edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective...

94
MINISTRY OF EDUCATION AND SCIENCE OF THE REPUBLIC OF KAZAKHSTAN SHAKARIM STATE UNIVERSITY of SEMEY 3rd level QMS Document Edition № ___ _________ 20___ y. M I 042-18-12.1.1-2016- 02 Methodical instructions for laboratory work Faculty of Information and communication technologies Department «Information systems» METHODICAL INSTRUCTIONS for laboratory work on discipline «Information and communication technologies» For all specialties and the directions of preparation of a bachelor degree (CodeSpecialty)

Transcript of edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective...

Page 1: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

MINISTRY OF EDUCATION AND SCIENCE OF THE REPUBLIC OF KAZAKHSTAN

SHAKARIM STATE UNIVERSITY of SEMEY3rd level QMS Document

Edition № ____________ 20___ y.

M I 042-18-12.1.1-2016-02Methodical instructions for laboratory work

Faculty of Information and communication technologies

Department «Information systems»

METHODICAL INSTRUCTIONS for laboratory work on discipline

«Information and communication technologies»

For all specialties and the directions of preparation of a bachelor degree

(CodeSpecialty)

Semey

2016

Page 2: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 2 of 68

Foreword

1 DESIGNEDCompiled by:Zenkovich K.U., senior lecturer, department «Information systems» _________

«__»________201__.

Methodical instructions intended for or laboratory work on discipline "Information and communication technologies" for students of all specialties and directions of preparation of bachelors.

2 DISCUSSEDMethodical instructions discussed at the meeting of the Department "Information

systems",Record «____» __________ 201_, № ____Head of the Department Smagulov S.K. __________

Methodical instructions are recommended for use in the educational process at the meeting of educational and methodical bureau of the faculty of "Information and communication technologies"

Record «____» __________ 201_, № ____

Chairman Bekmuhametova Т.М.____________

Page 3: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 3 of 68

Content

1 Introduction2 Name of laboratory works3 Safety instructions when conducting laboratory work4 Requirements for the registration of the report on laboratory work5 Literature

Page 4: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 4 of 68

1 Introduction

In the discipline «Information and communication technologies» are regarded as modern methods and means of communication of people in a normal and professional activities with the help of information technologies for the search, collection, storage, processing and dissemination of information.

The purpose of discipline «Information and communication technologies» is to master students of information and communication competencies that facilitate everyday life and will give an opportunity to use modern information technologies in various areas of professional activity, scientific and practical work, self-education and for other purposes. In addition to the practical purpose, the course provides academic and educational purposes, helping to expand the horizons of students, improve their general culture and education.

Tasks of the discipline– Acquaintance with modern receptions and methods of use of means of ICT.– Training in use of means of ICT in professional activity of the expert.– Training in effective application of means of ICT in educational process,

including work with the distributed information resource of educational appointment.– Acquaintance with opportunities of practical realization of the training

focused on use of technologies of multimedia, systems of artificial intelligence, the information systems functioning on the basis of computer facilities, providing automation of input, accumulation, processing, transfer, operational management of information.

The study of English enables students to develop and apply knowledge, understanding and skills of ICT in their composing, responding and presenting, and as part of the imaginative and critical thinking they undertake in English.

Students have the opportunity to become competent, discriminating and creative users of ICT as they learn to use ICT effectively and appropriately when investigating, creating and communicating ideas and information. Students will learn about the ethics of information communication through technology.

Page 5: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 5 of 68

2 Name of laboratory works

Laboratory work 1. ICT in Core Sectors of Development. ICT Standardization

Laboratory Objective:• understanding the implications of technology in society, including social, economic and ethical uses• awareness of the ways ICT can help in home, learning and work environments.• understanding and using applications• using Information and Communication Technology (ICT) to solve problems• analysing, designing, implementing, testing and evaluating ICT systems.

Laboratory Hardware, Software / Tools Requirements: The required hardware for teaching this course is having a PC for each student supported with a network connection for Internet access. A data show and a PC for the course instructor are also required. Windows XP or a later version must be installed. The required lab tool is Microsoft Office 2007-2010.

APPLYING ICT

The differences between batch processing, online processing and realtime processing. Communication applications (such as the internet, email, fax, electronic conferencing, mobile telephones and internet telephony services) Applications for publicity and corporate image publications (such as business cards, letterheads, flyers and brochures) Applications in manufacturing industries (such as robotics in manufacture and production line control) Applications for finance departments (such as billing systems, stock control and payroll) School management systems (including registration, records and reports) Booking systems (such as those in the travel industry, the theatre and cinemas) Applications in banking (including Electronic Funds Transfer (EFT), ATMs for cash withdrawals and bill paying, credit/debit cards, cheque clearing, phone banking, internet banking) Applications in medicine (including doctors’ information systems, hospital and pharmacy records, monitoring and expert systems for diagnosis) Applications in libraries (such as records of books and borrowers and the issue of books) The use of expert systems (for example in mineral prospecting, car engine fault diagnosis, medical diagnosis, chess games)

Page 6: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 6 of 68

Applications in the retail industry (stock control, POS, EFTPOS, internet shopping, automatic reordering)

Questions:1.Describe how ICT has effected employment:

Describe how there has been a reduction of employment in offices, as workers' jobs have been replaced by computers in a number of fields (e.g. payroll workers, typing pools, car production workers) Describe how there has been an increase in employment in other fields (e.g. website designers, computer programmers, delivery drivers in retail stores) 

2.Describe how ICT has effected working patterns within organisations:

Describe how the use of computers has led to a number of employees changing their working patterns (e.g. part-time working, flexible hours, job sharing, compressed hours) Describe what is meant by part-time working, flexible hours, job sharing, compressed hours

3.Describe microprocessor-controlled devices in the home:

Describe the positive effects microprocessors have on aspects of lifestyle (e.g. the amount and use of leisure time, the degree of social interaction, the ability to leave the home) Describe the negative effects microprocessors have on aspects of lifestyle (e.g. lack of exercise)

4.Describe potential health problems related to the prolonged use of IT equipment:

Describe repetitive strain injury (RSI) and what causes it Identify other health issues (e.g. back problems, eye problems, headaches) Describe some simple strategies for preventing these problems Evaluate the use of IT equipment and develop strategies to minimise the health risks

Laboratory work 2. Introduction to computer systems. Architecture of computer systems

Laboratory Objective: To able to describe and identify the components of a computer system.

Page 7: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 7 of 68

To be able to define the terms used to measure the capacity and speed of a microprocessor, memory, and auxiliary storage.

Laboratory Hardware, Software / Tools Requirements: The required hardware for teaching this course is having a PC for each student supported with a network connection for Internet access. A data show and a PC for the course instructor are also required. Windows XP or a later version must be installed. The required lab tool is Microsoft Office 2007-2010.

The computer consists of: hardware – physical computer parts, palpable and visible software – set of commands that are "understandable" to the computer; instructions to its palpable parts, giving orders what to do

Typical computer hardware

The system unit consists of the following components:

Page 8: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 8 of 68

Kinds of printers:

Kinds of mouse

Page 9: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 9 of 68

Questions:1. hardware and software• define hardware as consisting of physical components of a computer system• identify internal hardware devices (e.g. processor, motherboards, random

access memory• (RAM), read-only memory (ROM), video cards, sound cards and internal hard

disk drives)• identify external hardware devices and peripherals (such as monitors,

keyboards, mice,• keyboards, printers as input and output devices and external storage devices in

general)• define software as programs for controlling the operation of a computer or

processing of• electronic data• identify the two types of software – applications software and system software• define applications software (e.g. word processing, spreadsheet, database

management• systems, control software, measuring software, applets and apps, photo-editing

software, videoediting• software, graphics manipulation software)• define system software (e.g. compilers, linkers, device drivers, operating

systems and utilities)2. the main components of computer systems• describe the central processing unit including its role

Page 10: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 10 of 68

• describe internal memory, i.e. ROM and RAM and the differences between them

• define input and output devices and describe the difference between them• define secondary/backing storage input devices and their uses3.input devices and their uses• identify input devices and their uses, e.g. keyboard, numeric keypad, pointing

devices (such as• mouse, touchpad, trackerball), remote control, joystick/driving wheel, touch

screen, scanners,• digital cameras, microphone, sensors (general), temperature sensor, pressure

sensor, light• sensor, graphics tablet, video camera, web cam1. Storage devices and media• identify storage devices, their associated media and their uses, e.g.• magnetic backing storage media: fixed hard disks and drives, portable and

removable• hard disks, portable and removable hard drives, magnetic tape drives and

magnetic tapes,• memory cards• optical backing storage media (CD/DVD/Blu-ray): CD ROM/DVD ROM, CD

R/DVD R,• CD RW/DVD RW, DVD RAM, Blu-ray discs• solid state backing storage: solid state drives, flash drives (pen drive/memory

stick/USB• stick)• describe the advantages and disadvantages of the above devices

Laboratory work 3. Computer Software. Operating systems. Desktop applications

Laboratory Objective:• Define and describe operating systems • Identify the two types of software – applications software and system softwareAfter finishing this lab students will be able to:• Describe the windows desktop and change its appearance.• Use help and Support Center to obtain information about your computer;

describe the different ways to obtain help.• Describe the My Computer and My documents folders.• Copy and/or move a file from one folder to another; delete a file then recover

the deleted file from the Recycle Bin.• Use the Search Companion to locate a file on your system.

Page 11: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 11 of 68

Laboratory Hardware, Software / Tools Requirements: • The required hardware for teaching this course is having a PC for each student

supported with a network connection for Internet access. A data show and a PC for the course instructor are also required.

• Windows XP or a later version must be installed. • The required lab tool is Microsoft Office 2007-2010.

EXERCISE 1 – Common application programs1. Open NotePad or some other text editor. 2. Write your own name and address at the beginning of a new document in

the editor window.  3. Save the document in your home directory in a folder called Section

1 under the name Text editor exercise.txt (you have created the folder earlier during this course). Do not close this file. 

4. Use your web browser to go to your favourite search engine and look on the web for a quotation you like. Copy the piece of text from the browser onto the clipboard. 

5. Go back to the text document you were modifying and paste the quotation in the document.

6. Save the changes to your text document and close the document. 

EXERCISE 2 – Shared features of programs1. Launch some 5-10 programs on your computer without shutting  down any

of them before starting the others. If you are using the Windows operating system, for example, you can start programs from the submenu All Programs in the Start menu.

2. After launching the programs, look at their menus and toolbars.  Look at which menu contents are repeated in the different programs. Consider what the contents are that are repeated in each menu.

3. Use your web browser to go to a web page with photographs and try using the web browser’s pop-up menu. Try saving images to your home directory.

4. Leave the programs on and go on to the next exercise.

EXERCISE 3 – Switching from program to program1. You already have 5-10 programs running, but start some more. Start as

many programs as you can!  Keep an eye on their speed while starting them; do they become slower as you open more and more programs, or does your computer have enough capacity to handle the use of several programs at the same time?

