Academic literature on the topic 'Telecommunication, computer programs'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Telecommunication, computer programs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Telecommunication, computer programs"

1

Serostanova, Natalia. "Integrating information and communication technologies in the process of foreign language teaching and learning." Journal of Education Culture and Society 5, no. 1 (2020): 187–97. http://dx.doi.org/10.15503/jecs20141.187.197.

Full text
Abstract:
The paper is an attempt to cover some of the issues of using information and communication technologies (ICT) in foreign languages teaching and learning (FLT/FLL) on the basis of intercultural approach. The facilities of Internet along with computer programs, audio and video devices, interactive whiteboards and telecommunications are considered. Special attention is given to the peculiarities of telecommunication projects; the example of telecommunication project realization is represented. The advantages and disadvantages of distance language learning are considered. Besides, some diffi culties that students and teachers come across during ICT-supported language education are also discussed. Key words: information and communication technologies (ICT), foreign language teaching and learning (FLT/FLL), computer programs, interactive whiteboards, Internet-based (telecommunication) projects, distance learning.
APA, Harvard, Vancouver, ISO, and other styles
2

Mirzaev, Farrukh, and Khurshid Nematov. "Performance of Free Software and Freeware in Telecommunication System." Journal La Multiapp 1, no. 5 (2021): 20–24. http://dx.doi.org/10.37899/journallamultiapp.v1i5.276.

Full text
Abstract:
This article discusses the Performance of Free Software and Freeware in Telecommunication System. Software or software is a special term for data that is digitally formatted and stored, including computer programs, their documentation, and various information that can be read and written by a computer. In other words, part of a computer system that is intangible. This term emphasizes the difference from computer hardware. Making the software itself requires a "programming language" written by the programmer which is then compiled with the compiler application so that it becomes code that can be recognized by the hardware machine.
APA, Harvard, Vancouver, ISO, and other styles
3

Ershov, Maxim E., Vasiliy R. Golyatkin, and Sergey V. Chistyakov. "Using education software to educate speciasists in telecommunication." Research Result Information Technologies 6, no. 3 (2021): 51–57. http://dx.doi.org/10.18413/2518-1092-2021-6-3-0-7.

Full text
Abstract:
In modern world humanity regular interact with information technologies that someone creates and maintains. In these conditions, high-quality and fast training of specialists, who will have the skills and knowledge necessary for the operation of telecommunication technologies is required. One of the solutions to this problem is the development of training software complexes capable of individualizing personnel training with support of the required quality. Since in modern realities this type of training is still not widespread enough, it has a number of requirements: a friendly interface, a method for presenting educational material, consolidating the material learned, etc. Training with the help of computer programs has a number of advantages in contradistinction to traditional training, for example, such as minimal financial costs; there is not need to send an employee to courses, thereby interrupting his performance of his job duties. The main task of such programs is the effectiveness of employee training with minimal time waste. The article considers an example of the structural organization of such programs and the correct presentation of educational material in them.
APA, Harvard, Vancouver, ISO, and other styles
4

Ershov, Maxim E., Vasiliy R. Golyatkin, and Sergey V. Chistyakov. "Using education software to educate speciasists in telecommunication." Research Result Information Technologies 6, no. 3 (2021): 51–57. http://dx.doi.org/10.18413/2518-1092-2021-6-3-0-7.

Full text
Abstract:
In modern world humanity regular interact with information technologies that someone creates and maintains. In these conditions, high-quality and fast training of specialists, who will have the skills and knowledge necessary for the operation of telecommunication technologies is required. One of the solutions to this problem is the development of training software complexes capable of individualizing personnel training with support of the required quality. Since in modern realities this type of training is still not widespread enough, it has a number of requirements: a friendly interface, a method for presenting educational material, consolidating the material learned, etc. Training with the help of computer programs has a number of advantages in contradistinction to traditional training, for example, such as minimal financial costs; there is not need to send an employee to courses, thereby interrupting his performance of his job duties. The main task of such programs is the effectiveness of employee training with minimal time waste. The article considers an example of the structural organization of such programs and the correct presentation of educational material in them.
APA, Harvard, Vancouver, ISO, and other styles
5

Kuprashvili, Henri. "Cyberspace and Terms: “kiberushishroeba” (Cyber Security) and “kiberusaprtkhoeba” (Computer Security)." Works of Georgian Technical University, no. 2(524) (June 6, 2022): 167–77. http://dx.doi.org/10.36073/1512-0996-2022-2-167-177.

