Setting up a local network. Report on computer practice - file n1.doc Report on the practice of enterprise computer networks

Introduction

The development of economic and social relations, the expansion of the network and enterprises and the increase in their size, the emergence of new ties between enterprises and industries, the increase in the flow and volume of information - all this has led to a sharp complication of managerial tasks.

The complication of the tasks solved in the field of management, in turn, led to a change in the nature of management processes. The use of computers significantly increases the efficiency of management, but it assumes the active participation of a person in the management process. It is he who makes the final decision on the basis of an assessment of various calculation options, taking into account the additional data at his disposal.

Industrial and technological practice is an organic part of the educational process and aims to consolidate and deepen the knowledge gained in the process of theoretical activity, to involve the student in socially useful work and to link the theoretical knowledge gained with the real production conditions. During the passage of industrial technological practice, student interns work according to the regime established for this enterprise and obey the internal regulations of this organization.

The purpose of the production and technological practice is to study by students a real enterprise and working conditions on it, to acquire applied skills in the development and maintenance of programs, the study of information flows and workflow, ways of storing and processing information, collecting materials for a report and preliminary selection of a probable topic for a graduation project. In addition, during the internship, student interns must also take an active part in the social life of the enterprise.

1. Production activity of the enterprise

Municipal Budgetary Cultural Institution "Vozhegodsk District Cultural and Leisure Association"

Year of creation - 01.11.2007. The network of MBUK "VR KDO" consists of 14 branches: Houses of culture and clubs. Director of MBUK "VR KDO" Lyubov Alexandrovna Klyushina. The main goal of the work of MBUK "VR KDO": Creation of conditions for organizing leisure and providing residents of the district with the services of cultural and leisure institutions.

To achieve this goal, the following tasks were set for 2012:

Improving the organization of work to improve the skills of KDO specialists using new methods.

Creation of conditions for increasing the efficiency and effectiveness of the work of the KFOR.

Work to form a positive image of the BWW institutions.

Priority areas of work of MBUK "VR KDO":

Patriotic and spiritual and moral education of citizens.

Promotion of family values.

Preservation and revival of traditional folk culture.

Prevention of a healthy lifestyle.

Cultural and entertainment activities.

Formation and development of cultural brands of settlements.

Inter-settlement festivals and holidays are held annually.

Performance indicators of MBUK "VR KDO" in 2012:

4586 events were held, including 2389 screenings.

Conducted 3748 events on a paid basis, including 2389 film screenings.

54923 visitors were served, 13788 of them were at film screenings.

32,001 paid visitors were served, of which 13,788 were at film screenings.

There were 135 club formations with 993 members.

All Houses of Culture and clubs carry out their activities in accordance with the goals and objectives.

2. IS architecture, software tools, methods of processing and storing information, organization of the database, familiarization with the network structure and composition of the VT

The institution "Vozhegodsk Regional Cultural and Leisure Association" uses the topology of the "Zvezda" network, that is, two computers are connected to each other using a router.

The star topology is the basic topology of a computer network in which all computers on the network are connected to a central node (usually a switch), forming a physical network segment. Such a network segment can function both separately and as part of a complex network topology (usually a "tree"). The entire exchange of information goes exclusively through the central computer, which in this way has a very large load, so it cannot do anything other than the network. As a rule, it is the central computer that is the most powerful, and it is on it that all the functions of managing the exchange are assigned. In principle, no conflicts in a network with a star topology are possible, because the management is completely centralized, what the star topology looks like can be seen in diagram No. 1.

Scheme No. 1.

Characteristics of institutional computers

"Vozhegodsk regional cultural and leisure association":

Specifications:

Computer #1

Processor: Intel® Pentium® 4 2.66 GHz

RAM: 512 Mb DDR

Hard drive: Seagate 120 Gb 7200 rpm

Monitor: Samsung 17"

OS: MS Windows XP Professional

Computer #2

Processor: Intel® Pentium® 4 2.66 GHz

RAM: 1024 Mb DDR

Video card: Geforce FX 5200 128Mb 128 bit MSI

Hard drive: Seagate 240 Gb 7200 rpm

Monitor: Samsung 19"

OS: MS Windows 7

3. Reporting form

The reporting form of the institution "Vozhegodsk Regional Cultural and Leisure Association" is information containing tables, text, calculations and formatted in a text file using a set of software package Microsoft office such as Microsoft Word, Excel, Access.

4. Means of security and information protection

The institution's computers have been installed antivirus Kaspersky CRYSTAL.CRYSTAL keeps your digital world crystal clear. Hybrid Internet Threat Protection instantly eliminates malware, spam and other modern threats, saving computer resources through a combination of cloud and antivirus technologies. do on the internet. The product has optimal default settings, and you do not need to be an IT specialist to effectively manage the protection of all home computers. Use the full potential of the Internet, and entrust security to Kaspersky PURE. The capabilities of Kaspersky PURE allow you to save your valuable documents, photos, favorite audio recordings and movies even if your computer breaks down or is stolen. Special tools and security technologies allow you to create and securely store strong passwords and prevent account theft on websites and applications. Using Kaspersky PURE, you can determine the time, duration and nature of the work of each user in your home. You can also block access to websites with inappropriate content and filter data transmitted using instant messaging programs. Kaspersky PURE is a comprehensive home computer protection solution that allows you to centrally manage security and reliably protects your computers from malware and other Internet threats. Special tools such as Parental Control, Password Manager, Backup, etc. provide a level of protection for your personal data that was previously unavailable.

5. Requirements for labor protection and safety.

Basic rights and obligations of employees:

1. Employees of the Company have the right to:

· To conclude, amend and terminate an employment contract in the manner and under the conditions established by labor legislation.

· For the provision of work stipulated by the employment contract.

· On workplace, which complies with state regulatory requirements for labor protection.

· For timely and full payment of wages in accordance with their qualifications, the complexity of work, the quantity and quality of work performed.

· For rest provided by the establishment of normal working hours, the provision of weekly days off, non-working holidays, paid holidays.

· Complete and reliable information about working conditions and labor protection requirements at the workplace.

For professional training, retraining and advanced training in the manner prescribed by labor legislation and local regulations of the Company (documented by the QMS procedure "Personnel Training"), including for certification in order to maintain the level of professional competence, improve the qualification category or promotion , is regulated by the Regulations on the procedure for attestation of the Company's employees.

· For compensation for harm caused to them in connection with the performance of labor duties, and compensation for moral damage in the manner prescribed by labor legislation.

· On obligatory social insurance in cases stipulated by federal laws.

2. Employees are required to:

· Conscientiously fulfill their labor duties stipulated by the employment contract and job description.

· Comply with the Internal Labor Regulations and other local regulations adopted in the Company in the prescribed manner.

· Work conscientiously, observe labor discipline, timely and accurately execute the orders of the Company, use all working hours for productive work.

· Carefully treats the property of the Company (including the property of third parties held by the Company, if the Company is responsible for the safety of this property) and other employees.

· Ensure the safety of the entrusted property, use the equipment efficiently, take care of tools, measuring instruments, overalls and other items issued for use by employees.

· Not to disclose information constituting a commercial secret and confidential information about the activities of the Company, in accordance with the "Regulations on ensuring the safety of confidential information in the Open Joint Stock Company "Universalnaya electronic card Vologda region".

· Behave correctly, with dignity, avoiding deviations from the recognized norms of business communication.

Obligations of the employee in the field of labor protection.

The employee is obliged:

proper use of personal and collective protective equipment;

· be trained safe methods and methods of performing work on labor protection, first aid, briefing on labor protection, testing knowledge of labor protection requirements;

undergo mandatory medical examinations;

immediately inform the immediate supervisor or other representatives of the Company about the occurrence of a situation that poses a threat to the life and health of people, the safety of the Company's property (including the property of third parties held by the Company, if the Company is responsible for the safety of this property).

6. Tasks of the head of practice from the enterprise

1) Update installed software

Basically, this operation was carried out manually by selecting the necessary updates, but it was also practiced to update programs through the free application - Software Update Monitor (tracking software updates). Its main purpose is to notify the user about the appearance of new versions of applications with which he works (the result can be seen in Fig. 1).

2) LAN setup

Before setting up a local network through a router for two computers, we will perform the following operations on each of them:

· Setting up a local network for Windows XP

First you need to disable all security programs on this computer (antiviruses, firewalls, firewalls, etc.)

In order for several computers to be recognized and have public access, they must be placed in one working group. To do this, do the following: open the "Properties" tab by calling context menu on the "My Computer" icon, then go to the "computer name" tab and, by clicking on the "change" button, change the computer name, and click "OK". To set up a local network using a router, you need to make sure that all the IP addresses of computers are located on a single subnet. To do this, you must specify identical settings on all computers. Sometimes the configuration cannot be done without enabling the NetBios protocol. If you have just such a case, then you need to go to the tab " Network connections"And open a window for configuring TCP / IP, then call up additional parameters and enable this same NetBios in the "general" attachment. On this, we can assume that the process is completed.