2. Try switching from one program to another with the Alt + Tab key combination. Practise this function until you can move effortlessly between programs.

3. Try switching from one program to another with the help of the task bar. Whichwayfeelseasiertoyou?

4. Do not close the programs, but move on to the next exercise.

EXERCISE 4 – Solving problem situations

Page 12: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 12 of 68

1. Press down the Ctrl + Alt + Delete keys on the keyboard to bring up the task-management window.  Select  Windows Task Manager.

2. Make sure that all the programs you are running are functional. If one of the programs does not respond, close that program from the task-manager window. If there are no non-responsive programs, close the task manager. 

3. Do not close the programs you are running, but get used to the idea of using dozens of programs simultaneously: calculator, memo pad, word-processing program, spreadsheet, web browser running in a dozen separate windows, image processor, etc.

EXERCISE 5 – See basic information on your computer1. My computer / System Properties

System Properties overviewSystem Properties is a Windows Management Instrumentation (WMI) tool you

can use to view and change system properties on a remote computer or local computer

Page 13: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 13 of 68

Using System Properties you can:Change the size of the virtual memory paging fileYou can change the settings for the virtual memory paging file on a computer that

might run programs that require a lot of memory.Restart a remote computerYou can restart a remote computer to apply settings changes or to detect new

hardware.View a computer's network identification You can view the computer name and domain information for other computers on

your network.To change certain system properties on a computer, you must be an administrator.

Questions:1. Operating systems:• define and describe operating systems which contain a Command Line

Interface (CLI)

Page 14: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 14 of 68

• define and describe operating systems which contain a Graphical User Interface (GUI)

• describe the differences, including the benefits and drawbacks, between operating systemswhich contain a CLI and those which contain a GUI

2. define software as programs for controlling the operation of a computer or processing of electronic data

3. identify the two types of software – applications software and system software4. define applications software (e.g. word processing, spreadsheet, database

management systems, control software, measuring software, applets and apps, photo-editing software, videoeditingsoftware, graphics manipulation software)

5. define system software (e.g. compilers, linkers, device drivers, operating systems and utilities)

Laboratory work 4. Human-computer interaction

Laboratory Objective: Describe the resources in the Microsoft Clip Organizer; inset clip art and/or photograph into a document. Describe various tools on the picture toolbar. Use Word Art to insert decorative text into a document.

After finishing this lab students will be able to: Describe the elements on the Microsoft Word screen. Create, save, retrieve, edit, and print a simple document. Differentiate between save and save as commands. Move and copy text within a document. Use the format paragraph command to change line spacing, alignment, tabs, and indents, and to control pagination. Use the border and shading command to box and shade text.

Laboratory Hardware, Software / Tools Requirements: The required hardware for teaching this course is having a PC for each student supported with a network connection for Internet access. A data show and a PC for the course instructor are also required. Windows XP or a later version must be installed. The required lab tool is Microsoft Office 2007-2010.

Exercise 1. Create a text similar to the following.

Page 15: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 15 of 68

Основы форматирования в Word ШрифтНастройка формата выделенных символов осуществляется в диалоге

[Формат-Шрифт] и включает такие характеристики:

1. шрифт (Arial, Times, Courier);

2. начертание (Обычный, Курсив, Полужирный, Полужирный курсив);3. размер;4. подчеркивание ;5. цвет;6. эффекты (зачеркнутый, двойное зачеркивание, 7. верхний индекс, нижний индекс, с тенью, контур, приподнятый, утопленный, МАЛЫЕ ПРОПИСНЫЕ, ВСЕ ПРОПИСНЫЕ, ). 8. интервал (обычный, уплотненный, р а з р е ж е н н ы й ).

9. смещение (нет, вверх, вниз).

 Абзац

Формат абзаца (меню [Формат-Абзац]) включает такие параметры.

1. Способ выравнивания:

влево,

вправо,

по центру,

по ширине;

Requirements to the format of fontsLine Font

Title Times New Roman, 14, boldSubtitle Times New Roman, 12, bold italicThemaintext TimesNewRoman, 11

Formatrequirementsofparagraphs

LineParagraph

Alignment Padding Intervals

Title Atcenter

Left – 0Right – 0The first line – 0

Before – 6After – 6

Subtitle Attheleftedge

Left – 0Right – 0The first line –

Before – 3After – 3

Page 16: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 16 of 68

indent 1

Themaintext Atwidth

Left – 0Right – 0The first line –

indent 1

Before – 0After – 0

Exercise 2. Creating tables.Create a table based on the current progress of students.

DepartmentCourse 1 ICT Group

№ STUDENT September October2 9 16 23 30 7 14 21 28

123

Run the menu command Insert/ insert table.

Select the columns with numbers 3-11, and select the menu command Layout/

Height and cell width.In the dialog box height and width of the cells set the width of columns 3-11 equal to

1.2 cm, the width of column 2 to 3.8 cm and a width of the 1st column equal to 1cm.Highlight the top two cells of the first column and select the menu command

table/Merge cells and set the alignment to center.

Exercise 3.Calculation tables.

Prepare the document in the following form:

Intelligence

Page 17: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 17 of 68

January February March SumVolumeofsales 45000000 50000000 48000000 14300000

0Thepurchasecosts 15000000 12000000 18000000 45000000Costsforshipping 6000000 8000000 10000000 24000000Income 24000000 30000000 20000000 74000000

Director of the firm "Rhythm" И. И. Иванов

To calculate the amounts located in the fifth column, you must use the commands Layout/Formula to enter in cells of this column formulas: =SUM(LEFT).To calculate income, located in the fifth row, you must use the commands Layout/Formula to enter the cells of that column the formula: =b2-(b3+b4) =c2-(c3+c4) =d2-(d3+d4).

Exercise 4.Dial the system of inequalities

{5+√25−4 p2 p

<0 , ¿ ¿¿¿

Enter the formula for calculation of the consolidated payment

S=∑j=1

m

S j(1+ pt j/ K )+ ∑j=m+1

n

S j(1+ pt j/ K )−1.

Questions:1. MS OFFICE Is Application Software?2. Thesaurus tool in MS Word is used for... ?3. The minimum number of rows and columns in MS Word document is ?4. How many columns can you insert in a word document in maximum?5. A character that is raised and smaller above the baseline is known as?6. Selecting textmeans, selecting?7. MS-Word automatically moves the text to the next line when it reaches the right? edge of the screen and is called?8. Using Find command in Word, we can search?9. In MS-Word, for what does ruler help?

Page 18: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 18 of 68

Laboratory work 5. Databases

Laboratory Objective: After finishing this lab students will be able to: Describe the database window and the objects in an Access database. Add, edit, and delete records within a table. Describe the data types and properties available within Access and the purpose of each. Set primary key for a table. Discuss the importance of data validation and how it is implemented in Access.

Laboratory Hardware, Software / Tools Requirements: The required hardware for teaching this course is having a PC for each student supported with a network connection for Internet access. A data show and a PC for the course instructor are also required. Windows XP or a later version must be installed. The required lab tool is Microsoft Office 2007-2010.

Exercise For creation of a DB the human resources department of bank provided the

following information. Staff of credit department (ph. Department Dob 334) 1. Ivanov Ivan Vasilyevich, Pushkin St., 2, quarter 15, 8-914-46-47-485,

01/01/1960, family, 2 children, men's, Controlling, 50 000 + an award of 300 euros. 2. PetrovaNadezhdaYurevna, Lenin St., 8, quarter 46, 8-965-45-23-654,

15/06/1965, family, 2 children, women's, Deputy manager, 40 000 + award of 250 euros.

3. Surkov Roman Viktorovich, Lesnaya St., 45, quarter 9, 8-965-498-88-88, 15/07/1970, family, 3 children, men's, Deputy manager, 40 000 + award of 400 euros.

4. Ivanova Olga Dmitriyevna, Svoboda St., 456, kV.145, 8-913-759-8642, 02/04/1975, family, 1 child, female, Leading expert, 30 000 + award of 100 euros.

5. Vasilkova Elena Andreevna, Lenin St., 46, quarter 14, 8-945-789-99-91, 24/03/1979, family, 2 children, female, Leading expert, 30 000 + award of 50 euros.

6. Cat's Maxim Viktorovich, Morskaya St., 15, quarter 48, 8-913-457-78-12, 15/09/1980, family, 1 child, male, Leading expert, 30 000 + 300 euros award.

7. Lapkina Marina Sergeyevna, Pushkin St., 45, quarter 18, 8-915-465-96-96, 20/12/1988, is idle, women's, the Expert, 20 000 + 120 euros an award.

Page 19: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 19 of 68

8. Tsvetkova Anna Viktorovna, Gogol St., 50, quarter 45, 8-945-769-12-12, 26/11/1985, family, 1 child, Morskaya St., 26, quarter 22, 8-916-456-8978, Expert, 20 000 + 50 euros.

Staff of currency department (ph. Department of ext. 335) 1. Managing director (1 person) 2. Deputy manager (1 person) 3. Leading expert (2 persons) 4. Expert (2 persons)

Staff of legal department (ph. Department Dob 336) 1. Managing director (1 person) 2. Deputy manager (1 person) 3. Leading expert (2 persons) 4. Expert (2 persons)

Staff of human resources department (ph. Department Dob 337) 1. Managing director (1 person) 2. Deputy manager (1 person) 3. Leading expert (1 person) 4. Expert (2 persons)

Staff of information department (ph. Department Dob 338). 1. Managing director (it you). 2. Deputy manager (1 person) 3. Expert (2 persons)

Job 1. Creation of the new database Open the MS Access program. At screen center, click an icon "The new database".

Page 20: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 20 of 68

In the right part of a window the field for input of the name DB will appear. Call the new database "Frames + Your Surname" and you will select the personal folder for saving the Database.

Job 2. Creation of tables During creation to the new Database in the job 1 by default will appear one empty table. Create two more additional tables. Use the Table button on the Creation tab.

Save tables under names according to information which will be reflected in these tables: "Employees", "Positions", "Departments". To save the table in work area right-click on a tab of the appropriate table for a call of the shortcut menu, select item to save or click an icon "to Save" on a shortcut bar.

Pass into a design view of the table and create necessary fields. To pass into a design view on the Principal tab press the Mode button.

For each table define fields, data type and the size in compliance with information which will contain in this field.

Page 21: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 21 of 68

The Marital status field will be numerical – idle (1), family (2).

Job 3. Creation of communications In order that to create or change cross-table relationships, it is necessary to close all tables at first. Then at the Dataful Operation toolbar press the Data scheme button.

Add all existing tables on the diagram and close a window of adding of objects.

In work area the tables which are still not connected among themselves will be displayed.

Page 22: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 22 of 68

For change and creation of communications press the Change Communications button on the Designer panel.

In the appeared window press the New button. The window for communication creation will open. As the left table (the side of "one" one-to-many relationship) select the table "Positions" and the Position Code column. For the right table select the table "Employees" and the Position Code column. Pressthe OK button.

In the opened window leave a tick "Support of integrity of data" and create communication. Communication will be displayed in work area.

Create cross-table relationship "Employees" and "Departments" similarly. In total cross-table relationship will look as follows.

Create forms and reports to tables.

Page 23: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 23 of 68

Questions:1. What is the key field? 2. How to create cross-table relationship in MS Access? 3. Why property support of integrity of data is used? 4. List the main objects of MS Access? 5. For what requests are used? 6. For what forms are used? 7. For what use reports?

Laboratory work 6. Data Analysis and Data Management

Laboratory Objective:After finishing this lab students will be able to:

Describe a spreadsheet and suggest several potential applications; explain how the rows and colums of a spreadsheet are identified.

Open an Excel workbook; inser and delete rows and columns of a worksheet; save and print the modified worksheet.

Copy and/or move cells within a worksheet. Format a worksheet to include boldface, italic shading, and borderes;

change font and/or alighnment of a selected entry.

Laboratory Hardware, Software / Tools Requirements: The required hardware for teaching this course is having a PC for each

student supported with a network connection for Internet access. A data show and a PC for the course instructor are also required.

Windows XP or a later version must be installed. The required lab tool is Microsoft Office 2007-2010.

Exercise 1.Entering text data.The range A1: E3 to create a copy of the table below.

Page 24: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 24 of 68

A B C D E1 Выравнивание Текст т

екст ТЕ

КС

Т

ТЕК

СТ

2 текста

3 в Excel

Exercise 2. Enter in a cell A1 in sheet 2 proposal and format as follows (ALT + ENTER):

ЭЛЕКТРОННЫЙ ПРОЦЕССОР EXCEL

ПРЕДНАЗНАЧЕН ДЛЯ ОБРАБОТКИДАННЫХ, представленныхв ТАБЛИЧНОЙ ФОРМЕ.

Exercise 3.On sheet 4a) Write to A1-A12 cell names of all the months of the year, starting in January.In cell A1 write the first month. Then, with the help of auto-stretch marker down. In this monthsmonths will continue automatically in order.b) Write to B1-B7 cell names of all the months since Julyc) Record the cells C1-C7 days of the week.d) Write to cell D1-D10 numbers from 1 to 10, for this you need to enter in cell D1 and D2 figures 1 and 2, then select them, and autocomplete continue down marker.e) Record E1-E9 cell number from -2 to 2 in 0.5

Exercise 4. Create a pie chart displaying the average score on the subjects on the basis of the table "Results of the examinations." Table randomly fill up to 5 people.

The results of the examination session

№ Name Mathematics Economy. Theory

Computer science

1. Макаров С.П. 5 2 5

2. Иванов П.Р. 5 3 3

3. Петров К.К. 5 4 4

Average =СРЗНАЧ(С2:С4)

Create a pie chart in percent.

Page 25: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 25 of 68

Exercise 5.Construct the graph of y = sin x. The value of argument x to select the range of -6 to

6 in increments of 0.5.X -6,0 -5,5 -5,0 ... 5,5 6Y =SIN(B1) …

What will fill the values of X by pulling the string. The Y row insert the formula = Sin (B2) and will extend until the end of the table.

Next, select the range, and built on the Standard toolbar press the button Chart Wizard. We choose the type of chart - graph.

Exercise 6.Perform calculations using the following formulas:

A=4+3∗x+2∗x2+x3 , B=x+ y+zx⋅y⋅z , C= √ 1+x

x⋅y ,counting the predetermined value x, y, z, respectively, in the cells A3, B3 and C3.Result:

Questions:1. What is a spreadsheet?2. What is an active cell?3. What is a Worksheet?4. What is a Formula?5. What is a Charts?6. What is a Row?7. What is a Value?8. What is a Column?9. What is aChange Chart Type?10.What is aSwitch Row/Column?11.What is aChart Title?12.What is aLegend Position?13.What is aData Labels?

Laboratory work 7. Networking and telecommunications

Page 26: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 26 of 68

Laboratory Objective: to create a simple network

Laboratory Hardware, Software / Tools Requirements: The required hardware for teaching this course is having a PC for each student supported with a network connection for Internet access. A data show and a PC for the course instructor are also required. Windows XP or a later version must be installed. The required lab tool is Microsoft Office 2007-2010.

Local Ethernet network - the most widely used technology of building local networks, allowing computers to interconnect in a unified data exchange system.In this lab, we will create a simple local area network, consisting of two laptops connected to each other via the amplifier HUB.

Network Diagram is as follows:

Creation of a network.1. Take the network cable. One of its socket, connect the network card laptop so that it is firmly and completely into it went (which usually indicates a click grip). The other end of the cable just connect to one of the HUB hub ports. The ports are located on the rear panel of the hub.2.In the same way connect the other laptop.3.The network installed and can now be set up.

Network configuration.Network setup is to install the protocols that are necessary for its operation.Remember. Protocol - a specific language, by which computers on the network are sharing data. Our network is working protocol will be TCP / IP protocol. For computers to exchange data, this protocol must be installed on all computers that are in the network.On the laptop №2 TCP / IP protocol is already installed, we needed to install and configure the protocol Laptop №1 (cm. Network diagram). Remember that all the setting items to be performed in the order in which they appear. Do not break the sequence settings.

Page 27: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 27 of 68

№1 on the laptop, follow these steps

1. Right-click on the icon "My Network Places" and select "Properties" item. A window with network settings.

Right-click on the icon "Local Area Connection" and select "Properties" item. A window will open to the LAN settings.

2. Select "Internet Protocol (TCP / IP)» and click "Properties". Window opens the TCP / IP settings.

Page 28: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 28 of 68

3. Now we need to set specific settings required for the protocol. Each computer on the network, these settings must be unique. Enter exactly the settings that are shown in the figure.

Here10.242.50.240 - is the IP-address on the network.255.255.255.0 - Subnet Mask. This is a special setting that together with the address uniquely identifies the network where the computer is located. 4. After entering protocol settings, click "OK", the window «TCP / IP Properties" closes. Click "OK" in the "Local Area Connection". Window settings of this connection will be closed. The network is set up to work, and now her job to check. Check network performance.Once the network is set up, you need to check their work and make sure that the computers can communicate with each other. You need to know that the network can be a variety of services, and services, each of which performs its tasks. In the network, we have set up two services work: Local WEB-server for placement of HTML-pages in the network, and Service files and Microsoft network printers, by which made file sharing and working together with them.First, check the job WEB-server. In order to test the WEB-server, run on a laptop №1 Internet, Internet Explorer, and in its address bar, type http://10.242.50.1/net/If the page is loaded, proceed according to the instructions written on this page.If the page is not loaded, then the network is configured incorrectly. Then do the following:4. Make sure that the network cable connectors are securely and tightly connected to the notebook and the hub HUB.5. Check again the settings of TCP / IP and make sure that they are correct. IP-address should be - 10.242.50.240, Subnet mask - 255.255.255.0

Page 29: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 29 of 68

6. Make sure that the hub HUB power adapter is plugged in.

Questions:2. Local Ethernet network?3. Creation of a network?4. Network configuration?5. Internet Protocol?

Laboratory work 8. Cyber Security, Ethics and Trust

Laboratory Objective: to apply methods and means of information protection;

Laboratory Hardware, Software / Tools Requirements: The required hardware for teaching this course is having a PC for each student supported with a network connection for Internet access. A data show and a PC for the course instructor are also required. Windows XP or a later version must be installed. The required lab tool is Microsoft Office 2007-2010.

Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction. 

Set a password in a Word documentTo encrypt your file and set a password to open it:

1. Click the Microsoft Office Button , point to Prepare, and then click Encrypt Document.

Page 30: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 30 of 68

2. In the Encrypt Document dialog box, in the Password box, type a password, and then click OK.

Caution: Keep your password in a safe place. If you lose or forget the password, it can't be recovered.You can type up to 255 characters. By default, this feature uses AES 128-bit advanced encryption. Encryption is a standard method used to help make your file more secure.

3. In the Confirm Password dialog box, in the Reenter password box, type the password again, and then click OK.

4. To save the password, save the file.

Remove password protection from a Word document1. Use the password to open the document.

2. Click the Microsoft Office Button , point to Prepare, and then click Encrypt Document.

3. In the Encrypt Document dialog box, in the Password box, delete the encrypted password, and then click OK.

4. Save the file.

Set a password to modify a Word documentIn addition to setting a password to open a Word document, you can set a password to allow others to modify the document.

1. Click the Microsoft Office Button , click Save As, and on the bottom of the Save As dialog, click Tools.

2. On the Tools menu, click General Options. The General Options dialog opens.3. Under File sharing options for this document, in the Password to modify box,

type a password.4. In the Confirm Password dialog, re-type the password. Click OK.5. Click Save.

Note: To remove the password, repeat these instructions and then delete the password from the Password to modify box. Click Save.

Set a password in an Excel spreadsheetTo encrypt your workbook and set a password to open it:

1. Click the Microsoft Office Button , point to Prepare, and then click Encrypt Document.

Page 31: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 31 of 68

2. In the Password box, type a password, and then click OK.You can type up to 255 characters. By default, this feature uses AES 128-bit advanced encryption. Encryption is a standard method used to help make your file more secure.

3. In the Reenter password box, type the password again, and then click OK.4. To save the password, save the file.

Remove password protection from an Excel spreadsheet1. Use the password to open the spreadsheet.

2. Click the Microsoft Office Button , point to Prepare, and then click Encrypt Document.

3. In the Encrypt Document dialog box, in the Password box, delete the encrypted password, and then click OK.

4. Save the spreadsheet.

Set a password to modify an Excel spreadsheetIn addition to setting a password to open an Excel spreadsheet, you can set a password to allow others to modify the spreadsheet.

1. Click the Microsoft Office Button , click Save As, and on the bottom of the Save As dialog, click Tools.

2. On the Tools menu, click General Options. The General Options dialog opens.3. Under File sharing, in the Password to modify box, type a password.4. In the Confirm Password dialog, re-type the password. Click OK.5. Click Save.

Note: To remove the password, repeat these instructions and then delete the password from the Password to modify box. Click Save.

Set a password for a PowerPoint presentationTo encrypt your presentation and set a password to open it:

Page 32: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 32 of 68

1. Click the Microsoft Office Button , point to Prepare, and then click Encrypt Document.Caution: Keep your password in a safe place. If you lose or forget the password, it can't be recovered.

2. In the Password box, type a password, and then click OK.You can type up to 255 characters. By default, this feature uses AES 128-bit advanced encryption. Encryption is a standard method used to help make your file more secure.

3. In the Reenter password box, type the password again, and then click OK.4. To save the password, save the file.

Remove password protection from a PowerPoint presentation1. Use the password to open the presentation.

2. Click the Microsoft Office Button , point to Prepare, and then click Encrypt Document.

3. In the Encrypt Document dialog box, in the Password box, delete the encrypted password, and then click OK.

4. Save the presentation.

Set a password to modify a PowerPoint presentationIn addition to setting a password to open a PowerPoint presentation, you can set a password to allow others to modify the presentation.

1. Click the Microsoft Office Button , click Save As, and on the bottom of the Save As dialog, click Tools.

2. On the Tools menu, click General Options. The General Options dialog opens.3. Under File sharing settings for this document, in the Password to modify box,

type a password.4. In the Confirm Password dialog, re-type the password. Click OK.5. Click Save.

Page 33: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 33 of 68

Questions:1. Information security?2. Set a password in a Word document?3. Remove password protection from a Word document?4. Set a password to modify a Word document?5. Set a password in an Excel spreadsheet?6. Set a password for a PowerPoint presentation?

Laboratory work 9. Internet Technology Laboratory Objective: Learning the basics of creating HTML-documents.

Create HTML-document using HTML-tags. The logical and physical text formatting. Use the links.

Laboratory Hardware, Software / Tools Requirements: The required hardware for teaching this course is having a PC for each student supported with a network connection for Internet access. A data show and a PC for the course instructor are also required. Windows XP or a later version must be installed. The required lab tool is Microsoft Office 2007-2010.

Procedure of work1) Create a new HTML document using any conventional or specialized text

editor. The text must contain the required tags for every HTML document (<HTML>, <BODY>). Add text on a particular subject. Save the document in a folder together with the previously saved document titled "index.html".

2) Set title displayed in the title bar of the browser window. The text of the title bar - the name in

Russian. Use with the tag <TITLE>.3) Set the required background color and the text of the document. To set the

color of a document, use the parameters "BGCOLOR", "TEXT", inside the opening tag <BODY>.

4) Write a paragraph of text arbitrary largest font. In this case, you should use tags containers responsible for the font size, for example, <H2>. To carry out the alignment of various paragraphs (centering, press Right, Left, Justify).

5) Perform a logical formatting of the text as a small fragment of code with the release.

6) Perform a physical formatting of the text, as a small portion of monospaced font, underlined, and with blinking effect.

7) Write the definition of any of the three concepts of the course different colors and headsets (Arial, Times, monospaced font). The term should be displayed in bold italic and underlined. Up-beat of this effect may be using the tag <FONT> with parameters.

8) Add to Web-five kinds of reference document.

Page 34: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 34 of 68

9) To carry out experiments with the Escape-sequences. We should not forget that these sequences are case sensitive.

Methodical instructions1 General provisions of HTMLLanguage HTML (Hypertext Markup Language, Hypertext Markup Language) -

a structural markup language used to create Web-pages. HTML-documents can be viewed by different types of Web-browser. When a document is created using HTML, Web-browser can interpret HTML to distinguish different elements of the document and their primary treatment. Using HTML allows you to format documents for submission using the fonts, lines and other graphical elements on any system to view them.Web-pages can be created by:

1) a plain text editor;2) editor that can store the text in HTML format;3) specialized Editor;4) a dedicated system.HTML-documents are saved on the disk as normal text documents in ANSI

format. To identify Web-pages in their customary names denote those files using the .HTM extensions (for Windows 3.1) or .HTML (for Windows 95/98 / Me / NT / XP, Macintosh and Unix).

Also useful text in HTML-documents using special control alphanumeric codes (Tags), placed in angle brackets <B>, <HTML>, <IMG>, <HR>. Most elements consist of a pair of tags - opening and closing. The opening tag - it's just a mnemonic symbol element, enclosed in angle brackets <B>. The closing tag is identical to the open, with the exception that before the letter put forward slash </ B>. While some items do not need to put closing tag, because he did not surround <BR>.tag structure in general, as is the following:

<TEG parameter 1 = value1 ...> text that is subject to a tag</Tag> or <TEG parameter1 = value1 ...> textother designs. When interpreting the tag browser does not distinguish between uppercase and

lowercase letters. Therefore own tags can be typed in any case. Often the parameter (attribute) value is optional and can be omitted.

2 Structure of the HTML-documentWhen the Web-browser receives a document, it determines how the document

should be interpreted. The first tag that appears in the document should be tagged <HTML>. This tag tells the Web-browser that the document is written using HTML. Minimal HTML-document will look like this: <HTML> ... document body ... </ HTML>

In general Web-document has the following structure:<HTML><HEAD><TITLE> Document Title </ TITLE>

Page 35: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 35 of 68

</ HEAD><BODY>... The body of the document</ BODY></ HTML><HTML> and </ HTML> contains within itself all the elements of HTML-code

to indicate that you are using the language of HTML.<HEAD> and </ HEAD> designated Web-document title. As a rule, the header

contains the name of the document, the information to be indexed, and some general settings for the document. Tag header of the document should be used immediately after the tag <HTML> and more than anywhere else in the body of the document.

<BODY> and </ BODY> is framed by the rest of the document (the body). Here is located the main semantic text and graphic information.

Separation of the document header and the body has a meaning. The text contained in any of these parts, the screen looks exactly the same. Inside the container <HEAD> tag can be used <TITLE>, as shown above. Most Web-browser displays the content of this tag in the header of the window containing the document and in the bookmarks file, if it is supported by WEB-browser. Title of the document does not appear when the document is displayed in the window / 5 /.

Like any language, HTML allows you to insert into the body of the document explanatory text (comments) that is stored in the transmission document on the network, but is not displayed by the browser. The syntax is the following comment:

<! - This is a comment -> Comments may appear in the document anywhere and in any quantity.

3 Formatting textWhen displaying on-screen text browser ignores the extra spaces, tabs, and

carriage returns empty string. They can be used in order to make the text of HTML-document easier to read, but you should use special tags for proper display it on the Web-page:

a) The colors in the HTML-document.HTML language defines the following types of flowers:- BGCOLOR (background color for the document body)- TEXT (the color used in the derivation of the text on the screen of this

document)- LINK (the color that will be used when displaying text from a not yet chosen your hypertext links)- VLINK (the color that will be used when displaying text from already proven you hypertext links)- ALINK (the color that will stand out in the text of hypertext ligament at the time when the user clicks on them mouse button).

There are two color forms task: character (indicated by the name of one of the predefined colors) and digital (combination of RGB: #RRGGBB).

Symbolic ids primary colors RGB-and their combinations are listed below:

Page 36: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 36 of 68

- BLACK (# 000000) - black,- SILVER (# C0C0C0) - silver,- GRAY (# 808080) - gray,- WHITE (#FFFFFF) - white,- MAROON (# 800000) - dark red,- RED (# FF0000) - red,- PURPLE (# 800080) - dark purple,- FUCHSIA (# FF00FF) - lilac,- GREEN (# 008000) - Green,- LIME (00FF00) - bright green,- OLIVE (# 808000) - olive,- YELLOW (# FFFF00) - yellow,- NAVY (# 000080) - Dark Blue,- BLUE (# 0000FF) - blue,- TEAL (# 008080) - blue-green,- AQUA (# 00FFFF) - bright blue.Attribute indicating the color, can be used in the tags <BODY>, <FONT>, <HR>,

<MARQUEE>, <TABLE>.b) The elements block-level formatting.<P align = left | center | right | justify nowrap> text </ P> - separates the two

paragraphs by a blank line. Can not have a pair of </ P>. The parameter ALIGN aligns data. Application NOWRAP parameter allows you to write text without hyphenation. To center the text or graphics can be used as a container <CENTER>.<H1 | H2 | H3 | H4 | H5 | H6 align = ...> text </ H1 | H2 | H3 | H4 | H5 | H6> - used to highlight the structural parts of the text. Each title style has its own size. Tag <H1> is the largest size.

<HR align = ... size = ... width = ... noshade> - is designed for drawing a horizontal line. SIZE attribute specifies the line width in pixels, WIDTH - its width in pixels or percentage of the width of the browser window. NOSHADE attribute allows us to represent the line without a trace in the form of a simple dark stripes.

<BR> - Is the transition to a new line without breaking a paragraph.<WBR></ WBR> - defines the place of the possible (recommended) Transfer

(break) lines.<NOBR></ NOBR> - contains text that should not be broken into lines, even if it goes beyond the limits of the screen. Instead, the browser will allow text to scroll horizontally.<PRE></ PRE> -, the browser displays the screen as it is - with all spaces, tabs and newline.

This is very convenient when creating simple tables.<BLOCKQUOTE></ BLOCKQUOTE> - is intended to refer to the document

quotes from another source. Text marked with this tag, retreating from the left edge of the document on the 8 spaces.

Example:

Page 37: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 37 of 68

<P><font size = "1"> Font size 1 </ font></ p><P><font size = "2"> Font size 2 </ font></ p><P><font size = "3"> Font size 3 </ font></ p><P><font size = "4"> Font size 4 </ font></ p><P><font size = "5"> Font size 5 </ font></ p><P><font size = "6"> Font size 6 </ font></ p><P><font size = "7"> Font size 7 </ font></ p>In your browser, it will look as follows:

Figure 9 - The font size

c) logical formatting of the text elements.<ABBR></ ABBR> - Marks the text as an abbreviation.<ACRONYM></ ACRONYM> - Just like the tag <ABBR> is used to mark

abbreviations. This tag is recommended to observe the so-called acronyms, ie, spoken word consisting of abbreviations.

<CITE></ CITE> - used to mark quotations or titles of books and articles, links to other sources.

<CODE></ CODE> - celebrate their text as a small piece of code.<DEL></ DEL> - celebrate their text as a remote.<DFN></ DFN> - celebrate their word fragment as the definition of<INS></ INS> - celebrate their text as an insert.<EM></ EM> - Used to emphasize important parts of the text.<KBD></ KBD> - Marks the text as input from the user keyboard.<Q></ Q> - Marks a short quote in a string of text.<SAMP></ SAMP> - Marks the text as an example.<STRONG></ STRONG>- Used to emphasize important parts of the text<VAR></ VAR>- Indicates the names of program variables.g) The elements of the physical text formatting<B></ B>- Displays text in bold.<I></ I>- Displays text in italics ..<TT></ TT>- Displays text in monospaced font.<U></ U>- Displays the text underlined.<STRIKE></ STRIKE>- Displays the text underlined.<S></ S>- Displays text, crossed by a horizontal line.<BIG></ BIG>- Displays the text larger.<SMALL></ SMALL>- Displays smaller text size.

Page 38: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 38 of 68

<SUB></ SUB>- Shifts the text below the line level and outputs it to a smaller font.

<SUP></ SUP>- Shifts the text above the row level and outputs it to a smaller font.

<BLINK></ BLINK>- Displays blinking text.<BASEFONT>- Used to specify the size, type and color of the font used in the

document by default<FONT size = ... color = ... face = ...> text </ FONT>- Specifies the font

settings.size - sets the font size to be used by the text contained within the element font. You can specify an absolute font size by entering any integer from 1 to 7. You can also specify the font size relative telling attribute of integer (which may be size = "+ 1" or size = "- 2").

color - the color indicates that this piece of text is highlighted. Colors are given as RGB-values to hexadecimal notation, or one of the standard colors chosen.

face - specifies the typeface.

4 Special HTML tags

Tag <ADDRESS> is used to highlight the document author and his address (e-mail). Syntax:

<ADDRESS> Location-author </ ADDRESS>Some characters are control characters in HTML and can not be used directly in

the document:- The left angle bracket "<"- The right angle bracket ">"- The ampersand "&"- double quotes """To use these characters in the document, you must replace them with escape-

sequences:<- &lt; > - &Gt; & - & Amp; "- &Quot ;.There are a large number of escape-sequences to refer to special characters ( "&

copy;" to indicate the sign and "&reg;" for the icon ). One feature is the replacement of characters in the second part of the symbol table (after the 127th character) escape-sequences to transfer text files to the national languages through 7-bit channels.

Escape-sequence sensitive: DO NOT use & LT; instead of &lt ;.

5 LinksHypertext links (links) are the most important element of Web-pages. With their

help, doing paperwork related and structured, allowing the user to obtain the necessary information quickly and conveniently.

Links can point to another document, a special place in this document, or to perform other functions, for example, to request a file on the FTP-protocol browser to display it. URL (Universal Resource Locator) - a universal way of addressing resources

Page 39: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 39 of 68

on the network may indicate a special place in the absolute access path, or point to a document in the current access path that is often used for large structured organizations of Web-sites. In the URL after the file name in # (sharp) a special marker may be indicated. This item is a reference to a line (point) inside the HTML-document / 5 /.

Link consists of two parts. The first of them - this is what can be seen on the Web-page; she calls a pointer reference (anchor). The second part, giving instructions to the browser address is called a part of links (URL-address). When a mouse click on the index links, the browser loads a document whose address is given the URL-address. The following are the rules of construction of the individual elements of references. The second part of the link is the URL - the address. This is nothing like the Web address - the page that will be downloaded when you click on the index.

Link made <A> tag. Tag <A> has a single parameter HREF, whose value is the URL-address. This tag is a container, so you need to put closing tag </A>.

<A HREF = URL - e> Text reference pointer </ A>The pointer may be either relative or absolute.The relative indicators are easy to use. It is much easier to arise and shine forth,

only to build the file name, and not the entire long the URL-address. It also allows you to move files within the server without major changes in the cross-page addressing.

URL-address, is completely determined by the computer, the directory and the file is called absolute. In contrast to the relative, absolute pointers can refer to files on other computers.Also links to other documents, it is often useful to include a reference to the different parts of the current document. For example, a large document easier to read if it has a table of contents with links to the relevant sections.

To build internal links you first need to create an index that determines the destination. For example, if you want to link to the text of a specific title, you need to place the pointer there and give it a name using the parameter NAME <A> tag. HREF This option is not used, and the browser does not emit <A> tag contents.Example:

<A NAME = chapter_5></A>It is necessary to note that in this example there is no content <A> tag. Usually it

is and do as there is no need to somehow highlight text, and is only required to specify the location.

Once the destination is determined, you can proceed to the establishment NIJ-reference. To do this, instead of specifying the parameter HREF document addresses, as was done previously, place the reference to the name with the prefix #, talking about the fact that it is an internal link.

Example:<A HREF = "# chapter_5"> Chapter 5 </A>Now, if the user clicks the mouse on the words "Chapter 5", the browser will

display the corresponding part of the document in the preview window.Web-space is only part of the Internet. Other resources have begun to exist long

before the birth of the WWW, so have accumulated a lot of information worthy of

Page 40: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 40 of 68

attention and have a large enough audience. Therefore, developing a personal web page or document can include links to other resources.

Internet resources are very diverse in form and content. Although HTML involves the ability to create their own versions of these resources by the data processing mechanism forms, there are easier ways to interact with UseNet systems, Telnet, FTP, e-mail and others. For example, you can create a document using a different form of tags, textual elements and click to send an email to the address you want. However, it will be much easier to communicate to specify only your e-mail address. In this case, simplified page update that will not be associated with changes in forms. In addition, many browsers have built-in support for some of the resources that makes it possible to reduce the time to establish a connection with them.

The most popular activity on the Internet is the exchange of e-mails. Members of this resource is much more than any other. Most modern programs for the exchange of electronic messages have a user-friendly interface and easy to use.

Create a link to an email is as simple as a different page. To do this, instead of the URL-address should be the address e-mail, prefacing it with the word mailto :.

Example:<A HREF="mailto:[email protected]"> Send us your feedback </ A>Links to other Internet resources are recorded similarly.Web - page - http: // sitenamee-mail - mailto: addressNewsgroup - news: newsgroupnameftp - ftp: // sitenameGopher - gopher: // sitenameWAIS - wais: // sitenameTelnet - telnet: // sitename

Questions:1. What is meant by the term opens and closes tags? Do they always apply the

two?2. whether the HTML language Register affects the result of?3. How you can make a comment tag in HTML?4. What is the tag lets you change the background color of the HTML-

document?5. Appointment of the tag <HR>?6. Appointment of a tag <BIG>?7. What changes will result in the use of tag <ADDRESS>?8. How to build internal links create an index that determines the destination

within a document?

Laboratory work 10. Cloud and Mobile technology

Page 41: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 41 of 68

Laboratory Objective: Account creation in the cloud

Laboratory Hardware, Software / Tools Requirements: The required hardware for teaching this course is having a PC for each student supported with a network connection for Internet access. A data show and a PC for the course instructor are also required. Windows XP or a later version must be installed. The required lab tool is Microsoft Office 2007-2010.

Google Cloud Storage allows application makers to store their data on Google’s infrastructure with very high consistency, presentation and ease of use. Consider using Google Drive to store personal data. If you are an application maker you can do so using the Google Drive SDK. Google cloud storage is permitted by default for most projects. Before using Google cloud storage, you will require to allow billing and you should allow the API in your Google Cloud Platform to store data in Google Cloud Storage.

Need to activate Google cloud storageYou will not require to activate Google Cloud Storage depending on your

circumstances. Review the following circumstances to determine if you need to activate Google Cloud Storage.

Activate Google cloud storage if you require to add objects, control your data and create buckets.

Do not require to activate google cloud storage If you access data publicly. Use gsutil tool to download and access the data

without Google account.Read and write to a bucket to which you have approved access. When you have

approved access to access the data, you do not require to activate the Google Cloud Storage service.

You can still use thegsutil tool to set up your permits to read or write that data using your Google account.

How to activate Google Cloud StorageYou activate the Google Cloud Storage service on a project-by-project basis. For

newly created projects, the Google Cloud Storage is activated automatically.

To activate Google Cloud Storage:1. First, a Google account from Gmail.2. Go to the Google Cloud Platform Console.3. Create a project. If you have multiple projects, you have to activate Google Cloud Storage and click ‘Continue’.4. If you do not have a project, click on ‘create a new project’ and click on ‘create’.5. In the Google Cloud Storage component overview, click ‘Enable API’.

Page 42: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 42 of 68

6. Google Cloud Storage component is already turned on for most projects, you will see ‘Disable API’.7. Allow billing for the project. Before using Google Cloud Storage, you will require to allow billing for your project. To do that:8. Go to the billing page for the project you created above.9. Next, click ‘Enable billing’.

Using storage bucketsThe easiest way to use a Cloud Storage bucket in an App Engine app. An App

Engine default bucket requires neither configuration, permissions, further activation, nor allow billing on your app, because it comes with a free share.

Using a default bucket

To use a default bucket Define whether your app has created the default bucket. If it does not have a default bucket, create one: Go to Cloud Storage in the Google Cloud Platform Console. Click on ‘create’ and wait for default bucket to be created. Now, the bucket will be completely created and ready for use.

Using a non-default bucket

You may not require to use the default bucket. If you use a non-default bucket, you should allow billing for your app.

To create a new non-default bucket: In the Cloud Platform Console enable billing for your project. Go to Cloud Storage of your project. Select ‘create bucket’.

Mobile cloud storage is a form of cloud storage that applies to storing an individual's mobile device data in the cloud and providing the individual with access to the data from anywhere. Mobile cloud storage additionally facilitates syncing and sharing data across multiple devices such as mobile phones and tablet computers. Mobile cloud storage is also sometimes referred to as cloud storage on the go, personal cloud storage or pocket cloud storage.

Apple's iCloud, Google Drive and Dropbox are some of the most recognizable examples of mobile cloud storage.

Introduction to mobile phonesThe main purpose of the mobile phone is to be able to make and receive

telephone calls.

Page 43: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 43 of 68

In addition, text messaging is a basic function, officially called SMS (Short Message Service). All phones, even the cheapest ones are able to perform these basic functions.Moving on from there, middle-of-the-road phones have extra features.They have become a mulitfunctional device i.e. they can do more than one thing.Extra features include a clock, calculator, calendar, alarm features, basic games and to-do lists.Feature of mobile phones cont.There are a number of other features available on mobile phones. These include:

RadiosMany mobile phones can pick up any radio stations in your area so you can listen to your favourite radio channel 

CamerasMost mobile phones now contain a camera.The quality of the camera is determined by its resolution. A typical mobile camera has a resolution of 2 - 5 Megapixels.To give you an idea of the quality needed, a 3 Megapixel photo can be enlarged perfectly well up to A4 size.The higher the Megapixels the more detailed the photograph becomes.However the picture files also become larger.The file size of each photo is important because

The larger the photo, the longer it takes to send. The larger the photo the fewer you can store in the mobile's memory.

Some mobiles even have a small flash to allow photos to be taken in low light. 

Smartphones

Quite recently the mobile phone has developed into what is now called a 'smartphone'. These are true multifunctional devices. Yes, they can do all that mobiles can do but also so much more.

Part of the reason for the improvement in their capability has been the addition of some extra sensors in the device - namely a gyroscope that can measure angle, tilt and orientation.

They also contain GPS chips to pick up your exact location and touch screen technology.

 Smartphones are now supported by thousands of independent developers around

the world who dream up new things you can do with smartphones.

Page 44: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 44 of 68

There are apps that tell you the name of any song just by 'listening' to a few bars of music, apps to find out what is on at your local cinema, apps that track your exercise and calories, games, video players, joke generators and so on.

Basically, if you want to do something with your smartphone, there is generally an app to help you.

All these are available in the 'app store' of the smartphone maker. Some apps are free, some are available for purchase for a small fee.

These are some of the additional things a smartphone can do Touch screen, real and virtual keypads Email and internet Satellite Navigation Intelligent maps

Sensors inside a smartphoneSmartphones have an amazing array of sensors as shown below. It is up to the imagination of the app developer to make best use of them.Did you know that some space companies are making micro-satellites because they use low cost mobile phone technology (use the search box below to explore) 

Smartphone sensors

Sensor Purpose

Touch screen Respond to finger touch and swipes

GPS Global Positioning System allows your exact location to be determined

Accelerometer Measures movement and orientation

Gyroscope Measures changing angles in the three directions x y z and helps the accelerometer to be more accurate

Proximity sensor *** Recognises when you move the phone up to your face

Ambient light sensor

Allows screen brightness to be adjusted automatically (good for battey life)

Magnetometer Senses magnetic North so good for location services and compass services

Page 45: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 45 of 68

Smartphone sensors

Sensor Purpose

M7 motion sensor **

Can tell the difference between walking and driving to stop the Wi-Fi trying to attach to constantly changing hot spots whizzing by (which drains a battery quicker)

Temperature and Humidity sensors ***

Senses your environment

** Apple iPhone 5S and iPad Air*** Not common yet

Questions:1. What is Cloud?2. What is Mobile technology?3. What is Google Cloud Storage?4. Mobile phones?5. Smartphones?

Laboratory work 11. Multimedia technologies

Laboratory Objective:After finishing this lab students will be able to: Start PowerPoint; open, modify, and view an existing presentation. Use the outline to create and edit the text of a presentation. Add a new slide to a presentation. Apply a design template to a new presentation; change the template in an

existing presentation. Add headers and footers to slides.

Laboratory Hardware, Software / Tools Requirements: The required hardware for teaching this course is having a PC for each student supported with a network connection for Internet access. A data show and a PC for the course instructor are also required. Windows XP or a later version must be installed. The required lab tool is Microsoft Office 2007-2010.

Multimedia is content that uses a combination of different content forms such as text, audio, images, animations, video and interactive content. Multimedia contrasts

Page 46: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 46 of 68

with media that use only rudimentary computer displays such as text-only or traditional forms of printed or hand-produced material.

Multimedia can be recorded and played, displayed, interacted with or accessed by information content processing devices, such as computerized and electronic devices, but can also be part of a live performance. Multimedia devices are electronic media devices used to store and experience multimedia content. Multimedia is distinguished from mixed media in fine art; by including audio, for example, it has a broader scope. The term "rich media" is synonymous for interactive multimedia. Hypermedia scales up the amount of media content in multimedia application.

Multimedia may be broadly divided into linear and non-linear categories. Linear active content progresses often without any navigational control for the viewer such as a cinema presentation. Non-linear uses interactivity to control progress as with a video game or self-paced computer based training. Hypermedia is an example of non-linear content.

Multimedia presentations can be live or recorded. A recorded presentation may allow interactivity via a navigation system. A live multimedia presentation may allow interactivity via an interaction with the presenter or performer.

The first and most important step for the creation of a successful multimedia presentation is the choice of technology to be used. There are two main programs used today, Microsoft PowerPoint and Adobe Flash.

Microsoft PowerPointMicrosoft Power Point is the easiest way to create a multimedia presentation.

You can add videos, soundtracks, simple menus and some simple animations.The biggest advantage of using PowerPoint is the ease with which anyone can

edit the presentation.

Adobe FlashAdobe Flash allows you to create multimedia presentations in which you can

build powerful animations, besides having an excellent technology for video compression. Another great advantage of this program is that you can put your presentations directly on the website.

However, Flash is a difficult system to operate, limiting their use to specialized professionals. In its most recent versions, Flash has included some features that facilitate the creation of multimedia presentations, but there is no doubt that this is a tool far more complicated than Microsoft PowerPoint.

In addition, Adobe Flash is an expensive program, which further limits its use to create a multimedia presentation.

Advantages of multimedia presentations Do not need internet access to be used; They are highly engaging;

Page 47: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 47 of 68

The striking visual effects certainly help get your message across in a more clear and attractive manner to your audience;

It has a high degree of interactivity, which provides better performance for the presenter or speaker;

It offers the poZzssibility of sending a CD presentation to your audience in order to check out all the details of your product or service on their personal computer.

How to embed videos in your PowerPoint presentationEmbedding your video clipMake sure you have selected  ‘Insert’ on your ribbon.  By the way, a quick way to

do this is to use the mouse wheel to choose between ‘File’, ‘Home’, ‘Insert’, etc.  The scroll wheel jumps from tab to tab as you scroll the wheel.  Or simply click the tab to select.

Fig 3. Video selection iconOn the right is the ‘Video’ insert menu/ribbon selection icon and on clicking you

are offered three further choices.  We will deal with them from top to bottom.Video from FileSelecting this option will open a dialog box so that you can navigate to where

your video clip is filed on your PC.

Once you have found your clip and selected it, click the insert button and the clip is embedded into your slide, as you can see here.

Page 48: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 48 of 68

How to add music to your PowerPoint presentationChoose your music format – MP3 or WAV.That is the best format? MP3 – Smaller file size, but cannot be embedded WAV – Larger file size, but can be embeddedIf you have music from Apple iStore you will need to convert them to mp3

format.We have got a range of free music loops and sound clips you can use.

Step 2. Insert the music in your PowerPoint presentation.From the main menu Insert > Movies and Sounds > Sound from file

Then from the Files of Type drop down box select mp3 format.

You will then get a message about how you want the music to start

Step 3. Setting the music to play across multiple slidesA lot of people have asked if it is possible to keep the music playing across

multiple slides- for example if you wanted to make a slide show of someone’s life with music playing in the background – or it could be a useful feature at a trade show.

Page 49: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 49 of 68

You do this using a feature called Custom Animation. Select your music file then Right click (not the usual left click) and select Custom Animation. You can do this by selecting Slide Show > Custom Animation

How you do this depends upon which version of PowerPoint you are using.

Step 4. (Almost there). How to embed music in your presentation

If you want the music to be embedded in the presentation you will need to follow a couple of steps.

1. Make sure your music is in WAV format (mp3 files can only be linked and not embedded)

2. Increase the value in the Link sounds with file size greater than box to a value greater than the file size of the MP3 file. For example if the file size is 4.5MB then you will need to include a value higher than 4500. A good general purpose size that should incorporate most song files is 6000 as most mp3 files are less than 6MB. Be careful as some classical music tracks could be longer than this.

Questions1. What is Multimedia?2. What is multimedia presentation?3. What is Microsoft PowerPoint?4. What is Adobe Flash?5. How to embed videos in your PowerPoint presentation?6. How to add music to your PowerPoint presentation?

Laboratory work 12. Smart technology

Laboratory Objective:After finishing this lab students will be able to: possibilities of Smart-services; use of search engines and electronic resources in the professional purposes.

Laboratory Hardware, Software / Tools Requirements:

Page 50: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 50 of 68

The required hardware for teaching this course is having a PC for each student supported with a network connection for Internet access. A data show and a PC for the course instructor are also required. Windows XP or a later version must be installed. The required lab tool is Microsoft Office 2007-2010.

One of the most useful technologies to have appeared in the last few years are based on radio communication. Namely, Wi-Fi and Bluetooth.

Both have allowed people to connect to the internet and other devices without the need for an awkward cable.

Bluetooth Bluetooth is a type of radio communication and networking protocol combined.

It was developed so devices close to one another could exchange data, without any need for a physical connection.

By close, we mean within about 10 metres of one another even if there is a wall in-between.

This means it is possible to have 'hands-free' phone conversations in the car whilst driving because the car is fitted with bluetooth technology. A great boon to safety, as there were many road accidents caused by distracted drivers before the law on mobile phones changed and the introduction of Bluetooth into new cars.

The picture opposite shows a typical setting-up screen on a smartphone fitted with bluetooth. It allows you to switch it off if you want and it shows all the nearby devices the phone can connect to.

Advantages of BluetoothOne advantage with Bluetooth working within a short range is that it only needs a

tiny amount of radio power to work, less than a thousandth' of a Watt. ( A torch light uses about 1 Watt to light the bulb) so you can see this is a tiny amount of power. This means it is ideal for battery operated devices such as mobile phones.

Another advantage of Bluetooth is that it is completely automatic - every Bluetooth enabled device will sense the presence of another device within range. They can do this because they share a 'network protocol' that allows them to share data.

Another clever thing about the protocol is that it can reduce interference from other Bluetooth devices that are also exchanging data nearby. For example if Sam's

Page 51: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 51 of 68

mobile is exchanging data with Tom's mobile this will not interfere with Sarah's mobile also exchanging data with Mary's mobile nearby.

What is Wi-Fi Wi-Fi is a communication technology that makes use of radio waves in order to

connect to a local area network. It is also widely used to connect to the internet from a laptop or smart phone

whilst out and about.The word Wi-Fi is actually a trade name owned by the Wi-Fi alliance. The

alliance is a group of about 300 companies from around the world. They work together to make sure that all 'Wi-Fi' enabled devices are compatible with one another.

All laptops have Wi-Fi built in.

How does Wi-Fi work?Each Wi-Fi enabled device searches for a Wi-Fi base station located nearby.

If it finds a network, you can connect to it by providing the correct password. Some networks are not password protected and your device will connect immediately. The access points are called 'Hot spots'.

The Wi-Fi base station usually takes the form of a network router / ADSL modem. This router is often connected directly to the internet on a standard ADSL telephone line. This is why you are able to connect to the internet using Wi-Fi.

Speed of Wi-Fi

One thing to note about Wi-Fi is that it is not so fast as a cabled network. The maximum speed of a wireless network is 54 Mb/s (depending on the Wi-Fi

standard) but in reality the speeds are much lower than this. Compare this to a hard-wired Gigabit network that can transmit 1000 Mb/s. However, even that slower speed is fine for most uses, which is why it is so

popular at home and in many offices.Speed is mostly influenced by the strength of the radio signal - the weaker it is the

slower the speed.

Wi-Fi limitationsWiFi is very useful as a network technology. But there are some issues with it

that means hard-wired networks will always be with us as well.

Page 52: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 52 of 68

1. SecurityYou are broadcasting your network data over radio waves and these are easily

picked up by other devices within range.Early Wi-Fi networks were open to virtually anyone. Some people made a hobby

of driving around looking for open networks. But now most private networks are password enabled so it is harder for someone to break into the network.

2. Limited connectionsJust like a normal radio, WiFi uses a small number of radio channels to work. This is no problem at home where only a few connections are needed. But in a

busy office, this lack of channels may mean difficulty in making a connection.3. Limited rangeWi-Fi is a radio technology and so it is affected by things such as walls getting in

the way. For example, at home the router might be downstairs and so the signal upstairs may be very weak. This can be overcome by using a 'wi-fi extender' located somewhere in-between. It acts like a bridge, such as the extender shown in the picture which was plugged in a kitchen.

Future of Wi-FiIn the future many major cities intend to provide blanket coverage for anyone in

the city, even in underground trains.This is also happening in the private sector. For example, providers such a BT are

forming a huge free Wi-Fi network in the UK for their existing customers by encouraging many of their customesr to allow their BT-home hub routers to be used as a Wi-Fi hotspot.

At the last count there were over 4 million hotspots in the network and it is the largest wi-fi network in the world.

Questions1. What is Bluetooth?2. Advantages of Bluetooth?3. What is Wi-Fi?4. How does Wi-Fi work?5. Wi-Fi limitations?6. Future of Wi-Fi?

Laboratory work 13. E-technology. E-business. E-Learning. Social networks. E-gov

Laboratory Objective: Training in effective application of means of ICT in educational process, including work with the distributed information resource of educational appointment.

Page 53: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 53 of 68

Laboratory Hardware, Software / Tools Requirements: The required hardware for teaching this course is having a PC for each student supported with a network connection for Internet access. A data show and a PC for the course instructor are also required. Windows XP or a later version must be installed. The required lab tool is Microsoft Office 2007-2010.

A social networking service (also social networking site, SNS or social media) is an online platform that is used by people to build social networks or social relations with other people who share similar personal or career interests, activities, backgrounds or real-life connections. 

E-business (electronic business) is the conduct of business processes on the Internet. These electronic business processes include buying and selling products, supplies and services; servicing customers; processing payments; managing production control; collaborating with business partners; sharing information; running automated employee services; recruiting; and more.

Direct SalesDirect sales is an electronic business model that involves selling products through

a website or online marketplace such as eBay. Retail-style shopping websites can be programmed to process orders 24 hours a day without physical sales or service staff. Some retail websites package and ship orders during regular business hours from their own warehouses while others outsource fulfillment to a third party in a drop-shipping arrangement. The retail business model also works well for digital goods such as electronic books or software as fulfillment is provided automatically through a website download.

ServicesService-based electronic business models include freelance writing, research and

fact-checking, website design, video production, customer service, reminder services and virtual assistants. Service-based business models are ideal in an electronic environment because communication can be facilitated through email or instant messaging services, and the services can be rendered through those same mediums or through an electronic work desk on a corporate website.

AdvertisingAdvertising is a flexible electronic business model that can be executed in a

number of ways. Businesses can choose to be an online publisher of free content, for example, and sell advertising space on or within their content similar to what traditional magazines and newspapers do. According to Digital Enterprise, the online publishing model opens up subscription revenue options because companies can charge fees to

Page 54: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 54 of 68

access some or all of the content they produce. Affiliate marketing is another type of advertising business model frequently used online. Businesses recommend or mention specific products related to their content and if readers purchase products through the links provided, the business earns commissions from each sale.

KnowledgeKnowledge-based electronic business models often involve consulting, mentoring

or teaching through an online website, chat service or email. Some consultants and mentors offer private individual sessions with their clients through email or Internet telephones while others share their knowledge and training through teleconferences or discussion boards. Knowledge-based businesses commonly deliver much of their materials automatically through pre-recorded videos and audios, and written documentation that can be accessed for a fee through a private membership website.

E-learning (Electronic Learning) is an electronic learning system, which is synonymous with terms such as distance learning, learning using computers, online learning, virtual learning, learning through computer and electronic technologies.

An electronic book (or e-book) is a book- or periodical publication made available in digital form, consisting of text, images, or both, readable on computers or other electronic devices.

An intelligent tutoring system (ITS) is a computer system that aims to provide immediate and customized instruction or feedback to learners,[1] usually without intervention from a human teacher.

Page 55: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 55 of 68

Electronic and digital signatureA digital signature (not to be confused with a digital certificate) is a mathematical

technique used to validate the authenticity and integrity of a message, software or digital document.

A digital signature can be used with any kind of message -- whether it is encrypted or not -- simply so the receiver can be sure of the sender's identity and that the message arrived intact. Digital signatures make it difficult for the signer to deny having signed something (non-repudiation) -- assuming their private key has not been compromised -- as the digital signature is unique to both the document and the signer, and it binds them together. 

E-government

On the 12th of April web-portal of electronic government reaches 7 years old! Today citizens of the country may obtain online 96 public services. Moreover 49 types of services (acceptance and check of different data, reserving, placing in turn, information view), payments of 20 types if state duties, 17 types of state fees, 4 types of taxes, 3 types of payment for utility services, payment of fines for traffic violations, 81 services of e-licensing.

E-government of the Republic of Kazakhstan was highly appreciated on the global level in 2012. In the UN ranking of electronic government development Kazakhstan possessed the 2nd place according the e-participation index.

Page 56: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 56 of 68

Top 15 Most Popular Social Networking Sites1. Facebook2. YouTube3. Twitter4. LinkedIn5. Pinterest6. Google Plus+7. Tumblr8. Instagram9. Reddit10.VK 11.Flickr12.Vine13.Meetup14.Ask.fm15.ClassMates

Questions:1. Electronic business: Main models of electronic business?2. Information infrastructure of electronic business?3. Legal regulation in electronic business?4. Electronic training: architecture, structure and platforms?5. Electronic textbooks and the intellectual training systems?6. Electronic government: concept, architecture, services?7. Electronic and digital signature?

Page 57: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 57 of 68

8. Formats of implementation of the electronic government in developed countries?

Laboratory work 14. IT in professional sphere. Industrial ICT

Laboratory Objective: Organizations and ICT

Laboratory Hardware, Software / Tools Requirements: The required hardware for teaching this course is having a PC for each student supported with a network connection for Internet access. A data show and a PC for the course instructor are also required. Windows XP or a later version must be installed. The required lab tool is Microsoft Office 2007-2010.

ICT and schoolsSchools used to be fairly low technology places. Everything was paper based and

equipment was mainly the blackboard, chalk and a rather battered set of old textbooks.But with computers and electronic equipment appearing over the last thirty years

or so, schools have become major users of ICT.This has happened in all aspects of school life including

Administration Classroom teaching Networking e-Learning Examinations Distance learning and collaboration

This mini-web will describe some of the uses of ICT in schools today.With hundreds of students passing through the school electronic records need to

be kept for every student.The records are kept in a database called a Management Information System

(MIS).In the classroom - whiteboardsThe old blackboard and chalk is long gone from modern schools and in their

place you are more likely to see an interactive whiteboard.

courtesy of Wikimedia Commons

Interactive whiteboards can connect to any digital source such as a computer.The computer can be used to show a lesson or to connect to a web sitePupils can interact with the screen by using a special pen or their hands.

Page 58: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 58 of 68

However, many teachers do not use interactive whiteboards to their full capabilities and after a while they are very often used as an expensive 'projector screen'.

 In the classroom - projectorsMost classrooms now have a digital projector.They are commonly mounted onto the ceiling but they can also be free standing

and placed on a trolley or desk.

The projector takes a digital feed from the computer or device to which it is connected and then projects it on to a wall, projector screen or whiteboard.

Projectors enable students to see what is being displayed on the teacher's computer. Using specialist software, teachers can also project images from students' computers in the classroom.

Document camerasSome schools have a document camera.This is more flexible than a standard projector because solid objects can be placed

beneath it.The video camera can take a moving image and show it either through the

interactive whiteboard or the digital projectorThis is very useful for showing the whole class, an item. Perhaps a historic

arrowhead in a history class or a butterfly in a biology class.Computer roomsThe computer is widely used to teach many subjects as well as ICT itself.Each student may have their own laptop, netbook or laptop for personal use.But in order to teach a whole class, a set of computers are often arranged together

into one classroom. All the class can then take part in the lesson.

courtesy of IICD from The Hague, The Netherlands

A computer network connects them all together, along with access to shared drives, files servers, printers and the internet.

Of course for a lesson to take place, each computer has access to the right software application perhaps a photo editing suite, a sound editing application or an office suite.

Each student has their own network account so they log on using their username and password.

Page 59: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 59 of 68

Work is stored on the school file server.Virtual learning environmentA virtual learning environment or VLE is an online education platform. It is used

as an extension of normal school lessons.A VLE contains many tools to help students learn their subjects.Now, video links are being introduced so that the student can see the lesson as it

happens. They can ask questions and interact with their school mates by radio, email and instant messaging.

The video links are sent over a broadband satellite network that covers over 1.5 million square kilometers of the Australian Outback.

Nearer to home in the UK, distance learning is widely used as well, for both children and adults alike. For example, they can attend a 'webinar' or or a 'webcast', which is a real-time video stream of a lecture over the internet.

Online computer testsEach question is presented on screen along with a set of possible answers (multi-

choice). The student then selects their answer, either by mouse or touch screen.The advantage of taking an exam this way is that it is very fast to mark and it

does not involve a lot of paper which may get lost or damaged.The disadvantage is that it cannot deal with drawings very easily or with long

essay type answers. But for simple tests, it is very quick and easy to set up and mark. 

Questions:1. IT in professional sphere?2. Industrial ICT?

Laboratory work 15. Perspectives of ICT development

Laboratory Objective: Perspectives of ICT development

Laboratory Hardware, Software / Tools Requirements: The required hardware for teaching this course is having a PC for each student supported with a network connection for Internet access. A data show and a PC for the course instructor are also required. Windows XP or a later version must be installed. The required lab tool is Microsoft Office 2007-2010.

Priorities for the Future

Several opportunities are opening for ICTs in education in transforming the learner/teacher relationship, the means of transmission of the educational message, the production and use of educational materials, and the organization and function of educational structures. 

Page 60: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 60 of 68

First and foremost, developing countries should accord priority to connecting schools and universities to national and international distance education facilities, databases, libraries, research laboratories and computing facilities. Interactive sharing of information and ideas is critical to the mission of education. This would involve promoting and supporting dialogue and collaboration among teachers and researchers; between learners and learners; between classrooms and communities.

Second, the use of ICTs in distance education should be actively pursued, particularly to provide on-going learning opportunities at the community level. In addition to being cost-effective based on new functionality, easier access and economies of scale, ICTs will be critical in building a culture of lifelong learning in both urban and rural areas. Through differentiation, specificity, and better learner and teacher control, ICTs can accommodate the individual needs of most users. It will be critical to creatively explore how relatively expensive equipment can be made available to various needy user communities, i.e. through centres visited by students, mobile equipment such as computer bus classrooms, etc. In some cases improvements in existing technologies rather than entirely "new" technologies can best be used to meet the needs of learners. For example, the new compression and digital transmission technologies are giving new life to "traditional" educational television, by permitting many more channels to be broadcast over a given bandwidth at a much lower cost per channel, and, in the case of direct-broadcast satellite, over a wider geographic area. Efforts must be made to create multichannel learning environments, as single media projects have tended to fail in the past. 

Finally, ICTs should also be used to reduce the communications and administrative costs of educational institutions. Many institutions suffer from managerial insufficiencies which could also be significantly improved by the application of ICTs. Such action, if implemented properly, should result in higher staff morale, greater understanding of the needs of students and an enhanced ability to provide appropriate support services.

It is very important that these efforts to make effective use of ICTs in education foresee the human element. Although educational technology may enable a reduction in the teacher-to-learner ratio or in qualifications of on-site teachers, it cannot (and in the foreseeable future should not) replace human decisions and interaction in the educational process; specialized teaching and support staff will still be needed, and in fact will have to take on new responsibilities and learn new skills to serve as intermediaries and motivators, oversee student testing, follow up on feedback, etc. As long as learning is a human endeavor, there will always be a need for human "teachers" in some capacity.

With strong budgetary cutbacks in the public sector as a result of harsh structural adjustment programmes, libraries in many developing countries have seriously deteriorated in recent years. In some of these countries, reasonably good networks of

Page 61: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 61 of 68

public libraries did exist but these were usually based on the European model of serving leisure readers in major towns and cities. In others, the concept of public libraries was never very popular, and libraries were restricted to elite universities and inaccessible to the general public. In either case, today libraries of all types face substantial problems in many developing countries. Some of these problems stem from a lack of funds, while others are linked to deeper socio-cultural concerns. 

Developing countries should focus on the use of ICTs for both cultural preservation and development. Governments should enhance capabilities of cultural organizations to engage in electronic preservation and documentation of manuscripts and artifacts. They should also seek to increase the accessibility of museums, rare manuscripts and artifacts to researchers and the general public through the development of cultural ICT products. There should be a strong priority on establishing electronic communication and innovative telematics applications involving cultural sites, repositories of culture such as libraries and museums, and centres of research and learning. Maximum impact can achieved through the establishment of effective and interconnected specialized networks which build on and encourage synergy among institutions with complementary programmes and cultural and historical affinities. 

Questions:Perspectives of ICT development?

Page 62: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 62 of 68

3 Safety instructions when conducting laboratory work

PESS Computer Lab DO’s and DON’T 1. Do not eat or drink in the laboratory.2. Avoid stepping on electrical wires or any other computer cables.3. Do not open the system unit casing or monitor casing particularly when the

power is turned on. Some internal components hold electric voltages of up to 30000 volts, which can be fatal.

4. Do not insert metal objects such as clips, pins and needles into the computer casings. They may cause fire.

5. Do not remove anything from the computer laboratory without permission.6. Do not touch, connect or disconnect any plug or cable without your

lecturer/laboratory technician’s permission.7. Do not misbehave in the computer laboratory.8. Computer Lab Safety Rules for Protecting Equipment9. Do not bring any food or drinks near the machine.10.Turn off the machine once you are done using it.11.Do not plug in external devices without scanning them for computer viruses.12.Ensure that the temperature in the room stays cool, since there are a lot of

machines inside a lab as these can overheat easily. This is one of the many ways of ensuring computer safety.

13.Try not to touch any of the circuit boards and power sockets when a device is connected to them and switched on.

14.Always maintain an extra copy of all your important data files.

General Procedures

Teachers are expected to closely monitor student activity by frequent screen checks.  If using the Internet–use URL’s that you have visited and have found to be appropriate for the assignment and student’s age.

Teachers should report any non-functioning technology equipment to their ITRT via the online Technology Support site.

Students must save to their H drive (network drive) and not to the hard drive. Saving to the hard drive will cause the student to lose all of their work.

Students should only send the print command to the printer once. If information is not printing, there is a reason.

Students must close all open windows, applications, and log out before leaving the lab.

Teachers, should when using computer labs clean the whiteboard, turn off the digital projector, and return the room key after doors have been locked. Doors to computer labs must be locked when not in use.

Everyone will adhere to federal copyright laws.

Page 63: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 63 of 68

Computer users should not unplug and switch mouse for left handed students.  Simply have student move the mouse to the left side of the keyboard and replace on right side when done.

  Computer Rules

Log-on with your username and password for your use only. Never share your username and password.

Chewing gum, food, or drinks are not allowed in the computer lab or anywhere near a computer.

Respect the equipment.  Do not remove or disconnect parts, cables, or labels. Internet use is limited to teacher assigned activities or classwork. Personal Internet use for chat rooms, instant messaging (IM), or email is strictly

prohibited.  (This is against our Acceptable Use Policy.) Do not download or install any programs, games, or music.  (This is against out

Acceptable Use Policy.) No Internet/Intranet gaming activities allowed. Do not personalize the computer settings. (This includes desktop, screen saver, etc.) Ask permission to print. If by mistake you get to an inappropriate Internet site, turn off your monitor

immediately and raise your hand. CD-ROMs, thumb drives, or other multimedia equipment are for school work only. 

Do not use them for playing music or other recreational activities. Do not run programs that continue to execute after you log off. Log-off — leave the computer ready for the next person to use.  Pick-up your

materials and push in the chair.

4 Requirements for the registration of the report on laboratory work

Sections of a laboratory report:A laboratory report usually have several sections identified by titles.  A typical

report would include such sections as TITLE, INTRODUCTION, PROCEDURE, RESULTS, and DISCUSSION/CONCLUSION.  If you are using a computer to type your work, section headings should be in boldface.

 Title:The title can usually draw attention of the reader to your work.  It should clearly

represent the work presented.  If the purpose of the experiment is to measure the gravitational acceleration of the earth using pendulum as the experimental apparatus, the title should be like “ Measurement of the Gravitational Acceleration Using Simple Pendulum”. Avoid “The” as the first word in the title for it will lead to misleading searches when one uses the database.

Page 64: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 64 of 68

 Introduction:State the purpose of the experiment in general terms. For example, “ It is

possible to measure the gravitational acceleration using the oscillations of a simple pendulum.”

Review the existing information or the theory.  Reader will look for some reminder of the basic information relating to this particular area.  This can be done by giving him/her a brief summary of the existing state of knowledge.  We can also include a summary of earlier work with proper references.

Supply a paragraph or two about how the basic information, such as an equation representing the behavior of a model (theory), can be used to make measurements.

 Procedure:Indicate what parameter or properties of the system you are measuring.  Usually

you change a parameter of the system (such as changing the temperature, independent variable), and measure its effect (such as the length of a metal rod, dependent variable).

Specify such measurement details as the type of standard or instrument used to make the measurement (for example, meter stick or vernier caliper, etc.).  Give the instrument uncertainties.  For example, if we are using a meter stick, we can say, “ the length of the rod is measured using a laboratory meter stick accurate to within 1 cm.  You may also give, if necessary, an apparatus diagram.

 Results: Provide tables showing your measurement with units. Describe the uncertainties: standard, instrument, random errors Provide graphs.  Graphs should be neat, clear, and include the axis label

and units. Computation of the final answer: slope calculation, averages, and standard

deviations all in proper significant figures.  Discussions/Conclusions: Present your findings from the experiment. Evaluate the outcome objectively, taking a candid and unbiased point of

view. Suppose that the outcome is not close to what you expected.  Even then, after checking your results, give reasons why you believe that outcome is not consistent with the expected.  Make it plain, simple.  Make factual statements such as “graph 1 shows a linear variation of velocity with time”.

State the discrepancies between the experimental results and the model (theory), and discuss the sources of the differences in terms of the errors by offering logical inferences.

Suggest improvements. Although these do not make an exhaustive list of do’s or don'ts, they nevertheless

offer a framework around which one can write an effective report.  In our experiment, some of the items indicated under each section may not be needed.  I will give you more

Page 65: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 65 of 68

feedback in class.  I expect that, the lab reports, either typed or handwritten, should be neat, clear, and organized.  Points will be deducted for these, as well as for missing units and failing to follow the outline (i.e. title, introduction, procedure, results, conclusion) given above.

 5 Literature

5.1 Main literature5.1.1 June J. Parsons, New Perspectives on Computer Concepts 18th Edition—

Comprehensive, Thomson Course Technology, a division of Thomson Learning, Inc Cambridge, MA, COPYRIGHT © 2016; ISBN-10: 1-4239-0610-1, ISBN-13: 978-1-4239-0610-0.

5.1.2 ReemaThareja Fundamentals of Computers. – Oxford University press: Oxford, 2014. - 288p

5.1.3 George Beekman. Computer Confluence: Exploring Tomorrow's Technology. ISBN 0130661880, 9780130661883. PrenticeHall, 2003

5.1.4Симонович С.В. и др. Информатика. Базовый курс: учебное пособие для высших технических учебных заведений. – СПб.: Питер, 2011. – 639 с.

5.2 Further reading5.2.1 ThomasM. Connolly, etal. Database Systems: A practical approach to

Design, Implementation, and Management. 4th Edition ISBN: 0321210255 Addison-Wesley, 2004

5.2.2 H. L. Capron. Computers: Tools for an Information Age. Addison-Wesley, 1998.

5.2.3 Roqers Y., H. Sharp, J. Preece. Interaction design beyond human - computer interaction - Third Edition.- Italy: WILEY & Sons Ltd, 2011.- 585 р.

5.2.4 Ducket, J. Beginning Web Programming with HTML, XHTML, and CSS: 2th ed. / Jon Ducket.- U.S.A: Wiley Publishing. Inc, 2008.- 739с. ISBN 978-1-0-470-25931-3.

5.2.5 Stephen P Borgatti, Martin G. Everett, Jeffrey C. Johnson Analyzing Social Networks Paperback, 2013

5.2.6Уша Рани ВьясулуРедди. Серия учебников по ИКТР для молодежи. Учебник 1: Введение в ИКТ для развития. UN-APCICT/ESCAP 2011

5.2.7Дейтел Х. М., Дейтел П. Дж., Чофнес Д. Р. Операционные системы. Часть 1. Основы и принципы. – М.: Бином-Пресс, 2011. – 677 c.

5.2.8Ярочкин В.И. Информационная безопасность: Учебник для вузов. – М.: Акад. Проект, 2008. – 544 c.

5.2.9 Голицына О.Л. Базы данных: Учебное пособие. – М.: Форум, 2012. – 400 c.

5.2.10 Keith Worden, W.A. Bullough, J. Haywood.Smart Technologies. World Scientific Pub Co Inc (April 14, 2003)

Page 66: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 66 of 68

5.3 Internet resources5.3.1 https://en.wikipedia.org5.3.2 https://www.cs.cmu.edu/~fgandon/lecture/uk1999/computers_types/5.3.3 https://www.interaction-design.org/literature/book/the-social-design-of-

technical-systems-building-technologies-for-communities/the-evolution-of-computing5.3.4https://www.technologyuk.net/computing/computer-systems/

architecture.shtml

Page 67: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 67 of 68

Page 68: edu.semgu.kzedu.semgu.kz/ebook/umkd/c7f5af68-09a6-11e7-bfa7...  · Web viewTraining in effective application of means of ICT in educational process, ... Core. Sectors. of. Development

M I 042-18-12.1.1-2016-02 Edition № 1 от ______2016 г. page 68 of 68