Recruitment and processing of information. Data structure. Problems associated with computer methods of processing information

Golovna / Zakhist
Information processing is the separation of certain information objects from other objects by means of the implementation of certain algorithms.

Processing is one of the main operations that results from information, and primarily increases the diversity of information.

The methods of processing information are based on all the devices of the system created by mankind, and most importantly, the computer is a universal machine for processing information.

p align="justify">Computers process information through the use of various algorithms.

Living organisms and plants collect information about their organs and systems.

Information processing is the process of systematically changing the location and form of information.

The processing of information is carried out in accordance with the rules by any given subject or object (for example, a human or an automatic device). He is called a Vikonavian information processor.

All processing, interacting with the external medium, extracts from it input information that can be processed. The result of processing is the output information that is transmitted to the external medium. Thus, the external middle acts as a source of input information and production of output information.

The processing of information is subject to the rules established by the law. Processing rules, which describe the sequence of adjacent processing steps, are called an information processing algorithm.

All processing is based on the storage of a processing unit, called the processor, and a memory unit, in which both the processed information and the processing rules (algorithm) are stored.

Explaining the topic “Information Processing”, we follow with examples of processing both related to the removal of new information and related to changing the form of presenting information.

The first type of processing: processing associated with the creation of new information, new knowledge. To what type of processing should be done the most important mathematical tasks. Before what type of information processing should be done to solve various problems in the world, logical decisions must be made.

For example, following a certain set of evidence, you will know the evildoer; a person, analyzing the circumstances that have developed, makes decisions about his future actions; In the future he will unravel the mystery of ancient manuscripts.

Another type of trimming: trimming, knitted with a change in shape, but does not change the place. This type of information processing involves, for example, translating text into one language: the form is changed, otherwise the replacement can be saved. An important type of computer science processing is coding. Coding means converting information into symbolic form, manually storing, transmitting, processing.

The structure of the data can be transferred to another type of processing. The structure is associated with the introduction of the song order, the song organization of the information collection. Arrangement of data in alphabetical order, grouping by various classification signs, selection of tabular and graph representation - all this applies structure.

A special type of information processing is search. The present search should be formulated as follows: there is a mass of information - an information array (telephone guide, dictionary, train schedule, etc.), you need to know the required information that gives the singing minds a joke (telephone number of this organization, translation of this word into English language, departure hour of this train). The search algorithm lies in the method of organizing information. If the information is structured, the search results are faster and can be optimized.

Information processing systems

There are different types of data processing: centralized, decentralized, distributed and integrated.

The visibility of the CC is centralized. With this method, the correspondent delivers output information to the computer center and keeps the processing results in the form of effective documents. The peculiarity of this method of processing is the complexity and difficulty of establishing a smooth, uninterrupted connection, the great importance of VC information (for a great duty), the regulation of the terms of the execution of the operation, the organization without Protect the system against possible unauthorized access.

Processing has been decentralized. This method is associated with the appearance of PEOM, making it possible to automate a specific work area. Currently, there are three types of technologies for decentralized data processing.

Persha runs on personal computers that are not connected to a local network (data is saved in separate files and on separate disks). To remove the displays, please rewrite the information to the computer. Disadvantages: the number of mutually interrelated tasks, the inability to process large amounts of information, the low level of unauthorized access.

Other: PCs are united in a local network, which leads to the creation of unified data files (and avoids wasting a lot of information).

Third: a PC united in a local network, in which special servers are included (with a “client-server” mode).

Dividing the method of processing these foundations into subdivisions of processing functions between different EOMs included before the measure. This method can be implemented in two ways: the first transfers the EOM installation to the skin node of the system (or on the skin level of the system), in which data processing occurs one or more times the EOM in accordance with the real capabilities of the systems and that is what is needed at the given moment. Another way is to place a large number of different processors in the middle of one system. Such a path is found in systems for processing banking and financial information, where a measure of data processing is necessary (branches, branches, etc.). Advantages of the divided method: the ability to obtain any given term from the given data; high level of reliability, due to the fact that if one technical feature is identified, it is possible to instantly replace it with another; the short time required for the transfer of tributes; increasing the flexibility of systems, simplifying the development and operation of software, etc. The divisional method lies in a complex of specialized processors, then. The skin of the EOM is assigned to the highest singing commands, and the command of its peer.

An advanced method of data processing is integration. It transfers the created information model of the ceramic object to create a distributed database. This method will ensure maximum handiness for the operator. On the one hand, the data bases are transferred to collective governance and centralized management. On the other hand, the need for information and the diversity of tasks involved will require different parts of the database. The technology of integrated information processing makes it possible to improve the accuracy, reliability and fluidity of processing, since processing is carried out on the basis of a single information array, one-time entered into the EOM. The peculiarity of this method is the technological separation and time-consuming processing procedures from the procedures for collecting, preparing and entering data.

Current information processing systems use digital technologies that include paper data and enable data exchange between automated workstation technologies, which also allow for the integration of specialized forces of the spivrobit group. no one over the top of any task (such as organization within a work group), exchange of thoughts in progress of negotiations at any time in real time mode (teleconference), prompt exchange of materials via e-mail, electronic mailboxes, etc. For such systems, we need to broaden the term “corporate business process management systems” to support business operations as a whole. Such systems are characterized by the use of “client-server” technologies, including the connection of remote clients via the global Internet network. It is not uncommon for the system to unite over 40 thousand clients, located in different countries and continents, into a global information space. One of such applications could be the McDonalds company, which operates its branches all over the world, including in Ukraine.

Processing of digital information

In fact, any engineering device depends on the transformation of energy or the transformation of information. The task of any control system for the most important sense is the processing of information about the flow mode of the robotic object and the selection based on the signals that are controlled, in order to bring the flow mode of the robot object closer to the specified one. When processing information, it is always necessary to respect the decision in one way or another to equalize the status of the system.

In electronic devices, there are two main methods of processing information: analog and digital.

The fundamental feature of the analogue method of information processing is the ability to smoothly change the values ​​of electrical signals corresponding to the changing system. All transformations are carried out in a practical manner.

When processing information digitally, the skin variable value is assigned a digital code to the data type in the system. Functional functions in the system are implemented by means of the highest level of the system using these and other numerical methods behind the underlying program. The device that implements this solution is called a processor.

An important feature of digital control systems is the sampling of the signal behind the level, the value of which is determined by the bit depth of calculation. Thus, in the case of an 8-bit system, the entire range of changing the value of the signal is divided into 256 sections and a digital code corresponding to which signal can be received in just one of the 256 values. This may impair the accuracy of the digital control system. For a long time now, precision systems have continued (and in some cases continue) to rely on analogue methods of information processing. Let's carry out a thorough analysis. In an analog system, any active signal whose amplitude contains information can vary between 0 and 10 V. The level of noise in which does not exceed 1 mV. For reliable transmission of information, which excludes the influx of noise, the minimum increase in the signal must be at least 1 mV.

To transmit such a large amount of information in a digital code, it is necessary to have a bit depth of at least 14 double digits. Also, digital systems with a lower capacity can match the accuracy of an analog system. However, due to the obvious capacity, a lower 14-bit digital system may not only fail, but also exceed the analog accuracy of the fragments and its parameters do not change over time and not such external factors as temperature, humidity etc., which is at the great stage Powerful to almost all analog systems.

In particular, at this time, due to the over-reinsurance, there is a large-scale introduction of microprocessor technology in almost all areas of activity, whereas just yesterday analogue methods of information processing were in decline.

In modern technology, microcontrollers play not only the role of direct control of the transmitter for the implementation of special peripheral devices, but also the role of a digital controller, protection system and diagnostics ki, as well as systems connected to the technological network of the highest level.

At the same time, there has been a shortage of microcontrollers specialized in managing the transmission switches. Їх computational core, pobudovane, zazvichay, z urahuvannyam t.zv. “Digital signal processing processors”, a series of recurrent polynomial digital control algorithms has been adapted. The peripheral devices included include multi-channel PWM signal generators, analog-to-digital converters, vector coordinate conversion units, treatment timers, Watchdog timers, etc. Examples of such devices include the ADMC330 microcontroller from Analog Devices, the TMS320C240 from Texas Instruments, the 56800 from Motorola, and the ADMC200 vector processor from Analog Devices.

The first processor, as a software-functioning device, was able to perform arithmetic and logical operations, as well as adjust the algorithm of its functioning based on the results of previous calculations, and was created in the 40s ah of our century in the USA by the representatives of IBM. It is a device on electro-mechanical relays, occupying a large number of surfaces, with extremely low speed and reliability, and is only suitable for a very high class of specific calculations. With the progress of electronic technology, the elemental base for everyday processors has been improved. Processors based on electronic tubes, transistors, and discrete logical microcircuits of a small integration stage appeared. The world's most sophisticated processors have become smaller and smaller, have less energy, and are less productive and reliable. However, the stench was still of little relevance to the real-life management operations, and they were mainly used only for the singing class of accounting departments.

The true revolution in computing technology took place after the appearance of the first so-called. "microprocessor", that is. a processor equipped with seemingly one high-stage integration microcircuit. This is a 4-bit microprocessor 4004 from INTEL. Born in 1973 INTEL produces the 8-bit microprocessor 8080, and in 1978. - 16-bit microprocessor 8086, there are 29 thousand transistors on the chip and a cost of $360. The evolution of microprocessors is slower than the pace that has accelerated since entering the market in 1993. microprocessor INTEL PENTIUM MAV is already 3.2. million transistors on a chip and the price of 878 $. The main directions of the evolution of microprocessors are (and are) an increase in the capacity of rapidly changing calculations and a change in the hourly calculation.

Microprocessor-software-coding devices used for processing digital information and controlling the process of processing, processing of one (or several) integrated circuits with a high level of int integration of electronic elements.

Changes in performance, reduced weight and overall dimensions, increased reliability and productivity of microprocessors have led to a significant expansion of the scope of their development. Along with traditional calculation systems, stench has become increasingly prominent in management tasks. In front of the microprocessor, the task of software control of various peripheral objects was assigned.

Information processing management

Information systems can function with or without technical restrictions. The price is economical. It is important to classify the stage of automation of information processes in an organization's management system into manual, automatic and automated.

Manual intelligence is characterized by the presence of modern technical methods for processing information and converting all operations by humans. For example, about the activity of a manager in a company that uses computers every day, we can say that he works with manual IV.

Automated IV eliminates all operations from processing information without human participation.

Automated systems involve both human and technical processes in the processing of information, with the computer playing the leading role. The current term “information system” includes the mandatory automation of the system. Automated insurance systems, which are widely used in the organization of control processes, may have various modifications and can be classified, for example, the nature of the information provided in the field of stagnation.

The increase in the need for information in the information system of an organization, the need for faster and more efficient processing methods necessitates the need to automate the work of the information system to automate ї information processing.

In a non-automated information system, all actions related to information are decided by humans. Automation of information processing processes will lead to the emergence of general rules within the processing algorithms, which can lead to the development of a pure information system into an information management system. Within the framework of the remaining partially implemented functions, people will soon make a decision.

Automated information system for managing the organization - the totality of data, ownership, software, personnel, standards of procedures, purposes for collecting, processing, distributing, saving, and generating (data) is interconnected And this is obviously due to the goals of the organization. Typically, this system supports the development of information products that support computer information technology, as well as the personnel that interact with computers and telecommunications. The technology of work in a computerized information system may be understandable to facists. The system will support the dynamic information model of the economical facility for satisfying the information needs of customers and making management decisions.

Enable automated IS to enable automated work stations (AWS) for front desk clerks, methods of communication and information exchange. All this allows you to effectively automate the robot. The effectiveness of the use of IV for the management of economic objects (enterprises, banks, trade organizations, government institutions, etc.) must be kept in mind, management solutions must be promptly prepared, adapted before changes message and information needs of correspondents.

Information technology is an infrastructure that ensures the implementation of information processes (collection, processing, accumulation, storage, search and distribution of information). IT is intended to reduce the complexity of processes for obtaining information resources, increasing their reliability and efficiency. The IT warehouse includes hardware and software, data, and telecommunications.

Functional subsystems are specialized programs designed to ensure the processing and analysis of information to prepare data and make decisions for a specific functional area based on IT. The range of functional subsystems and add-ons includes: manufacturing, accounting, finance, personnel, marketing, and production.

IV management is a component that ensures optimal interaction between IT, functional subsystems and associated faciliates, and IV developments throughout the entire life cycle. ІВ is involved in the management of personnel, accounting, operational, financial, safety, quality, development ІВ.

The skin is automated and is oriented towards the implementation of essential functions in the thyroid gland.

Economic information systems (EIS), associated with the data and processing of information for various levels of management of economic objects. This information allows the functions of planning, control, analysis, planning and regulation to be carried out in order to make effective management decisions. The levels of government of the EIS are divided into state, regional and municipal. According to the objects of management, EIS is divided into industry and non-industry.

Decision support systems (DSS) are analytical IVs that ensure the possibility of development, forecasting, development and assessment of possible behavioral options based on the analysis of data that displays the results of action the integrity of the object throughout the singing hour. DSS generates information that is accepted by people before it becomes known and where decisions are made.

DSS are systems developed to support decision-making processes by managers in complex, weakly structured situations associated with decision-making and decision-making. The development of DSS has been strongly influenced by hostile advances in information technologies, closed telecommunications networks, personal computers, dynamic spreadsheets, and expert systems.

At the level of strategic management, low DSS is developed, for long-term, mid-term short-term, as well as for financial planning, including a system for the division of capital investments. Operational management oriented DSS is involved in marketing (forecasting and analysis, market monitoring and prices), scientific research and design work, and personnel management. Operational and information stagnation is associated with the production, acquisition and volume of inventories, their physical distribution and accounting form.

Business information systems (BIS) are computerized systems designed to provide online and reliable information to top managers to support business decisions based on networked desktops ій. There are instrumental ways to ensure preparations on the noses of sounds in a consistent format and instructions for the latest kernels of the highest level. They clearly demonstrate the preparation of the world and the ability to begin. VIS is classified as a specialized DSS that helps scientists analyze important information and identify various tools in order to direct them to create strategic decisions shen in organization. Thus, BIS helps Wikonavians to develop a more accurate and up-to-date picture of the organization’s operations, as well as competitors, employees and associates.

BIS's specialty is monitoring current trends, both internal and external. With more information and tools available, senior managers are better prepared to make strategic changes to improve the organization's capabilities and reduce problems. VIS can be competitive and instrumental in strategic planning; enhance the richness of the solutions that are created on the market; took the time to identify problems; improve the level of planning at the upper levels of organization management; Provide a mechanism for improved control within the organization and increased access to data and models.

The BIS fragments are intended for the upper level of management and for the consideration of strategic alternatives, the system may be adapted to the management process, lower level DSS. In addition, the distributors are responsible for a creative approach to the development of initiatives for the desire of the vicoristan system with the highest quality of care. The design of the BIS may result in a more detailed, lower development of the DSS, a medical solution and a type of doctor.

Information and listening systems enable the entry, systematization, saving, and delivery of information to the user without complex data processing.

Information-computing systems carry out all operations of information processing according to a specific algorithm. Among them, it is possible to carry out a classification step by step by infusing the generated output information into the decision-making process and see two classes: those that are helpful and those that please.

Careful information generates information, on the basis of which people make decisions. These systems are characterized by the type of task of a rozrakhunkovy character and the processing of great obligations of data.

ІС, it is good to generate information that is accepted by people before it comes to mind and does not inevitably turn into a series of specific actions. They are characterized by the accumulation of knowledge, but not by knowledge. These systems are characterized by the type of task of a rozrakhunkovy character and the processing of great obligations of data.

In addition to all the above categories, information systems are also integrated, designed to automate all management functions for the operation of an economical facility (such as scientific research, design, production, release and implementation before analyzing the operation of the system).

Automated information processing

Automated information processing allows you to quickly process in the recording mode (in real time) various updates, information, special and professional characteristics, information about service movements, and much more Wow, let’s allow all the work with the staff of the Kerivniks to be raised to a higher level.

Automated processing of information in the form of basic functions creates a change in the need for manual filing of filing cabinets, eliminating the need for manual operations to improve the basics their features, the breakdown of depreciation and amortization, the compilation of manual accounting records and other forms.

Automated processing of information on the created synthetic data transfers the basic mind to the automated processing of all data in the accounting system. The processing of information for this business is special. Automated processing of information results in advances to the core of the robotic communication channel, which indicates the speed of transmission and reliability. Due to the need for automated information processing in the form of inventories, there is a need for prompt processing of large quantities of documents.

For automated processing of information about reliability, data from the primary forms of data is transferred to special maps of fault data, divided into automated processing structures.

For automated information processing, graphic texts are short and pleasant, although the smell may not go away.

p align="justify"> The technological process of automated information processing includes the stages of filling out the original documents, transferring data from them to computers, and processing information on the EOM. In the process of such information processing, allowances are made due to the lack of reliability of technical methods, and due to the fault of the human operator. A meta-system of automated information processing operates on the stored and processed output information to separate out the information that is currently necessary to make a decision.

To ensure automated information processing, primary or secondary converters are used to provide an output voltage signal. These include inductive, transformer, whirlwind, mechanotronic, pneumomechanotronic, raster, photoelectric and other types of converters.

When designing automated information processing, it is important to integrate elements into three main aspects: pragmatic, semantic and syntactic.

Effective functioning of an automated information processing system (AIP) to ensure the safety of life in everyday minds is practically impossible without reliable mathematical security. The mathematical security of the SAO means the selection of mathematical methods adequate for processing sociological, socio-economic, engineering, sanitary and hygienic and other data (indicators minds at work, the protection of work, productivity, occupational illness and viral injuries, assessments of them Influenced on the efficiency of production, the productivity of work and other programs that implement the designated methods.

The growing importance of automated information processing and the growth of information flows continually stimulate the search for fundamentally new methods and ways of saving information.

Below is shown the technology of automated information processing in the form of payment from the application of this software complex.

All the lists of systems for the new automated processing of information are nothing more than a decomposition of decision-making methods during the life cycle of the system: pre-design research and development work, design, creation of functions tsyonuvannya. Phases delimit the process of system life within an hour, which allows the system to be divided into different hourly phases of the process. The principle of a systemic approach does not allow one to look outside the clock phases in isolation. The legacy of the praise of a large-scale decision at any time phase is bound to be seen not only during this phase, but also at all times. For example, a gross leak at the stage of planning the birth of the family, it is important, because it is impossible to correct it at the early stages.

Enterprises that implement automated information processing require a large number of personnel to collect and verify data, compile and operate various types of classifiers and encryptors. It can be said that at factories that have achieved great success with advanced automatic control systems, such growth has reached the number of 50 or more. Creation of automated systems for managing and processing information. The industrial approach to automated information processing means the type of price for it is wholesale. It is necessary for us, in advance of important information, to spend individual expenses on collection and processing of some kind close to absolutely necessary expenses. Prior to analytical information, the constant power of which will increase and the molding process of which is of an individual nature, which appears at higher costs, there will be an agreed-upon approach to pricing i. At the same price, the time-sensitive aspect of this information is also reflected, since processing it in batch mode is trivial, but cheaper than in dialog mode.

If the organization is in a state where information processing is automated, then additional codes can be entered in the specially designated field next to each row. The coding system must either be fragmented by the organization itself or transferred to software.

The development and implementation of an automated information processing system involves the preparation of technical specifications. Instead of the first part of the system, it is determined by the warehouse task of design, analysis, planning and operational management, which are most amenable to automation and are of great importance for making management decisions in enterprises . In the process of developing the operational aspects of the system, there is an increase in the output complex of functional tasks, expansion and integration of information and mathematical security, and modernization of a complex of technical features. When the first draft of the EIS is created, the technical specifications are divided into the entire system, and the technical and operational projects are divided into the production and subsystems that are included before the storage of the first draft of the system.

The section is devoted to the consideration of the principles of automated information processing, which carries the topological structure of the FGS connection. Meaningfulness, information density and structural organization of linking diagrams ensure the possibility of promptly effective formal procedures (with their implementation on a digital computer) for transforming linking diagrams into other and equivalent forms of mathematical description of the system. The section will review automated procedures for the division on the diagrams linking the operational cause-and-heritage lines, displayed in a normal form to the level of the FGS, prompting the FGS algorithms that model, signal graphs of folding Projects and transfer functions for displaying the dynamic behavior of linear systems.

A bright development in the development of automated information processing marks the emergence of the EOM measure - the absence of great and small electronic computing machines connected by communication channels. Connecting to a large number of subscriber points to the EOM measure will ensure the collective access of users to a variety of information stored in the memory of any EOM included in the measure.

Manually entering codes under automated information processing. If accounting is carried out manually, it is not necessary to set the codes.

The number of workers involved in automated information processing is determined using a special methodology.

Since information processing is automated in the information system, technical security includes electronic computing technology and communication methods between them. The main part of technical security is EOM. Large modern companies are developing complex automated information processing that combines all technical information processing techniques with new technologies and information processing methodologies. . The creation of complex automated systems takes place in a number of stages.

The main activity profile of IVO enterprises is the automated processing of information using additional EOM, as well as the creation of information, software, technical and technological environment for effective processing of information This is the formalization of the results.

A procedure that defines the features of automated information processing. Since the organization is already a service for automated information processing, it is often the specialists themselves who are entrusted with the task development. Thus, through this process, a team of specialists is created. May be assigned to the project. It is possible that the members of the team may be selected from the facists who took part in the implementation of automation. So, in this case, when it comes to helping companies that provide services, it is important to hire one or several consultants to support automation management. Physicians who are between the medical professionals - the sub-sections of the organization, who are in a relationship to the task that is being dismantled, and the team of specialists - often have tensions, the selection of specialists is responsible for carrying out the procedure services for automated information processing, as well as for the purpose of maintaining the organization’s database and databases.

The calculation center is currently developing and implementing programs for automated processing of insurance information in insurance practice. Interaction with all structural parts of the insurance company. Forms electronic databases of insurance claims, categories of insurers and other groups. Creates a closed electronic system within the central office and branch of the insurance company, connected to the central computer. Works on the creation of other local computer networks. How to determine the cost of river operating expenses for automated information processing using automated control systems.

In the minds of the robotic information-computing center on an independent balance, the processing of information is automated in the order of state government services and is assigned on the basis of the availability of the EOM machine-year and the time for carrying out expansions. Semiotic problems of automated information processing – published materials devoted to: exploration of problems linking between syntactic and semantic powers of computer systems; research into natural and formalized science and technology in connection with knowledge, saving and searching for information; feeding automatic text processing by creating practical systems for machine indexing, abstracting and translation of texts; According to research, Galusa created special programs and translators from them for machine processing of texts.

The current features of computing technology are being considered that are being developed for the automated processing of information during the development of naphtha deposits. The effectiveness of the considered methods for processing geological and industrial information is shown in the development of the rich clans of the Ural-Volga region and Western Siberia.

In the rest of the years, computer graphics are widely used in the automated processing of information on the EOM. Hundreds of scientific papers have been published in computer graphics, conferences, international congresses and exhibitions are systematically held.

In the minds of processing cloud information on the EOM, with automated processing of information, a therapeutic method of control due to its great difficulty stagnates, as a rule, it is difficult to verify the correctness of transfer to the machine from the first documents of cash-sum exhibits. Other indicators are verified on the EOM using software control methods, which can ensure a logical verification of document details. Logical verification makes it possible to identify errors in many cases, especially if the original document is filled out. Other methods of monitoring the transfer of these primary documents to machine media will be established to ensure their effectiveness.

Up to the third group of output machines held in the process of automated processing of information in the form of payroll payments, various types of data sheets, such as registers, are processed analytically the appearance and detailing of the sum of these events is planned and resolved. The information of the departmental records does not require additional processing, it is located in the accompanying files and is part of the data on paid wages, as well as other types of payments and is eliminated. Let's take a look at some of the pre-video reports.

When the subsystem is fully put into operation, methods of automated information processing and direct planned expansion are used based on the use of mathematical methods and methods of computing technology to estimate the consumption of types of material and technical resources for the main directions of their development in the section of galusies and fund drainers, the folding of natural and waste balances machinery products, molding and verification of plans for the division of material and technical resources and compilation of statements from them for fund managers. Control system operators should be familiar with the basic concepts of automated information processing, equipped with instructions for preparing information before machine processing and obtaining the resulting information from their activities. As an example that illustrates the capabilities and principles of organizing automated processing of information about the reliability of CE ownership, the ASN reliability that functions in an important electrical machine It serves to generate information about the reliability of electric generators. In the minds of the vykoristannya services of the bulk computer center, expenditures for automated processing of information are carried out on the basis of the performance indicator of one machine-year of the EOM robot. In the case of substitution of services to the cash accounting center, the costs for automated processing of information are based on the cost of one machine-year of the EOM robot.

The Adviser can be useful to a wide range of scientists who develop systems for automated information processing, design, automation of scientific and technical experiments, production management, as well as students and graduate students. Obviously, with computer science, there is a lot more to it than that - automated information processing.

As a result (and regardless of the fact that the organization has already automated information processing), the management team has to develop a policy for automated information processing, which is in line with the automation plan correctness. The rest may be formulated based on the specific difficulties that the management apparatus faces when removing its obligations through manual procedures, as well as the establishment of a global policy of improved management of the organization Yes.

Based on the completeness of the operation, the complexity of processing and the results of automated processing of information from an automated control system, they are divided into information (or information-based information), cordially and caringly.

The concept of databases has long been the primary driver of the creation of effective automated information processing systems. However, the rest of the time, the fachists came to the conclusion that the most important component of this concept is a unified methodology for designing databases. This is explained not only by the fact that the design of new databases is a difficult and labor-intensive process, which requires obtaining highly qualified accountants, but also because, being an information model, parts of the In a lot of real world, the data base must also be changed in order to adequately reflect the action. Therefore, in order to support and operate information systems, there is a need for consistent database design procedures. Naturally, the use of automation systems for database design may lead to a change in the cost of developing information systems, a reduction in the amount of routine and non-creative work (related to the collection and editing of output data) and the cost of developing application systems. At present, the naphtha industry has a great need for efficient automated processing of information and control together with a traditional control system to ensure a significant increase in efficiency information about all types of production in naphtha production.

The registration warehouse of the application registration card details allows you to rationally carry out search procedures under the hour of automated information processing.

At an accelerated pace, develop the production and promotion of paper for hand, for automated information processing, paper and cardboard for packaging and packaging of grub and industrial goods. Collect waste paper more widely from paper and cardboard.

Information processing methods

One of the main purposes of IT is the collection, processing and supply of information for managers to make management decisions.

In connection with this method of processing economic information, it is easy to look at the phases of the life cycle of the process of making a management decision:

1) diagnosis of problems,
2) identification (generation) of alternatives,
3) choice of decision,
4) implementation of the decision.

Methods that are used during the diagnostic phase of problems will ensure a reliable and up-to-date description. Our warehouse includes methods of alignment, factor analysis, modeling (economic-mathematical methods, methods of mass service theory, inventory theory, economic analysis) and forecasting (explained and common methods ). All these methods involve collecting, saving, processing and analyzing information, recording the most important aspects. The set of methods depends on the nature and location of the problem, the terms and costs that appear at the stage of formulation.

At the phase of developing (generating) alternatives, methods of collecting information are also developed, but at the same time as the first stage, which is influenced by the search for responses to questions such as “What happened?” And “For what reasons?”, here they learn how the problem can be solved with the help of some management actions.

When developing alternatives (methods of management actions to achieve the goal), choose methods of both individual and collective problem solving. Individual methods are characterized by the least investment per hour, but the solutions are optimal. When generating alternatives, use an intuitive approach and methods of logical (rational) problem solving. To help the decision maker (DM), experts are obtained from the most common problems to take part in the development of alternatives. Collective problems arise from the brain attack/assault model, Delphi and nominal group technology.

During a brain attack, there is an open-ended discussion, which is important to conduct in groups that consist of 4–10 participants. A brain attack on the self is also possible.

The greater the difference between participants, the better the result (through different evidence, temperament, work areas).

Participants do not need any extensive or tedious preparation or knowledge of this method. However, the variety of ideas that are floating around, and it will take an hour to show how much participants and entire groups are aware of the principles and basic rules of this method. It is positive that the participants have knowledge and evidence in the field of analysis. The duration of the session within the framework of a brain attack can be chosen between a number of days and a number of years; the duration of the session is typically 20-30 minutes.

With the use of the method of brain attack in small groups, two principles must be strictly adhered to: avoid evaluating ideas (here a lot turns into harshness) and adhere to four basic rules - criticism is turned off, floats in A stronger association, as far as the quantity is concerned, is being searched for to understand and improve.

The choice of decision is made in the minds of significance, risk and insignificance. The difference between these stages of the middle is indicated by a variety of information, the level of knowledge of the decision maker about the essence of the problem, and the minds of the decision-making process.

It is important for the mind to make a decision (become aware of the essence of the problems), if the decision maker can later determine the result (output) of the skin alternative assigned to the choice. This is the situation with tactful short-line solutions. And here the decision maker has his own ordered reporting information, then. comprehensive knowledge about the situation to praise the decision.

The mental risk is determined by such a state of knowledge of the essence of the problem, if the decision-maker is aware of the credibility of the possible results of the implementation of a dermal alternative. The minds of the crisis and insignificance are characterized by the so-called minds of richly significant perceptions of the current situation in the external environment. In this case, the decision maker can choose an alternative without accurately identifying the contributing factors and their impact on the result. In the minds, the result of the skin alternative is the function of the minds - the officials of the dovkill (the function of coarseness), which is the first step in the transmission of the decision maker. To analyze the results of choosing alternative strategies, a decision matrix is ​​created, which is also called a payment matrix.

The mind of insignificance is such a state of excessive middle-classness (knowledge of the essence of the phenomena), if a skin alternative can produce a number of results, and the certainty of the culprit of these inheritances is unknown. The insignificance of the middle has decided to lie in the relationship between a number of information and reliability. Because of unimportant external precision, it is more important to take effective decisions. The middle will decide to lie also in line with the level of dynamics, the looseness of the middle, etc. The speed of change that is expected will lead to a decision. A change of minds can result from the development of an organization, then. adding to it the possibility of facing new problems, created before updating, and with the influx of new officials, who can be regulated by the organization. The choice of the best solution for the minds of insignificance must be based on this, which is the stage of this insignificance, then. Moreover, the information is provided by the decision maker. Such a choice, if the number of possible options of minds is unknown, but to determine the principles of approach to assessing the results of actions, will provide the following criteria: the maximum Wald criterion, using the Savage criterion, the Hurwitz criterion for pessimism-optimism, the Laplace criterion or the Bayesian criterion.

When implementing a decision, it is necessary to establish methods of planning, organizing and monitoring the implementation of decisions. The ordering of the plan for the implementation of the decision is transferred to the main source of nutrition, which, to whom, how, and where to work. The evidence for this nutrition may be documented.

The main methods to ensure consistency with a plan for the implementation of management decisions are the moderate modeling of certain obligations. The main tools of edge modeling are edge matrices, a edge graph of connections from a calendar-scale grid.

The methods of organizing a decision include the methods of compiling an information table for the implementation of a decision (ITPP) and methods of infusing and motivation.

Methods for controlling the financial decision are divided into monitoring intermediate and final results and monitoring the terms of the financial system (operations in ITRR). The main purpose of control lies in the established system of guarantees of the final decision, the system of ensuring the maximum possible extent of the decision.

Information processing technologies

During the information process, the information that circulates in the enterprise or organization is subject to one or the other processing depending on its activities. Behind the scenes one can see input and output, internal and external information. In the process of processing, information can be primary and secondary, intermediate and resultant, during which the data are transformed from one type to another. With the development of information technology, the amount of work spent on data processing increases and requires the use of sophisticated technologies.

Technology (gr. techne - mastery, logos - knowledge, knowledge about mastery) - the totality of knowledge about the methods and features of manufacturing processes, in which there is a necessary clear change in the objects that are being produced.

Information technology is a process that uses a combination of techniques and methods for collecting, processing and transmitting information to collect new information about an object, a process, or a device. A similar meaning is given in Art. 2 of Federal Law No. 149-FZ “On information, information technologies and information protection”: information technologies – processes, methods of searching, collecting, saving, processing, data, expanding information and ways of developing such processes and methods.

Meta-information technology is the collection of information for human analysis and further decision-making for any actions. In general, information technology is a set of clearly meaningful actions of people from processing information on a computer. The technological process of processing information consists of stages, operations and specific actions of the operator that result in data processing.

The structure of possible operations based on data can be named as follows:

Data collection and formalization, then. reduced to a new form;
filtration and sorting;
processing and transformation of data in accordance with the given task;
archiving of data, then. organizing data storage in a compact, handy and easily accessible form;
Data protection - a complex of approaches aimed at preventing the loss of data and their modifications;
transportation of data, tobto. reception and transmission of data between remote participants in the information process.

The history of the development of information technologies includes a number of stages associated with fundamental changes in the field of information processing.

The first stage of connection with the development of writing. The means of collecting, storing and processing information here were pen, ink, paper and books; the efficiency of information processing at this stage was extremely low. Vinakhid of the Friendship in the middle of the 16th century. significantly increased the efficiency of information processing, such as the dialing board and the Drukarsky verstat.

“Manual technology” was replaced, at the end of the 19th century, with the advent of telegraph, telephone, and radio, by “mechanical” technology, which allows for the rapid transmission of information.

Creation of electric Drukar machines, television towers, copying machines, tape recorders until the middle of the 20th century. led to the rise of “electric” information technologies.

From the other half of the XX century. With the emergence of the EOM, and then the personal computer, a new stage in the development of information technologies arose - “electronic” technologies.

An electronic computing machine is a universal device for entering, displaying, accumulating, processing and transmitting information for increasing calculation and information tasks. The term "computer" is used in the same sense as the term "EOM". EOM is an electronic machine, the fragments of which are composed of electronic circuits, and a calculating machine, which processes the fragments of information in digital form, finite calculations, numerical arithmetic and logical operations without human input. The digital form of presenting any data will provide the computer with such power as universality and suitability for a variety of different tasks.

The first was the design of an analytical machine (calculating machine) in a warehouse with an input device, a memory device, a processor, a device for displaying registration letters in the 19th century. Charles Babyge. In the first place, I came up with the idea of ​​software processing with such a machine. Further development of this idea is known to be continued with the introduction of the first electronic calculating machines. The functioning of the EOM was based on a dual numerical system for representing numbers and placing control programs in the device. The first EOMs were developed in the USA and England, in continental Europe the first “small electronic medical machine” (MESM) was created in the USSR.

Electronic computing machines are classified as low.

The physical data collected includes:

Analog computing machines are non-stop operations that work with information supplied in a non-stop (analog) form. in a seemingly continuous series, the value of any physical quantity (most often electrical voltage);
digital computing machines that process information in discrete form (digital);
Hybrid computing machines are combined, which combine the advantages of analog and digital computing machines and are used for advanced control of folding sliding technical complexes.

Behind the stages of the creation of EOM one can see several generations of development of computer technology, which was formed throughout the XX century.

The first generation includes cars built in the 1950s. with the arrangement of electronic tubes. At this time there were divided medical machines: MESM (small electronic medical machine), BESM (large electronic medical machine), “Strila”, “Ural” series, M-20. The main consequences of the first EOM were the cessation of scientific and technical developments.

Ten years later, EOMs were created, based on discrete conductor devices (transistors). Another generation of EOM was stagnated for technical and development purposes.

Third generation cars appeared in the 1970s. and there were separations on the conductor integrated circuits with a small and medium level of integration (hundreds, thousands of transistors in one package). This generation of EOM has begun to stagnate in the management and implementation of economic developments.

The fourth generation of EOM took shape in the 1980s. with the understanding of great and super-great integrated circuits - microprocessors (tens of thousands - millions of transistors per crystal). The method of EOM of this generation was already the presentation of information and wider development in management.

Thus, EOM creations are characterized by dozens of parallel working microprocessors, which allow for efficient knowledge processing systems. This generation is characterized by the stagnation of personal computers, telecommunication data processing, computer networks, the widespread stagnation of database management systems, elements of the intelligent behavior of data processing systems and devices.

The creation of optoelectronic EOMs with massive parallelism and neural structure dates back to the beginning of the 21st century. It is expected that the next generation of computers will have a clear transition from data processing to knowledge processing.

Information processing process

Information processing is a process of ordering and transformation that is consistent with the algorithm for solving the task.

After complete processing of information, the result may appear to the end users in the required form. This operation is carried out as soon as the latest information is available. The presentation of information, please, is carried out using additional external EOM devices such as texts, tables, graphs and others.

Information technology is the material basis of information technology, which also includes the collection, storage, transmission and processing of information. Until the mid-19th century, when the processes of collecting and accumulating information were dominant, the basis of information technology was the pen, inkwell and paper. Communication (contacts) took place through the route of directing packets (dispatches). The “manual” information technology at the end of the 19th century was replaced by the “mechanical” one (typewriter, telephone, telegraph, etc.), which served as the basis for fundamental changes in information processing technology. It would take a lot more effort to move on from storing and transferring information before processing. This became possible with the emergence in the other half of our century of such information technology as electronic computing machines, which gave rise to “computer technology”.

The ancient Greeks respected that technology (techne - mastery + logos - knowledge) is the mastery (mystery) of speech. The greatest significance of this concept has arisen in the process of industrialization of marriage.

Technology is the totality of knowledge about the methods and methods of carrying out manufacturing processes that involve a clear change in the objects that are formed.

Technologies of ceramic processes of power are ordered and organized, as opposed to spontaneous processes. Historically, the term “technology” has been used in the sphere of material production. Information technology in this context can be influenced by the technology of the hardware and software of computing technology in this subject area.

Information technology is a set of methods, production processes and software and technical features integrated into technological devices that ensure collection, processing, saving, expansion and display formats by reducing the complexity of processes for obtaining information resources, as well as increasing their reliability and efficiency .

Information technologies are characterized by the following main powers:

1. The subject (object) of the processing (process) is data;
2. The method of the process is the removal of information;
3. The methods of this process include software, hardware and software-hardware computing systems;
4. Data processing processes are divided into operations corresponding to a given subject area;
5. The choice of inputs into processes that are managed is the responsibility of the people involved in making decisions;
6. The criteria for optimizing the process are the timeliness of delivery of information to the public, its reliability, validity, and completeness.

Of all types of technology, information technology in the sphere of management provides the greatest benefits to the “human factor”, giving an important contribution to the qualifications of a worker, replacing his work, physical activity and knowledge. wife, professional prospects and the level of social contributions.

Analysis of information processing

The primary sociological information is removed and then stored, analyzed, and scientifically integrated. For this purpose, all collected questionnaires, surveys, report cards and interview forms must be verified, coded, entered into the program, grouped, collected, compiled into tables, graphs, diagrams, etc. In other words, it is necessary to establish methods for analyzing and processing empirical data.

The primary methods of processing information are based on the data that was collected during empirical investigation.

Secondary methods are the methods used to remove indicators, to determine frequencies and grouped data.

Six stages of sociological information:

Stage 1. Coding and editing of information. It is important to formalize empirical data, which has been removed by the method of study and other methods of collecting sociological information. Part of the questionnaire information has already been formalized, so that all possible variants of responses are given and corresponding digital codes are entered. However, most of the time, there are problems that need to be put in place when editing already collected profiles. In addition, another type of data that is collected is the output when the power is on. Therefore, there is no grouping and further coding for the important tasks of the first stage.
Stage 2. Transfer of sociological data to magnetic media. The amount of information that is collected in the course of sociological research is often large: the average of the research yields at least a few thousand pieces of information. Processing such a large amount of data without shutting down current computers is very important but ineffective. The importance of computing technology requires that the information that is collected be located on specially designed carriers. Therefore, the transfer of data from questionnaires to such media will replace another stage of processing sociological information.
Stage 3. Entering information on the computer. The data of the research we need, which is stored on special media, is entered into the computer and retrieved in a new version, as soon as possible previously fragmented and modified by special data processing programs. This stage is most often implemented by the calculation center's employees and current programs.
Stage 4. Verification of sociological data and correction of inaccuracies. Information has been entered into the computer in many cases to avenge more or less serious consequences. The reasons for such cancellations vary widely - the failure of respondents when filling out questionnaires and the transfer of codes to computer-readable media, and in addition to the failure of technical devices of computers. However, it doesn’t matter, the stars are gone. It is immediately necessary to identify and correct them after entering the data into the computer, so that the process begins to move to the next stage of analysis of sociological information. For this purpose, the sociologist-preslednik formulates songs of benefits that may be satisfied with the removal of data under the hour of investigation. On the basis of the removed information about these and other proposals, the sociologist-pre-researcher makes a decision about their removal, thereby eliminating the information.
Stage 5. Creation of change. The information collected from additional questionnaires often does not directly correspond to nutrition, which is necessary during the investigation. This is most often due to the fact that it is often very difficult to obtain the required characteristics of any traceable characteristics. For this purpose, to get everything done, you may need to revise the collected data. For rich questionnaires, the information directly corresponds to the research findings, and in this sense the nutrition itself is changeable.
Stage 6. Final. Statistical analysis of sociological information. Due to its significance, this stage is the most important in any analysis of sociological data. During the statistical analysis, the necessary statistical patterns and relationships are revealed. Sociologists use a wide range of different methods of mathematical statistics to easily access and thoroughly analyze all available sociological information. In this case, the stagnation of modern computing technology, equipped with similar programs for mathematical and statistical processing of information, is necessary for the mental, prompt and clear analysis of sociological data.

Sociological data must be correct, accurate, stable, informed and representative. The classification of alarms is important for assessing the reliability of sociological information. In sociology, all attempts are usually divided into the following two groups: instrumental and theoretical.

Instrumental relaxations serve the purpose of the virtual and true meaning of the sign. The stench is divided into phases and systematically. Vipadkovym means amends, which, with repeated deaths, change according to international laws. Systematic eliminations with repeated deaths will become permanent.

Other methods of increasing the reliability of sociological information can be used to ensure compliance and control the reliability of empirical data. To discover methods of external and internal control. External information is important in relation to the empirical information provided, which is followed by any other external information. The internal ones are knitted in the middle with the cross-sectional sign of the investigator.

Presumably, it is possible to develop a conclusion that methods for increasing the reliability of sociological information make it possible to establish the level of reliability of the follow-up results that were removed when repeated By the very methodology and technology in the same minds.

Processing of text information

Regardless of the wide possibilities of using computers for processing various information, the most popular ones, as before, are deprived of programs designed for working with text.

When preparing text documents on a computer, there are three main groups of operations:

Input operations allow you to transfer the output text from your external form into an electronic form, a file that is saved on your computer. Entries can be made not only by typing on an additional keyboard, but also by scanning the paper original and then converting the document from a graphic format to a text one (recognition).
- Editing operations allow you to change an existing electronic document by adding or removing fragments, rearranging parts of a document, splitting multiple files, dividing a single document into multiple smaller ones, etc. Introduction and editing during the hour, work on the text is often completed in parallel. When entered and edited, a replacement text document is formed.
- The formatting of a document is specified by formatting operations. Format commands allow you to precisely determine how text appears on the monitor screen or on paper or on the printer.

Programs that process text information are called text editors.

All the variety of current text editors can be mentally divided into three main groups:

1. First, the simplest text editors are used, which allow you to use a minimum of capabilities and work with documents in the original text format. This group of editors can include the WordPad editors included with the Windows OS and the very low-functional NotePad, as well as similar products from other manufacturers (Atlantis, EditPad, Aditor Pro, Gedit, etc.) etc.).
2. The middle class of text editors includes a wide range of possibilities for document design. They work with standard text files (TXT, RTF, DOC). Such programs can be downloaded from Microsoft Works and Lexicon.
3. Up to the third group there are heavy text processors, such as Microsoft Word or StarOffice Writer. Please note all operations with text. Most of the vikory writers are editors in everyday work.

The main functions of text editors and processors are:

Introducing and editing symbols in the text;
- Possibility of selecting different fonts for symbols;
- copying and transferring parts of the text from one place to another or from one document to another;
- contextual joke and replacement of parts of the text;
- Setting additional parameters for paragraphs and fonts;
- automatic transfer of drains to a new row;
- automatic numbering of pages;
- processing and numbering of wines;
- Create a table and daily diagrams;
- checking the spelling of words and adding synonyms;
- Pobudova place and subject indicators;
- distribution of prepared text on a printer, etc.

Also, almost all text processors have the following functions:

Support for different document formats;
- richness, then. the ability to work with a large number of documents overnight;
- insertion and editing of formulas;
- automatic saving of the edited document;
- robot with rich column text;
- Possibility of working with different formatting styles;
- Creation of document templates;
- Analysis of statistical information.

Today, almost all modern text editors are included in the stock of integrated software packages intended for the needs of the daily office. So, for example, Microsoft Word is included in the warehouse of the most popular office suite, Microsoft Office.

Similar MS Office programs are OpenOffice.org Writer, StarOffice Writer, Corel WordPerfect, Apple Pages.

Processing of personal information

The Russian Federation ratified the Convention for the sake of Europe “On the protection of physical persons under the automated processing of personal data.” With the ratification of this international document, our country and we and our communities entered into a new socio-economic formation, in which the rights of the people and the rights of “operators” were re-important. At the end of the Convention, Russia hastily adopted Federal Law No. 152 “On Personal Data” (hereafter Federal Law No. 152), which repeats the Convention in all basic provisions. Federal Law No. 152, however, until recently, when going to the library or to the dentist, people did not have the opportunity to give new information about their life: themselves, family, work, power.

The brutal and total collection of information about all aspects of people’s lives came as no surprise to the authorities of Federal Law No. 210 “On the organization of government and municipal services.” Here they also requested the adoption of the Convention for the sake of Europe “On the protection of physical persons during the automated processing of personal data” and Federal Law No. 152. On the basis of Federal Law No. 152, residents will also have to sign various forms “for the processing of their personal data” at the place of work, starting at the nursery that raises the child. Schools, clinics, libraries, and all social institutions collect our voluntary benefits. We also noted that stores that, when given a discount, hand out questionnaires, with a phrase about a benefit for processing personal data included in bold font.

First of all, people need to know what is behind the concepts that are used on forms:

1. Subject to Federal Law No. 152, personal data is any information that can be communicated directly or indirectly to an individual.
2. The concept of “processing of personal data” is not nearly as innocent as most of us think it is. Subject to clause 3 of Article 3 of Federal Law No. 152, “processing” includes any action (operation) or a set of actions (operations) that operate with or without the use of automation methods personal data, including collection, recording , systematization, accumulation, saving, clarification (updation, change), acquisition, recovery, transfer (expansion, transfer, access), isolation, blocking, removal, reduction of personal data.
3. The term “operator” is very important. It is necessary to remember that the operator independently decides what personal data he chooses and how he deals with this data. Subject to Federal Law No. 152, the operator is a government body, a municipal body, a legal or physical person who, independently or jointly with other persons, organizes and/or carries out the processing of personal data, and also determines the purposes of timidity of personal data, warehouse of personal data, scho facilitate processing, actions (operations) that deal with personal data.
4. What is meant by the concept of “personal data wiki”? Since operators are given the right to take any action with our personal data, then the recognition of legally significant decisions is subject to this right. Giving time to process their personal data, people are willing to allow operators to carry out any actions or manipulate any of their own information, including confidential information.
5. Subject to Federal Law No. 152, “rozpovyudzhennya” – these actions are directly related to the disclosure of personal data to an unidentified number of individuals. Fragments of personal data - whether information about a person, or more broadly - are not actually controlled by people's awareness of their confidential information, whether physical or legal, at the discretion of the operator. If the operator acknowledges that it is necessary, then in the process of processing, transcordon transfer of personal data may occur - transfer of personal data by the operator through the State Cordon of the Russian Federation to the authority of a foreign power, foreign physical or a foreign legal entity.
6. Federal Law No. 152 provides virtually unlimited possibilities for any manipulation of our personal data to any operator who has denied people “the processing of personal data.” The formal phrase of the forms about the right of people to request the processing of personal data does not apply. At the time of clicking on personal data, people have already been sent to different databases, they will be deprived of their rights and will be subject to abuse. In addition, clicking here threatens the operator with reprisal attacks. Some operators talk about them immediately, while others stagnate in practice without further delay. Article 9 of the Federal Law No. 152 has been amended to give the operator the right to continue the processing of personal data and after clicking on the processing. Changes to Article 6 of this law allow the processing of personal data without the need of a person when performing state and municipal services, including registration on a single portal of state services. Subject to the logic of these provisions, no electronic services will be allowed to process personal data of any kind. Well, in the information sector, a new person is coming to the fore - an operator who dictates his mind to the people and powers.
7. Thousands of people with religious connections cannot accept the automated method of collecting personal data that is linked to a number of special identifiers (SNILZ, IPN and others), bar coding of information ї, creation of personal data bases, access to which is based on the individual’s digital identifiers. The use of individual digital identifiers in any legal framework violates the right to operate under one’s own name, guaranteed by Article 19 of the Civil Code of the Russian Federation. For a common person, replacing a name with a digital identifier is unpleasant, since there is an actual replacement of the name given at Baptism with a digital number, which is pre-modern and becomes obligatory mental access before being what rights and services.

However, the use of an automated method for storing personal data does not reduce the rights guaranteed by the Constitution of the Russian Federation. The first application of sanctions for vidmova is to provide all information about yourself at the discretion of the operator. So called operators, who have approved the release date for the processing of personal data, are forcing citizens to pay subsidies, do not provide medical assistance, and the Scientists are informing about the threat of not being allowed to undergo tests or not being able to see a certificate. This is a grave violation of the rights of the citizens.

The Constitution of the Russian Federation has the rights of citizens to social security, medical assistance, education and other things that are not covered by the compulsory year for the processing of personal data. The Constitution has a direct effect and has legal force. Residents have the right to exercise all their rights and have the right to process personal data.

The Bishops' Council of the Russian Orthodox Church adopted the Document “The position of the Church in connection with the development of technology and the processing of personal data.” The Document states that thousands of citizens, on the basis of their constitutional rights and with religious motivation, are encouraged to develop a new identification system.

The Church places particular importance on the principle of voluntariness in accepting any identifiers and points out that it is necessary to respect the constitutional rights of citizens and not discriminate against those who are deemed to accept electronic their identification methods.

The Church respects the inadmissibility of compromising the rights of citizens whenever they have the right to process personal data.

Paragraph 5 states: “In connection with this, the supply of personal information creates the ability to control and manage a person through various areas of life (finance, medical care, family, social security, power and otherwise) there is a real problem, not only Introducing people into everyday life, and bringing peace into their soul. The Church shares the concern of the citizens and respects the unacceptable infringement of their rights for all people to have the right to process personal data.”

Organization of information processing

In each case, there are possible options for the design of the structure of the body, such as external and individual officials, officials of a particular enterprise.

Individual factors include:

Trivality of the variable and level of penetration (breadth/number, depth/common and stage of integration of add-ons) OI in the enterprise;
kerivnitstva style;
The basic structure of the organization of the organization and the sphere of OI.

Depending on the scale of the information processing problem at a particular enterprise, there are various organizational structures in this area. Let's take a look at the different structural diagrams (organizations) that characterize typical options for organizing subdivisions (or services) of different scales.

The structure of the great branch of OI is divided into other ranks of the central organization, the design of application systems and its maintenance, the IC, the development of basic technological features, and the main VC. Apparently, the staff here is given broad staff functions.

Servicing in large enterprises takes up 50 to 70% of the obvious efforts, which can be seen as a significant autonomous part of the structure. At the same time, it is often said against this dismembered substructure that in practice the design of a robot is considered more prestigious, and the maintenance and support of systems by their parts is, as a rule, the most clear, that is a valid sense secure these functions thoroughly, t .e. for help from these people themselves.

The computational center may, for example, be the central hub of data; Many enterprises have adopted a division of data structure.

Come in before the vantage of the cars, they will spit out the plans for the carving of clay and, more precisely, the caravan. When organizing computational work, it is often necessary to recognize their changeable nature in principle.

Subject to design (development) and the development of systems can also be recommended for the structure of the average unit OI. The choice and implementation (installation) of standard application software that is added by third-party organizations is becoming increasingly important for all companies; servicing of terminal koristuvachs is presented in this same group. Such structures often do not have a central hub of data, which is designed for the purpose of decentralizing control over viral species.

Planning and support functions include organizational tasks that are not otherwise within the competence of the care department of the species. Planning and support functions also rely on technical and software features and boundary planning. Depending on these and other situations that have arisen among the staff, it is also possible to delegate certain functions to work groups of another or third level.

Important for the small number of workers in the small sector (all functions are carried out by the same person, the planned and responsible responsibility for this is to work with a different personal union of Management often. is transferred to the sub-unit, which prompted the promotion of OI. In industrial plants, it is often the case that there is no standard application software, and the functions of support and support in such enterprises are often transferred to the bank, the parts of the government of which profile have not yet been formed.

Processing economical information

1. Tabular display of economical information.

Tables are a more compactly concentrated representation of business activities in digital expression. The role of the table is high due to its ability without text analysis. And the most convenient and rational form for receiving information. There are 3 types of tables: simple, group, combined.

Behind the analytical place, there are tables that display the characteristics of the object, which includes, among other things, the order of arrangement of indicators, the dynamics of tracking indicators, structural changes in the warehouse of indicators, The connections between the indicators behind different signs, the results of the breakdown of the influx of factors to the level before the investigation of the exhibitor.

2. Graphic method of displaying information.

Graphs are large-scale images of indicators and their location using geometric figures.

The main forms of graphs are diagrams, which behind their shape are stacked, dark, circular, square, linear, shapes. In place of the diagrams there is an equalization (the simplest graph of the equalization of the values ​​of indicators - stacker diagrams, smooth diagrams. For them, a rectangular coordinate system is created), structural (sectoral), dynamic, linkage graphs (On the and the abscissa shows the values ​​of the factor indicator, and on the axis ordinates – the value of the effective indicator on a similar scale.), control graphs (there will be two lines on the graph: the planned and actual level of indicators for the period of an hour.) etc.

3. Leveling method.

Evaluating is a scientific method of understanding, in some unknown phenomenon, objects are presented with those already known, previously investigated, using a single method of identifying hidden characteristics and the values ​​associated with them.

Vikoristavayutsya when:

Alignment of actual data with planned data;
- Change of performance indicators;
- alignment of the indicators of the analyzed PP with the average indicators for Galusia;
- Increasing the results of activities before and after making a management decision.

4. Variation of extreme and average values.

Absolute displays show the vast dimensions of the item, regardless of other items in the world, vagi, obsyagu, trivalosti, ploshcha, vartosti, etc.

These indicators establish a relationship between the size of the object under investigation and the size of any other object, or the size of this object, or taken over a different period or from another object. The relevant indicators are taken from the result of the division of one value in another, which is taken as the basis for the equalization.

To characterize the change in indicators over a period of time, use specific dynamics values. They are designated by the division of the value of the indicator of the flow period for the previous period (months, quarters, generations). They are called rates of growth (increase) and are expressed depending on the percentages and coefficients. The specific dynamics values ​​can be either basic or Lanczygian. The indicator of the structure is the visible part (pitted part) of the sterile part, expressed in hundreds and coefficients.

5. Grouping of information.

Widespread use in AHD is to understand the grouping of information - the division of the totality of objects, which is divided into somewhat homogeneous groups behind similar signs. It is important to analyze typological, structural and analytical groupings during the analysis.

Examples of typological groupings can be population groups for activity, groups of enterprises for forms of power, etc.

Structural grouping allows for the development of internal structures, connections between new elements. They are also divided into workers' warehouses based on their professions, work experience, age, and employment standards.

Analytical (causal-inheritance) groupings are used to enhance clarity, directly forming a connection between the indicators that are being studied.

6. Balance method.

The balance method serves as the main principle of the correlation, the proportion of two groups of mutually related economic indicators, some of which are identical. It is widely used to analyze the security of the enterprise with labor, financial resources, raw materials, fuel, materials, main methods of production, etc., and to analyze the abundance of their waste.

The balancing method can be used in case of deterministic additive factor models. The analysis can establish a model based on the balance of goods. For example,

Surplus for the settlement + Virobnitstvo + Import = Sales. Products + visa + Surplus on the market

7. Rich world level.

For the needs of the date, an assessment of the activities of several enterprises of the same area, region, subject. Based on the comparison of these indicators, a ranking of the activities of the enterprise is carried out. For different displays, one enterprise can take different places, so different methods can be used. The rich-scale analysis, based on the Euclidean scale method, allows one to determine not only the absolute value, but also the proximity/distance of a given indicator to the indicators of the standard enterprise. In connection with this, the coordinates of the aligned enterprises are expressed in parts that correspond to the coordinates of the reference enterprise (its coordinate = 1).

Stages of conducting a wide-ranging analysis based on the Euclidean method:

1. Setting up a system of indicators, which evaluates the results of the activities of enterprises, the collected information and the folded matrix of output data.
2. For each graph in the matrix, the maximum values ​​are calculated as compared to 1. Then all elements of the graph are divided by the maximum values.
3. Remove the coefficients by squaring them and multiplying them by the value of the corresponding coefficients of significance, and then add the rating score to the surrounding column.
4 The results of the ratings are to rank and indicate the place of the skin business for the sum. 1st place for the enterprise with the maximum rating score.

With the sum method, the place of participation in the given coefficient is indicated in the skin graph; otherwise, the place is subsumed. Those who have less sum – 1 sum. However, it is important to pay attention to the coefficient of significance (the most important is the coefficient of absolute liquidity).

8. Methods of bringing in indicators from a foreigner.

An important consideration that needs to be taken into account during analysis is the need to ensure the consistency of the indicators, since it is possible to compare values ​​that are not clearly uniform.

Inconsistency of indicators can be caused by various reasons: different price levels, activity obligations, structural changes, heterogeneity of products, differences in the indicators distribution method, In other calendar periods, too. Correction of uncorrected indicators can lead to incorrect conclusions based on the analysis results. Since the inconsistency of the indicators of the vyklikan with different levels of vartis assessment, then in order to neutralize this factor, their levels are expressed in the same prices

Methods of processing information

Current information processing systems use digital technologies that include paper data and enable data exchange between automated workstation technologies, which also allow for the integration of specialized forces of the spivrobit group. no one over the top of any task (such as organization within a work group), exchange of thoughts in progress of negotiations at any time in real time mode (teleconference), prompt exchange of materials via e-mail, electronic mailboxes, etc. For such systems, we need to broaden the term “corporate business process management systems” to support business operations as a whole. Such systems are characterized by non-viable technologies.

"Client-server", including connections of remote clients through the global Internet network. It is not uncommon for the system to unite over 40 thousand clients, located in different countries and continents, into a global information space. One such application could be the McDonalds company, which has its branches all over the world, including Russia.

Simply installing personal computers at work stations and connecting them locally is unlikely to have a positive effect in business management, since the original information structure will not be completely changed . It is not possible to automate outdated methods of work; a personal computer can be turned into a tool for the high-speed production of new papers. Thus, the results of the analysis of the work of enterprises in the United States describe the situation when, in order to enable the time service to the list warehouse of the enterprise, 43 different documents were drawn up, a total of 113 pages, including the necessary copies. This is because the information system has established connections (communications) between sub-units and other services. Moreover, for the normal functioning of an enterprise, no more than 20-30 internal communications are required, in fact they have 3-4 times more. Moreover, the practice of automation of business management shows that the establishment of productive computer equipment can lead to an increase in the number of communications for the management of “every problem” of your copies and their distribution. This stage of implementation for the production of computer technology can be achieved by speeding up all communications (communications) to an optimal level.

One of the most widespread problems: the attribution of the obvious power of the computer. A personal computer, no matter how expensive or productive it is, is nothing more than a healing machine, because it cannot solve our complex economic problems, because we ourselves cannot correctly formulate our goals.

Of great importance are also social and psychological problems that the team has under the hour of introduction of computer technology, which leads to a reduction in the number of spivorobnitniks, increased (and therefore strengthened) control over the activity and other coronavirus patients too.

Computerization fundamentally changes the technology of accounting and analysis of government activities. In a non-automated accounting system, the processing of data on government transactions is easily simplified and is accompanied by documents on paper, information - orders, assignments, records and regional registers, such as regional journals Iku. Similar documents are often stored in a computer system, but in many cases they are not found in electronic form. Moreover, the main accounting documents (accounting books and journals) in the accounting computer system have data files, which are impossible to read or change without a computer.

p align="justify"> Computer technology is characterized by a number of features that must be taken into account when assessing intelligence and control procedures.

A single operation. Computer processing transmits one or more commands for several identical accounting operations, which includes the appearance of random errors, such as manual processing. However, software fixes (and other systematic fixes in hardware and software) lead to incorrect processing of all identical operations for new minds.

Subfunction. p align="justify"> A computer system can create non-personal internal control procedures, as in non-automated systems there are different falsifications. This situation deprives frontline employees who have access to a computer from being able to perform other functions. As a result, computer systems can introduce additional inputs to support control at the necessary level, which in non-automated systems is achieved by simple subfunctions. Before such logins, a password system may be in place to prevent actions that are unacceptable on the part of facsimile agents who can access information about assets and cloud documents through a terminal in interactive mode.

Potential possibilities appeared due to inaccuracies. Compared to non-automated accounting systems, computer systems are more susceptible to unauthorized access, including features that provide controls. They are also open for the desired change of data and direct or indirect removal of information about assets. The less people are involved in the machine processing of the operation, the lower the possibility of identifying errors and inaccuracies. Applications made during the development or adjustment of application programs may be subject to undue delay during the trial period. The potential for increased control from the side of the administration.

Computer systems provide the administration with a wide range of analytical capabilities, allowing them to evaluate and control the activities of the company. The availability of additional tools will ensure the improvement of the internal control system and, thus, reducing the risk of its ineffectiveness. Thus, the results of the normal comparison of the actual values ​​of the expenditure coefficient with the planned ones, and the calculation of the calculations are usually carried out before the administration during computer processing of information. In addition, certain application programs accumulate statistical information about the computer's operation, which can be used to control the actual progress of accounting transactions.

Initiation of a computer operation. The computer system can log certain transactions automatically, and its authorization is not necessarily documented, as is the case in non-automated accounting systems, since the very fact of putting such a system into operation by the administration It conveys in an implicit sense the obviousness of the corresponding sanctions.

Thus, the method of processing government transactions when maintaining an accounting system greatly influences the organizational structure of the company, as well as the procedures and methods of internal control.

The role of the accountant and his interaction with the administration is clearly changing. However, automation of the accountant’s work attracts specific minds in Russian minds, for example, there are a large number of documents that need to be printed one by one. Additional difficulties will arise over the next three years in connection with Russia's transition to international standards.

Types of information processing

Processing information involves separating one “information objects” from other “information objects” by means of various algorithms and one of the main operations that creates Working on information leads to an increase in diversity.

On the very top level you can see numerical and non-numerical processing. When designating the type of processing, there is a different interpretation of the concept of “given”. In numerical processing, objects such as variables, vectors, matrices, rich arrays, constants, etc. are processed. For non-numeric processing, objects may include files, records, fields, hierarchies, boundaries, tables, etc. Another importance is that from the numerical processing of the data there is no great significance, since from the non-numerical processing we can obtain comprehensive information about objects, and not their totality.

Based on the current availability of computing technology, we see the following types of information processing:

Sequential processing, which is based on the traditional von Neumann architecture of the EOM, which uses one processor;
parallel processing, which stands for the presence of many processors in the EOM;
Conveyor processing is connected with the same resources in the EOM architecture for the execution of different tasks, and both tasks are the same as the sequential conveyor, but the task is, however, a vector conveyor.

It is customary to classify common EOM architectures from the perspective of information processing into one of these classes.

Architectures with a single stream of commands and data (SISD). This class includes traditional single-processor systems, which contain a central processor that processes attribute-value pairs.

Architectures with single command and data streams (SIMD). The peculiarity of this class is the presence of one (central) controller, which controls a number of processors.

It is important to look at the capabilities of the controller and the processing elements, the number of processors, the organization of the search mode and the characteristics of the routing and control measures:

Matrix processors that are used for performing vector and matrix tasks;
associative processors that can be used for a variety of innumerable tasks and memory storage, which can be used directly to access the information that is stored in it;
processor ensembles that can be used for numerical and non-numerical processing;
conveyor and vector processors.

Multistream and Single Data (MISD) architectures. To what class can conveyor processors be classified?

Multi-instruction multi-data (MIMD) architectures. To which class can the following changes be made: multiprocessor systems, systems with multiprocessors, computing systems with multiple machines, computing measures.

The creation of data as a processing operation transfers their light as a result to the current algorithm and further processing for processing at a higher level.

Data modification is associated with changes in the real subject area, which are affected by the inclusion of new data and the removal of unnecessary ones.

Ensuring the security and integrity of data is directly based on adequate representation of the real object data in the information model and ensures the protection of information from unauthorized access (security) and from data failures code of technical and software features.

Searching for information that is stored in the computer’s memory acts as an independent operation when selecting inputs from different records and as an additional operation when processing information.

Making a decision is the most important step that comes before the time of processing information. A wide variety of decisions has been made to necessitate the use of different mathematical models.

Depending on the level of information about the machine of the ceramic object, the precision and accuracy of the object models and control systems, the interaction with the external environment, the process of making a decision takes place in different minds:

1) make a decision for the minds of the importance. In this particular model of the object and control system, the tasks are important, and the injection of additional power is not networked. Therefore, between the chosen strategy of resource utilization and the final result, there is an unambiguous connection, it is evident that in the minds of the importance of vicorizing the general rule for assessing the cost of solution options, accepting as optimally those that lead to the greatest effect. As such strategies are similar, all of them are considered equivalent. For the sake of understanding, the importance of using mathematical programming methods;
2) praise for the decision in the minds of the riziku. In order to make a decision in the minds of the crisis, it is necessary to take into account the influx of the external middle, which cannot be accurately predicted, but is known to be an unimaginable division of its forces. In minds, the use of the same strategies can lead to different results, the likelihood of which will appear in respect of tasks and can be determined. The assessment and choice of strategy is carried out according to the following general rule, which ensures the possibility of achieving the final result;
3) a praised decision in the minds of insignificance. As in the primary task between the choice of strategy and the final result of daily unambiguous connections. In addition, the significance of the likelihood of the final results appearing is also unknown, which either cannot be determined or does not exist in the context of the substitute sense. Each pair of “strategy - final result” suggests that the external assessment looks like a winner. The most broadened criterion is to achieve the maximum guaranteed winnings;
4) make decisions based on rich criteria. Regardless of the above, the richness of criteria arises from the fact that there are many independent goals that cannot be reduced to one another. The presence of a large number of decisions complicates the assessment and selection of the optimal strategy. One of the possible ways is to use alternative modeling methods.

The creation of documents, records, and reviews places the converted information on forms that can be read by both humans and computers. This activity involves operations such as processing, reading, scanning and sorting of documents.

When processing information, it is transferred from one form of submission to another, which is determined by the needs that arise in the process of implementing information technologies y.

The implementation of all processes related to the information processing process operates using various software tools.

To process the entered text, computer typing systems (DTP) are used (DTP - Desktop Publishing). DTP - what kind of preparation technology is it?, for what? renews? The document is processed on an autonomous work station, which can serve as a personal one? computer chi working station. Text, graphics and images are designed according to the layout and combined into a smoothie. Inexpensive technologies of modern systems have recently replaced advanced phototypesetting technology. Do software tools offer a wide range of text processing capabilities? Is the information so great? choosing fonts, you can select the results without sacrificing anything you would have done with another phototypesetting machine? technology. The most popular layout programs are Design (Adobe Systems) and QuarkXPress.

Coding of signs

Coding the text is necessary for mental processing in electronic systems. Does the font resemble a digital one for the skin sign? machine? code. All over the world, the standard for representing text is ASCII (American Standard Code for Information Interchange). A 7-bit character description is standard, which can be used to encode 128 different characters. How are 96 characters identified that are used for creation instead of smuga, and 32 codes are used for control signs? information. Umlaut and special characters are designated as a combination? From the eighth bit, the method of installation is determined by the manufacturer of the software product. This often leads to problems when converting in the process of transferring data.

A file is a collection of logically linked data that is located in a form that can be easily saved and processed by the calculation system. A file is a collection of logical records.

When talking about records that go into a file, the word “logical” is often omitted. Kozhen record the file with tributes that may be specifically recognized. In files that are based on the type of reserves, each record can represent the totality of data that corresponds to one name of the virus. In the student progress file organized by the administration, records can contain the student's name, department number, course number and examination grades. Bank account file records may contain, for example, data such as the client number, his name, current account and information about his transactions for the previous month. Submission management file records can be made up of sums that are collected from previous payers of payments in the flow process. At this time, a lot of programming is related to the organization and management of files.

A significant part of the operating system is designed to make it easier for the user to manage and process data. However, the operating system is provided with a large amount of other information. This includes the texts of computer program outputs, subprogram libraries, input data of compiled tasks and their outputs. Data for processing by the operating system may be presented in the form of data sets. The collection of data is the largest collection of information that the operating system, and the data itself, is presented in memory in a special way, along with additional information that will ensure Possibility of access to more than one element of a multiplicity. The cutaneous operating system operates with sets that produce one of many valid structures.

To use data files, you need to check the capabilities of your operating system. The type of structure being analyzed indicates how the data set is organized. We will briefly describe the ways of organizing data sets, first of all we will try to take a closer look at the notes that appear between the logical records of the file and the input-output operations.

Record block

As you might have guessed, files are made up of one or more logical records. As a recording, a row can appear that is displayed on the device either hand or instead of one punched card. If we are talking about an assembler program, then the entry here is a proposition of the output language, which takes up 80 bytes. A file entry containing information about a given student can take 500 bytes. It seems that the total number of records, both and together, is assigned to the file’s attributes.

A physical record, or block, is information that is transmitted by an input or output device in one operation. For a device for reading from punched cards or an output punch, the block consists of 80 bytes, the fragments of 80 bytes themselves are encoded by one punched card. The block to be used is a 132-byte row. In such devices, i.e. devices, the size of the block is strictly determined by the equipment itself, the number of logical records in the block cannot be changed and exactly one record is made at a time. Such devices are called devices for single recordings. On other devices, for example, such as a magnetic disk and magnetic strip, the dimensions of the block are not strictly defined. In such situations, the stink comes from the programmers themselves. Physical records do not necessarily follow logical dimensions. The format of records in a data set is determined by the settings between the sizes of the type records and blocks.

Small 17.1. Record formats.

In cases where physical and logical records are oversized, it seems that the records are not blocked. We often talk about blocking data formats, since one physical record contains more than one logical one. This may occur if the size of the surrounding records exceeds the size of the blocks. Records in such a set are called transitional.

The size of a block in a data set is a constant value. This is why we talk about blocks of interchangeable life, and the values ​​of the quantities that characterize the dimensions of the blocks are written in the middle of the blocks themselves. Since all the blocks in the set are the same size, then we talk about the set of data from blocks of a fixed value.

In practice, there are different combinations of block sizes and adjacent records. Some possible consequences are shown in Fig. 17.1. Set of data, images in Fig. 17.1, or maybe, for example, a punched card file. The total number of each block is equal to 80 bytes, and each block has exactly one logical record. Type in Fig. 17.1,6, folds from 100-byte records. The blocks in this set contain up to 300 bytes. This means that in the process of entering or displaying data in this set, within one operation, information will be entered or displayed, amounting to 300 bytes. When a set is processed by a computer program or by operating system programs, the blocks will be divided into recording edges. In Fig. 17.1 shows a set of data with transitional records of the final day. The input or output of a sufficient record is transferred to the output of two input-output operations. Data set fig. 17.1g is compiled from the records of the changeover. Depending on the duration of the block, and the number of records in each block, the number of records varies. The task of distributing the skin block for recording is again based on the detailed program.

Ways to organize data sets

Having become familiar with the various possibilities of distributing data sets in a warehouse - blocks and records - let's now move on to look at the elements associated with the basic structure of the set. When organizing the collection, it is understood that there is a mutual arrangement of storage blocks and trays to tie the skins from the blocks and the collection of data as a whole. The choice of the appropriate method for organizing the recruitment lies with several officials. This includes the type of device on which the dialing is saved, the order in which adjacent records are read, and the type of data that is re-examined when the dialing is made.

Consistent organization. Some peripheral devices, for example, magnetic storage devices or devices with single records, clearly indicate the method of organizing a particular set of data. Records are processed in the order in which they are saved. For the punched card reader, enter the output array card by card in the same order as in preparation for insertion. The devices are next to each other, row after row, in order, in which stench comes to the next. Information is recorded on the magnetic page in the same order as blocks. Once entered, these lines go through the order in which the blocks are placed on them.

Small 17.2. File from sequential organization.

On the other hand, direct access devices, such as, for example, storage devices on magnetic disks, make it possible to write and read blocks in a convenient manner. For this purpose it is necessary to enter the address in the entry. In other words, the processing of records in a set can be done in a fairly orderly manner, provided that we know the addresses of their placement or the addresses behind which they are located. However, in most programs, the physical order of records in a set is consistent with the order in which it should be processed. Rarely looking at the surrounding records, warehouse propositions and output programs, it is necessary to carry out the order in which they were written. The same can be said about the hundreds of machine-written object and creative modules.

Files in which processing of subsequent records is carried out in the order of their physical location are called sequential. When creating a sequential file or adding new entries, the order in which the information is recorded is the same as the order in which it is sent to the peripheral device. The records of the sequential file are read in the order in which they were inserted into the new one. Processing of information in the order of placement on the device or memory is called sequential processing.

Consecutive files are saved in data sets through sequential organization. In Fig. 17.2 shows the butt of a sequentially organized set of data. The remaining block in the set is followed by a special block, called a line mark and indicating the end of the data set. When a drawing block is added to the next set, the line mark overlaps with this block and a new mark is written immediately after it. When you enter a data set, the records will be read in the order in which they are recorded in the set, the entry will be read until the line mark is pressed.

Library organization. We have already guessed the origins of certain system libraries, which are of great importance for computer scientists. There is a system macro library, a library of cataloging procedures, and a library of system programs and test applications. Each section of the library contains the latest set of data. For example, the library of cataloging procedures of the OS system contains sections such as ASMFCLG, FORTGCLG and COBUCG.

You will be prompted for additional section names instead of libraries. For example, when parsing the INITIAL macro, the assembler queries the section with the INITIAL names that is located in the system macro library. A collection of data that consists of one or more sections and organizations in such a way that access to each section is provided by their names is called a library set.

Small 17.3. The structure of the library data set in order to accommodate special macros that are used in this book.

Library data sets are stored on a direct access device. This allows you to view different sections, indicating their addresses as well. To make it easier to search for a section of the library, the system creates a special table, called a subset, for each section, the data set matches the addresses of that section. In Fig. 17.3 shows the structure of the library set. As soon as the next section of the library is queried, the system looks for the location in search of a username. Then connections are made with these names and addresses, and they are immediately searched to determine the location of the sequential set of data that represents the required section.

The operating system provides special programs for the creation and management of external library sets. OS also provides library kits for maintaining public libraries. There is little robot in the DOS systems in the DOS systems in the OS, DOS do not can be able to be special -hated, the broth to the broth to the Vikonuvati Roboti is allowed to the browned.

Index-sequential organization. In such situations, it is necessary to manually clean up both the subsequent processing of the set, selecting the records in the order in which they are stored in each device, and the complete processing of the connections between the various records. in, reading, adding and changing records. Know our program for processing cloud information We are responsible for saving in memory records that correspond to each obvious brand name, one record per skin name. Key meanings At the end of the skin massage, the file is displayed at the current moment. new row, which is consistent with the song's name.

Over time, the current situation, however, could change: the company could prepare and purchase completely new products, old products could be sold incrementally. This requires making changes before writing to the image file. In order to make a change before making an entry, you need to know it right away. To find a record, you can organize a review of the entire file from start to finish until the required record is identified. However, if the file contains thousands of records, such a review every time, if you need to make changes to an existing record, can turn out to be too costly in terms of machine hours.

Small 17.4. File structure with index-sequential organization.

In fact, such a method of organizing a set of data is required, in which access to individual records can be achieved either sequentially or using sequential keys.

This method of organizing data has an index-sequential organization. When creating an index-sequential data set, the file records are initially ordered by keys. In our application, associated with the processing of cloud information, the key record will be based on the branch number. Then the records are subsequently displayed. They are located by the system on a device with direct access. Who will have one or more indexes. If this is done manually, the processing of a set created in this manner can be carried out sequentially in the order of recording the corresponding device. On the other hand, each specific record can be requested using a key, which will search for indexes, prompted by the system to quickly find the required record.

In Fig. 17.4 shows the example of a single-index organization for a data set. The output file is divided into subfiles, each of which is represented by the first row of the index table. This row contains information about the key of the remaining one and the address of the first entry in the podfile. When a record needs to be entered with certain specified key values, the system initially looks at the index table in search of the first row to place more or equal values ​​to this value. The required entry must be placed under the podfile that corresponds to this row, so further search will be carried out between the elements of this podfile.

The system has the ability to add new entries to a separate file and delete old entries. Thus, the index-sequential organization significantly expands the capabilities of file processing. Records can be processed sequentially and in sufficient order. All this transfers, however, the ordering of the records in the output file.

Direct organization. Since the direct addresses behind which the adjacent records are placed in the file are set by the user himself, we speak about the direct organization of the data set. Set the keys to serve either the exact address of the record, or the area, no more than any record can be. Direct organization allows the best access to individual records in the file, while at the same time all the responsibility for creating and maintaining the data set is entrusted to the operator. Direct organization is used in these situations when it is necessary to finish the work with files that are visible from the structure created by the operating system.

Access Methods

At the department Section 17.4 will describe peripheral devices and methods for directly programming these devices. However, it is really rare to be able to program at such a low level. In order to organize various exchanges between memory and peripheral devices, as well as to create data sets, different organizations use special system programs called the method ів access. The entry-exit command, which uses the access method, is used to create a set of system programs called the entry-exit supervisor. The input-output operations themselves are directly coordinated by the input-output supervisor and the subprograms associated with them. In fact, this means that with different access methods, there is a need to pay attention to the specific details associated with the various input-input-output operations involved in the access methods themselves.

Each operating system has a number of access methods. The choice of any specific method depends on the operating system, the organization of the collected data set and the choice of the necessary buffering method.

Small 17.5. (a) Simple buffering delays the program until the buffer is full; (b) The use of several buffers will ensure the condensation of data transfer programs.

Buffers Buffers are areas of memory designed to accommodate information entered from a peripheral device and information prepared for output to a peripheral device. In the most extended option, the buffer addresses are specified immediately from the input. The input-output supervisor places the end-to-end input of the block from any device into the buffer. If we want to create a new solution, then we ourselves need to know about a separate buffer instead of a buffer. Once the data is prepared, a write is applied to the new file, with the buffer address; The building itself is completely shaped by the system.

In Fig. Figure 17.6a shows the sequence of steps that are retrieved when the input is periodically entered into a single buffer. Introduction to the program of the koristuvach. The fragments, swiveled for everything, the robot program of the correspondent cannot be continued until the exchange is completed, the supervisor immediately applies it until the exchange is completed.

In most devices, every I/O operation can be carried out very quickly, and the processor can perform thousands of operations at any given time. Thus, a vikoristan without one buffer significantly increases the vikonanny of programs. However, you don’t need to think that while going through the process of input and output, the processor cannot cancel any other operations. Yak mi bachimo v rosd. 17.4, EOM Systems 360 and 370 allow one-hour operation of the processor and peripheral devices. Let's talk about the volume of input/output operations from basic program commands.

The feasibility of such a connection can be successfully carried out in vibrating exchanges, for example, with two buffers. The butt of such a vikoristan is shown in Fig. 17.5,6. During the final processing, the supervisor arranges for the information to be entered in the order in which it appears on file. In this way, the system can, in fact, by “transferring” the steps, store the buffer even before the order is cancelled. In fact, since the processing of data is carried out by the computer program no more than once, the system can store and release buffers, then the selection of several buffers allows you to reduce to a minimum the costs that arise from the connection with the necessary There is also an output-input operation. The use of several buffers allows you to increase the speed of the information displayed.

However, during the subsequent processing of data, the selection of several buffers can result in a win in an hour. Since the processing of these data is carried out in a long, random sequence, those who are called “transfers” of the system, lose sense.

The skin operating system provides a variety of access methods. The stage of the necessary part of the program for the most abundant power supply, associated with the vicarious buffers, largely lies in the access method, which becomes stagnant. These access methods allow operators to not worry about buffers, completing all necessary work automatically. In other situations, the use of buffers can be entirely borne by the operator. There are methods to help you make choices before using the system's services to manage buffers.

Methods for accessing the DOS system. All access methods of the Disk Operating System are automatically buffered. To ensure the functionality of the system, it is necessary to reserve one or two buffer areas in the middle of your program. If the robot is configured with two buffer areas, then all input-output operations during the hour of work with the latest files are saved by the system until the real inputs are removed. Koristuvach can block data blocking at the time of deletion and unblocking at the time of entry. The DOS system has the following methods for organizing data sets: sequential, index-sequential, and direct. The main access methods of the DOS system are:

Sequential Access Method (SAM)

Index-Sequential Access Method (ISAM)

Direct Access Method (DAM)

Table 17.1 Methods for accessing the OS system

Name

Mnemonics

Queued Sequential Access Method

Consistent organization of data, method of access from books

Basic Sequential Access Method

Consistent organization of data, basic access method

Queued Indexed Sequential Access Method

Creation and sequential processing of index-sequential files

Basic Indexed Sequential Access Method

Sufficient processing of index-sequence files

BasicPartitioned Access Method

Creation and processing of library data sets

BasicDirect Access Method

Processing files using direct organization

TelecommunicationsAccess Method

Interaction with remote terminals

Methods for accessing the OS system. Access methods of the OS operating system fall into two classes: basic access methods and basic access methods. Access methods can ensure automatic buffering. The system itself maintains buffer areas. The system works to block and unblock records. Access methods need to be reviewed when processing sequential and index-sequential files. These methods allow you to achieve maximum processing efficiency with a minimum of delays before the operator’s program.

The methods used are similar to the basic ones and the access methods are very primitive. Tim is not less, the stench allows you to reach the greater filthiness of the robot with data. Part of the burden of managing buffering is now the responsibility of the user, and the user is also responsible for unlocking records. Basic access methods are used mainly if they are brought to the right with inconsistent processing of data sets. The list of the most suitable methods for accessing the OS system is given in the table. 17.1.

In our opinion, we only slightly focused on the nutrition associated with data structures and the capabilities of the operating system and the input-output operations. There is no less material available to disseminate the agreed-upon access methods for programmed entry and exit. We are now using the latest access methods from OS and DOS systems. Regardless of the fact that the principle of a sequential access method is different for the two systems that we are considering, the specific details still tend to vary greatly. Please take a closer look at the material related to the input-output programming for your specific system. After this, however, you can look at the other section to become familiar with similar issues in working with the two systems.

Processing is one of the main operations that involves processing information and thereby increasing its complexity and diversity. For the health of the reversal of the pre -person of the tech, to represent the formalized Vighmi - at the Viuggian structures of the Dani (“INformation Op'Kktіkt“), the Yaki є Act of the abstract fragment of the real Svit. Abstraction (from the Latin. Abstraction - abstraction) conveys a vision of the greatest detail from the perspective of the work of authorities and connections. So, for example, information about a student, necessary for the appearance of his success, can be represented by a set of identifying data such as nickname, first name, number of the initial group. In this case, the specific characteristics, such as hair growth, hair color, etc., will not be covered. Information processing is the separation of some “information objects” (data structures) from other ways of constructing certain algorithms. The algorithm is an abstract or real (technical, biological or biotechnical) system, created by a viconati dii, which is represented by the algorithm. To mechanize and automate the process of information processing and calculation, which is consistent with a given algorithm, there are different types of calculating machines: mechanical, electrical, electronic (EOM), Natural, pneumatic, optical and combined. In modern information science, the main component of algorithms is EOM, also called a computer (from the English Computer). EOM is an electronic device used to automate the process of algorithmic information processing and calculation. Depending on the form of submission of processed information, computing machines are divided into three great classes: ■ digital computing machines (DCMs), which process information presented in digital form; ■ analogue computing machines (AVM), which process information, are presented in the form of continuously changing values ​​of any physical quantity (electrical voltage, current, etc.); ■ hybrid computing machines (HCMs), which combine both analog and digital computing devices. The functioning of the AVM is based on the principle of modeling. Thus, when the variable size of the task is set to the same variable size of the electronic lancet, the variable size of the task is set to the same variable size of the electronic lancet. In this case, the basis of such a model is the isomorphism (similarity) of the tracking task and the corresponding electronic model. In accordance with their computational capabilities, AVMs are best suited for the accomplishment of mathematical tasks that allow for differential calculations that do not require complex logic. In addition to digital computers, the accuracy of which is determined by their capacity, the accuracy of calculation on computers is determined by the type of preparation of the elemental base and the main units. At the same time, for the whole class, the speed of solving tasks on an AVM may be significantly greater than on a digital computer. This is explained by the parallel principle of releasing tasks on the AVM, if the result of the decision is released simultaneously at all points of the model. This feature increases the efficiency of the AVM in closed automatic control systems for maximum control in real time mode. Hybrid computing machines, which combine both analog and digital computing devices, combine the advantages of computers and digital computers. In such machines, digital devices are intended to serve for the implementation and execution of logical operations, and analog devices are intended to serve for higher differential levels. However, it is important that most computers are digital, hence the word “computer” and “EOM”, which means “digital computer”. To process analog information on such a computer, first convert it to digital form (section 6.2). The current computer (EOM), as a real data processing system, contains a number of complex figures with the abstract algorithmic system considered in the previous section - the Turing machine (MT): ■ similar to the MT model, the EOM contains in its ordered endless commands, underlie implementation and implementation of the skin algorithm; Similar to the MT model, the EOM functions discretely (tactically) under program control, which is stored in RAM; ■ the EOM control device for the designated purpose is similar to the MT-model control device. However, EOM is similar to MT-models with a truly complex organization and a wide range of large teams, which allows you to effectively represent different algorithms for solving tasks. Moreover, considering the possibility of increasing memory for necessary tasks, the skin EOM can be modeled like MT, being potentially universal. Potentiality is further explained by the fact that it is impossible for the EOM to take into account the universal sense of computation of a sufficient, often recursive function, i.e. it is a class of unrelated tasks for the mind і її resources (before memory). The basis of modern computers is made by hardware (a set of electronic and electromechanical elements and devices), and the principle of computer information processing lies in software (software) - a formalized description of the processing algorithm in and look at the sequence of commands that guide the processing process. The command is a double code that indicates the operation of the calculation system for any operation. An operation is a complex of technological processes on information based on one of the program commands. The main operations when processing information on the EOM are arithmetic and logical. Arithmetic operations include all types of mathematical operations, developed by the program, on whole numbers, fractions and floating numbers. Logical operations provide operations on logical values ​​from a logical result. In computing systems, the sequence of actions that initiates the processing of information is called a process. Thus, the processing of a particular text by an editor program is a process, and the editing of another text at an additional cost by a program is a different process, as in which the same copy of the program is corrupted. A process is defined by a host program, a set of data that can be read, recorded, and edited at the time of implementation of the process, and a handle can be assigned to the process, which means the flow rate of any observed process. su resource EOM. The process descriptor is the totality of records, the initial stages of EOM resources assigned to the process. The skin session of a koristuvach with the computational system, for example, the introduction and display of data in the EOM, is also a process. Due to a problem in the computing system, a large number of processes may be running at the same time, which means there may be competition for water with one or another resource, ahead of the time of the processor - the main computing device of the EOM. This implies the need to organize process management and planning. Today's EOMs are tasked with operating systems (OS), which include a set of programs for managing processes, distributing resources, organizing input and output, and the interface with the computer. From the point of view of the organization of calculation processes in the EOM, a number of modes can be seen: ■ single-program single-cost mode, in which the calculations are of a sequential nature, and EOM resources are not shared; ■ multitasking, if a number of programs consistently use the processor time, from their own hardware and software resources EOM; ■ insurance coverage for a large number of users, if the individual processor sees a quantum (interval) of processor time, in which the distribution of resources, first of all the processor time and memory, is significantly complicated; ■ multiprocessor, if the computing system includes a number of processors, it allows you to combine real parallel processes, in which the distribution of resources is of the most complex nature. When you select the information processing task on the computer, you can see batch and interactive (query, dialog) modes of interaction between the client and the EOM. The batch mode is now being used to reduce the unproductive costs of machine hours in order to obtain the same type of work. Its essence lies with the next. The commands are grouped into packages using their own compiler. The compiler will execute the task once, and then it will start broadcasting all the instructions in the package. After the compilation of the package is completed, all successfully translated and double-coded tasks are sequentially downloaded and processed. This mode was the main one in the era of the centralized exchange of EOM (centralized processing), when different classes were invariably dependent on the same computational resources, concentrated in one place (information-computation center). For whom, the organization of the calculation process would be important without access to the EOM. Its functions were limited to the preparation of output data for a complex of information-interconnected tasks and transfer to the processing center, deforming the package of tasks for the EOM. Currently, the batch mode refers to the process of computer processing of a task without the possibility of interaction with the server. In this case, as a rule, the tasks are entered by the accountants from the terminals and are not processed immediately, but are placed initially in the task box, and then go for processing using available resources. This mode is implemented in many multiple access systems. The interactive mode directly conveys the interaction between the user and the information and computing system, and may also change the nature of the request (usually regulated) or the dialogue with the EOM. The power supply mode allows a differentiated, strictly established order to give the customers an hour to sleep with the EOM. The dialogue mode reveals the ability of the user to directly interact with the computational system at a pace acceptable for a given work rate, implementing a cycle of forming a task that is repeated, retrieved, and analyzed. In this case, EOM itself can initiate a dialogue, informing you about the sequence of steps (this menu) to determine the result. The organization of mutual cooperation between the Koristuvach and EOM is presented in Fig. 6.1. Interaction occurs through the transmission of relevant signals between the system and the EOM. Input messages are generated by the operator using additional input methods: keyboards, mouse-type manipulators, etc. The main types of notifications generated by the user are: requesting information, requesting assistance, requesting operations or functions, entering or changing information, etc. What actions do you require, notifications about amends that will require action from the witness, etc. 1 Fig. 6.1. Organization of mutual cooperation with the EOM This regime is based on the current stage of development of computer information processing systems, which is characterized by widespread use in almost all areas of activity of personal computers (PCs) - single-system They are micro-sized, which satisfies them due to their accessibility and versatility. Nowadays, the scientist, having a good knowledge of the basics of computer science and computational technology, breaks down the algorithm for solving the task, enters data, extracts results, and evaluates its accuracy. One has the real opportunity to deal with alternative options, analyze and choose the most suitable option for a particular system in a particular mind. The main stages of performing tasks on an additional computer are presented in Fig. 6.2. The practice of installing personal computers in various fields of science, technology and manufacturing has shown that the greatest efficiency in the development of computing technology is ensured not by PCs, but by calculation measures - the totality of computers and terminals connected through additional channels into a single connection system of distributed data processing. 6.1.1.

Enter

For writing my thesis, I chose the topic “Information Processing Technologies.” I consider this topic to be the most relevant, since it provides information and information about the vast world that is subject to saving, transformation, transmission and recovery. Whether human activity is the process of collecting and processing information, decisions are made on its basis and their decisions are made. With the emergence of modern computing technology, information began to act as one of the most important resources of scientific and technological progress.

Data - this knowledge, expression in signals, notifications, notifications, notifications, etc. Every person in the world is surrounded by a sea of ​​information of different types.

The purpose of my thesis is to study the principles of processing information in its form of submission, methods of encoding and saving. And it is necessary to learn the concepts of information, which are the basic concepts of computer science.

For a detailed investigation of the process, the robot must be divided into several stages. First, get to know the concepts of “information processing”, and learn: the goals, objectives and types of information processing; methods of processing information; information processing scheme; current information processing systems; problems related to computer processing methods; improvement of computer processing of data from non-automated; technological process of information processing In other words, follow the classification of technical methods of data processing. Before them lie: modes of processing tributes; ways of processing data; a set of technical methods for processing information; classification of technical means of information processing

1. Information processing

Main types of information The form of filing, the methods of encoding and saving, which is of greatest importance for computer science, is:

§ graphic and image-creative- the first type, for any implementation of methods of saving information about the excessive light in the appearance of rock babies, and later in the appearance of paintings, photographs, diagrams, chairs on paper, canvas, marmur, etc. materials that depict pictures of the real world;

§ sound- the world around us of the discovery of sounds and their storage and circulation began with the introduction of sound recording devices in 1877. This is a different type of musical information - for this type, we have found a method for encoding special symbols in a series of symbols, which makes it possible to save similar graphic information;

§ textual- a method of encoding the language of people with special characters - letters, and different people can use different languages ​​and use different sets of letters to represent the language; This method is of especially great importance after the release of paper and medicine;

§ numerical- a wide world of objects and different powers in the world; Particularly great significance arose with the development of trade, economy and penny exchange; Similar to text information, for displaying vikoryst the method of encoding with special characters - numbers, and the encoding (numerical) systems can be different;

§ video information- A way to save “live” paintings from the extra world that has appeared with the release of cinema.

There are also types of information for which no way of encoding or storing it has been found - tactile information, which is transmitted by senses, organoleptic, which is transmitted by smells and tastes, etc.

Claude Shannon is considered the creator of the advanced theory of information and the founder of digital communication. Its worldwide popularity was brought by the fundamental development of 1948 - “A Mathematical Theory of Communication”, which first introduced the possibility of using a double code for transmitting information.

The set of laws of information processing in systems of various natures (physical, economic, biological, etc.) is the fundamental basis of the theory of information processes, which means they are fundamentally significant existence and specificity. The object of this theory and information is the understanding of something in the abstract that exists “in itself” in connection with the specific field of knowledge in which it is being studied.

Information resources in everyday life play no less, and often a greater role, than material resources. Knowing who, if and where the goods are sold, can be priced no less than the lower price of the goods. In connection with this, a great role is played by methods of information processing. There are more and more sophisticated computers, new, manual programs, and modern ways of saving, transmitting and protecting information.

In terms of the market, information has long become a commodity, and this situation highlights the intensive development of the practice, industry and theory of computerization of business. The computer, as an information medium, not only allows for a clear cut in the organization of industry, science and the market, but also reveals new self-valuable developments: computing technology, telecommunications ї, software products.

Tendencies in the computerization of business are associated with the emergence of new professions related to computing technology and various categories of business owners. Since in the 60-70s this area was dominated by computer engineers (electronics engineers and programmers), they are creating new methods of computing technology and new packages of application programs, then The category of EOM correspondents is intensively expanding - representatives of highly specialized areas of knowledge, not They work on computers at university level, and then use them to complete their specific tasks.

Figure 1.1 Information processing cycle

The EOM manager is required to know the fundamental principles of organizing information processes in the computer environment, to select the required information systems and technical features and to master them x completely its own subject area.

1.1 Purposes, objectives and types of information processing

Information processes(Collection, processing and transmission of information) have always played an important role in science, technology and family life. As a result of the evolution of mankind, there is a strong tendency towards the automation of these processes, although their internal changes have become permanently unchanged.

Collection of information- this is the activity of the subject, during which he obtains information about the object that is being collected.

Collection of information can be done either humanly or with the help of technical features and systems - hardware. For example, a correspondent can obtain information about the flow of trains or flights himself, having read the schedule, or from other people directly, or through any documents compiled by people, or through additional technical means (auto matic confirmation, telephone too). The task of collecting information cannot be superior to other tasks, restrictions, and the task of exchanging information (transfers).

Exchange of information- this is a process in which information is transmitted and received by the host.

If an error is detected in the notifications that are transmitted, a retransmission of this information is organized. As a result of the exchange of information between the device and its owner, a kind of “information balance” is established, in which, ideally, one holds the same information as the device.

The exchange of information takes place using additional signals, which are also material. The pieces of information can be any objects in the real world, like the songs of power and wealth. Whenever an object is brought into contact with inanimate nature, it generates signals that immediately discourage its authorities. Since the object-jet is a person, then the signals that it generates may not only reflect its power, but also correspond to the signs that a person generates through the exchange of information .

The stolen information can be abused more than once. In this way, you are responsible for fixing them on a material medium (magnetic, photo, film, etc.).

Accumulation of information- This is the process of forming an output, unsystematized array of information.

Some of the recorded signals may be such that they display valuable information that is often violated. Some information may not be of particular value at this time, although it may be necessary in the future.

Saving information- this is the process of supporting the output information in the view, which will ensure the output of data to the end devices at the installation terminal.

Processing information- after ordering, the transformation process is consistent with the algorithm for solving the problem.

After complete processing of information, the result may appear to the end users in the required form. This operation is carried out as soon as the latest information is available. The presentation of information, please, is carried out using additional external EOM devices such as texts, tables, graphs and others.

The power of information.

As an object, information carries power. A characteristic feature of information from other objects of nature and prosperity is dualism: the power of information flows like the power of output data, which becomes a substitute part of power. using all methods, recording this information.

From the perspective of computer science, the most important seem to be the following obscure clear powers: objectivity, reliability, completeness, accuracy, relevance, cosiness, value, relevance, availability, accessibility, consistency, etc.

Objectivity of information . Objective - a basic position, regardless of human knowledge. Information is the reflection of external objective light. The information is objective, as it lies in the methods of fixation, thoughts, judgments.

butt. The message “It’s warm outside” carries subjective information, and the message “It’s 22 ° C on the street” is objective, but with accuracy, to avoid the death of the individual.

Objective information can be obtained using the reference sensors of the vibrating devices. Based on the knowledge of people, information can be contradicted (at least to a lesser extent) depending on thoughts, judgement, information, knowledge of a specific subject, and therefore cease to be objective.

Credibility information . The information is reliable as it shows the current reference status. Objective information is always reliable, but reliable information can be both objective and subjective. Reliable information helps us make the right decisions. Inaccurate information may be due to the following reasons:

§ spontaneously created (disinformation) or unintentionally created subjective power;

§ the problem of influx of code transfer (“zipped phone”) and lack of accurate methods of fixation.

Completeness of information . Information can be called complete if it is sufficient for understanding and making a decision. Incorrect information can lead to a settlement or decision.

Accuracy of information is indicated by the degree of its closeness to the real state of an object, process, phenomenon, etc.

Relevance of information - importance for today, topicality, urgency. Information that is constantly removed may be red.

Value (value) of information . Coridity can be assessed based on the needs of specific companions and is assessed based on those tasks that can be achieved with its help.

The most valuable information is objective, reliable, and up-to-date. This is because unobjective, unreliable information (for example, fiction) is of great importance to people. Social (social) information has additional power:

§ has a semantic (meaningful) character, that is. conceptual, since the concepts themselves recognize the actual signs of objects, processes and manifestations in the wider world.

§ May be of natural nature (except for various types of aesthetic information, for example, creative art). One and the same place can be expressed in different natural (formal) words, written in the form of mathematical formulas, etc.

Over time, the amount of information grows, information accumulates, it is systematized, evaluated and documented. This power was called the growth and accumulation of information. (Cumulation - from the Latin cumulatio - increase, buying up).

Old information tends to change in value over time. It doesn’t take time for information to grow old, but for new information to appear, which clarifies, adds, or adds, and often early. Scientific and technical information is older, more aesthetic (create mysteries) - more advanced.

Logicality, compactness, and a manual form of presentation make it easier to understand and assimilate information.

The concept of information processing is even broader. When talking about information processing, we need to understand the processing invariant. Call it the place of notification (the place of information that is available from the contact). When automating the processing of information, the object of processing is informed, and it is important to carry out the processing in such a way that the invariants of the transformation correspond to the invariants of the processed information.

The method of processing information is determined by the method of functioning of the operating system in connection with the analysis of the information process. To achieve this goal, you must first complete a series of mutually dependent tasks.

For example, the initial stage of the information process is reception. In other information systems, reception is manifested in such specific processes as the selection of information (in scientific and technical information systems), the conversion of physical quantities into a visual signal (in information systems) natural systems), durability. but apparently (in biological systems) too.

The reception process begins between, which strengthens the information system from the outside world. Here, at the border, the signal from the external world is transformed into a form that can be manually processed for further processing. For biological systems and rich technical systems, such as automatic machines, what to read is that this difference is most clearly expressed. In other cases, there is a significant peace of mind and flow of water. As for the internal boundaries of the reception process, it is always mental and selected for each individual condition due to the ease of following the information process.

It should be noted that no matter how “deeply” the inner boundary is inserted, the reception can now be seen as a classification process.

The information processing model has been formalized

Let us now return to the point where there are similarities and differences in the information processing processes with different warehouse information processes, which have their own formalized processing model. In advance, we respect that it is not possible to differentiate this feed from the information received (to the addressee), from the semantic and pragmatic aspects of the information. The presence of the addressee for whom the notification (signal) is assigned means that there is an unambiguous relationship between the notifications and the information that is contained in it. It is completely obvious that the same information can have different meanings for different addressees and different pragmatic meanings.

· A secret scheme for the process of information processing.

· Statement of the processing task.

· Vikonavets obrobki.

· Processing algorithm.

· Typical information processing tasks.

1.2 Information processing methods

There are no methods for processing information, but in most cases it comes down to processing text, numerical and graphic data.

Processing of text information

Textual information may arise from different elements and therefore a different level of complexity behind the form of manifestation. Please follow the submission form for processing text notifications using various information technologies. Most often, text editors or processors are used as tools for processing text electronic information. They represent a software product that provides the user with special features designed for creating, processing and saving text information. Text editors and processors are used to compile, edit and process various types of information. The importance of text editors as processors is that editors, first of all, work only with the same type of information (text, formulas, etc.), and processors allow you to process other types of information.

Editors used for preparing texts can be divided into primary ones (preparing sheets and other simple documents) and folding ones (preparing documents with different fonts, which include graphs, little ones, etc.). Editors that are used for automated work with text can be divided into several types: simple ones, integrated ones, hypertext editors, text retrieval systems, scientific text editors, typesetting systems.

In the simplest formatter editors (for example, Notepad), additional codes are not used for internal representation of text; texts are usually formed on the basis of characters from the ASCII code table. Text processors have a text preparation system (Word Processor). The most popular among them is the MS Word program.

The technology for processing text information using such programs includes the following stages:

) create a file to save text information;

) saving text submitted in electronic form;

) by opening a file that saves text information;

) editing electronic text information;

) formatting the text that is saved in electronic form;

) creation of text files based on input from text files

design style editor;

) automatic forming of replacement of text and alphabetical guide;

) automatic spelling and grammar checking;

) insertion of various elements and objects into the text;

) document collection;

) Druk text.

Before the main operations, editing includes: adding; visionary; displacement; copying a fragment to the text, as well as searching and contextual replacement. Since the text creates a rich document, you can change the formatting of the pages or sections. In this case, the text contains such structural elements as bookmarks, wine bars, crosswords and footers.

Most word processors support the concept of a folded document - a container that contains various objects. It allows you to insert small documents, tables, graphic images, and other software components into the text of the document. Vikorystuvana at Tsomu technology of bonding and propagation of objects called OLE(Object Linking and Embedding – linking and transferring objects).

To automate frequently repeated processes in text processors, use macro commands. The simplest macro - the sequence of pressing the keys, moving and clicking the mouse is recorded. It can be interpreted as a tape recording. They can be processed and changed by adding standard macro commands.

Transferring texts from one text editor to another is done by the program. converter. You create the output file in a suitable format. Please note that text processing programs include modules for converting popular file formats.

Types of text processors desktop viewing systems. You can prepare materials according to the rules of printing. Programs of desktop publishing systems (for example Publishing, PageMaker) and tools for a layout designer, designer, technical editor. With this help, you can easily change the formats and numbering of pages, the size of indents, combine different fonts, etc. A large amount of stench is associated with printing products.

Processing tabular data

Workers in the process often have access to tabular data in the process of creating and maintaining accounting books, bank accounts, accounts, statements, with the development of plans and distribution of resources of the organization, with the completion of scientific research. Increased automation of this type of work has led to the emergence of specialized software for processing information, which is presented in tabular form. These software features are called table processors or else electronic tables. Such programs allow you to create tables and automate the processing of tabular data.

Electronic spreadsheets have proven to be effective and the rise of tasks such as: sorting and processing of statistical data, optimization, forecasting, etc. They will help develop the definition of developments, encourage decision-making, model and present results in practically all areas of activity. When working with tabular data, the consultant uses a number of standard procedures, for example, such as:

) create and edit the table;

) creation (saving) of a table file;

) entering and editing data in the table;

) insertion into the table of various elements and objects;

) selection of sheets, formatting and links table;

) processing of tabular data with formulas and formulas

special functions;

) daily diagrams and graphs;

) processing of data, submissions from the list;

) analytical processing of data;

) other tables and diagrams before them.

The structure of the table includes numbered and thematic headings, a head (header), a sidebar (the first column of the table that contains the row headings) and a subgraph (under the table data).

The most popular spreadsheet processor is the MS Excel program. Vaughn presents to koristuvach a set of working arches (sides), each of which can be used to create one single table.

The worksheet contains a set of middles to create a straight mass. Their coordinates are indicated by specifying the position vertically (in columns) and horizontally (in rows). Arkoosh can accommodate up to 256 rows and up to 65536 rows. Rows are designated by letters of the Latin alphabet: A, B, C... Z, AA, AB, AC... AZ, BA, BB..., and rows are designated by numbers. So, for example, “D14” means the middle, which is on the crossbar of the “D” column with the 14th row, and “CD99” means the middle, which is on the crosshair of the “CD” column with the 99th row. The names of the workers are always displayed at the top row of the working arch, and the row numbers are displayed on the left border.

The following operations are assigned for spreadsheet objects: editing, joining one group, deleting, clearing, inserting, copying. The operation of moving a fragment is reduced to the subsequent completion of the operation of deleting and inserting.

For ease of calculation, mathematical, statistical, financial, logical and other functions are introduced into the table processors. Numerical values ​​entered in the table can be divided into different two-dimensional, three-dimensional and mixed diagrams (over 20 types and subtypes).

Table processors can wrap database functions. In this case, the table is entered in the same way as in the database, through a screen form. The data in them can be stolen, sorted by a key or by a number of keys. This includes processing queries to the database and processing external databases, creating tables, etc. They can also use the programming language for macro commands.

The important power of the table is the ability to use their formulas and functions. The formula can be sent to a computer table, spread out, including on another working platform or table, placed in another file. Excel provides more than 200 programmed formulas, called functions. To make it easier to navigate, the functions are divided into categories. With the help of the "Function Master" you can formulate them at any stage of the process.

The Excel spreadsheet editor, the Word text editor, and other programs included in the Office application package (APP) support the OLE data exchange standard, and the use of “lists” allows you to effectively work with large, uniform data sets. A similar OLE mechanism is used in other software applications.

In Excel, you can efficiently process a variety of economic and statistical data.

Processing of graphic information

Graphic information There is a dot on the computer monitor screen.

In graphics mode, the monitor screen represents a collection of dots that light up - pixels (“pixel”, in English “picture element”). The total number of points on the screen is called separate parts of the monitor, which also applies to this type of robotic mode. One unit of size is the number of dots per inch (dpi). The separation of the current displays is 1280 pixels horizontally and 1024 pixels vertically. 1310720 pixels.

The number of colors that are displayed depends on the capabilities of the video adapter and display. You can change it programmatically. Skin color is one of the dots on the screen. Color images have modes: 16, 256, 65536 (high color) and 16777216 colors (true color).

Whether on a computer, images are composed of a set of graphic primitives that form a single graphic element. The primitives can be alphanumeric or other symbols.

1.3 Information processing scheme

Output information – final processing – subsumable information.

In the process of information processing, there is an information task that can first be posed in a traditional form: given a certain set of output data, it is necessary to extract the same results. The very process of transition from output data to the result is a processing process. The object or subject that carries out the processing is called the Vikonavian sample.

For successful processing of information in the world (people or devices), a processing algorithm may be required. the sequence of actions that need to be followed in order to achieve the desired result.

There are two types of information processing. The first type of processing: processing associated with the extraction of new information, new knowledge (new mathematical tasks, situation analysis, etc.). Another type of editing: editing associated with a change in form, but does not change the place (for example, translating the text from one language to another).

An important way of processing information is coding- Converting information into symbolic form, manually for saving, transferring, processing. Coding is actively being researched in technical ways of working with information (telegraph, radio, computers). Another type of information processing - structurebath data (entering into proper order to store information, classification, cataloging of data).

Another type of information processing - search Some people have information of necessary data, which prompts a search (question) in the minds of young people. The search algorithm lies in the method of organizing information.

Malyunok 1.3.1 Information processing scheme

1.4 Current information processing systems

p align="justify"> When designing technological processes, we focus on the modes of their implementation. The mode of implementation of the technology depends on the volume-time characteristics of the tasks being released: the frequency and terminology that can be updated to the speed of processing, as well as the mode capabilities of the technical staff and us in advance of the EOM.

Set: batch mode; real scale mode; half hour mode; regulatory regime; asking; dialogue; TV screenings; interactive; single-program; richly programmed (multi-problem).

For investors in the financial and credit system, the most relevant are the current modes: batch, dialog and real time mode.

Batch mode With this regime, the koristuvach does not have any direct connection with the EOM. Collecting and registering information, entering and processing do not take an hour. From now on, the operator collects information, forming it into packages that appear to be in order or any other sign. (As a rule, this is a non-operational character with a suitable term for the results of the decision). After completing the received information, processing is carried out, so that processing is delayed. This mode is based on a centralized method of processing information.

Dialog mode (power supply) mode in any case, it is possible for the operator to directly interact with the calculation system in the process of the operator’s work. Data processing programs are in the memory of the EOM gradually, since the EOM is available every hour, or for a short period of time, if the EOM is available to the public. The interaction of the koristuvach with the computational system in the form of dialogue can be richly dimensional and is determined by various factors: my spilkuvaniya, the active and passive role of the koristuvach; who is the initiator of the dialogue – koristuvach or EOM; from time to time; the structure of the dialogue too. If the initiator of the dialogue is the operator, then the mother is responsible for his knowledge of work procedures, data formats, etc. Since the initiator is EOM, the machine itself informs the brain that it needs to work with a variety of choices. This method is called “menu selection”. He will provide support for the actions of the teacher and punish them consistently. In this case, less preparation is required.

The dialogue mode requires the highest level of technical equipment of the operator. the presence of the terminal or PEOM, connected to the central computational system by communication channels. This mode is used for accessing information, computing and software resources. The ability to work in the dialog mode may be limited in hours from the beginning to the end of the work, or may not be limited.

Real time scale mode means the existence of a computational system for interacting with controlled chemical processes at the speed of these processes. The reaction time of the EOM can satisfy the pace of the controlled process and allow for minimal disruption. As a rule, this mode is used when data processing is decentralized and distributed. Example: a PC is installed on the operator’s desktop, through which all information about the operation is entered into the EOM in the world.

These vary ways of processing data:

centralized, decentralized, distributed and integrated.

Centralized conveys the presence of the VC. With this method, the correspondent delivers output information to the computer center and keeps the processing results in the form of effective documents. The peculiarity of this method of processing is the complexity and difficulty of establishing a smooth, uninterrupted connection, the great importance of VC information (for a great duty), the regulation of the terms of the execution of the operation, the organization without Protect the system against possible unauthorized access.

Decentralized obrobka This method is associated with the appearance of PEOM, making it possible to automate a specific work area. Currently, there are three types of technologies for decentralized data processing.

Persha runs on personal computers, but is not integrated into a local network. (data is saved in separate files and on separate disks). To remove the displays, please rewrite the information to the computer. Disadvantages: the number of mutually interrelated tasks, the inability to process large amounts of information, the low level of unauthorized access.

Other: PCs are united in a local network, which leads to the creation of unified data files (and avoids wasting a lot of information).

Third: a PC united in a local network, in which special servers are included (with a “client-server” mode).

Divisions a method for processing these grounds on a subdivision of the processing functions between different EOMs included before the limit. This method can be implemented in two ways: the first transfers the EOM installation to the skin node of the system (or on the skin level of the system), in which data processing occurs one or more times the EOM in accordance with the real capabilities of the systems and that is what is needed at the given moment. Another way is to place a large number of different processors in the middle of one system. Such a path is found in systems for processing banking and financial information, where a measure of data processing is necessary (branches, branches, etc.). Advantages of the divided method: the ability to obtain any given term from the given data; high level of reliability, due to the fact that if one technical feature is identified, it is possible to instantly replace it with another; the short time required for the transfer of tributes; increasing the flexibility of systems, simplifying the development and operation of software, etc. The divisional method lies in a complex of specialized processors, then. The skin of the EOM is intended for the supreme performance of singing commands or the command of one’s peer

The best way to process data is integrations . It transfers the created information model of the ceramic object to create a distributed database. This method will ensure maximum handiness for the operator. On the one hand, the data bases are transferred to collective governance and centralized management. On the other hand, the need for information and the diversity of tasks involved will require different parts of the database. The technology of integrated information processing makes it possible to improve the accuracy, reliability and fluidity of processing, since processing is carried out on the basis of a single information array, one-time entered into the EOM. The peculiarity of this method is the technological separation and time-consuming processing procedures from the procedures for collecting, preparing and entering data.

Current information processing systems use digital technologies that include paper data and enable data exchange between automated workstation technologies, which also allow for the integration of specialized forces of the spivrobit group. no one over the top of any task (such as organization within a work group), exchange of thoughts V negotiations including any food in real time (teleconference), prompt exchange of materials via e-mail, electronic mailboxes, etc. For such systems, we need to broaden the term “corporate business process management systems” to support business operations as a whole. Such systems are characterized by the use of “client-server” technologies, including the connection of remote clients via the global Internet network. It is not uncommon for a system to integrate more than 40 thousand users into a global information space, located in different countries and continents. One of such applications could be the McDonalds company, which operates its branches all over the world, including in Ukraine.

1.5 Problems associated with computer processing methods

Simply installing personal computers at work stations and connecting them locally is unlikely to have a positive effect in business management, since the original information structure will not be completely changed . It is not possible to automate outdated methods of work; a personal computer can be turned into a tool for the high-speed production of new papers. Thus, the results of the analysis of the work of enterprises in the United States describe the situation when, in order to enable the time service to the list warehouse of the enterprise, 43 different documents were drawn up, a total of 113 pages, including the necessary copies. This is because the information system has established connections (communications) between sub-units and other services. Moreover, for the normal functioning of an enterprise, no more than 20-30 internal communications are required, in fact they have 3-4 times more. Moreover, the practice of automation of business management shows that the establishment of productive computer equipment can lead to an increase in the number of communications for the management of “every problem” of your copies and their distribution. This stage of implementation for the production of computer technology can be achieved by speeding up all communications (communications) to an optimal level.

One of the most widespread problems: the attribution of the obvious power of the computer. A personal computer, no matter how expensive or productive it is, is nothing more than a healing machine, because it cannot solve our complex economic problems, because we ourselves cannot correctly formulate our goals.

Of great importance are also social and psychological problems that the team has under the hour of introduction of computer technology, which leads to a reduction in the number of spivorobnitniks, increased (and therefore strengthened) control over the activity and other coronavirus patients too.

Computerization fundamentally changes the technology of accounting and analysis of government activities. In a non-automated accounting system, the processing of data on government transactions is easily simplified and is accompanied by documents on paper, information - orders, assignments, records and regional registers, such as regional journals Iku. Similar documents are often stored in a computer system, but in many cases they are not found in electronic form. Moreover, the main accounting documents (accounting books and journals) in the accounting computer system have data files, which are impossible to read or change without a computer.

p align="justify"> Computer technology is characterized by a number of features that must be taken into account when assessing intelligence and control procedures.

.6 Features of computer data processing versus non-automated

A single operation. The computer processing transmits a series of these same commands during the execution of identical operations to the accounting department, which includes the appearance of random errors, including those in power

manual cutting. However, software fixes (and other systematic fixes in hardware and software) lead to incorrect processing of all identical operations for new minds.

Subfunction. p align="justify"> A computer system can create non-personal internal control procedures, as in non-automated systems there are different falsifications. This situation deprives frontline employees who have access to a computer from being able to perform other functions. As a result, computer systems can introduce additional inputs to support control at the necessary level, which in non-automated systems is achieved by simple subfunctions. Before such logins, a password system may be in place to prevent actions that are unacceptable on the part of facsimile agents who can access information about assets and cloud documents through a terminal in interactive mode.

Potential possibilities appeared due to inaccuracies. Compared to non-automated accounting systems, computer systems are more susceptible to unauthorized access, including features that provide controls. They are also open for the desired change of data and direct or indirect removal of information about assets. The less people are involved in the machine processing of the operation, the lower the possibility of identifying errors and inaccuracies. Applications made during the development or adjustment of application programs may be subject to undue delay during the trial period.

The potential for increased control from the side of the administration. Computer systems provide the administration with a wide range of analytical capabilities, allowing them to evaluate and control the activities of the company. The availability of additional tools will ensure the improvement of the internal control system and, thus, reducing the risk of its ineffectiveness. Thus, the results of the normal comparison of the actual values ​​of the expenditure coefficient with the planned ones, and the calculation of the calculations are usually carried out before the administration during computer processing of information. In addition, certain application programs accumulate statistical information about the computer's operation, which can be used to control the actual progress of accounting transactions.

Initiation of a computer operation. The computer system can log certain transactions automatically, and its authorization is not necessarily documented, as is the case in non-automated accounting systems, since the very fact of putting such a system into operation by the administration It conveys in an implicit sense the obviousness of the corresponding sanctions.

Thus, the method of processing government transactions when maintaining an accounting system greatly influences the organizational structure of the company, as well as the procedures and methods of internal control. The role of the accountant and his interaction with the administration is clearly changing. Against automation, the work of an accountant attracts specific minds in Ukrainian minds, for example, there are a large number of documents that need to be printed one by one.

1.7 Technological process of information processing

And the ordered sequence of actions from data processing, information, and knowledge until the necessary results are obtained. The results show that the understanding of information technology is important for the solution of economical and management tasks related to the collection of low-level operations necessary for the production of tasks. information, processing it through various algorithms and individuals who make decisions manually for a new form.

The technological process of information processing depends on the nature of the tasks involved, the technical features used, control systems, the number of employees and other factors. The technological process of information processing may include the following operations:

Collection of data, information, knowledge - is a process of registration, fixation, recording of detailed information (data, knowledge) about ideas, objects (real and abstract), connections, signs and other ii. In this case, one can see in the scope of the operation “collection of data and information” and “collection of knowledge”. Collection of data and information is the process of identifying and separating data from different elements, grouping the separating data and submitting it to the form required for entry into the EOM. Collecting knowledge - extracting information about subject areas from surveyors - experts and submitting it in the form required for recording in the knowledge base.

Processing data, information, knowledge. Processing is a broad concept and includes a number of mutually related operations. Remember that processing is a systematic process of processing data, the process of transformation of calculation, analysis and synthesis of any forms of data, information. That knowledge will help systematically carry out operations on them. When such an operation is performed, processing is seen: data processing, information processing, knowledge processing. Data processing is the process of managing data (numbers, symbols and letters) and transforming their information. Information processing is the processing of information of one type (text, sound, graphic), transforming it into information of another type.

However, the use of new modern technologies will ensure the comprehensive presentation and instant processing of information of any kind (text, graphics, audio, video, animation), and transformation. The concept of processing knowledge is related to the concepts of expert systems (or systems of artificial intelligence), which allow the user to recognize the situation, make a diagnosis, formulate solutions, and make recommendations on the basis of rules and facts. Choose your actions carefully.

Generation of data, information, knowledge is the process of organizing, reorganizing and transforming data (information, knowledge) into the required form, including ways and processing. For example, the process of removing formatted documents (documents).

Saving data, information, knowledge - processes of accumulation, placement, extraction and copying of data (information, knowledge) for their further recovery (processing and transmission).

The transfer of Dani, INFORMASIA, knowledge - the process of the Danishi (INFORMASIA, knowledge), the middle of the Koristuvachiv for the pre -hats of the TA systems of the Komonikati Tom (overlapping) Dani Vid Jerel (Vidzhuvach).

2. Development of the mini-handbook “Updating the operating system”

2.1 Converting text from DJVU to PDF

How to convert a document from DjVu to PDF? It is one of the most advanced formats for electronically presenting printed documents, books and periodicals. The Universal Document Conveter tool allows you to perform the optimal conversion of a document from DjVu to PDF.

- Open the DjVu file in Internet Explorer and click the Print button on the plugin toolbar.

Small 2.1.1 Viewing a file in Internet Explorer

By selecting Universal Document Converter from the list of available printers and clicking the Power button.

Small 2.1.2 Universal Document Converter

Click the Enchant button on the settings panel.

Small 2.1.3 Introduce customization

In the Open window, select the file Text Document to PDF.xml and click on the Open button.

Small 2.1.4 "Text document to PDF.xml"

Click the OK button in the Druk window to print the converted document. The completed PDF file will be created in the “My Documents\UDC Output Files” folder.

Small 2.1.5 document conversion

Information processing editing conversion

- A copy of the document will be opened either in Adobe Acrobat or in another program used by the system for viewing files with PDF extensions.

2.2 Conversion from PDF to WORD

To copy the side of the PDF file to the Word file, select the following.

Go to the required page.

Click the Text Select Tool button on the Basic Tools toolbar.

To copy the PDF file from a Word document, select the following steps.

Open the PDF file in Adobe Acrobat Reader.

The View menu has the Continuous command selected.

From the Edit menu, select the Select All command.

The Copy command is selected from the Edit menu.

Go to Word and select Paste from the Edit menu.

To copy the little ones, you will see such actions.

Open the PDF file in Adobe Acrobat Reader.

Hold down the SHIFT key and click the Text Select Tool button. Without releasing the mouse button, click the Graphic Select Tool button on the toolbar that appears.

When the cursor fills with a crosshair shape, painting a rectangle next to the required baby with a way of dragging the cursor.

The Copy command is selected from the Edit menu.

Go to Word and select Paste from the Edit menu.

To determine whether it is permissible to copy the text from this document, select such actions.

Open the PDF file in Adobe Acrobat Reader.

From the File menu, select Document Info and Security.

If the Selecting Text and Graphics parameter is set to Allowed, the text and images from this document can be copied to other programs.

2.3 Editing the deleted text

- open the document window

- By selecting the font, row spacing, indents, align by width command, etc.

- The result is a document that appears to be indispensable.


PROTECTION OF PRATSI

1. Foreign regulations

1. Persons who have undergone special training, medical examination, introductory safety training, on-the-job training and fire safety training are allowed to operate a personal electronic computing machine (PEOM). Repeated instruction through the skin 6 months

2. Koristuvach is guilty of:

2.1. Vikonuvati rules of internal labor order.

2.3. Do not write down the inscriptions in order to comply with the rules of protection.

2.4. Remembrance of the special responsibility for the implementation of the rules of protection and safety of fellow employees.

2.5. Please note that we will provide first aid to those suffering from accidents.

2.6. Please take the first steps to extinguish the fire.

2.7. Please follow the rules of special hygiene.

2.8. Unsafe and unprofitable viral factors that can affect the customer:

a) physical:

discharged by electric shock;

advances in electromagnetic and x-ray vibration;

advances in ultraviolet vibration;

increases the level of noise at work from fans,

processors, audio cards, printers;

increases or decreases in the level of brightness and brightness;

advances and spending time;

unevenness of brightness in the field of view;

The brightness of the light image has been increased;

movement of the pulsation of the light flow;

c) psychophysiological:

napruga zora ta uvagi;

intellectual and emotional attractions;

trival static avantagement;

monotony of practice;

a great deal of information that is being released in an hour;

irrational organization of the work place;

1.3 Applications with PEOM are of natural and light-colored nature. With unsatisfactory brightness, the productivity of the PEOM practice decreases, possibly short-sightedness, and fatigue (Fig. 3.1).

1.4 It is not allowed to move PEOM work equipment around basement areas or basement surfaces.

Small 3.1 – Working place

6. Workplaces under the hour of conquest of creative work will require a significant amount of effort and a great concentration of respect, then isolate each other with a partition of 1.5-2.0 m.

7. Vibratory premises, in which the EOM is installed, do not have to interfere with the premises, as noise and vibration exceed the norm (machine shops, mines, etc.).

8. Workplaces with PEOM are recommended to be located in the following locations. When work places are located in private rooms or in areas with unsafe and unsafe factors, stench is likely to develop in isolated rooms with natural light and organized ventilation foreign

9. The area on which one working place with PEOM is developed must be no less than 6.0 m 2 , the area of ​​the premises must be no less than 20 m 3 .

10. The surface must be smooth, without potholes, not slippery, easy to clean and tidy up, and antistatic.

11. When working places are located, it is necessary to turn off the possibility of direct illumination of the screen with a natural lightening device.

12. Possibilities for visual understanding by operators of information from two different media (from the PEOM screen and the paper media) are different.

Even a low level of brightness will spoil the information when reading documents, and even a high level will result in a decrease in the contrast of the image on the screen.

Therefore, the brightness ratio of the PEOM screen to the brightness of excessive working surfaces should not be too high in the working area 3:1, and working surfaces and excessive objects (walls, equipment) - 5:1.

13. Individual lighting in areas with PEOM requires the appearance of a combined lighting system with vicarious fluorescent light fixtures in luminous lighting fixtures, such as traces of lighting stand over the working surfaces in a straight and even order.

14. To illuminate the PEOM screens with direct light flows, the lines of luminaires must be distributed with sufficient displacement to rows of working areas or zones, as well as in parallel to light openings. There is a window placed on one side of the working area.

For this skin type, light-colored curtains with a color coefficient of 0.5 -0.7 are appropriate.

15. Piece lighting can provide work areas with a brightness of 300-500 lux. If it is not possible to ensure adequate illumination by the ambient lighting system, it is allowed to leave the local illumination lamps in place, otherwise there will be no glare on the surface of the screen and increased illumination The brightness of the screen is more than 300 lux.

16. In the event of natural lightening of the traces, the presence of sleep-related problems can be revealed, so this method can be used to remove glazes with metallic coatings or blinds with vertical slats that are adjustable.

17. It is necessary to arrange the working place, equipped with PEOM, in such a way that the operator’s field of view is not damaged by windows or lighting fixtures; They are innocent and right behind him.

18. At work, you must ensure uniform illumination using a dimmed or diffused light.

19. The light-colored lights on the keyboard, screen and other parts of the PC must be visible directly to the operator’s eyes.

20. To prevent glare, lighting fixtures should be made from opaque material or milky colors. The dry corner of the blower is no less than 40°.

21. Workplaces must be installed with a minimum of 1.5 m of water from the wall with window openings, and from other walls - of 1 m of water; between each other and the wind is at least 1.5 m.

22. The main equipment of a PEOM correspondent's work station includes a monitor, keyboard, work table, and desk (chair). Additional equipment: music stand, footrest, wardrobe, police, etc.

23. When placing elements of the work area, ensure:

I work the pose of a koristuvach.

Space for accommodating a kistuvach.

It is possible to look at the elements of the work environment.

I will take a moment to look around at the expanse beyond the boundaries of the work place.

The ability to work with records, place documentation and materials, such as a vikoryst correspondence (Fig. 3.2).

Small 3.2 – Working place

24. The mutual expansion of the elements of the work place does not require the installation of all necessary elements and movement for the operation of the PEOM; Adoption of the optimal mode of operation and repair, reduction of volumetric consumption.

25. To ensure accurate and easy readability of information, the surface of the monitor screen should be positioned in the optimal zone of the information field in a plane perpendicular to the normal line of sight of the operator who is in work pose. It is allowed to bend over this area - no more than 45 °; It is allowed to bend the line of sight from normal - no more than 30°.

26. It is necessary to install the PEOM at the work place so that the surface of the screen is at the optimal position in front of the operator’s eyes, depending on the size of the screen.

27. The keyboard should be placed on the surface of the table or on a special height-adjustable working surface next to the table at a distance of 100-300 mm from the nearest to the right edge, where there is damage between 5° - 15°.

28. The printer needs to be installed so that access to each person and colleague is manual; so that the maximum distance to the printer keys does not exceed the length of the extended arm (height 900-1300 mm, depth 400-500 mm).

29. The design of the working table is to ensure the possibility of optimal placement on the working surface of the installation, which depends on the size, dimensions, design features (size of VDT, keyboard, printer, EOM is different to the character of his robot.

30. The height of the working surface of the table can be adjusted between 680-800 mm; in the middle it may become 725 mm.

31. The width and depth of the working surface are responsible for ensuring the ability to carry out labor operations at the boundaries of the motor field, which is indicated by the area between the visibility of the devices and the reach of the controls.

The advantage should be given to the modular dimensions of the table, which ensures constructive dimensions; tread width: 600, 800, 1000, 1200, 1400 mm; depth - 800, 1000 mm, with non-adjustable height - 725 mm.

32. The top of the table can be matte with small reflections and heat-insulating.

33. The work table has a space for the legs of the curve of no less than 600 mm, a width of no less than 500 mm, a depth of at least 450 mm at the level of the knees and at least 650 mm at the straight legs mm.

34. The chair can provide support for a rational working posture during the time of completing basic operations and changing the mind of the posture. By moving the chair forward, you can ensure a decrease in static tension in the muscles of the cervical-shoulder area and back.

35. The type of work chair must be chosen depending on the nature and difficulty of the work. It can be tilted and swivel and can be adjusted in height, seat and backrest, as well as the backrest from the front edge of the seat. Regulation of the skin parameter may be both independent and reliable. It is important that the handles (for adjustment) must be hand-held in the bath.

36. The seat and back of the chair are soft, do not become electrified, and have non-permeable coatings, the material of which ensures the ability to be easily cleaned without staining.

2 Vimogi bezpeki in front of the cob roboti

1. Turn on the air conditioning system in the room.

2. Look around the working place and put it in order; roll over that someone has foreign objects; All equipment and PEOM units are connected to the system unit using appropriate cords.

3. Check the reliability of installing the equipment on the desktop. The VDT may not be placed on the edge of the table. Turn the VDT so that it is directly visible on the screen under the straight edge (and not from the side) and slightly downward; In this case, the screen is guilty of a little bit of damage - its lower end is closer to the backbone.

4. Check the heating circuit of the equipment, check the correctness of the electrical wiring, connecting cords, plugs, sockets, grounding of the dry screen.

operation of cables and wires with damaged or lost power per hour of operation with insulation;

deprive the voltage cables and darts with uninsulated conductors;

the use of self-contained footwear, which does not comply with the requirements of the Rules for the control of electrical installations to portable electrical wiring;

stand-up for scorching, placement of non-standard (self-propelled) electric heating equipment or frying lamps;

removal of damaged sockets, loose boxes, devices, as well as lamps that may be darkened or damaged;

hanging lamps directly from flue-conductors, burning electric lamps and lamps with paper, fabric and other flammable materials, operating them with removed hoses - sockets;

defective electrical equipment and appliances that do not comply with the instructions (recommendations) of manufacturing companies.

6. Adjust the brightness of the work area.

7. Adjust and fix the height of the chair, making it easier for you to adjust the backrest.

8. Whenever necessary, attach the necessary equipment (printer, scanner, etc.) to the processor. All cables that connect the system unit (processor) with other devices will not stick in or out when the computer is turned on.

9. Connect the computer equipment with circuits on the cases in the following order: voltage stabilizer, monitor, processor, printer (which is transferred to another).

10. Adjust the brightness of the monitor screen, the minimum size of the point that lights up, focus, contrast. We must brighten up the image as quickly as possible, so as not to tire the eyes.

Screen brightness – not less than 100 cd/m;

the ratio of brightness of the monitor screen to the brightness of excess surfaces in the work area - no more than 3:1;

The minimum size of the light point is no more than 0.4 mm for a monochrome monitor and no less than 0.6 mm for a color monitor;

The contrast of the sign image is not less than 0.8.

11. If any malfunctions are detected with the robot, do not repair it, notify the robot’s service center.

3.3 How to take care of your work during the war

1. With video display terminal (VDT):

1.1. It is necessary to move the keyboard firmly on the desktop to prevent it from being tampered with. At the same time, the ability to turn and move can be transferred. The position of the keyboard is inappropriately to blame for the needs of the correspondent. Since the design of the keyboard does not provide enough space to support the palms, they should be placed on a stand not less than 100 mm above the edge of the table in the optimal zone of the motor field. When working on the keyboard, sit straight up without straining yourself.

1.2. To change the unpleasant influx of the koristuvach koristuvach type “misha” (impressive posture, the need for constant control over the action), you should provide a free large surface to the table for moving the “misha” and manually supporting the elbow joint.

1.3. Outside speeches that make noise are not allowed.

1.4. Periodically, when the computer is turned on, remove the ice from the surface of the equipment with a honey soaked in mild rose water. Wipe the VDT screen and dry screen with cotton wool soaked in alcohol. It is not allowed to use vicor or aerosol cleaners to clean the surface of the computer.

Repair equipment yourself, especially VDTs. Repairing equipment is not the same as maintaining computers; they are also responsible for opening the processor and using a vacuum cleaner to remove the waste that has accumulated there.

Placing any objects on the computer hardware, pressing on the keyboard or using it - this can put them out of order.

1.6. To remove static electricity, it is recommended to touch the metal surfaces of the grounded structure of the location (central firing battery, etc.).

1.7. To reduce the stress of work on the PEOM, it is necessary to evenly distribute and keep the nature of the work consistent with their complexity.

By changing the negative influx of monotony, it is necessary to completely stabilize the operation of transferring text and numerical data (change of change works), change of editing texts and transfer of data (change of change and speed of work), etc. (Fig. 3.3).

Small 3.3 - Cherguvanya in sight of robots at the computer

3.1.8. To change the negative impact of viral factors on the health of workers, it is necessary to impose regulated breaks.

1.9. Requirement for a work change, no matter what trifles, may be exceeded - 6 years.

1.10. The difficulty of non-stop work for VDT without a regulated break does not have to exceed 2 years.

1.11. The triviality of the daily break is indicated by the formal legislation on work and the rules of internal labor regulations of the enterprise.

1.12. If those who work for VDT are concerned with visual discomfort or other unpleasant subjective symptoms, it is necessary to take an individual approach in the interim to work on VDT ​​and correct the pain, take a break for repair or replace them with other types of robots (not related to VDTs).

2. On laser printers.

2.1. The printer must be disconnected from the processor in such a way that there is no tension on the cord. It is forbidden to install the printer on the processor.

2.2. First you program the printer robot, go to it so that it is in connection with the computer mode.

2.3. To achieve the cleanest, most discreet images and avoid zipping the machine, you must follow the instructions in the printer instructions. The paper's surfaces are damaged by hot metal without nicks - this will change the quality of the wrinkled paper.

overarmed at one side;

very smooth and shiny, and also highly textured;

laminated;

torn, wrinkled or with irregular openings such as paper or stapler;

perforated into splints or cigarette paper (the basis of a copy paper);

from company forms, the heading of any oversleeves with non-heat-resistant adhesives that can withstand 200 °C with a stretch of 0.1; These furbies can switch to a heat-sealing roller and thus cause defects in the other.

3.2.5. Follow the rules for preserving the cartridge in accordance with the manufacturer's instructions (including direct exchanges, at a temperature of 0 – 35 °C).

Defend:

- Save the cartridge without packaging.

Place the cartridge on its end so that it is vertical.

Turn the cartridge over with the label facing down.

Unscrew the cover of the roller and stick it out.

Replace the vikoristan cartridge yourself.

4 Tips for safety after finishing work

1. Finish and save the file that is in the computer to the computer’s memory. Exit the program shell and go to the MS DOS environment.

2. Turn on the printer, other peripheral devices, and turn on the RCCB and processor. Turn off the stabilizer if the computer is connected to the circuit through it. Plugs are removed from sockets. Cover the keyboard with a cover to protect the saw from being cut to it.

3. Pick up your work place. Place the originals and other documents in the desk drawer.

4. Carefully wash your hands with warm water.

5. Turn on the air conditioner, turn on the light and turn off the electricity.

5 Ways to be safe in emergency situations

5.1.2. The command “Stop!”, given by any police officer, threatens to kill everyone who senses it.

5.1.3. If the practitioner is infected with electric shock, release the patient from the electric shock:

v turn on the electricity supply to this plot;

v waterproof the affected parts, viscous and insulating mittens, other chemicals, insulating materials and objects;

v call for a doctor, and until he arrives, give the patient some help;

v tell about the process to the middle-aged kerivnikov.

5.1.4. In the event of a short circuit in the electrical circuit, it is important to power up the robot and turn off the faulty electrical circuit. Notify the head of the hospital. Self-defense for a short period of time DEFENSE!

5.1.5. When the power supply is turned on, turn on the PEOM at the limit, allowing the woodworker to reach the site.

5.1.6. If the power cords are on fire, immediately turn on the robot, turn on the power supply and extinguish the fire with carbon dioxide igniter; if necessary, call the fire command - tel. 01. Advice to the potter of the plot.

5.1.7. If there is a threat of an emergency situation, the emergency worker should do his best to avoid any danger, give help to the injured person, notify your emergency worker, and call the emergency worker if necessary. u.

5.1.8. In the event of an accident, if possible (as long as it does not jeopardize the life and health of other workers and will not lead to more important inheritances), it is necessary to preserve the environment at work і, which was at the moment of delivery.

1.9. In the event of an accident or natural disaster, the rules of safety for all categories of workers are obligatory.

1.10. Practitioners who have committed violations of this instruction are subject to the order established by law.


Visnovok

During the course of this thesis, I reached the basics, and, having thoroughly studied the types of information, followed and described the methods and technologies for processing various types of such. In the course of writing my thesis, I realized that with the advent of computers (or, as they were originally called in our country, EOM - electronic computing machines), the need for processing numerical information suddenly appeared. However, later, especially after the expansion of personal computers (PCs), computers began to be used for storing, processing, transmitting and searching text, numbers, images, sound and video information. Since the advent of the first personal computers - PCs (80s - 20th century) - up to 80% of current working hours are devoted to work with text information.

Analyzing the captured information, note: the processing of information (creation, transformation, transmission, recording of external media) is carried out by the computer processor. With the help of a computer, it is possible to create and store new information of any kind, for which there are special programs that are installed on computers and devices for entering information.

p align="justify"> At this time, you can take into account information presented on the global Internet with a special type of information. Here you will find special methods of saving, processing, searching and transmitting distributed information of great obligations and special methods of working with different types of information. The security program is being steadily improved to ensure collective work with information of all types.


List of Wikilists

1. Information system. Wikipedia free encyclopedia [Electronic resource]

2. File server. Wikipedia free encyclopedia [Electronic resource]

Shokin Yu.I., Fedotov A.M. Divisions of information systems [Electronic resource]

L.F. Kulikovsky, V.V. Motov “Theoretical ambushes of information processes: Navch. Handbook for universities". - K. 2009

V. Dmitriev "Applied theory of information". – M., 2008

A.G. Kushnirenko, G.V. Lebedev, R.A. Animal. “FUNDAMENTALS OF INFORMATION AND HIV TECHNOLOGY.” KYIV "OSVITA" 2008

Dokuchaev A.A., Moshensky S.A., Nazarov O.V. Costs of computer science in the office of a trading company. Koshti computer communications. – St. Petersburg: TEI, 2010, 32 p.

Computer technologies for information processing. // For ed. Nazarova S.I. - M.: Finance and Statistics, 2008.

Nans B. Computer measures. - M: Shidna Book Company, 1996.

Friedland A. Informatics – a comprehensive dictionary of basic terms. - M: Prior, 1998.

Shatt S. World of computer measurements. – Kiev: BHV, 2006

Shafrin Yu. Information technologies. - M., 2010

© 2024 androidas.ru - All about Android