· LAN setup for Windows 7

The process of setting up a local network for different operating systems is very different. Setting up a local network through a router for Windows 7 is not much more difficult. First, we will need to find out the name of our computer, then go to the "Properties" section, in which we click on the "change settings" button and make the necessary amendments. Then restart your computer for the changes to take effect. The computer name must be in English letters. If it is specified in a different way, then there is a high risk of getting serious errors in the network.

Now we configure automatic generation of the address and DNS. To do this, go to the following path: Control Panel - Control Center - Local Area Network - Properties. In the window that opens, select TCP / IPv4 and check the box for obtaining an IP address automatically. At the end, you will only have to enable NetBios. To do this, you will need to go to the "Protocol Properties" section, in the "Advanced" tab, click on the "WINS" button and check the box next to "Enable NetBios", and then restart the computer. This completes the settings.

3) Installation of additional software

In the institution "Vozhegodsk Regional Cultural and Leisure Association" additional software was installed:

WINRAR 5.00 is a powerful utility for creating and managing archives containing a whole range of additional useful features. WinRAR is used daily by millions of people around the world to save PC space and transfer files quickly.

Adobe Flash Player is a universal free application that allows you to view pages with dynamic content, colorful special effects, interactive games and video clips, in fig. 2 you can see what it looks like Adobe Flash player.

Reader is a free, proven standard for securely viewing, printing, and annotating PDF documents. This is the only viewer PDF files, which allows you to open and interact with all types of PDF content, including forms and multimedia objects, the result can be seen in Fig. 3.

FineReader is a text recognition program that allows you to quickly and accurately convert document images and PDF files into editable electronic formats without the need for retyping.

You can get an image for recognition not only with the help of a scanner: it is enough to have a digital camera with you or mobile phone with a built-in camera, the result can be seen in Fig. 4.

microsoft office antivirus installation

4) Install Microsoft Office 2007

Before installing office 2007, we need to remove old version, to do this, go to the "my computer" folder, then select "add/remove programs" and delete the old Office version 2003, after the removal is completed, we restart the computer. After restarting the computer, load the Office 2007 image from portable media and start the installation following the instructions. After installation, it is best to reboot the copter for the changes to take effect.

) Installing Windows7 operating system:

Windows is reinstalled using hard disk partitioning programs, both standard and third-party such as: Acronis Disk Director.

· The first thing to do before installing Windows is to make a copy of the data we need using a memory card or CD-ROM.

· Now we need to go into the BIOS of the computer to set the boot from a CD or from a USB flash drive. Save the changes and restart the computer by pressing the F10 key.

· The third step is to prepare the hard disk to install the new OS. Here we perform the procedure of partitioning the disk into the NTFS file system using the Acronis Disk Director program. From under BIOSS, launch Acronis and perform the following actions: delete the previous hard disk partitions and create new ones, specify the amount of memory that will be required for the new OS, specify the NTFS file system and click the "Start" button. After completing these procedures, close the program and remove the disk.

· The fourth step is to install the new OS itself. We launch the installation image from under the BIOS and begin the installation. We indicate the disk partition we need and click next, and wait for the installation process to complete.

After the installation of the OS is completed, we configure it.

Install drivers using Driver programs Pack solution.

Install the programs we need from the ChipWPI program collection (antivirus, MS Office, codecs, archiver).

· Setting up a local network.

6) Install Adobe Photoshop CS5

1. Install Adobe Photoshop.

2. We go to the Adobe website.

Choose Russian | windows | 1000.9 MB Download now.

Download Akami Download Manager. Open it and open the site again. Click "Download Now". Select the directory where the files will be downloaded.

Password entry

Download Adobe Photoshop CS5 Extended 12.0 Final Multilanguage. Click on Set-up.exe, the result of this operation can be seen in fig. five.

Click the “Skip and continue” button, wait for the installation programs to initialize, the process of this operation can be seen in Fig.6.

The next step in installing Adobe Photoshop CS5 must enter the serial number that was given when purchasing the software.

We are waiting for the installation to complete, the process can be seen in Fig. nine.

At the end of the installation, click the "Finish" button, fig. 10.

We launch the program using a shortcut on the desktop or through the Start menu, we get the working window of the program, which can be seen in Fig. 11. The program is ready to use.

7) Antivirus settings

When setting up the network, there was a problem with the definition of computers, to solve it, it was necessary to disable the firewall in the Kaspersky anti-virus. To do this, we perform the following action: in the system tray (lower corner of the screen) we find the antivirus icon and click on it. Next, select "Security Control" on the antivirus panel. Select "Protection Center" on the left. At the bottom right, click "Work online".

A new window "Protection components for your computer" will open. On the left, select "Network protection", then look for "Firewall". And by clicking on the dot opposite, turn off the "Firewall". This is the firewall in Kaspersky "CRYSTAL".

The license for the use of Kaspersky anti-virus programs was also renewed.

Conclusion

Passage of industrial practice is an important element of the educational process for the preparation of a specialist in the field of programming.

During the production practice in the institution "Vozhegodsk Regional Cultural and Leisure Association" all the acquired skills of theoretical training were fixed in production.

The wide coverage of industries that I had to deal with in practice allowed me to better assimilate the studied theoretical material obtained in the classroom at the technical school.

I mastered some subtleties of using software in practice, understood how some programs work, subroutines that were not clear to me, realized their importance in practical activities, increased the level of software proficiency: Adobe Photoshop, Adobe Reader, Microsoft Word and others.

Practical activities helped me learn how to independently solve a certain range of tasks that arise in the course of a programmer's work. The Internet, in which you can currently find a lot of useful information in the field of programming.

Bibliography

1. Scott Kelby - Adobe Photoshop CS6. Handbook of Digital Photography (2013) PDF.

2. Broido V.L. Computing systems, networks and telecommunications: Textbook for universities / V.L. Broido. - St. Petersburg: Peter, 2003. - 688 p.

3. Shafrin Yu.A. Fundamentals of computer technology / Yu.A. Shafrin. - M.: ABF, 2001. - 560 p.

4. Olifer V.G., Olifer N.A. Computer networks. Principles, technologies, protocols /V.G. Olifer, N.A. Olifer. - St. Petersburg: Peter, 2002. - 672 p.



Department ____________________________________________________________

name of the department providing practice

APPROVE:

Head department ___________________________

"_____" _______________________ 20__

THE TASK

On production practice

to the student(s) of the group ______ ____________________________________

Full name. student(s)

Specialty (direction)

Terms of practice from _____20__. to _______ 20___

____________________________________________________________________

generalized task statement

Job Schedule


Name of the tasks (activities) that make up the task

Task completion date (activities)

Signature of the head of practice from the organization

1

2

3

Theoretical part

Practical part

Protection of the practice report

Head of practice from the university

_________________ ___________________

signature Full name, position

Justification of the need for corporate network 4

1.1 The value of information, information technology 4

1.2 Inconvenience in the absence of a LAN 4

1.3 Tasks solved by the presence of a LAN 5

Description of the organization's corporate network 6

1.4 Network topology 6

1.5 Network model 7

1.6 Protocol 9

Hardware and software 10

1.7 Hardware of the server and work computers 10

1.8 Network equipment 12

1.9 Network cabling 13

1.10 Software 14

1.11 Ensuring information security 17

Conclusion 18

List of sources used 19

Introduction

Today, computerization in the workplace is not uncommon. The presence of only computers in the office with a large information flow and the amount of work with documents slows down the work process of employees and creates inconvenience. The success of almost any enterprise, organization is connected or depends on the availability and well-established system of informatization. Such systems are local area computer systems (LANs), which are now often referred to as corporate networks.

Creating a corporate network allows you to:

– organize high-speed data exchange between employees;

- reduce paperwork within the organization;

– increase labor productivity;

– reduce the time for processing information.

There is no longer a need for removable storage media for data exchange, there is no need to print documents on paper that need to be shared with several users.

The network can be installed network printer, modem, scanner, network server is used as an application server.

In addition, such networks are networks of a closed type, access to them is allowed only to a certain circle of users, which ensures the protection of information. All these features cannot be implemented using only operating systems (OS) and application programs. Therefore, most modern enterprises use LANs.
^

Justification of the need for a corporate network

1.1 The value of information, information technology


The editorial office of the newspaper "Work in the City" is preparing (writing materials, accepting ads, advertising design, layout) newspapers for printing in a printing house. That is, the activity of the organization is associated with the use and generation of a large amount of information. The slightest violation during its storage and processing will affect the decrease in the efficiency of the editorial office as a whole. Information is a kind of subject of labor, and a well-organized information resource management process allows an enterprise to effectively conduct its activities and solve tasks with a lower degree of risk. The use of a local computer network allows you to get rid of paper workflow, increases productivity, and reduces the time for processing information.