Full text
Abstract:
The terms “kiberushishroeba” (cyber security) and “kiberusaprtkhoeba” (computer security) are often used in inappropriate contexts. The term “kiberushishroeba” is used when the avoidance of an imminent threat requires the formulation and implementation of socio-political measures (development and adoption of doctrines, laws, legal acts, improvement of the “kiberushishroeba” and “kiberusaprtkhoeba” assurance management process), because the state of protection of national interests in cyberspace is achieved through the establishment of an effective Computer Security system, cyberspace sustainability, protection from unwanted internal and external influences – as a result of qualified cyber policy. The starting-point in “kiberushishroeba” providing is political aim and the result – to achieve them. “Kiberusaprtkhoeba” is an integral component of “kiberushishroeba”, a carrier of different content and weight. “Kiberusaprtkhoeba” is a combination of technologies, methods and processes of technical protection against cyberattacks of components (networks, computers, programs, data, devices) within the field of computer and information-telecommunication. It is more associated with protection from "technical" threats (to be taken organizational-technical measures: to identify those responsible for the operation safety of the computerinformation-telecommunication field and to introduce appropriate technical infrastructure and security system) or rather to “protection of labor safety” than formulation and implementation of socio-political goals. The goal of “kiberusaprtkhoeba” is to protect them, and to achieve this protection as a whole is ensuring of the result that meets the requirements of the political goal of “kiberushishroeba”.
APA, Harvard, Vancouver, ISO, and other styles
6

Styazhkina, S. A. "QUESTIONS OF QUALIFICATION OF CYBER-EXTORTION." Bulletin of Udmurt University. Series Economics and Law 32, no. 5 (2022): 941–47. http://dx.doi.org/10.35634/2412-9593-2022-32-5-941-947.

Full text
Abstract:
The problem of ensuring information security today comes to the fore. Information is becoming an increasingly valuable object that requires special protection. Society, transforming into a digital one, is becoming increasingly dependent on information resources and information and telecommunication networks. Recently, cases of the use of encryption programs for information have become widespread, with subsequent demands for the payment of large sums of money for the preservation of data and their decryption. To date, "cyber extortion" falls under the signs of crimes in the field of computer information, such as unauthorized access to computer information (Article 272 of the Criminal Code of the Russian Federation) and the creation, use and distribution of malicious computer programs (Article 273 of the Criminal Code of the Russian Federation). In our opinion, this is not enough. It is proposed to supplement Article 163 of the Criminal Code with additional objective signs aimed at protecting computer information.
APA, Harvard, Vancouver, ISO, and other styles
7

Soni, Sumit, and Pravesh Kumar. "Compiler Construction for a Network Identification." Journal of Advance Research in Electrical & Electronics Engineering (ISSN: 2208-2395) 1, no. 4 (2014): 1317. http://dx.doi.org/10.53555/nneee.v1i4.240.

