file that stores text information;

) editing e-text information;

) formatting text stored in electronic form;

) Creating text files based on embedded in text

decoration style editor;

) Automatic formation of table of contents to text and alphabetical directory;

) automatic check spelling and grammar;

) embedding in the text of various elements and objects;

) Combining documents;

) Printing text.

The main editing operations include: add; removal; moving; Copying text fragment, as well as search and contextual replacement. If the text created represents a multi-page document, you can apply formatting pages or partitions. In this case, the text will appear such structural elements as: bookmarks, footnotes, cross references and footers.

Most text processors Supports the concept of a composite document - container, including various objects. It allows you to insert drawings, tables, graphic images prepared in other documents software environments. Used at the same time communication technology and implementing objects called Ole. (Object Linking and Embedding - Communication and Implementation of Objects).

To automate frequently repeated actions in text processors, macros are used. The easiest macro is the recorded sequence of keystrokes, movements and clicks. It can be played as a tape record. It can be processed and modified by adding standard macros.

Transferring texts from one text editor to another is carried out by the program. converter. It creates an output file in the appropriate format. Usually programs text processing Have built-in modules for converting popular file formats.

The type of text processors are desktop publishing systems. They can prepare materials according to the rules of printing. Desktop Publishing Systems (for example, Publishing, PageMaker) are a tool of the vestist, designer, technical editor. With their help, you can easily change the formats and numbering of pages, the size of the indents, combine various fonts, etc. To a greater extent, they are intended for the publication of printing products.

Treatment of tabular data

Users in the process of work often have to deal with tabular data in the process of creating and conducting accounting books, bank accounts, estimates, statements, in the preparation of plans and distribution of resources of the organization, in the implementation of scientific research. The desire to automate this type of work led to the emergence of specialized software processing software provided in tabular form. Such software is called table processorsor spreadsheets.Such programs allow not only to create tables, but also automate the processing of tabular data.

The spreadsheets turned out to be effective and when solving such tasks as: sorting and processing statistical data, optimization, prediction, etc. With their help, the tasks of calculations are solved, supporting decision-making, modeling and presenting results in almost all spheres of activity. When working with tabular data, the user performs a number of typical procedures, for example, such as:

) Creating and editing tables;

) Creating a tabular file;

) Enter and edit data into table cells;

) embedding in a table of various elements and objects;

) Use sheets, formatting and communication tables;

) Treatment of tabular data using formulas and

pecial functions;

) Building diagrams and graphs;

) processing of data presented as a list;

) data analytical processing;

) Print tables and diagrams to them.

The structure of the table includes a numbering and thematic headlines, head (header), sidework (first graph graph containing string headers) and a prograin (actually table data).

MS Excel program is most popular among table processors. It presents users a set of working sheets (pages), each of which you can create one or more tables.

The working sheet contains a set of cells forming a rectangular array. Their coordinates are determined by reference to specify the position by vertical (in columns) and horizontally (in lines). The sheet may contain up to 256 columns and up to 65536 lines. The columns are denoted by the letters of the Latin alphabet: A, B, C ... Z, AA, AB, AC ... AZ, BA, BB ..., and rows are numbers. For example, "D14" denotes a cell on the intersection of the "D" column with a 14 string, and the "CD99" is a cell located at the intersection of the CD column with a 99 string. Column names are always displayed in top string Working sheet, and row numbers - on his left border.

For the objects of the spreadsheet, the following operations are defined: editing, merge into one group, removal, cleaning, insertion, copying. The displacement operation of the fragment is reduced to the sequential execution of removal and insert operations.

For convenience, mathematical, statistical, financial, logical and other functions are built into tabular processors. From the numerical values \u200b\u200bmade to the tables, various two-dimensional, three-dimensional and mixed diagrams can be built (more than 20 types and subtypes).

Tableware processors can perform database functions. In this case, the data in the tables are entered in the same way as in the database, that is, through the screen form. These data can be protected, sorted by key or several keys. In addition, the database requests and processing of external databases are processed, creating consolidated tables, etc. You can also use the built-in Macro programming language.

An important property of the table is the possibility of using formulas and functions in them. The formula may contain references to table cells located, including on another work sheet or in a table located in another file. Excel offers more than 200 programmed formulas called functions. For the convenience of orientation in them, the functions are divided into categories. With the help of the "Master of Functions" you can form them at any stage of work.

EXCEL table editor, text editor Word and others, programs included in the application package (PPP) Office supports the exchange standard oLE.And the use of "lists" allows you to effectively work with large homogeneous data sets. A similar OLE mechanism is used in other PPPs.

Excel can effectively handle various economic and statistical data.

Processing graphic information

Graphic information the computer monitors screen is formed from points.

In graphical mode, the monitor screen represents a set of luminous points - pixels ("Pixel", from English. "Picture Element"). The total number of points on the screen is called resolution monitorwhich also depends on its type and mode of operation. Unit of measurement in this case is the number of points per inch (DPI). The resolution of modern displays is usually equal to 1280 points horizontally and 1024 points vertically, i.e. 1310720 Points.

The number of reflected colors depends on the capabilities of the video adapter and the display. It can change programmatically. Each color represents one of the status points on the screen. Color images have modes: 16, 256, 65536 (High Color) and 16,777,126 colors (True Color).

Any computer image consists of a set of graphic primitives that reflect some graphic element. Primients may also be alphanumeric and any other characters.