With the introduction of the network, personalization of computing tools took place, automated workstations were organized, which made it possible to effectively solve the corresponding tasks.
^

1.2 Inconvenience in the absence of a LAN


The lack of a network would complicate the work of employees, cause inconvenience, entail costs:

- the transfer of information from one computer to another would be carried out using removable memory media, it would take time;

– access to the global network was made only from a computer with a modem;

- not all computers are equipped with peripheral devices (printers) (to use such a device, you need a removable memory medium, the computer to which the device is connected must be freed for a while);

– the cost of acquiring various devices for each computer (hard drive, printer, CD-ROM, modem) and expensive software.
^

1.3 Tasks solved by the presence of a LAN


LAN ---– a set of hardware and algorithms that connect computers and peripheral devices located on short distance(one enterprise, office), and allowing you to quickly exchange data, share informational resources, peripherals.

Features provided to LAN users:

- saving and archiving your work on the server so as not to use valuable space on your PC hard drive;

– easy access to applications on the server;

- collaborative work with documents;

- simplification of workflow (the ability to view, correct and comment on documents without leaving the workplace, without organizing meetings and meetings that take a lot of time);

– relief sharing in organizations of high-value resources such as printers, CD-ROM drives, hard drives and applications (eg word processors or database software).

^

Description of the organization's corporate network

1.4 Network topology


The topology of a computer network is a way of connecting its individual components (computers, servers, printers, etc.).

The editorial LAN is built according to the “star” topology based on the server: all computers are connected to the central component using cable segments, information between network clients is transmitted through a single central node, the server acts as the central node. At the same time, two printers installed in the edition are also connected to the server and are network printers.

Editorial LAN Diagram (Star Topology Type)

Zvezda arose at the dawn of computing, when computers were connected to a central, main computer. The advantages of this topology are as follows:

- high network performance, since the overall network performance depends only on the performance of the central node - the server;

– internal calculations of clients do not affect the speed of the server processor;

– there is a single person responsible for the administration of network resources;

– provides the ability to restrict and control access to network resources;

– no collision of transmitted data, since data between the workstation and the server is transmitted via a separate channel without affecting other computers.

Disadvantages of star topology:

- the reliability of the entire network is determined by the reliability of the central node, if the central computer fails, then the operation of the entire network will stop;

– cabling costs are high, especially when the central node is geographically located far from the center of the topology; when expanding computer networks, previously made cable connections cannot be used: a separate cable must be laid from the center of the network to a new workplace.

The main criterion for choosing this topology was the fact that if only one computer (or the cable connecting it to the server) fails, then only this computer will not be able to transmit or receive data over the network, this will not affect the rest of the computers on the network.
^

1.5 Network model


The type of LAN under consideration is the client-server type, there is one host computer - the server. Nine computers and two network printers are connected to the server. The main tasks of the server:

– storage of user data;

– storage of accounting databases, archives, etc.;

– storage of service databases and programs of the department;

– storage of home folders of users.

The server is designed to provide access to multiple files and printers while providing high performance and security. Administration and control of access to data is carried out centrally. Resources are also centrally located, which makes it easier to find and maintain them.

Diagram of a client-server network model

The advantages of such a model:

– high network speed;

- the presence of a single information base;

- the presence of a unified security system.

Since all important information is located centrally, that is, concentrated on one server, it is not difficult to ensure its regular backup. Therefore, in case of damage to the main data storage area, information will not be lost - it is easy to use a duplicate copy.

This model also has disadvantages. The main one is that the cost of creating and maintaining a client-server network is much higher due to the need to purchase a special server.

The decisive argument in choosing a server-based network was the high level of data protection. In such networks, one administrator can deal with security issues: he forms a security policy and applies it to each network user.

1.6 Protocol

A protocol is a set of rules and technical procedures that govern communication between computers on a network.

The process of transferring data over the network is divided into several steps. At the same time, the order in which these steps are performed is strictly defined. The task of the protocols is to define such steps and control their implementation. The editorial network uses the Transmission Control Protocol/Internet Protocol – TCP/IP protocol.

TCP/IP is an industry standard set of protocols that provide communication in a heterogeneous environment, providing compatibility between different types of computers. Compatibility is the main advantage of TCP/IP, most LANs support it. TCP/IP also provides access to Internet resources, as well as a routable protocol for enterprise networks. Since TCP/IP supports routing, it is commonly used as an internet protocol.

TCP / IP has two main drawbacks: size and insufficient speed. But for the editorial network is quite suitable.
^

Hardware and software

1.7Hardware of the server and working computers


There are two parameters that distinguish the server from ordinary computers. The first is very high performance (this also applies to efficient exchange with peripheral devices), a fairly powerful disk subsystem (mainly with SCSI interface); the second is increased reliability (the server, as a rule, works around the clock).

Server performance is often measured in transactions. A transaction is understood as a set of three sequential actions: reading data, processing data and writing data. With regard to, for example, a file server, a transaction can be considered the process of changing a record on the server, when a workstation modifies a file stored on the server.

Of great interest is the maximum volume random access memory, which can be used on this server, the ability to install more powerful processor, as well as a second processor (if you plan to use an operating system that supports a dual-processor configuration).

Another important question is which configuration disk subsystem can be used on this server, first of all, what is the volume of disks, their maximum number.

An important role is played by the possibility of expanding the system and the ease of its modernization, since this is what allows us to provide the required performance not only at the current time, but also in the future. An important circumstance in the operation of the server is its high-quality and uninterrupted power supply.

In our case, the server is implemented on a normal, standard computer that has a configuration with fairly good characteristics.

To provide the server, an Intel processor based on Core 2 Duo dual-core technologies was chosen, which has high performance, reliability, good power consumption and temperature performance.

For hardware workstations, the advantage was given to processors from AMD with an average performance value and a low price.

The server motherboard is ABIT P-35 on socket 775. It is optimal in terms of price-performance, has a good throughput, a dual-channel architecture for RAM, is provided with a built-in network card with a bandwidth of up to 1Gb / s. This board supports many modern processors from INTEL, which will allow, if necessary, to increase system performance by replacing the processor. There are also plenty of slots for system expansion.

Server Motherboard - ABIT IP-35

RAM for the server is implemented on two sets of OCZ Gold Series (4 bars of 512 MB each).

When choosing storage devices, special attention is paid to its reliability, this is especially true for server equipment. When designing the network, the editors took into account the organization of a large database, so they decided to use a RAID-array of the RAID-5 level. Data blocks and checksums in this array are written cyclically to all disks. This is the most popular of the levels, primarily due to its economy.

Additional resources are spent on writing information to a RAID 5 volume, since additional calculations are required, but when reading (compared to a separate hard drive), there is a gain, because data streams from several array drives are parallelized. The minimum number of disks used is three, so three disks from a reliable manufacturer Segate, with a capacity of 150 Gb each, were chosen for organizing the RAID.

For the workstations, hard drives of the smallest volumes were chosen, from those available in the store - 80.0 Gb from Hitachi. This volume is quite sufficient for installing various professional applications and office programs. A cache size of 8MB will allow you to organize your work without delay.
^

1.8Network equipment


Additional equipment is installed in the LAN of the editorial office: two network printers and a modem.

A network printer eliminates the need to purchase a large number of devices for all employees who need them. When creating the network, Samsung CLP-300 A4 color laser printers were chosen.

The modem is connected to the LAN server. D-Link DSL-2540U Modem selected.

The most important component of a computer network are network cards. Network cards act as a physical interface between a computer and a network cable. The main purpose of the network card:

- preparation of data coming from a computer for transmission over network cable;

– data transfer to another computer;

– control of the data flow between the computer and the cable system.
^

1.9 Network cable system


cable lines are a complex structure. The cable consists of conductors enclosed in several layers of insulation: electrical, electromagnetic, mechanical. In addition, the cable can be equipped with connectors that allow you to quickly connect various equipment to it. In the computer network under consideration, it is not required to lay the foundation for communication from a PC to a server over a distance of more than 100 meters, therefore a twisted cable is used UTP pair Category 5e supporting 100 Mbps.

twisted pair cable

Cable " twisted pair"consists of pairs of wires twisted around each other and simultaneously twisted around other pairs, within the same sheath. Each pair consists of a wire called "Ring" and a wire called "Tip". Each pair in the shell has its own number. Curling wires allows you to get rid of electrical interference. The shielded twisted-pair cable has a copper braid that provides additional protection against interference. The maximum length of an unshielded twisted pair cable is 100 m.

Benefits of twisted pair:

– high performance in data transfer rate;

- low cost;

– ease of installation;

– high noise immunity;

– the dimensions of the areas allow keeping within the minimum effective cable length.

RJ-45 connectors are used to connect twisted pair to computers.
^

1.10Software


Server versions of the Windows operating system are widely used today, mainly due to ease of administration and low total cost of ownership. Family Windows Server 2003 differs from its predecessors by the presence of the Microsoft . NET Framework. Windows Server 2003 comes in four editions. The edition uses Windows Server 2003 Standard Edition. This is a network operating system for running the server part of business solutions and is designed for use in small companies and departments. It features resource sharing and centralized deployment of desktop applications, as well as support for up to 4 GB of RAM and dual-processor symmetric multiprocessing.

Workstations are computers that use network resources but do not themselves have their own resources. These computers run an operating system. An operating system was installed for editorial workstations. Microsoft system Windows XP Pro. This system has a wider range of configuration, administration and networking options than Windows XP Home Edition. Windows XP Professional has many advantages:

- stability. A prerequisite for system reliability is that applications run in their own memory spaces. This protects them from conflicts and the problems that arise in connection with them;

- compatibility. Ability to work with applications that were not specifically designed for Windows environments XP Professional;

- System Restore . When it crashes, the computer enters Safe Mode ( Safe mode), the operating system offers a rollback option called System Restore. This allows the user to return to the settings that were on the computer before the incident. So-called restore points can be created by the user at any time. In addition, the operating system periodically creates its own restore points and every time a new program is installed. When you roll back your computer to a restore point, the operating system uses the installation data that corresponds to when the system was working properly.

OpenOffice.org is installed as an office software package, which can work with extensions of the rather expensive Microsoft Office. This rather powerful program has a number of other useful features, and it is completely free for both home and commercial use. It's universal office suite programs that can run on all major operating systems.

The OpenOffice.org suite includes six application programs. The Writer text editor has a user-friendly interface similar to that of the Word editor. Therefore, any user familiar with Word will easily get used to Writer. The same can be said about the Calc spreadsheet editor, which in many ways resembles Excel. There is also a program for creating and demonstrating Impress presentations, a vectorial Draw editor, a Base database management tool, and an editor for creating and editing Math formulas. The disadvantage of OpenOffice.org is its speed: it loads and runs somewhat slowly, but quite acceptable.

The organization of safe LAN operation is not possible without the use of anti-virus software. Therefore, Kaspersky Anti-Virus 7.0 is installed as anti-virus protection - a reliable and relatively cheap system.

Kaspersky Anti-Virus has three levels of protection against known and new Internet threats: signature database scanning, heuristic analyzer and behavioral blocker.

Kaspersky Anti-Virus protection against viruses is comprehensive and includes:

- Email protection. Kaspersky Anti-Virus performs anti-virus scanning of mail traffic at the data transfer protocol level (POP3, IMAP and NNTP for incoming messages and SMTP for outgoing messages) regardless of the protocol used. mail program;

– Internet traffic check. Kaspersky Anti-Virus provides anti-virus scanning of Internet traffic arriving via the HTTP protocol in real time and regardless of the browser used. This prevents infection even before the files are stored on the computer's hard drive;

– scanning file system. Any individual files, directories and disks can be scanned. In addition, you can start scanning only critical areas of the operating system and objects loaded at Windows startup.

Kaspersky Anti-Virus protects your computer from Trojans and all types of keyloggers, preventing the transmission of sensitive data to intruders.
^

1.11 Ensuring information security


Considering the problem of protecting data on the network, we will highlight all possible failures and violations that can lead to the destruction or unwanted modification of data.

Potential threats include:

– equipment failures: cabling failures; power outages; crashes disk systems; failures of data archiving systems; failures of servers, workstations, network cards, etc.;

- loss of information due to incorrect work Software: loss or change of data due to software errors; system infection losses computer viruses;

– losses associated with unauthorized access: unauthorized copying, destruction or falsification of information; familiarization with confidential information constituting a secret, unauthorized persons;

– user errors: accidental destruction or alteration of data; incorrect use of software and hardware, leading to the destruction or alteration of data.

To ensure the reliability of data storage and to prevent the loss of information as a result of power failures, the editorial office has a source uninterruptible power supply(UPS) Ippon Back Office 600. Its presence allows, in the event of a power failure in the mains, at least correctly shut down the operating system and turn off the server.

Kaspersky Anti-Virus is used to protect against viruses.

Conclusion

The result of the internship was:

– detailed acquaintance with the local network of the organization;

- obtaining new knowledge about the operation and maintenance of the LAN;

- the programs used in the organization are studied.

After studying the network and analyzing the work of the editors, it was proposed to create a new workplace - a full-time system administrator. Since now the daily problems of network operation, computers are solved by the employees themselves, without having all the necessary knowledge and being distracted from their direct duties.
^

List of sources used


  1. Akulov O. A. Informatics: basic course [Text] - M .: Omega-L, 2004. - 552 p.

  2. Olifer V. G., Olifer N. A. Computer networks [Text]: a textbook for universities. - Peter, 2007, 960 p.

  3. Pyatibratov A. P., Gudyno L. P., Kirichenko A. A. Computing systems, networks and telecommunications [Text] / Pod. ed. A. P. Pyatibratova. M.: Finance and statistics, 2001. - 512 p.

State Budgetary Professional Educational Institution “Arzamas Instrument-Making College named after P.I. Plandin"

I approve

Director of GBPOU

APK im. P. I. Plandin»

___________/S.A. Ermolaev/

INTERNSHIP WORKING PROGRAM

PM 02. Organization of network administration

UP.02.01

specialty 09.02.02

Computer networks

Arzamas, 2016

The working program of educational practice was developed on the basis of the Federal State Educational Standard in the specialty of secondary vocational education09.02.02. "Computer networks", Regulations on the practice of students mastering the basic professional educational programs of secondary vocational education, approved by Order of the Ministry of Education and Science of the Russian Federation dated April 18, 2013 No. 291.

Organization-developer: GBPOU "APK them. P.I.Plandina»

Developers: Malova E.V., lecturer at GBPOU “APK them. P.I.Plandina.

Approved by the Methodological Council of GBPOU "APK them. P.I. Plandin"

CONTENT

2

RESULTS OF LEARNING PRACTICE LEARNING ……

3

STRUCTURE AND CONTENT OF LEARNING PRACTICE…

4

CONDITIONS FOR THE IMPLEMENTATION OF TRAINING PRACTICE ……..

5

CONTROL AND EVALUATION OF THE RESULTS OF LEARNING PRACTICE ………………………………………………………...

1. PASSPORT OF THE WORKING PROGRAM OF TRAINING PRACTICE

1.1. Scope of the program

The work program of the training practice is part of the training program for mid-level specialists (hereinafter referred to as PPSSZ) in accordance with the Federal State Educational Standards of secondary vocational education in the specialty09.02.02 Computer networks, in terms of mastering the main types professional activity(hereinafter - VPD).

1.2 Goals and objectives of educational practice

The purpose of educational practice is the formation of students' skills, the acquisition of initial practical experience within the framework of the professional modules of the LSSP for the main types of professional activity for the subsequent development of general and professional competencies in their chosen specialty.

The tasks of educational practice are:

Development by each student of an expedient, necessary and sufficient set of practical skills that are important for the subsequent formation of competencies;

Education of the student's conscious comprehension and self-assessment of their own activities.

Requirements for the results of mastering educational practice.

As a result of passing the educational practice by types of professional activity, the student must have initial practical experience and possess the skills:

Organization of software maintenance and operation of workstations and office equipment of a computer network

Organization of software maintenance and operation of software for workstations and servers of a computer network

Organization of software maintenance and operation of active and passive computer network equipment

Practical experience in software maintenance and operation of workstations, active and passive equipment and related computer network software

    set up local network Windows 7;

    Windows;

1.3. Number of hours to master work program educational practice:

Codes of professional competencies

Name of the professional module

Total hours

Distribution of hours by semester

Educational practice in computer network software

Total

2. RESULTS OF MASTERING THE WORKING PROGRAM OF TRAINING PRACTICE

The result of the development of the working program of educational practice is the development by students of professional (PC) and general (OK) competencies in their chosen specialty.

OK 1

Understand the essence and social significance of your future profession, show a steady interest in it

OK 2

Organize their own activities, choose standard methods and methods for performing professional tasks, evaluate their effectiveness and quality

OK 3

Make decisions in standard and non-standard situations and be responsible for them

OK 4

Search and use the information necessary for the effective implementation of professional tasks, professional and personal development

OK 5

Use information and communication technologies in professional activities

OK 6

Work in a team and in a team, communicate effectively with colleagues, management, consumers

OK 7

Take responsibility for the work of team members (subordinates), for the result of completing tasks

OK 8

Independently determine the tasks of professional and personal development, engage in self-education, consciously plan advanced training

OK 9

Navigate in the face of frequent technology changes in professional activities

3. THEMATIC PLAN AND CONTENT OF LEARNING PRACTICE

3.1. Thematic plan and content of educational practice

Code and name

professional

modules and themes

educational practice

Volume

hours

Level of development

Educational practice in computer network software

Types of jobs:

Organization of software maintenance and operation of workstations and office equipment of a computer network

Organization of software maintenance and operation of software for workstations and servers of a computer network

Organization of software maintenance and operation of active and passive computer network equipment

Installation and configuration of application software for workstations and servers. Performing data backup and recovery. Health diagnostics, troubleshooting and failures of the operating system and application software. Installing, updating and removing versions of operating systems for personal computers. Performing administration of operating systems; updating and deleting the version of the application software of personal computers. Update and remove device drivers for personal computers, peripherals, and hardware. Updating the firmware of computer components, servers, peripherals and equipment.

1. Installing the WEB server

2. Installing the WEB server

3. Installing the WEB server

4. Web server configuration

5. Web server configuration

6. Web server configuration

7. Interaction with databases.

8. Interaction with databases.

9. Interaction with databases.

10.Installation and configuration of drivers

11. Installing software: MS Office, specialized programs and workstations.

12.Using a file manager FAR/and other alternative programs.

13. Disk maintenance (defragmentation, cleaning, error checking, file recovery)

14. Installing and configuring the Kaspersky Anti-Virus program.

15. Analysis and monitoring of the network.

16. Installing and configuring browsers Opera, Mozilla, Google Chrome, Internet Explorer

17.Installation and configuration of mail Microsoft utilities outlook, OutLook Express.

18.Using an FTP service using a browser.

19.Setting up and use FTP client

20. Installation of specialized programs and workstations.

21. Organization of uninterrupted operation of the system for backup and recovery of information

22. Updating and deleting the version of operating systems of personal computers.

23. Performing administration of operating systems.

24. Updating and removing device drivers for personal computers.

25. Update and remove peripheral device drivers.

26. Update and remove peripheral device drivers.

27. Update and remove hardware drivers.

28. Updating the firmware of computer components.

29. Firmware update of server components.

30. Firmware update of peripheral devices components.

31. Firmware update of hardware components.

32.Working with the BIOS. The main sections of the BIOS. Overclocking the computer using the BIOS

33. Procedure BIOS updates

34. BIOS diagnostic tools

35.Installation of CS software.CS software operation

36.. Differentiated offset

Intermediate certification in the form of a differential test

4. CONDITIONS FOR THE IMPLEMENTATION OF THE WORKING PROGRAM OF TRAINING PRACTICE

4.1. Minimum Logistics Requirements

The implementation of the work program of educational practice assumes the presence

1. Equipment:

PC, software, separate components, peripheral equipment (microphones, speakers), office equipment (printers, scanners)

2. Tools and fixtures:

    Computers - 24.

3. Learning tools:

    Electronic directory "PC"

4.3. General requirements for the organization of the educational process.

Training practice is carried out by masters of industrial training and / or teachers of the professional cycle. Implemented in a concentrated manner.

4.4. Staffing of the educational process.

Masters of industrial training, teachers

4.5 Information support of educational practice

Main sources:

    1. Kelim Yu.M. Computing technology: a textbook for students of institutions of secondary vocational education. - M.: Publishing Center "Academy", 2014. - 368 p. (electronic version)

      Maksimov N.V. Architecture of computers and computing systems. M.: FORUM-INFRA-M, 2013

      Tanenbaum E. Computer architecture. St. Petersburg: Peter, 2013

Additional sources:

    1. Kuzin A.V. Architecture of computers and computing systems. M.: FORUM-INFRA-M, 2006

Electronic versions of textbooks:

    1. Ilyukhin B.V. Hardware and computer networks. Tomsk: Tomsk interuniversity. distance center. education, 2005

      Kolesnichenko O.V. Architecture of RS tools. St. Petersburg: BHV-Petersburg, 2010

      Stepanov A.N. Architecture of computing systems and computer networks. St. Petersburg: Peter, 2007

Internet resources:

    EOR: electronic directory"PC"

    http://nn.nix.ru/

    http://pusk.at.ua/publ/1-1-0-2

4. 6 Requirements for the organization of certification and evaluation of the results of educational practice

Certification of educational practice is carried outin the form of a differentiated offset on the last day of training practice on the basis of equipped college classrooms.

Students who have completed the program of educational practice in full and submitted a diary and report of educational practice are allowed to attestation.

In the process of certification, an examination of the formation of practical skills is carried out, and the acquisition of initial practical work experience in terms of mastering the main type of professional activity, mastering general and professional competencies.

Grade for educational practice is determined taking into account:

meeting deadlines and submitting reports for each day of practice,

compliance with labor protection issues, safety regulations and fire safety,

provided that the tasks of each day are completed in full,

demonstration of acquired skills,

explanations of algorithms of actions when performing the acquired skills.

demonstrating the ability to search and select the necessary information in the global network on specialized resources and the ability to apply it when demonstrating practical skills;

Demonstrating the ability to work in a team and individually.

5. CONTROL AND EVALUATION OF THE RESULTS OF MASTERING THE PROGRAM OF TRAINING PRACTICE

Control and evaluation of the results of mastering the educational practice is carried out by the head of the practice in the process of conducting training sessions, independently completing tasks by students, and performing practical test work. As a result of mastering the educational practice within the framework of professional modules, the student passes an intermediate certification in the formoffset/differential offset.

Expert assessment of actions on tasks of each day

Expert evaluation of the completed written report for each day

Expert assessment of report protection for each day

Acquired practical experience:

operation of computer network workstations.

Acquired Skills:

    choose the software configuration of a personal computer, server and peripheral equipment that is optimal for solving user problems;

    ensure compatibility of components of personal computers and servers, peripheral devices and equipment;

    configure the parameters of the software operation;

    diagnose software performance;

    Troubleshoot and troubleshoot software;

    choose the software configuration of a personal computer, server, optimal for the requirements and tasks solved by the user;

    install and administer operating systems on personal computers and servers, as well as configure the user interface;

    evaluate the performance of the computing system;

    optimize the operation of a personal computer (workstations);

    manage data files on local, removable storage devices, as well as on disks of a local computer network and on the Internet;

    to navigate the web resources of the Internet using a web browser program;

    search, sort and analyze information using search websites;

    support for network users;

    set up local networkWindows 7;

    configure access to the Internet from the local network;

    connect and configure a network printer in the OSWindows;

    analyze network traffic network monitor

(Graduate work)

  • Report on technological practice (Thesis)
  • Report on industrial practice - Intercultural communication (tourism) (Thesis)
  • Report on practice (at the factory) (Thesis)
  • n1.doc

    1 TPI Prilepo D.V.


    Content

    Page


    Introduction……………………………………………………………..

    3

    1.

    a common part

    1.1

    Brief description of the object of practice ……………………….

    4

    1.2

    Characteristics of computer equipment………………………

    6

    1.2.1

    Microsoft Word- text editor………………………………

    9

    1.2.2

    Microsoft Excel is an editor for a set of formulas, plotting graphs.

    11

    1.2.3

    Microsoft Access is an editor for creating databases……………

    14

    1.2.4

    Microsoft power point- graphics editor(preparation of presentations)…………………………………………………………….

    2.

    Special part

    2.1

    Stocks and bods market……………………………………………….

    19

    Conclusion…………………………………………………………...

    23

    Output…………………………………………………………………

    24

    Bibliography………………………………….

    25

    Introduction

    aim practice is the consolidation of theoretical knowledge and the formation of sustainable practical skills in the collection, storage, processing, analysis and presentation of information on personal computers.

    To achieve the goal you need to do the following tasks:










    • preparation and execution of a report on the results of the work.

    1. GENERAL
    1.1 Brief description of the object of practice
    Branch of the State Educational Institution of Higher Professional Education “Kostroma State University named after V.I. ON. Nekrasov"

    The branch is a structural subdivision of the state educational institution of professional higher education "Kostroma State University. ON. Nekrasov. The branch is endowed with a power of attorney issued by the Rector of the University, in full or in part with the powers of a legal entity.

    The branch was created on the basis of order No. 259 dated May 28, 1996 of the Ministry of Education of the Russian Federation, renamed into a branch of the state educational institution of professional higher education “Kostroma State University. ON. Nekrasov" in the city of Kirovsk, Murmansk region on the basis of order No. 965 dated March 2, 2004 of the Ministry of Education of the Russian Federation. The branch carries out its activities in accordance with the Constitution of the Russian Federation, the Law of the Russian Federation "On Education", the Law of the Russian Federation "On Higher and Postgraduate Professional Education", other federal laws of the state, the Charter of the State Educational Institution of Higher Professional Education "Kostroma State University. ON. Nekrasov, _Regulations on the branch.

    The director of the branch is appointed by order of the Rector of the University. The director of the branch is Lyudmila Viktorovna Koptyaeva. If there is a power of attorney to grant the branch the powers of a legal entity, the director of the branch represents it in all bodies, institutions, enterprises:

    1 - opens branch accounts in the bank, issues an order and gives instructions that are obligatory for all employees and students;

    2 - manages the property of the branch, including, concludes contracts with the subsequent informing of the Academic Council of the branch;

    3 - carries out hiring and dismissal of branch personnel, deputy directors and accountants, determines their specific duties and responsibilities

    4 - determines the competence, degree of responsibility, volume and forms of financial incentives for employees of the branch

    5 - is personally responsible for the results of the branch.