Full text
Abstract:
The Compiler Construction is mainly used to improve the network processing system through the advance advance compiler design.The name Compiler is primarily used for programs that translate source code from a high –level programming language to a lower level language.The advance compiler design is useful in the industrial application like telecommunication. Our approach to increase the flexibility ,productivity and usability of the system to target with the minimal effort .we use the bit level addressing for the network processor we show how a compiler backend has been design and also improve the feature of the compiler and fully operational. A compiler is a computer program (or set of programs) that transforms source code written in a programming language (the source language) into another computer language (the target language, often having a binary form known as object code The most common reason for wanting to transform source code is to create an executabe program.
APA, Harvard, Vancouver, ISO, and other styles
8

Sorokina, G. P., T. A. Pershina, and E. A. Dolgikh. "Implementation of digital competencies in higher education educational programs in Russia." Vestnik Universiteta, no. 5 (June 30, 2022): 61–70. http://dx.doi.org/10.26425/1816-4277-2022-5-61-70.

Full text
Abstract:
In the context of digitalisation, the transformation of the educational process is inevitable and is a priority issue for any country that wants to maintain or improve its position on the world stage. The article presents a comparative analysis of digital competencies and the possibility of their implementation in the higher education system in Russia. The comparison of the formulated competencies in the methodology approved by the Order of the Ministry of Economic Development of the Russian Federation No. 41 dated January 24, 2020, as well as the International Telecommunication Union and other European organisations is considered. The descriptors (knowledge, skills and abilities) of graduates in various fields who, in the era of digitalisation, must have the necessary digital competencies are identified. Today, professional standards, even in the humanities, define the requirements for technical and computer skills. The article proposes formulations of universal competencies in the higher education system based on the analysis.
APA, Harvard, Vancouver, ISO, and other styles
9

Sharma, Dilip Kumar, and A. K. Sharma. "Search Engine." International Journal of Information Communication Technologies and Human Development 3, no. 2 (2011): 38–51. http://dx.doi.org/10.4018/ijicthd.2011040103.

Full text
Abstract:
ICT plays a vital role in human development through information extraction and includes computer networks and telecommunication networks. One of the important modules of ICT is computer networks, which are the backbone of the World Wide Web (WWW). Search engines are computer programs that browse and extract information from the WWW in a systematic and automatic manner. This paper examines the three main components of search engines: Extractor, a web crawler which starts with a URL; Analyzer, an indexer that processes words on the web page and stores the resulting index in a database; and Interface Generator, a query handler that understands the need and preferences of the user. This paper concentrates on the information available on the surface web through general web pages and the hidden information behind the query interface, called deep web. This paper emphasizes the Extraction of relevant information to generate the preferred content for the user as the first result of his or her search query. This paper discusses the aspect of deep web with analysis of a few existing deep web search engines.
APA, Harvard, Vancouver, ISO, and other styles
10

Završnik, Aleš, and Pia Levičnik. "The Public Perception of Cyber-surveillance Before and After Edward Snowden’s Surveillance Revelations." Masaryk University Journal of Law and Technology 9, no. 2 (2015): 33–58. http://dx.doi.org/10.5817/mujlt2015-2-3.

Full text
Abstract:
The article contextualizes contemporary cyber-surveillance practices in the light of Edward Snowden’s revelations of massive espionage by intelligences services and shows the results of an online survey on the public perceptions of privacy in public telecommunication networks in Slovenia. The results relate to types and frequency of victimization; self-reported study on violating of the privacy of others; concern for the protection of one’s own privacy; perception of those carrying out surveillance; the value of privacy; views on abrogated data retention regulation; and awarness of personal data protection remedies.Despite growing distrust of large internet corporations and – after Edward Snowden’s revelations – Intelligence agencies, the findings indicate a low degree of awareness and care for the protection of personal data. In regard to the perception of primary subjects of surveillance, 56 percent of respondents chose internet corporations as the greatest threat to their privacy, followed by telecommunications companies (25 percent), and shops with loyalty programs (23 percent). According to chi-square and Cramer's coefficient calculations, gender correlation is weak, but men feel more threatened by foreign intelligence services and the Slovene Intelligence and Security Agency. By comparing responses before and after the Datagate affair, we noted that prior to this date, only a handful of people felt threatened by foreign or domestic intelligence agencies. An increased feeling of threat after this date is evident in men as well as women.
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography