Публикация на сайте для учителей

Публикация педагогических разработок

Бесплатное участие. Свидетельство автора сразу.
Мгновенные 10 документов в портфолио.

Иконка файла материала 29.ru.en.doc

STATE AUTONOMOUS EDUCATIONAL INSTITUTION

SECONDARY PROFESSIONAL EDUCATION

NOVOSIBIRSK REGION

"KUPINSKY MEDICAL TECHNICUM"

 

 

 

 

 

 

 

 

METHODOLOGICAL DEVELOPMENT

THEORETICAL LESSON

 

 

By discipline: "Informatics and ICT"

 

Section: Fundamentals of Social Informatics

Topic: "The main stages of development of the information society"

Specialty: 060501 "Nursing" Course: 1

(a basic level of)

 

 

 

 

 

 

 

 

 

 

 

Kupino

2014 academic year

 

Considered at the meeting

PCMK

Protocol No. "" 2014

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Author - compiler: teacher of the discipline "Informatics and ICT" Zhanna Anatolyevna Polei.

 

 

 

 

 

 

 

 

 

 

 

Kupino

2014

Appendix # 1

Input control on the topic

"Computer hardware and software"

  1. The smallest addressable element on a floppy disk is: sector, cluster, track, byte (underline the correct answer).
  2. What are the main output devices used in the computer?
  3. What is the best way to enter a photo from a magazine into a computer? Write down the correct answer: plotter, scanner, touchpad, digital camera, modem.
  4. What is FAT? Purpose and types of FAT? What is a sector and a cluster? File fragmentation.
  5. How many clusters on a FAT-32 hard drive will a 37KB file occupy?
  6. IN what is the optical principle of reading

information? What are the types of optical media

you know?

  1. What is the maximum speed of reading information

provides a 32-speed CD-ROM? Write down the correct answer:

150 KB / s, 300 KB / s, 3.2 MB / s, 4.7 MB / s, 4.8 MB / s.

  1. What are the main input devices

are used in the computer? Describe their functions and main

specifications.

 

EXPLANATORY NOTE

 The methodological development of a theoretical lesson is intended to study the topic "The main stages of development of the information society" of the discipline "Informatics and ICT".

 After studying this topic, the student should know / understand:

- the main technologies for creating, editing, designing, saving, transferring information objects of various types using modern software tools for information and communication technologies.

This methodological development consists of the following structural elements:

- educational and methodological plan of a theoretical lesson

- scheme of integrative relationships

- technological map of the lesson

- list of literature

- applications

EDUCATIONAL - METHODOLOGICAL PLAN OF THEORETICAL LESSON

 

Lesson topic: The main stages of the development of the information society

 

Lesson type: theoretical lesson

 

Occupation type:  learning new material

 

Location of the lesson: classroom

 

Duration of the lesson: 90 minutes

 

Motivation topic: this topic is the basis for further mastering the educational

 material.

Lesson objectives:

Educational: after studying the topic, the student must know / understand the main technologies for creating, editing, designing, saving, transferring information objects of various types using modern software of information and communication technologies. The main stages of the formation of the information society. Information civilization. Information resources of the society. Information culture.

Educational: formation of a conscious attitude to the learning process, striving for independent work and comprehensive mastery of the specialty.

 

Developing: Development of interest in the subject, assistance in activating the thinking of students. To develop the cognitive activity of students, to master the program educational material, in the discipline "Informatics and ICT".

 

Interdisciplinary integration

Intradisciplinary integration

Methodological support of the lesson: Methodological development of a theoretical lesson in the discipline "Informatics and ICT", the topic "The main stages of development of the information society", entrance control (Appendix No. 1), questions on the topic (Appendix No. 3).

 

Homework: Work on the educational material of the textbook and additional literature.

Assignment for extracurricular independent work of students Work on the educational material of the textbook and additional literature.

 

List of literature:

Informatics and ICT, Basic level: Grades 10-11, M. Binom, Knowledge Laboratory, 2011 - 246 pages.

 


Technological class map

 

No.

n \ n

Stages

lessons

Time

Activity content

purpose

Methods and techniques of teaching

Forms and methods of control

Equipment

 

teacher

student

1

Motivation for cognitive activity. Lecture plan:

The main technologies for creating, editing, designing, saving, transferring information objects of various types using modern software of information and communication technologies. The main stages of the formation of the information society. Information civilization. Information resources of the society. Information culture.

5 minutes

 

Emphasizes the importance and necessity of the acquired knowledge on this topic. Announces the name of the main issues to be considered on this topic

Listen

To interest and tune the audience to the perception of educational material

 

 

 

2

Incoming control

15 minutes

Gives assignments, listens.

Answer

 

Determine the level of mastering of the previous lesson

 

Questions for entrance control (Appendix # 1)

 

2

Presentation of new material

50 minutes

Explains, tells, shows

Listen, take notes

Ensure the formation of a system of knowledge in this discipline

Explanatory-illustrated

 

Theoretical part (Appendix No. 2).

 

3

Generalization, conclusions on the topic

5 minutes

Tells, asks

Listen, answer

Summarize the lecture, summarize educational material, answer questions.

 

 

 

4

Quality control of assimilation and comprehension of the material

10 min

Gives assignments, listens.

Answer

 

Determine the level of effectiveness of the lesson

 

Questions (Appendix # 3)

Methodological support

five

Homework

5 minutes

Gives a task

Listen, record

 

 

 

 


Appendix # 2

The main stages of the formation of the information society

Human society, as it developed, went through the stages of mastering matter, then energy and, finally, information.

In primitive communal, slave-owning and feudal societies (whose existence was based on craft), the activities of society as a whole and each person individually were aimed, first of all, at mastering the substance.

At the dawn of civilization (tens of thousands of years BC), people learned to make simple tools of labor and hunting (stone ax, arrows, etc.), in antiquity, the first mechanisms (lever, etc.) and vehicles (chariots, ships) appeared. , in the Middle Ages, the first complex tools and mechanisms were invented (loom, clock). The mastery of energy was at the initial stage during this period, the sun, water, fire, wind and human muscle power were used as energy sources.

From the very beginning of human history, the need arose for the transmission and storage of information. To convey information, sign language was first used, and then human speech. Rock paintings began to be used to store information, and in the IV millennium BC, writing and the first carriers of information appeared (Sumerian clay tablets and Egyptian papyri). The history of the creation of devices for processing numerical information also begins from antiquity - from the abacus (the counting board, which is the prototype of accounts).

Industrial society.

Starting from about the 17th century, in the process of the formation of machine production, the problem of mastering energy comes to the fore (machines and machine tools had to be set in motion). At first, the methods of mastering the energy of wind and water (windmills and water wheels) were improved, and then mankind mastered thermal energy (in the middle of the 18th century, a steam engine was invented, and at the end of the 19th century - an internal combustion engine).

At the end of the 19th century, the mastery of electrical energy began, an electric generator and an electric motor were invented. And finally, in the middle of the 20th century, mankind took possession of atomic energy, in 1954 the first nuclear power plant was put into operation in the USSR.

The mastery of energy allowed the transition to mass machine production of consumer goods, an industrial society was created. The main indicators of the development of an industrial society were quantitative indicators, that is, how much coal and oil was produced, how many machine tools were produced, and so on.

During this period, there were also significant changes in the methods of storing and transmitting information. In the middle of the 15th century, typography was invented, which made information available to many more people. Since the end of the 19th century, telegraph and telephone have been widely used to transmit information over long distances by wire, and in the 20th century - electromagnetic waves(radio, television).

Information society.

The first attempt at automated information processing was the creation by Charles Babbage in the middle of the 19th century of a mechanical digital analytical engine. However, only in the middle of the 20th century, since the advent of electronic devices for processing and storing information (computers, and then a personal computer), a gradual transition from an industrial society to an informational one began.

In the information society, the main resource is information, it is on the basis of possession of information about a variety of processes and phenomena that any activity can be effectively and optimally built.

It is important not only to produce a large number of products, but to produce the right products at a certain time, at a certain cost, and so on. Therefore, in the information society, not only the quality of consumption increases, but also the quality of production; a person using information technology has better working conditions, work becomes creative, intellectual, and so on.

Currently, the developed countries of the world (USA, Japan, Western European countries) have actually already entered the information society, while others, including Russia, are on the closest approaches to it.

Three can be chosen as criteria for the development of the information society: the availability of computers, the level of development of computer networks and the number of people employed in the information sphere, as well as using information and communication technologies in their daily activities.

Computer production.

The first electronic computers (computers), which could automatically process large amounts of information according to a given program, were created in 1946 in the USA (ENIAC) and in 1950 in the USSR (MESM). In the 40s-60s, the production of computers was measured in units, tens and, at best, hundreds of pieces. Computers were very expensive and very large (they occupied huge halls) and therefore remained inaccessible to the mass consumer.

The mass production of relatively inexpensive personal computers began in the mid-70s of the 20th century with the Apple II computer (from this computer Apple began its existence). The number of personal computers produced began to amount to tens of thousands per year, which was a colossal achievement at that time.

In the early 80s, the IBM corporation began mass production of personal computers (computers were called IBM Personal Computer - IBM PC). Soon enough, many companies began to produce IBM-compatible computers, and their production reached hundreds of thousands a year. The annual production of personal computers grew steadily and in 2000 exceeded 150 million.

The personal computer has been constantly improved, its performance has increased by three orders of magnitude, while, which is very important, the price has practically not changed. The personal computer has become available to the mass consumer, and now in the developed countries of the world, computers are found in most jobs and in most families.

Computer networks.

Currently, a significant trend in the informatization of society is the transition from using computers in an offline mode to using them in information networks.

Information networks create a real opportunity for quick and convenient user access to all information accumulated by humanity throughout its history. E-mail and teleconferencing, searching for information on the World Wide Web and in file archives, interactive communication, listening to radio stations and watching television programs, shopping in online stores have become a daily practice for many computer users in developed countries.

The development of global computer networks began in the 80s. In 1981, there were only 213 computers on the Internet; by the end of the 80s, the number of computers connected to the network had increased to 150,000, but the fastest exponential growth in their number occurred in the 90s.

By the number of available Internet servers, one can judge the degree of informatization of individual countries. The largest number of servers is registered in administrative-type domains, which are located mainly in the United States (about 104 million servers), in second place, with a large lagging behind, Japan (7.1 million servers), Russia occupies 24th place in this list (about 400 thousand servers).

The development of the global computer network requires high-bandwidth communication channels. The basis of the global computer network Internet is high-speed backbone communication lines through which information is transmitted between regional networks. Currently, the most powerful regional networks operate in North America, Europe, Japan and Australia. They are interconnected by numerous fiber-optic communication lines with a bandwidth of up to 20 Gbps and higher.

Within regional networks, information is also transmitted mainly via fiber-optic channels with different bandwidth (from 1 to 155 Mbit / s). In regional networks, leased lines (copper) are also often used, and sometimes (within the line of sight) and radio channels, the throughput of which can reach 2 Mbit / s.

To connect remote regions, the most cost-effective is the connection via satellite channels, the bandwidth of which can reach tens of megabits per second.

However, for the majority of individual users (there are now about 1 billion of them in the world), access to the Internet only through dial-up telephone channels with a speed of up to 56 Kbit / s is affordable. In Russia, according to various estimates, there are from 3 to 5 million such users.

Population employed in the information sphere.

According to the UN, in the 90s, the number of workers employed in the information sphere (for whom information processing is the main production function) increased by about 25%, while the number of people employed in agriculture and industry decreased by 10 and 15%, respectively.

Computers and information technologies are intensively penetrating into the sphere of material production. An engineer, a farmer, and specialists in other traditional professions more and more often have a computer at their workplace and use information and communication technologies in their professional activities.

With the development of communication technologies and mobile communications, an increasing number of people carry out their production activities remotely, that is, working from home, and not in the office (more than 10 million people in the United States). Distance education and job search through the Internet are becoming more widespread. In 2000, the turnover of the world market of information and communication technologies amounted to about 1 trillion dollars. At the same time, less than half of this amount was spent on the purchase of hardware, most of it was invested in software development, design of computer networks, and so on.

Information society Is a society in which most of the population is engaged in receiving, processing, transmitting and storing information.

The course of computer science and information technology plays a special role in the era of transition from an industrial society to an information society, as it prepares school graduates for life and work in the information society.

Information culture

The amount of information in modern society is growing rapidly, a person is immersed in a sea of ​​information. In order not to “drown” in this sea, it is necessary to have an information culture, that is, knowledge and skills in the field of information and communication technologies, as well as be familiar with legal and ethical norms in this area.

The process of informatization of society changes the traditional views on the list of skills and abilities required for social adaptation. Take the traditional writing skill. At the dawn of civilization (Sumer, Egypt), in the ancient world (Hellas, Roman Empire, etc.) and in the Middle Ages (before the invention of printing), the skill of calligraphic writing was the key to successful advancement on the social ladder. In industrialized society (before the invention of personal computers), pen writing skills were also essential for any member of society.

At the present time, on the threshold of the information society, the social significance of the skill of writing with a pen is decreasing, and, conversely, the social significance of the skills of entering information using the keyboard and working with the graphical interface of applications using the mouse is increasing.

Creating and editing documents using a computer, that is, mastering office information technologies, becomes a socially necessary skill in the information society - just look at job advertisements.

The ability to work with multimedia documents, create computer presentations is becoming important in the information society.

In today's information society, traditional drawing skills on Whatman paper are hardly necessary. Instead, it is helpful to get an initial understanding of the purpose and capabilities of computer-aided design (CAD) systems. Such systems will allow you to quickly consider various options for planning the interior of a house or apartment, create a drawing or diagram.

Using spreadsheets will make it easier and more intuitive to research and graph functions in the process of studying mathematics, planning and maintaining a home budget, building and researching models of various objects and processes.

The need to organize information, for example, about the people with whom you are in contact, requires the use of a notebook. However, it is often more convenient to use a computer database "Notebook" for storing such information.

When searching for information in a modern library or on the Internet, you must have the skills to search for information in databases. In the information society, it is very useful to be able to create databases, as well as to search for data in them.

A qualified computer user can create the specialized applications he needs using visual object-oriented programming tools. For example, you can create an application that automates the filling out of numerous receipts for payment for an apartment, electricity, gas, etc.

A modern person needs to master a communicative culture, that is, the ability to create and send emails, find the necessary information on the World Wide Web or in file archives, participate in chats, and so on. A prerequisite for successful professional activity is the creation and publication on the Internet of Web sites with information about the activities of an organization or enterprise.

Information culture consists not only in mastering a certain set of knowledge and skills in the field of information and communication technologies, but also implies knowledge and observance of legal and ethical norms and rules. The laws prohibit the use of pirated computer software and the promotion of violence, drugs and pornography on the Internet. Communication via e-mail or chats, participation in teleconferences presupposes compliance with certain rules: to respond to emails and not send numerous advertising messages (spam) to acquaintances and strangers, not deviate from the topic of discussion in newsgroups and chats, and so on.

 

 

 

 

 

Legal norms related to information, offenses in the information sphere, measures to prevent them

Licensed, shareware and free programs.

Programs according to their legal status can be divided into three large groups: licensed, shareware, and freeware.

Distributions of licensed programs (floppy disks or CD-ROMs from which programs are installed on users' computers) are distributed by developers on the basis of agreements with users on a paid basis, in other words, licensed programs are sold. Quite often, developers provide substantial discounts when purchasing licenses to use the program on a large number of computers or to use the program in educational institutions. In accordance with the license agreement, the developers of the program guarantee its normal functioning in a specific operating system and are responsible for this.

Some software firms offer shareware to users to advertise and market them. The user is provided with a version of the program with a limited validity period (after the expiration of the specified period, the program stops working if no payment has been made for it) or a version of the program with limited functionality (in case of payment, the user is informed of a code that includes all functions).

Many manufacturers of software and computer equipment are interested in wide distribution of software free of charge. These software tools include the following:

·        new unfinished (beta) versions of software products (this allows them to be widely tested);

·        software products that are part of fundamentally new technologies (this allows you to conquer the market);

·        additions to previously released programs that fix found bugs or expand capabilities;

·        outdated software versions;

·        drivers for new devices or improved drivers for existing ones.

Legal protection of information

Legal protection of programs and databases. Legal protection of computer programs and databases was first fully introduced in the Russian Federation by the Law of the Russian Federation "On the Legal Protection of Programs for Electronic Computers and Databases", which entered into force in 1992.

The legal protection provided by this law applies to all types of computer programs (including operating systems and software systems) that can be expressed in any language and in any form, including source text in a programming language and machine code. However, legal protection does not extend to the ideas and principles underlying the computer program, including the ideas and principles of organizing the interface and the algorithm.

For the recognition and exercise of copyright for computer programs, its registration with any organization is not required. Copyright for computer programs arises automatically when they are created.

To announce his rights, the program developer can, starting from the first release of the program, use the copyright protection mark, which consists of three elements:

·        letters C in a circle or parentheses ©;

·        name (name) of the copyright holder;

·        year of the first release of the program.

For example, the copyright mark for the Word text editor looks like this:

Copyright © 1993-1997 Microsoft Corporation.

The author of the program has the exclusive right to reproduce and distribute the program by any means, as well as to modify the program.

An organization or a user who lawfully owns a copy of the program (who has bought a license to use it) has the right, without obtaining additional permission from the developer, to carry out any actions related to the operation of the program, including its recording and storage in the computer memory. Recording and storage in the computer memory is allowed in relation to one computer or one user in the network, unless otherwise provided by an agreement with the developer.

You must be aware of and follow existing laws that prohibit illegal copying and use of licensed software. With regard to organizations or users that infringe on copyright, the developer may demand compensation for damages caused and payment of compensation by the infringer in an amount determined at the discretion of the court from 5,000 times to 50,000 times the minimum monthly wage.

Electronic signature.

In 2002, the RF Law "On Electronic Digital Signature" was adopted, which became the legislative basis for electronic document management in Russia. According to this law, an electronic digital signature in an electronic document is recognized as legally equivalent to a signature in a paper document.

When registering an electronic digital signature in specialized centers, the correspondent receives two keys: secret and public. The secret key is stored on a floppy disk or smart card and should only be known to the correspondent himself. The public key should be available to all potential recipients of the documents and is usually sent by email.

The process of electronically signing a document consists in processing the message text using a secret key. Then the encrypted message is sent by e-mail to the subscriber. The subscriber uses a public key to verify the authenticity of the message and the electronic signature.

Data protection.

Protection of access to the computer.

Passwords are used to prevent unauthorized access to data stored on your computer. The computer allows access to its resources only to those users who are registered and entered the correct password. Each specific user can be allowed access only to certain information resources. In this case, registration of all unauthorized access attempts can be made.

Protection of user settings is available in the Windows operating system (when the system boots, the user must enter his password), but this protection is easily overcome, since the user can refuse to enter the password. Password entry can be set in the BIOS Setup program, the computer will not start loading the operating system if the correct password is not entered. It is not easy to overcome such protection, moreover, serious data access problems will arise if the user forgets this password.

At present, biometric systems for authorization and user identification are increasingly used to protect against unauthorized access to information. The characteristics used in these systems are inalienable qualities of a person's personality and therefore cannot be lost and forged. Biometric information security systems include speech recognition systems, fingerprint identification systems, and iris identification systems.

Protection of programs from illegal copying and use.

Computer pirates, illegally replicating software, devalue the work of programmers, make software development an economically unprofitable business. In addition, computer pirates often offer users unfinished programs, programs with errors, or their demos.

In order for the computer software to function, it must be installed (installed). The software is distributed by manufacturing firms in the form of distributions on CD-ROM. Each distribution kit has its own serial number, which prevents illegal copying and installation of programs.

Special protection can be used to prevent illegal copying of programs and data stored on CD-ROM. The CD-ROM can contain an encoded software key, which is lost during copying and without which the software cannot be installed.

Protection against illegal use of programs can be implemented using a hardware key, which is usually connected to the parallel port of the computer. The protected program accesses the parallel port and requests a secret code; if the hardware key is not connected to the computer, the protected program detects a security violation and stops executing.

Data protection on disks.

Each disk, folder and file of a local computer, as well as a computer connected to a local network, can be protected from unauthorized access. Certain access rights can be set for them (full, read-only, by password), and the rights can be different for different users.

To ensure greater reliability of data storage on hard drives, RAID arrays (Redantant Arrays of Independent Disks) are used. Several hard drives are connected to a special RAID controller, which treats them as a single logical storage medium. When recording information, it is duplicated and stored on several disks at the same time, so if one of the disks fails, data is not lost.

Protection of information on the Internet. If a computer is connected to the Internet, then, in principle, any user also connected to the Internet can access the information resources of this computer. If the server has an Internet connection and at the same time serves as a local network server (Intranet server), then unauthorized entry from the Internet into the local network is possible.

The mechanisms of penetration from the Internet to the local computer and to the local network can be different:

·        Web pages loaded into the browser can contain active ActiveX controls or Java applets that can perform destructive actions on the local computer;

·        some web servers place text cookies on the local computer, using which you can obtain confidential information about the user of the local computer;

·        using special utilities, you can access disks and files of the local computer, etc.

To prevent this from happening, a software or hardware barrier is established between the Internet and the Intranet using a firewall (firewall). The firewall monitors the transmission of data between networks, monitors current connections, detects suspicious activity and thereby prevents unauthorized access from the Internet to the local network.

 

Appendix No. 3

Questions:

·        What role did matter, energy and information play at different stages of the development of society?

·        What parameters can be used to judge the degree of development of the information society?

·        How does the content of human life and activities change in the process of transition from industrial to information society?

·        What are the main components of information culture that a person needs to live in an information society?

·        What is the difference between licensed, shareware, and freeware programs?

·        How can you fix your copyright for a software product?

·        What methods of personal identification are used when providing access to information?

·        Why is software piracy damaging the community?

·        What are the software and hardware ways to protect information?

·        What is the difference between simply copying files and installing programs?


 

 


Посмотрите также