    The main tasks of the branch are:


    1. meeting the needs of the individual in intellectual, cultural and moral development through higher education;

    2. meeting the needs of society in highly qualified personnel, combining a high general culture with professional competence;

    3. conducting scientific research and development work;

    4. raising the general educational and cultural level of the population, expanding its knowledge.
    Educational activity.

    1. The branch implements basic and additional educational programs for vocational training.

    2. The content of education is determined by the State standards, approved curricula of specialties and programs.

    Research activities


    1. The branch carries out scientific research, which is a necessary part of the training of specialists.

    2. The subject and scope of scientific research is approved by the Academic Council of the branch of the University.
    The director of the branch annually reports to the Academic Council on the activities of the branch.

    The department is managed by the head, who is elected by the Academic Council of the University for a period of up to five years and approved by the Rector of the University, who is fully responsible for the results of work within the competence.

    The department includes professors, associate professors, senior lecturers, teaching assistants, teaching and support staff.

    The department provides methodological and manages educational and production programs, term papers and diploma works (projects), self-study of students, prepares and conducts term papers, exams and tests, organizes practices.

    To date, the branch has the following 4 departments.

    The reorganization and liquidation of the branch is carried out by order of the Ministry of Education and Science of the Russian Federation in the prescribed manner.

    The liquidation of the branch is carried out by the liquidation commission on the grounds provided for by the Laws of the Russian Federation in the prescribed manner.

    1.2 Characteristics of computer equipment
    There are 3 computer classes in the branch:
    201 cab (XP):

    9 PC brand Intel Pent-4

    9 LG monitors

    The clock frequency of the computer is 2.4 megahertz

    USB model

    Installed on one computer with a CD-ROM CCD-40 X3H server

    RAM -256 MB

    9 comp brand Sisg50-651-M 650-M652-740

    9monitors

    Clock frequency 1700mH

    RAM 128 MB 7pcs

    Hard disk 30GB-40GB

    Operating system Wind-98

    Their brand is Intel Pent-3

    Clock frequency -602mH

    RAM-12MB

    Hard disk-10-20 GB

    Installation Wind-98
    Information and technical department:

    3 computers:

    1comp - Intel Celeron

    T-frequency 667mg

    RAM 128 MB

    Hard disk-120 GB

    Operating system Wind-XP

    Seaver SAMSUNC

    Monitor LG flatron liquid crystal

    EPSH dot matrix printer

    2nd monitor ACEZ

    2 computer monitor AMD-k5

    Clock rate 100mH

    RAM 32 MB

    Hard disk - 8 MB

    Operating system Wind-98 network version

    Seaver –Beno

    Server Intel Pent-4

    Clock rate 2.66mH

    RAM 256 MB

    Hard disk - 20 MB

    Operating system Winolows N1 Pzo

    There is a copier oievelop 1300

    2nd monitor LG LCD

    AMD Duzen computer

    2 sideromes

    Scanner - Mustek

    Model ACCUZA Hays

    HD laser printer

    Brief list of techniques:

    Each department of the KSU branch is equipped with a PC and peripheral devices:

    a printer

    Xerox

    Multifunction device:

    Computer classes 102-201 are united in a local network for connection with a star topology.

    In the future, it is planned to combine 3 branch buildings into one network for more efficient information exchange.

    Kom classes of the branch are intended for conducting practical classes in information disciplines.

    Computers are equipped with server and software.

    In practical classes, specialized packages, universal

    Programs such as:

    Accounting

    Turbo Pockal

    Mat Kat

    As well as a text editor, graphics, spreadsheet and DBMS

    Computer classes are equipped with reference legal systems:

    Consultant + Guarantor

    There is Internet access. Each computer is equipped with a parallel connection that protects against unauthorized access.
    1.2.1 MicrosoftWord- text editor.
    General information

    The general name of software tools designed to create, edit and format simple and complex text documents, word processors. Currently, the most widely used word processor is Microsoft Word.

    The working window of the Microsoft Word processor

    The working window of the Microsoft Word 2000 processor. Its main controls are: menu bar, toolbar, work field and status bar, which includes indicators. Starting with the Microsoft Word 95 processor, the toolbar is customizable.

    Document display modes

    Starting from the sixth Microsoft versions Word supports several document presentation modes.

    In the normal mode, only the content of the document is displayed without the requisite design elements that relate not to the text, but to the printed pages (footers, footers, footnotes, etc.). This mode is useful in the early stages of document development (typing, editing, reviewing), as well as in all cases where the content of the document is of higher importance than the external presentation. In this mode, operations with large documents are faster, which is important when working on low-performance computers.

    In Web document mode, the screen representation is not the same as the printed one. This is a deviation from the WYSIWYG principle, but it is typical for electronic publications on the World Wide Web, since it is not known in advance which viewer and on what equipment the document will be displayed. The concept of a printed page for electronic documents does not make sense, so the assigned page settings are ignored, and the formatting of the document on the screen is relative. In this mode, electronic publications are developed.

    In markup mode, the screen representation of the document fully corresponds to the printed one, up to the assigned parameters of the printed page. This mode is useful for most work related to the formatting of text intended for printing.

    In Outline View, you can only display the headings of a document. The mode is useful in cases where the development of a document begins with the creation of a content plan. If the document is larger than 5-7 printed pages, you should always start by creating a primary plan. The mode is different in that when it is enabled, the auxiliary Structure panel automatically opens on the toolbar, the controls of which allow you to edit the structure of the document.

    The choice of one of the four above modes of presentation of the document is performed using the command buttons located in the lower left corner of the application window, or the commands of the View menu.

    A special view (fifth mode) is also available through the View menu. The scheme of the document, in which the application window has two working panels. The left pane shows the structure of the document, while the right pane shows the document itself. This mode, which combines the advantages of markup mode and structure mode, is useful when navigating a large document - it is convenient to use it not when creating, but when viewing documents of a complex structure.

    Two more document presentation modes are available through the File menu, used for previewing. For electronic documents, use the File command. Preview Web pages, and for printed documents - the Preview file. In the first case, the created document is displayed as a Web page in the browser window registered by the operating system as the default (preferably Microsoft browser Internet Explorer 5.0). In the second case, the document is presented in a special window

    Techniques for working with texts in the Microsoft Word processor

    The basic methods of working with texts in the Microsoft Word word processor include the following:


    • document creation;

    • text input;

    • text editing;

    • text review;

    • text formatting;

    • saving the document;

    • document printing.

    1.2.2 Microsoftexcel– editor of a set of formulas, plotting.
    MS Excel, being the market leader in spreadsheet processing software, sets the development trends in this area. Up to version 4.0 Excel program was the de facto standard in terms of functionality and convenience of work. Now version 5.0 has appeared on the market, which contains many improvements and pleasant surprises.

    Significant achievements in new version Excel programs can be attributed to the emergence of three-dimensional documents (notebooks). Establishing links between files and tables is much easier than in previous versions. Context menus are greatly expanded, and additional software tools make it easier to solve complex application problems.

    Mention should also be made of various assistants (Assistants) that help the user set functions and give recommendations if there is an easier method for solving the current task. A convenient help subsystem is built into the Excel program, which is ready to issue the necessary help at any time.

    The innovations described so far relate mainly to the comfort of work and the rapid development of the program. One of the most important functional extensions of the program, designed for professionals, is the Visual Basic (VBA) programming environment built into Excel for solving applied problems. With VBA, Microsoft not only expanded the capabilities of the Excel 4.0 macro language, but also introduced a new level of application programming, since VBA allows you to create full-fledged application packages that go far beyond spreadsheet processing in their functions. In addition, the following important innovations in Excel 5.0 should be mentioned:

    File manager that gives detailed information about all files;

    Dialog boxes-registers;

    Separate icon for formatting;

    The appearance of the Drag & Plot mechanism, designed to quickly activate charts.

    All table data is recorded in so-called cells, which are located at the intersection of rows and columns of the table. By default, the contents of a cell are presented by Excel in a standard format that is set when the program starts. For example, for numbers and texts, a specific type and size of the font is set.

    Excel has context menus that are called by the right mouse button when a certain area of ​​the table is marked. These menus contain many table processing and formatting directives.

    The ability to use formulas and functions is one of the most important features of a spreadsheet program. This, in particular, allows statistical analysis of the numerical values ​​in the table.

    The text of a formula that is entered into a table cell must begin with an equal sign so that Excel can distinguish the formula from text. After the equal sign, a mathematical expression containing arguments, arithmetic operations and functions is written to the cell.

    Numbers and cell addresses are usually used as arguments in a formula. The following symbols can be used to denote arithmetic operations: + (addition); - (subtraction); * (multiplication); / (division).

    The formula can contain references to cells that are located on another worksheet or even in a table in another file. Once entered, the formula can be modified at any time. The built-in Formula Manager helps the user to find an error or incorrect reference in a large table.

    In addition, Excel allows you to work with complex formulas containing several operations. For clarity, you can turn on the text mode, then the Excel program will display in the cell not the result of calculating the formula, but the formula itself.

    Graphic charts enliven the dry columns of numbers in the table, so the ability to build charts was already provided in the early versions of Excel. Excel 5 includes a new Chart Builder that allows you to create "presentation-quality" charts.

    A beautiful 3D chart is not only pleasing to the eye, but also improves the quality of the document. MS Excel 5.0 introduced new type 3D charts - the so-called donut charts, which complement surface and grid 3D charts of the fourth version.

    It is fashionable to place the chart next to the table or place it on a separate worksheet.

    Chart Builder is one of the most powerful tools in the Excel program. Building a diagram with its help is carried out in several steps. The designer is given the source area of ​​the table, the type of chart, the labels and colors used. The main panel has an icon to call the Chart Builder.

    Formulas are required to perform spreadsheet calculations. Since some formulas and their combinations are very common, Excel offers more than 200 pre-programmed formulas, which are called functions.

    All functions are divided into categories to make them easier to navigate. The built-in Function Builder helps you apply functions correctly at all stages of work. It allows you to build and calculate most functions in two steps.

    The program has an alphabetically ordered full list all functions, in which you can easily find the function if its name is known; otherwise, search by category. Many of the functions differ very little, so when searching by category, it's helpful to use the short descriptions of the functions that the Function Builder offers. The function operates on some data, which are called its arguments. A function argument can occupy one cell or be placed in a whole group of cells. The function constructor provides assistance in specifying any types of arguments. Data Exchange allows an Excel user to import objects from other applications into their spreadsheets and transfer (export) their spreadsheets for embedding in other objects.

    1.2.3 MicrosoftAccess- editor for creating databases.
    Microsoft Access provides several tools for creating each of the basic database objects. These funds can be classified as;


    • manual (development of objects in the Design mode);

    • automated (development with the help of wizard programs);

    • automatic - means of accelerated development of the simplest objects.
    1. When developing training tables and queries, it is recommended to use manual tools - work in Design mode. The use of wizards speeds up the work, but does not contribute to the development of concepts and methods.

    1. Conversely, when designing training forms, reports, and access pages, it's best to use the automated tools provided by the wizards. This is due to the fact that appearance plays an important role for these objects. The design of these objects is very time-consuming, so it is better to entrust it to the program, and the student to focus on the content of the work.
    Working with tables

    Creating tables. Working with any objects starts from the Database window. Its left panel contains controls for calling all seven types of program objects. Creating tables begins with selecting the Tables control.

    The right pane lists the tables already in the database and provides controls for creating a new table. To create a table manually, use the Create Table icon in Design view.

    The lower part of the form contains a list of properties of the field highlighted in the upper part. Some of the properties are already set by default. Field properties are optional. They can be customized as desired, or you can leave them alone.

    When creating a table, it is advisable (although not required) to set a key field. This will help later, when organizing relationships between tables. To set a key field, just right-click on its name and select the Key field item in the context menu that opens.

    It was said above that if a primary key is needed to link to other tables, but none of the fields is unique, then the primary key can be created based on two (or more) fields. This operation is performed in exactly the same way, through the context menu, you just need to be able to select several fields at once

    Having finished creating the table structure, the form is closed (in this case, the system issues a request to save the table), after which the table is given a name, and from that moment it is available among other tables in the main Database window. From there it can be opened if necessary.

    The created table is opened in the Database window by double-clicking on its icon. The new table has no records - only column names characterizing the structure of the table. The table is filled with data in the usual way.

    At the bottom of the table is the Navigation Button Bar. Its controls are useful when navigating through a table that has a large number of records.

    Beginning users of Microsoft Access are inconvenienced by the fact that the data does not always fit in the table cells. Column widths can be controlled by dragging their borders. It is convenient to use automatic formatting of columns "by content". To do this, place the mouse pointer on the border between the columns (in the row of column headers), wait until the pointer changes shape, and double-click

    After filling the table with data, you do not need to save them - everything is saved automatically. However, if while working with the table, its layout has been edited (for example, the width of the columns has changed), the DBMS will ask you to confirm saving these changes.

    If it becomes necessary to change the structure of the table (composition of fields or their properties), the table must be opened in Design view. To do this, select it in the Database window and click the Design button.

    Creating inter-table links. If the database structure is thought out in advance, and the relationships between the tables are outlined, then creating relational relationships between tables is very simple. All necessary work takes place in a special Data Schema window and is performed using the mouse. The Data Schema window is opened with a button on the toolbar or with a command.

    1.2.4 Microsoftpowerpoint– graphic editor (design of presentations).
    AT Microsoft PowerPoint There are three main modes: normal mode, slide sorter mode, and slide show. Based on these basic modes, you can select a default mode.

    Create presentations

    The process of creating a presentation in Microsoft PowerPoint consists of actions such as choosing a general design, adding new slides and their content, choosing markup slides, change if necessary the design of the slides, change color scheme, application of various design templates and creating effects such as slideshow animation effects. The information below is for the tools available at the start of this process.

    Task area Creating a presentation in Microsoft PowerPoint provides the following options for creating a new presentation.


    • Create. Slides have a minimum of design elements and colors are not applied to them.

    • From an existing presentation. The presentation is created on the basis of an existing presentation with a given design. A copy of an existing presentation is created, allowing you to create a new presentation by making changes to the design and content of the original presentation.

    • From the design template. The presentation is based on an existing Microsoft PowerPoint template that contains basic design elements, fonts, and a color scheme. In addition to the standard Microsoft PowerPoint templates, you can use your own templates.

    • From the autocontent wizard. Use the Auto Content Wizard to apply a design template that includes suggested text for your slides. Then the necessary changes are made to the proposed text.

    • Web site templates. Create a presentation using a template found on the Web.

    • Templates on Microsoft.com. Create a presentation based on additional Microsoft PowerPoint templates from the Microsoft Office Template Library. These templates are organized by presentation type.

    Create a presentation using blank slides

    Create a presentation based on suggested content


    1. If in task areas icon not showing Create a presentation, select from the menu File command Create.

    2. Listed Create select item From the autocontent wizard and follow the instructions of the wizard.

    3. Replace the suggested text in your presentation with new text, and then make any changes to your presentation, such as adding or removing slides, adding art or animation effects, or inserting headers and footers.

    4. When finished on the menu File select a team Save, enter the name of the created presentation in the field File name and press the button Save.
    Create a new presentation based on an existing one
    Following the steps below will create a copy of an existing presentation, allowing you to make changes to the design and content of the copy of the presentation without changing the original.

    1. If in task areas icon not showing Create a presentation, select from the menu File command Create.

    2. In section Create from an existing presentation select a team Presentation selection.

    3. In the list of files, select the desired presentation and click the button Create.

    4. Make the desired changes to the presentation, and then in the menu File select a team Cguard as.

    5. In field File name enter a name for the new presentation.

    6. Click the button Save.
    2. GENERAL
    Stocks and bods market.
    General information:

    In a modern market economy, the securities market occupies a special and very important place.

    The history of the securities market goes back several centuries. 400 years ago, in 1592, a list of prices for securities sold on the local exchange was first published in Antwerp. This year is considered the year of the birth of stock exchanges as special organizations involved in the purchase and sale of securities.

    In the conditions of the regulated economy of the Soviet period, there were simply no securities. Only government bonds were in circulation, which can be called a security only with a big stretch due to the forced nature of the distribution of most issues of these loans and the lack of free circulation.

    Securities - are documents that have legal force, drawn up in a certain form and give their owner a unilateral standardized set of rights in relation to the persons who issued these documents, the ability to transfer these documents, subject to predetermined conditions, but without the consent of the issuers, to another person together with the full range of rights contained in them.

    The peculiarities of the formation of the Russian securities market include the issue of shares during the transformation of state enterprises into joint-stock companies in the process of privatization. In Russia, mass privatization led to the emergence of a huge number of securities in circulation, but for the world experience, such a way of expanding the stock market is not typical. Especially in countries with developed market economies, privatized enterprises are already joint-stock companies, the controlling stake of which was owned by the state before privatization.

    Another feature of the formation of the securities market in Russia was the issue by the federal authorities of a part of government securities not to raise funds, but to give a more civilized market form to government debts.

    It was for this purpose that the bonds of the Internal State Foreign Currency Loan, Treasury bonds, rural bonds were issued, here, with reservations, Privatization checks of the Russian Federation of the 1993 sample can also be included. As with the shares of privatized enterprises, these government securities laid the foundation for the modern Russian securities market.

    In general, the securities market is complex system with its own structure. Organizationally, the securities market includes several elements:


    • regulatory framework of the market;

    • market instrument - securities of all varieties;

    • methods of organizing securities trading;

    • market participants.

    Types of securities:

    1. Bearer securities are securities that do not contain the owner's name. Most often, they are issued in small denominations and are intended for investment by the general population.

    2. registered securities - the owner's rights to such security must be confirmed by entering the owner's name in the text of the security itself and in the register maintained by the issuer.