1.3 information processing scheme

Source information - the performer of processing - final information.

In the process of processing information, some information task is solved, which can be previously supplied in the traditional form: a certain set of source data is given, some results are required. The process of transition from the source data to the result is the processing process. The object or the processing entity is called the processing performer.

To successfully perform information processing, the Contractor (person or device) must be known for the processing algorithm, i.e. The sequence of actions that need to be performed to achieve the desired result.

Distinguish two types of information processing. The first type of processing: processing related to obtaining new information, new knowledge content (solution of mathematical problems, analysis of the situation, etc.). The second processing type: Processing associated with a change of form We, but not changing content (for example, translation of text from one language to another).

An important type of information processing is coding - Converting information to a character form, convenient for its storage, transmission, processing. Coding is actively used in technical means of working with information (telegraph, radio, computers). Another type of information processing - structuring data (making a number of information specified in the information storage, classification, data cataloging).

Another type of information processing - search In some information storage of the necessary data that meets certain search conditions (query). The search algorithm depends on the method of organizing information.

Figure 1.3.1 Information Processing Scheme

1.4 Modern information processing systems

When designing technological processes, focus on regimes of their implementation. The implementation mode of the technology depends on the volume and temporary features of the tasks being solved: periodicity and urgency, requirements for speed processing, as well as from the mode of technical means, and primarily computer.

Exist: batch mode; Real time mode; time separation mode; regulatory mode; Request; dialog; teleworking; interactive; single-strware; multi-program (multicasting).

For users of the financial and credit system, the following are most relevant modes: Batch, dialog and real-time mode.

Batch mode. When using this mode, the user does not have direct communication with the computer. Collection and registration of information, input and processing do not coincide in time. First, the user collects information by forming it in packets in accordance with the type of tasks or some other sign. (As a rule, these are inoperative tasks, with a long-term validity period of the solution results). After the receipt of information is completed, it is input and processing, so on, the processing delay occurs. This mode is used, as a rule, with a centralized method of processing information.

Dialog mode (Required) modewhere there is the ability to directly interact with the computing system during the user's work. Data processing programs are in the memory of the computer constantly, if the computer is available at any time, or within a certain period of time when the computer is available to the user. The user interaction with the computing system in the form of a dialog may be multidimensional and determined by various factors: communication language, active or passive role of the user; Who is the initiator of the dialogue - a user or computer; response time; structure of dialogue, etc. If the initiator of the dialog is the user, then it must have knowledge of working with procedures, data formats, etc. If the initiator is a computer, then the machine itself reports at every step, what to do with a variety of choice features. This method of work is called the "menu selection". It provides support for user actions and prescribes their sequence. At the same time, less preparedness is required from the user.

The dialogue mode requires a certain level of the technical equipment of the user, i.e. The presence of a terminal or PEVM associated with the central computing system of communication channels. This mode is used to access information, computing or software resources. The ability to work in the dialog could be limited in the start time and end of work, and maybe unlimited.

Real time modeindicates the ability of the computational system to interact with controlled or controlled processes at the rate of these processes. The response time of the computer must satisfy the process of the controlled process or user requirements and have a minimum delay. As a rule, this mode is used in decentralized and distributed data processing. Example: A PC is installed on the operating table, through which all information on operations is introduced into the computer as it arrives.

The following varies data processing methods:

centralized, decentralized, distributed and integrated.

Centralized Presums the presence of a HC. In this method, the user delivers the source information to the WC and receive the results of the processing in the form of effective documents. A feature of such a method of processing is the complexity and complexity of the establishment of a quick, uninterrupted communication, a large loading of the MC information (since its size is large), the regulation of the operations of operations, the organization of system security from possible unauthorized access.

Decentralized treatment. This method is associated with the appearance of PC, which gives you the opportunity to automate specific workplace. At present, there are three types of decentralized data processing technologies.

The first is based on personal computers that are not combined into a local network. (Data is stored in separate files and on separate disks). To obtain the indicators, refunge information to the computer. Disadvantages: no intercourse tasks, the impossibility of processing large amounts of information, low sewn from unauthorized access.

Second: PCs combined into a local network, which leads to the creation of single data files (but it is not designed for large amounts of information).

The third: PCs combined into the local network, which includes special servers (with the "Client-Server" mode).

Distributed The data processing method is based on the distribution of processing functions between different computers included in the network. This method can be implemented in two ways: the first suggests installing a computer in each node of the network (or at each system level), while data processing is carried out by one or more computers depending on the real capabilities of the system and its needs at the current time. The second way is to place a large number of different processors within one system. This path is used in banking and financial information systems, where the data processing network is necessary (branches, branches, etc.). Advantages of a distributed method: the ability to process any amount of data on specified time; High degree of reliability, since when a single technical means fails, it is possible to instantly replace it to another.; reduction of time and data transmission costs; Improving system flexibility, simplifying development and operation software etc. Distributed method is based on a complex of specialized processors, i.e. Each computer is designed to solve certain tasks, or tasks of its level

Next data processing method - integrated . It provides for the creation of an information model of a managed object, that is, the creation distributed base data. This method provides maximum convenience for the user. On the one hand, the database includes collective use and centralized management. On the other hand, the amount of information, the variety of tasks solved require database distribution. The technology of integrated information processing allows you to improve the quality, accuracy and processing speed, since the processing is performed on the basis of a single information array once entered into a computer. A feature of this method is the separation of technologically and the time of processing procedures from procedures for collecting, prepare and entering data.

In modern information processing systems, digital technologies excluding paper carriers are used and the exchange of data on the network between ATC technologies also intend to combine the joint efforts of the employee group over the solution of any task (i.e., the organization on the network working Group), opinion exchange induring the discussion on the network of any question in real-time (teleconference), operational exchange of materials through email, electronic announcements boards, etc. For such systems covering the work of the enterprise as a whole, the term "corporate business management systems" has been distributed. For such systems, the use of the "client-server" technology is characterized, including connecting remote users through the global Internet network. He is a rarity when the system combines in the overall information space of more than 40 thousand users placed by different countries and continents. One of these examples is McDonalds, which has its own divisions around the world, including in Ukraine.

1.5 Problems associated with computer information processing methods

Just arrange in the workplaces of personal computers officers and the connection of them to the local network is unlikely to give a positive effect in the management of the enterprise, if it is fundamentally not to revise the existing information structure. It is impossible to automate outdated ways of work, a personal computer can turn into a means for high-speed production of new papers. Thus, according to the results of the analysis of the work of enterprises in the United States, a case is described when 43 different documents were issued in the list composition of the enterprise, only 113 pages, including the required copies. This is because in the information system there are extra communication (communications) between divisions and individual employees. At the same time, no more than 20-30 internal communications are required for the normal functioning of the enterprise, in fact, they are 3-4 times more. Moreover, the practice of automation of management of the enterprise shows that the installation of productive computer equipment can lead to an increase in the number of communications by printing "just in case" unnecessary copies, and their mailing. Therefore, the implementation phase at the enterprise of computer equipment should precede a reduction in unnecessary communications (employees) to an optimal level.

One of the common hazards: attributing imaginary power to the computer. Personal computer, no matter how expensive and productive, it is, is just a countable car that is not able to solve our complex economic problems if we ourselves are not able to correctly formulate the task.

Socio-psychological problems arising in the team in the introduction of computer equipment are also of great importance, which causes a reduction in the number of employees, improvement (and therefore strengthening) control over the activities of other employees, etc.

Computerization significantly changes the technology of accounting and analysis of economic activities. In a non-automatic accounting system, the processing of data on economic operations is easily traced and is usually accompanied by documents on paper information, orders, instructions, accounts and accounting registers, such as accounting logs. Similar documents are often used in a computer system, but in many cases they exist only in electronic form. Moreover, the main accounting documents (accounting books and magazines) in a computer accounting system are data files, read or change that without a computer is impossible.

Computer technology is characterized by a number of features that should be taken into account when evaluating conditions and control procedures.

.6 differences of computer data processing from non-automated

Uniform operations.Computer processing involves the use of the same commands when performing identical accounting operations, which practically eliminates the emergence of random errors, commonly inherent

manual processing. On the contrary, program errors (or other systematic errors in hardware or software) lead to incorrect processing of all identical operations under the same conditions.

Separation of functions.A computer system can carry out a variety of internal control procedures, which in non-automatic systems perform different specialists. This situation leaves specialists with access to a computer, the ability to interfere with other functions. As a result, computer systems may require additional measures to maintain control at the required level, which in non-automatic systems is achieved by simply separation of functions. Such measures may include a password system that prevents the actions that are invalid by specialists who have access to asset information and accounting documents through the terminal in the dialogue mode.

Potential opportunities for mistakes and inaccuracies.Compared to non-automatic accounting systems, computer systems are more open to unauthorized access, including controls. They are also open to hidden data change and direct or indirectly obtaining information about assets. The smaller the person interferes with the engineering processing of accounting operations, the lower the possibility of identifying errors and inaccuracies. Errors made in the development or adjustment of application programs may remain unnoticed over a long period.

Potential opportunities for increased control by the administration.Computer systems give the administration a wide range of analytical tools to evaluate and monitor the activities of the company. The presence of additional tools ensures the strengthening of the internal control system as a whole and, thus, reducing the risk of its inefficiency. Thus, the results of the usual comparison of the actual values \u200b\u200bof the cost coefficient with planned, as well as reconciliation of accounts come to the administration more regularly during computer processing. In addition, some application programs accumulate statistical information about the operation of the computer, which can be used in order to control the actual processing of accounting operations.

Initiating operations in the computer.A computer system can perform some operations automatically, and their authorization is not necessarily documented, as is done in non-automatic accounting systems, since the fact of the adoption of such a commissioning of the administration implies in an implicit form to prevent the relevant sanctions.

Thus, the method of processing economic operations when conducting accounting has a significant impact on the organizational structure of the company, as well as on the procedures and methods of internal control. The work of the accountant and its interaction with the administration changes. However, the automation of the accountant is prevented by specific working conditions in Ukrainian conditions, for example a large number of documents contrary to each other.

1.7 Technological processing process

It is an ordered sequence of data processing, information, knowledge before receiving the result user. It follows that the concept of information technology implies the solution of economic and managerial tasks associated with the implementation of a number of operations to collect it necessary to solve these tasks of information, its processing on some algorithms and issuing a decision that makes a decision in a form convenient for it.

The technological processing process of information depends on the nature of the tasks used, used technical means, control systems, numbers of users, etc. factors. The technological process of processing information may include the following operations (actions):

Collecting data, information, knowledge - is a process of registration, fixation, records of detailed information (data, knowledge) about events, objects (real and abstract), links, features and related actions. At the same time, sometimes allocated in separate operations "Collecting data and information" and "knowledge collection". Collecting data and information - the process of identifying and receiving data from various sources, grouping of the data obtained and the presentation of them in the form required to enter into a computer. Knowledge collection - receiving information about the subject area from experts - experts and the presentation in the form required to record the knowledge base.

Processing data, information, knowledge. Processing - the concept is wide and includes several interconnected operations. Processing include operations such as: Calculation, sampling, searching, combining, merging, sorting, filtering, etc. It should be remembered that processing is a systematic implementation of data transactions, the process of converting the calculation, analysis and synthesis of any forms of data, information and knowledge through systematic performing operations over them. When determining such an operation, how processing is allocated: data processing, information processing, knowledge processing. Data processing is the data management process (numbers, characters and letters) and transform them into information. Processing information - processing of information of a certain type (textual, sound, graphic), transforming it into other type information.

However, the use of the latest modern technologies provides a comprehensive presentation and simultaneous processing of information of any kind (text, graphics, audio, video, animation), its transformation. The concept of knowledge processing is associated with the concept of expert systems (or artificial intelligence systems), allowing the rules and the facts provided by the user to recognize the situation, to diagnose, formulate a solution, to make recommendations for the choice of action.

Generating data, information, knowledge is the process of organization, reorganization and data transformation (information, knowledge) to the user-required form, including through its processing. For example, the process of obtaining formatted reports (documents).

Storage of data, information, knowledge - the processes of accumulation, placement, generation and copying data (information, knowledge) for further use (processing and transmission).

Data transfer, information, knowledge is the process of distributing data (information, knowledge) among users through means and communications systems and by moving (forwarding) data from the source (sender) to the receiver (recipient).

2. Development of a mini-tutorial "Restoration of the operating system"

2.1 Converting text from DJVU to PDF

How to convert a document from DJVU to PDF? Is one of the most common formats for presenting in electronic form printed documents, books and periodicals. Using Universal Document Conveter allows you to solve the task of converting a document from DJVU in PDF optimally.

- Opened file djvu. in a programme Internet Explorer. And clicked on the PRINT button on the plug-in toolbar.

Fig. 2.1.1 Opening a file in Internet Explorer

Selected Universal Document Converter from the list of available printers and pressed the Properties button.

Fig. 2.1.2 Universal Document Converter

In the settings panel, I clicked on the Download Settings button.

Fig. 2.1.3 Load Settings

In the Open window, select the "Text Document to PDF.xml" file and pressed the Open button.

Fig. 2.1.4 "Text Document to PDF.xml"

Click on the OK button in the Print window to start converting the document. The finished PDF file by default will be created in the "My Documents \\ UDC Output Files" folder.

Fig. 2.1.5 Conversion of the document

information Processing Editing Conversion

- The resulting copy of the document will be opened either in the program Adobe Acrobat.Or in another program assigned to your system to view files with PDF extension.

2.2 Conversion from PDF in Word

To copy the PDF file page word file, performed the following steps.

Switch to the desired page.

Click the Text SELECT Tool button on the Basic Tools toolbar.

To copy the PDF file to the Word document, performed the following steps.

Opened PDF file in adobe program Acrobat Reader.

In the View menu chose the Continuous command.

The Edit menu chose the Select All command.

The Edit menu chose the COPY command.

Switched B. word program And chose the Paste command in the Edit menu.

To copy the pictures, performed the following steps.

Opened PDF file in Adobe Acrobat Reader.

Holding the SHIFT key, pressed the Text SELECT Tool button. Not releasing the mouse button, pressed the Graphic Select Tool button on the toolbar that appears.

When the cursor took the shape of the crosshair, drew a rectangle around the desired pattern by dragging the cursor.

The Edit menu chose the COPY command.

Switch to Word and chose the Paste command in the Edit menu.

To determine whether the text is allowed from this document, performed the following steps.

Opened PDF file in Adobe Acrobat Reader.

The File menu selected Document Info and Security commands.

If the SELECTING TEXT AND GRAPHICS parameter is set to Allowed, text and drawings from this document can be copied to other programs.

2.3 Editing the resulting text

- opened the document window

- Chose the font, the line interval, indents, the "Align in width" command, etc.

- As a result, received the necessary type of document.


OCCUPATIONAL SAFETY AND HEALTH

1. General Provisions

1. To work on a personal electronic computing machine (PEVM), persons who have passed special training, a medical examination, introductory instruction on labor protection, instruction in the workplace and instruction on fire safety issues. Repeated briefing every 6 months

2. The user must:

2.1. Perform the rules of the internal labor regulation.

2.3. Do not fulfill the instructions contrary to labor protection rules.

2.4. Remember the personal responsibility for the implementation of the rules of labor protection and security of colleagues.

2.5. To be able to provide first medical care affected by accidents.

2.6. Be able to use primary fire extinguishing tools.

2.7. Perform personal hygiene rules.

2.8. Dangerous and harmful production factors that can affect the user:

a) physical:

electric shock;

elevated level of electromagnetic and x-ray radiation;

elevated level of ultraviolet radiation;

increased noise level in the workplace from fans,

processors, audio photos, printers;

elevated or reduced level of illumination and reflected gloss;

increased loss of vision;

non-uniformity distribution of brightness in sight;

increased brightness of the light image;

elevated level of pulsation of the light stream;

c) psycho-physiological:

tension and attention;

intelligent and emotional loads;

long static loads;

monotonicity of labor;

large amount of information processed per unit time;

irrational organization of the workplace;

1.3 Premises with PEVM should have natural and artificial lighting. With unsatisfactory lighting, the productivity of the Labor PCLM is reduced, myopia is possible, fast fatigue (Fig. 3.1).

1.4 The location of the PC workplaces in the basements and ground floors is not allowed.

Fig. 3.1 - Workplace

6. PEVM workplaces during creative work, requiring significant mental stress or a large concentration of attention, it should be isolated from each other by a partition with a height of 1.5-2.0 m.

7. Production facilities in which computer are located should not border with rooms where noise and vibration levels exceed the norm (mechanical workshops, workshops, etc.).

8. Workplaces with PEVM are recommended to be placed in separate rooms. In the case of jobs for workplaces with PEVM in halls or rooms with sources of dangerous and harmful factors, they should be located in fully isolated cabinets with natural light and organized air exchange.

9. The area on which one workplace is located with PEVM should be not less than 6.0 m 2, the size of the room is at least 20 m 3.

10. The floor surface must be smooth, without Colds, non-slip, convenient for cleaning and wet cleaning, have antistatic properties.

11. When placing jobs, it is necessary to exclude the possibility of direct screening of the screen with a source of natural light.

12. Requirements for lighting for visual perception of information operators from two different carriers (from the screen of the PC and paper carrier) are different.

A very low level of illumination worsens the perception of information when reading documents, and very high leads to a reduction in the contrast image of characters on the screen.

Therefore, the ratio of the brightness of the PC screen to the brightness of the surrounding work surfaces should not exceed 3: 1 in the working area, and the working surfaces and the surrounding items (walls, equipment) - 5: 1.

13. Artificial lighting in premises with PEVM should be carried out in the form of a combined lighting system using fluorescent light sources in overall lighting lamps that should be placed above the working surfaces in a uniform rectangular order.

14. To prevent the expanding screens with straight lights, the luminaire lines must be located with a sufficient side offset relative to the rows of jobs or zones, as well as parallel to the lighting holes. It is desirable to place windows from one side of the work premises.

In this case, each window must have light scattering curtains with a reflection coefficient of 0.5 -0.7.

15. Artificial lighting should provide 300-500 LCs at the workplaces of PC. If it is impossible to provide this level of illumination with a general lighting system, local lighting lamps are allowed, but there should be no reflections on the screen surface and an increase in the illumination screen more than 300 LCs.

16. In the case of natural lighting, sunscreensions should be provided, for this purpose, films with metallized coating or blinds with vertical adjustable lamelters can be used.

17. Playing a workplace equipped with PEVM, in such a way that windows or lighting devices do not fall into the field of view of the operator; They should not be and directly behind his back.

18. In the workplace, uniform illumination should be ensured using a predominantly reflected or multiple light distribution.

19. Light reflections from the keyboard, screen and from other parts of the PEVM in the direction of the Operator's eye should not be.

20. To prevent blinding, local lighting lamps should have reflectors from an opaque material or a glass of dairy-colored. The protective angle of the reflector must be at least 40 °.

21. PEVM workplaces should be located at a distance of at least 1.5 m from the wall with window openings, from other walls - at a distance of 1 m; There is at least 1.5 m at a distance at a distance.

22. The main equipment of the working place of the user PEVM is the monitor, keyboard, work desk, chair (chair). Auxiliary equipment: PUPITER, footrest, wardrobe, shelves, and so on.

23. At the location of the elements of the workplace, consider:

Work post office.

Space for the placement of the user.

The ability to review the elements of the workplace.

The ability to review space outside the workplace.

The ability to make records, place documentation and materials that the user uses (Fig. 3.2).

Fig. 3.2 - Workplace

24. The relative position of the elements of the workplace should not interfere with the implementation of all necessary movements and movements for the operation of the PC; Assist the optimal mode of operation and recreation, a decrease in user fatigue.

25. To ensure accurate and quickly reading information, the monitor screen surface should be placed in the optimal zone of the information field in the plane perpendicular to the normal line of the user's side view, which is in the working position. A deviation from this plane is allowed - no greater than 45 °; The angle of deviation of the line of sight is allowed from normal - no more than 30 °.

26. Paving PC in the workplace is necessary so that the screen surface is at an optimal distance from the user's eye, depending on the size of the screen.

27. The keyboard should be positioned on the table surface or on a specially adjustable in height, the working surface separately from the table at a distance of 100-300 mm from the close side of the wheelchair, its tilt angle should be within 5 ° - 15 °.

28. The printer must be positioned so that access to the user and his colleagues is comfortable; In order for the maximum distance to the printer control keys, the length of the elongated hand (at a height of 900-1300 mm, in a depth of 400-500 mm).

29. The design of the desktop should provide the possibility of optimal placement on the working surface of the equipment used, taking into account its quantity, sizes, design features (the size of the VTU, keyboard, printer, PEVM, etc.) and its work.

30. The height of the working surface of the table should be adjusted within 680-800 mm; On average, it should be 725 mm.

31. The width and depth of the working surface must ensure the possibility of performing labor operations within the boundaries of the engine field, which are determined by the zone within the visibility of the instruments and reach the controls.

The advantage should be given to the modular sizes of the table, on the basis of which the design dimensions are calculated; The width should be considered: 600, 800, 1000, 1200, 1400 mm; The depth is 800, 1000 mm, with its unregulated height - 725 mm.

32. The surface of the table can be matte with a small reflection and heat insulating.

33. The desktop must have a floor space with a height of at least 600 mm, a width of at least 500 mm, at a level of knees at least 450 mm and at the level of the extracted leg - at least 650 mm.

34. The chair must ensure the maintenance of rational working postures during the fulfillment of key production operations, creating conditions for changing the posture. In order to prevent fatigue, the chair should ensure a decrease in the static stress of the muscles of the cerheth-brachial area and the back.

35. The type of work chairs must be selected depending on the nature and duration of work. It should be lifting-turning and adjusting the height and corners of the tilt of the seating and the back, as well as the distance of the back from the front edge of the seating. Adjusting each parameter must be independent and have reliable fixation. All levers and knobs of fixtures (for regulation) must be convenient in control.

36. The seat and back of the chair must be semi-dimensional, not electrochatized and with an airtight coating, the material of which provides the possibility of easy cleaning against contamination.

2 Safety requirements before work

1. Include air conditioning system indoors.

2. Inspect the workplace and bring it in order; make sure that there are no foreign objects; All equipment and blocks of PEVM are connected to system block With connecting cords.

3. Check the reliability of the installation of equipment on the desktop. A VTU should not stand on the edge of the table. Rotate in so that it is convenient to look at the screen - at right angles (and not on the side) and a little top down; In this case, the screen must be slightly tilted - the bottom it is closer to the user.

4. Check the overall condition of the equipment, check the health wiring, connecting cords, plugs, sockets, grounding of the protective screen.

operation of cables and wires with damaged or lost protective properties during the operation of insulation;

leave under voltage cables and wires with uninsulated conductors;

the use of homemade extension cords that do not meet the requirements of the rules of the electrical installation device to portable electrical wiring;

application for heating the premises of non-standard (homemade) electric heating equipment or incandescent lamps;

the use of damaged sockets, connecting boxes, switches, as well as lamps whose glass has traces of blackout or protrusion;

hanging lamps directly for conductive wires, overturning electrollamps and lamps with paper, cloth and other combustible materials, operation with removed caps - diffusers;

the use of electrical appliances and devices in conditions that do not meet the instructions (recommendations) of manufacturers.

6. Adjust the lighting of the workplace.

7. Adjust and fix the height of the chair, user-friendly tilt of its back.

8. If necessary, attach the necessary equipment to the processor (printer, scanner, etc.). All cables that connect the system unit (processor) with other devices should be turned on and off only when the computer is disconnected.

9. Enable computer equipment with switches on the enclosures in the sequence: voltage stabilizer, monitor, processor, printer (if printing is assumed).

10. Adjust the brightness of the monitor screen glow, the minimum size of the luminous point, focusing, contrast. We should not make images too bright, so as not to fulfill the eye.

the brightness of the screen glow is at least 100 cd / m;

the ratio of the brightness of the monitor screen to the brightness of its surrounding surfaces in the working area - not more than 3: 1;

the minimum size of the glow point is not more than 0.4 mm for the monochrome monitor and at least 0.6 mm for color;

the contrast of the image image is not less than 0.8.

11. In case of identifying any malfunctions, the work does not start, report this to the head of work.

3.3 Safety requirements during work

1. With the video display terminal (VDT):

1.1. It is necessary to resist the keyboard on the desktop, without allowing its swing. At the same time, it may be possible to turn its turns and movements. The position of the keyboard and the angle of its inclination must respond to the user's wishes. If the design of the keyboard does not provide space for palms support, they should be positioned at a distance of at least 100 mm from the edge of the table in the optimal zone of the engine field. During running on the keyboard, sit straight, not strain.

1.2. To reduce adverse influence on the user of the Mouse type (forced posture, the need for constant control, for the quality of actions) should ensure the free large surface of the table to move the "mouse" and the convenient stop of the elbow joint.

1.3. No other conversations that irritating noises are allowed.

1.4. Periodically, when the computer is disconnected, it is barely dipped with a cotton rogue from the surfaces of the instrument. Screen VDT \u200b\u200bI. protective screen. Wipe with cotton swab in alcohol. It is not allowed to use liquid or aerosol means for cleaning the surfaces of the computer.

Independently repairing equipment, especially twice. The repair of the equipment is performed only by computer maintenance specialists, they must open the processor once every six months and withdraw the dust and dirt with a vacuum cleaner that have accumulated there.

Put any items on the computer's equipment, drinks on the keyboard or next to it - it may be out of order.

1.6. To remove static electricity, it is recommended from time to time to be struggled to the metal surfaces of the grounded design designs (central heating battery, etc.).

1.7. To reduce the intensity of work on the PEVM, it is necessary to evenly distribute and alternate the nature of the works of their complexity accordingly.

In order to reduce the negative impact of monotony, it is advisable to apply the alternation of text and numeric data operations (change in the content), alternation of text editing and data introduction (change in content and pace), etc. (Fig. 3.3).

Fig. 3.3 - Alternation of the type of work at the computer

3.1.8. To reduce the negative impact on the health of industrial workers, it is necessary to apply regulated breaks.

1.9. The load for the work shift of any duration should not exceed 6 hours.

1.10. The duration of continuous operation for the VDF without a regulated interruption should not exceed 2 hours.

1.11. The duration of the lunch break is determined by the current legislation on the work and the rules of the internal labor regulation of the enterprise.

1.12. In the event of a partial discomfort in workers, an individual approach should be applied to restricting the time of work for VTT and correction of duration of breaks for recreation or replace other types of work (not related to the use of VDT).

2. On laser printers.

2.1. Place the printer is necessary next to the processor in such a way that the connecting cord is not pulled. Do not put a printer on the processor.

2.2. Before programing the work of the printer, make sure that it is in the communication mode with the computer.

2.3. To achieve the cleanest, highly separate image ability and not to spoil the device, the paper should be used in the instructions for the printer. Paper sections must be made with a sharp blade without sowing - this will reduce the likelihood of crumpled paper.

printed on one side;

too smooth and brilliant, as well as high-defined;

laminated;

ripped, crumpled or irregular holes from a hole punch or stapler;

perforated into several parts or tissue (the basis of copier paper);

from branded blanks, the heading of which is printed not with heat-resistant paints, which must withstand 200 ° C for 0.1 s; These paints can go to the thermal conquering roller and cause print defects.

3.2.5. Adhere to the storage rules of the cartridge in accordance with the manufacturer's instruction (away from direct sunlight, at a temperature of 0 - 35 ° C, etc.).

Do not:

- Save the cartridge without packaging.

Put the cartridge on the end, that is, vertically.

Turn over the cartridge with a label down.

Open the roller lid and touch it.

Fill the used cartridge itself.

4 Safety requirements after the end of work

1. Finish and record the file in operation in the computer. Get out of the software shell and return to MS DOS environments.

2. Turn off the printer, other peripherals, turn off the VDT and processor. Turn off the stabilizer if the computer is connected to the network through it. Pull plugs stretch out of sockets. Cover the keyboard with a lid to prevent dust from entering it.

3. Remove the workplace. Originals and other documents put in the table box.

4. Wash hands thoroughly with warm water with soap.

5. Turn off air conditioning, lighting and general power supply unit.

5 Safety requirements in emergency situations

5.1.2. The "Stop!" Team, filed by any employee, must fulfill everyone who heard it.

5.1.3. When defeating the employee with electric shock to free the victim from the operation of the electric current:

v Disable power from this section;

v Separate the victim from the current parts using dielectric gloves, other protective equipment or insulating things or objects;

v call a doctor, and before arriving, to provide victim to the first help;

v Report an incident to his immediate supervisor.

5.1.4. In case short circuit In the power supply network, immediately stop working and turn off the damaged power grid. Check the head of the site. Alone to eliminate short circuit prohibited!

5.1.5. When the electricity supply is stopped, turn off the PC from the network, to report to the head of the site.

5.1.6. When sunbathing the power cords immediately stop working, turn off the power supply to the PC and proceed to caring in a carbon dioxide fire extinguisher, if necessary, cause the fire team - tel. 01. Take the head of the site.

5.1.7. In the event of a threat to an emergency, the employee is obliged to adopt the worst measures to prevent it, to provide the first assistance to the victim, inform his immediate supervisor, if necessary, call ambulance.

5.1.8. If an accident occurs, if possible (if it does not threaten the life and health of other employees and will not lead to more severe consequences), it is necessary to maintain the equipment and the situation in the workplace in the state that was at the time of the event.

1.9. When eliminating the consequences of an accident or natural disaster, security rules for all categories of workers must.

1.10. Employees who allowed violations of the requirements of this Instruction shall be liable in accordance with the procedure established by law.


Output

During the fulfillment of this thesis, I achieved initially the goals, namely, thoroughly studied the types of information, investigated and described the methods and technologies for processing various species such. During the writing of the thesis, I came to the conclusion that with the advent of computers (or, as they were first called in our country, a computer - electronic computing machines) at first a means for processing numerical information. However, in the future, especially after the wide distribution of personal computers (PCs), computers began to be used for storage, processing, transmission and search for textual, numerical, visual, sound and video information. Since the appearance of the first personal computers - PC (80s of the 20th century) - up to 80% of their working time is devoted to working with textual information.

Analyzing the information received should be noted: information processing (playback, transformation, transmission, writing to external media) performs a computer processor. With the help of a computer, it is possible to create and store new information of any kinds, for which they serve special programs used on computers, and information entry devices.

A special type of information currently can be considered the information presented in the global Internet. There are special techniques for storage, processing, searching and transmitting distributed information of large volumes and special ways of working with various types of information. Constantly improved software, providing collective work with information from all types.


Bibliography

1. Information system. Wikipedia Free Encyclopedia [Electronic Resource]

2. File server. Wikipedia Free Encyclopedia [Electronic Resource]

Shokin Yu.I., Fedotov A.M. Distributed information Systems [Electronic resource]

L.F. Kulikovsky, V.V. Moto "Theoretical foundations of information processes: studies. Manual for universities. " - K. 2009.

V. Dmitriev "Applied Information Theory. - M., 2008

A.G. Kushnirenko, G.V. Lebedev, R.A. Sore. "Basics of computer science and computing technology." Kiev "Enlightenment" 2008

Dokuchaev A.A., frach S.A., Nazarov O.V. Computer science in the office of the trading company. Computer communications tools. - St. Petersburg: TEI, 2010, 32 s.

Computer information processing technologies. // Ed. Nazarova S.I. - M.: Finance and Statistics, 2008.

NATS B. Computer networks. - M.: Eastern Book Company, 1996.

Friedland A. Informatics - Explanatory Dictionary of Basic Terms. - M.: Prior, 1998.

Shatt S. Mir computer networks. - Kiev: BHV, 2006

Shafrin Yu. Information Technology. - M., 2010

Data processing

At various stages of the information cycle, the data is converted from one species to another with various methods. The general scheme of the process processing process is as follows (Fig. 1.15).

Fig.1.15.

In the process of processing information, a certain information problem is solved for which the source (some set of source data) and the final (required results) information must be determined. The transition from the source data to the result is the processing process. That object or subject, which carries out processing, is called a processing performer. It may be a person or technical device, including computer.

To successfully perform information processing, the Contractor must be known for processing method, i.e., the sequence of actions that must be performed to achieve the desired result. A description of such a sequence of action in computer science is called the processing algorithm.

You can select two types of information processing:

1. Processing related to obtaining new information, new knowledge content. It belongs to the solution of various tasks by applying logical reasoning.

2. Processing associated with a change in shape, but not changing content, for example, translation of the text from one language to another.

Data processing includes many different operations that are a complex of technological actions, as a result of which information is transformed. The main operations are:

Formalization (bringing data coming from different sources to a single form);

Filtering (elimination of unnecessary data that is not needed to make decisions);

Sorting (aligning data on specified features for the purpose of use);

Archiving (saving data in a convenient and affordable form);

Protection (a set of measures aimed at preventing losses when reproducing and modifying data);

Conversion (conversion of data from one form to another or from one structure to another or change type of media).

Information processing is the receipt of some information objects from other information objects by performing some algorithms.

Processing is one of the main processes performed on information and the main means of increasing the volume and diversity of information.

Information processing tools are all sorts of devices and systems created by humanity, and first of all the computer.

When processing information, data structuring is structured. This is a certain order, a certain organization in the information repository: the location of the data in alphabetical order, the grouping on some features of the classification, the use of a table or graph view - all of these structuring examples. The search algorithm depends on the method of organizing information. If the information is structured, the search is carried out faster.

Living organisms and plants handle information with their organs and systems, computers by performing some algorithms.

Computational algorithms must be combined into a computational graph of information processing system in accordance with the required technological sequence of solving problems.

As computational technology develops, the forms of use are also improved. There are a variety of ways to access and communicate with computer. Individual and collective access to computational resources depends on the degree of their concentration and organizational forms of functioning. Centralized forms of application of computing means that existed before mass use by PEVM, they assumed their concentration in one place and the organization of information and computational centers of individual (ILS) and collective use (IVTSCP).

The activities of the ILS and IVTSKP were characterized by processing large amounts of information, using several medium and large computers, qualified personnel for maintaining machinery and software development. The central use of computational and other technical means allowed to organize their reliable operation, systematic loading and qualified service.

Centralized information processing along with positive aspects It has some negative features that are primarily generated by a passage of the end user from the technological processing process of information.

Decentralized forms of use of computing resources began to be formed from the second half of the 80s g. Decentralization provides for the placement of PEVM in places of occurrence and consumption of information where autonomous items of its processing are created. These include subscriber points and automated jobs.

The automated workplace (ARMS) of a specialist includes a personal computer operating autonomously or in computing network, a set of software and information arrays to solve functional tasks.

Electronic processing technology is a human-machine process of execution of interrelated operations occurring in an established sequence in order to convert the original (primary) information to the result. Technological operations are diversified by complexity, appointment, implementation technique, are performed on various equipment, many performers.

There are two main types of technological processes: subject and redeplaying.

The subject type of technology organization involves the creation of parallel active technological lines specializing in the processing of information and solving specific tasks (accounting of the load, the quality of the signal passage, etc.) and the organizing data processing inside the line.

OPENING (PET) Type of constructing the technological process involves a sequential conversion of the processed information according to the technology represented as a continuous sequence of replacing each other operations performed in automatic mode.

The following user interaction modes with computers are distinguished: batch and interactive (requested, dialog). The computer themselves can function in the following modes: single and multi-program, separation of time, real time, teleworking.

The organization of the computing process during batch mode was built without user access to the computer. Its functions were limited to the preparation of baseline data on a set of information and interconnected tasks and transmitting them to the processing center where the packet was formed, including a task for computer processing, programs, source and reference data. It was introduced into the computer and implemented in automatic mode, while the operation of the computer could pass in one or multi-program mode.

Interactive mode provides for the direct interaction of the user with an information and computing system, may be the nature of the query (usually regulated) or a dialogue with computers.

Request mode requires users to interact with the system through a significant number of subscriber terminal devices, including remote to a significant distance from the processing center. Such a need is due to the solution of operational tasks of a reference and information nature.

The dialog mode opens the user with the opportunity to directly interact with the computing system in the work permissible for it, implementing a repeating cycle of issuing tasks, receiving and analyzing the response. In this case, the computer itself may initiate a dialogue, telling the user a sequence of steps (menu presentation) to obtain a desired result.

Both variations of the interactive mode (requested, dialogue) are based on the work of the computer in real-time and telework modes, which are the further development of the time separation regime, therefore mandatory conditions The functioning of the system in these modes are, firstly, constant storage in EUM storage devices necessary information and programs and only in the minimum volume of initial information from subscribers and, secondly, the availability of subscribers of appropriate communication tools with the computer to appeal to it at any time.

Considered technological processes and users of users in the man-machine system are particularly clearly manifested with integrated processing of information, which is typical for the modern automated solution of tasks in multi-level information systems.