    Such securities can be sold on the secondary market, but to register the transfer of ownership, it is necessary to register ongoing transactions in the register, which makes it difficult to turn registered securities compared to bearer ones. Most of the securities circulating in Russia are registered.

    3. order securities - the rights of the owner of order securities are confirmed by transfer records in the text of the paper and the presentation of the paper itself. This category primarily includes bills and checks.
    Stock - a security issued by a joint-stock company (JSC), reflecting the investor's share in the authorized capital of the company and giving the owner the right to receive a certain income from the company's profit, that is, dividends.

    The practice of attracting financial resources to joint-stock companies has developed a large number of varieties of shares that satisfy the most diverse needs of consumers.

    The nominal price shows only what part of the value of the authorized capital in absolute terms falls on this share. Beyond this, only a minimum of information can be obtained at par value, namely, if the par value of an ordinary share is divided by the size of the authorized capital of the enterprise, reduced by the volume of preferred shares issued, then we get the minimum share of votes attributable to this share at a meeting of shareholders, and the share of profit, which will be paid on that share out of the total amount allocated to dividends on ordinary shares.

    Bonds - it is the obligation of the issuer to pay certain amounts of money to the owner of this security within a certain period of time. Due to their debt nature, bonds are more reliable investments than stocks; being an analogue of a loan, they are "senior" securities in relation to shares, that is, they give a preemptive right in the payment of income or the return of invested funds in the event of bankruptcy or liquidation of the issuer.

    The higher reliability of bonds makes them popular among investors, and it is bonds that account for more than half of the turnover of most of the largest stock markets in the world.

    According to the status of the issuer, foreign bond issuers are sometimes distinguished into a separate category, which are also divided into private companies and government bodies.

    Derivative securities – An option is an obligation in the form of a security that gives the right to buy or sell another security at a specified price up to or for a specified future price.

    A warrant is a security that gives the right to purchase other securities at their initial placement at a certain price and is sold by the issuer of these securities.

    Deposit and savings certificates - this is a certificate of banks on the deposit of funds, giving the right to receive a deposit and the agreed interest. In fact, certificates of deposit and savings are a type of bank term deposits that can be resold.

    The attractiveness of certificates of deposit for Russian investors is due to the peculiarities of tax legislation, according to which income from ordinary deposits of legal entities is subject to taxation at the income tax rate, and income from certificates of deposit is taxed as income from securities, the tax rate for which is much lower.

    Bills - this is a debt obligation drawn up in accordance with established laws, and giving its owner the unconditional right to demand a specified amount after a specified period.

    To characterize the turnover of bills, you should get acquainted with the special terminology used in this sector of the securities market:


    • promissory note - drawn up by the debtor and contains his obligations;

    • bill of exchange - drawn up by the creditor and contains an order to the debtor to pay the indicated amount;

    • remittent - the person in whose favor the draft is drawn up;

    • endorsement - an endorsement on a bill that satisfies the transfer of the right to claim on the bill;

    • allonge - a sheet attached to a bill on which endorsements are made;

    • aval - a guarantee, according to which the person who made it takes responsibility for the fulfillment of the obligations of the debtor;

    • friendly bill - a bill, behind which there is no transaction, but all participants in the bill of exchange are real.

    Other securities - among other securities that are important for the Russian stock market, we can distinguish shares of Mutual investment funds and depositary certificates. Securities include:


    • A check is a security issued on a blank form of a form established by the carpenter in the form of an order from the drawer of the check to the bank to pay the amount specified in the check to the holder of the check.

    • A mutual fund share is a security with unique properties. The uniqueness lies in the practical absence of a specific element in this security. Units are issued by management companies.
    Conclusion
    As a result of educational and technological (computer) practice, I studied and mastered the following programs:

    • Microsoft Word;

    • Microsoft Excel;

    • Microsoft Access;

    • Microsoft PowerPoint.
    In the course of this practice, I learned how to fully work in these programs. These programs will help in the future, because. in our modern world more and more the use of computer technology contributes to increased productivity.

    Personally, as a student, this will help me in writing term papers, practical work, as well as in writing graduation projects, namely, to feel more free in the above programs.

    Output
    This practice contributed to the consolidation of theoretical knowledge and the formation of sustainable practical skills in collecting, storing, processing, analyzing and presenting information on personal computers.

    During the practice, the following was done:


    • work in the environment of the Windows operating system;

    • work with service software (disk maintenance utilities, archivers, antivirus programs);

    • creation of text documents (MS Word);

    • creation of functional spreadsheets and graphical display of data processing results (MS Excel);

    • creation and maintenance of relational databases (MS Access);

    • work with the integrated MS Office application package and create combined documents based on the MS Word word processor;

    • creation of a computer presentation (MS Power Point);

    • obtaining information from the Internet;

    • preparation and execution of a report on the results of the work.
    As my proposals, I would add to the program practice, work with a printer and scanner, allow the opportunity to work (get primary skills) working with the Internet.
    Bibliography

    1. Aleksunin V.A. Marketing in industries and fields of activity.: textbook. – M.: Ed. "Dashkov and Co", 2005 - 716s.

    2. Weiskas J. Effective work with M. Access 2000. St. Petersburg - Peter, 2000 - 1040s.

    3. Gnidenko I.G., Merdina O.D., Ramin E.L. Access - 2000: Workshop. - St. Petersburg: Publishing house "Insight - Ch", 2002. - 192 p.; ill.

    4. Dodge M., Stinson K. Effective work with M. Excel 2000, St. Petersburg: Peter. 2000 - 1056 p.

    5. Zhivotnova R.N., Ramin E.L., Shlyonov V.V. Word-2000: Workshop. - St. Petersburg: Publishing House "Insight - Ch", 2001. - 176 p.; ill.

    6. COMPUTER SCIENCE: Textbook / ed. N.V. Makarova M.: Finance and statistics, 2003

    7. COMPUTER SCIENCE: Workshop / ed. N.V. Makarova M.: Finance and statistics, 2003.

    8. Mogilev A.V. etc. Informatics: Proc. allowance for students. ped. universities. - M.: Ed. Center "Academy", 2000. - 816s.

    9. Ramin E.L., Zhivotnova R.N. Power - Point 2000: Workshop. - St. Petersburg: Publishing House "Insight - Ch", 2002. - 26s.; ill.

    10. Homonenko A.D., Tsyganokv V.M., Maltsev M.G., Databases: A Textbook for Higher Educational Institutions - 3rd Edition, add. and reworked. - St. Petersburg: Korona print, 2003. - 672 p.

    Introduction
    Chapter 1. Analysis of the structure of the organization, description of the hardware and software of the organization
    1.1 Structure of the organization
    1.2 Description of the organization's hardware
    1.3 Description of the software used in the organization
    1.4 Description of the activities of the information technology department of the organization
    Chapter 2. Ensuring stable operation of computer systems and complexes
    2.1 List of instructions required for organizing the workplace of a computer system adjuster or a hardware and software system adjuster.
    2.2 Examine the system of preventive maintenance of computers in the organization
    2.3 Description of monitoring, diagnostics and recovery of computer systems and complexes
    2.4 Identification of shortcomings in the system for ensuring the stable operation of computer systems and complexes. Suggestions for improving this system
    Chapter 3. Description of the information system used in the organization
    3.1 Analysis/development of the structure of the information system
    3.2 Description of the database management system/software used for development
    3.3 Description of the main objects of the information system
    3.4 Instructions for users to work with the information system
    3.4.1 Purpose of the program
    3.4.2 Program execution conditions
    3.4.3 Program execution
    3.4.4 Operator messages
    3.5 Description of means, methods of information protection when working with an information system
    Conclusion
    List of sources used

    Introduction

    Today the whole world communicates with the help of computers. Every family has high-tech machines; not a single enterprise works without them. Only not everyone knows how to talk to a computer in its language and make it understand the language of a person. To be an expert in computer systems means to be one step ahead of time. After all, nothing in the world is developing as fast as computer technology. No wonder they say: "The computer is outdated as soon as it went on sale."

    Having learned how computer systems are arranged, you begin to understand the language of numbers, to know computer-aided design systems, microprocessor systems and peripheral equipment. In other words, you begin to speak the same language with the computer. He, as a friend, teaches to solve problems, assess risks and make decisions in non-standard situations, which is very much appreciated by employers. The range of application of the knowledge of a computer network specialist is wide: from small salons to large enterprises - wherever there are computers, a system administrator is required - a specialist in computer systems and complexes.

    In order to better prepare specialists for this profession, practical skills are required. For this purpose, practical classes are provided in educational institutions.

    Practice in the profile of the specialty is a form of training in organizations (enterprises) of different forms of ownership and organizational and legal forms.

    Practice in the profile of the specialty is carried out in order to study the general principles of the functioning of organizations and institutions for labor management and regulation of social and labor relations, employment services; principles of organizing the work of services and divisions dealing with the selection, placement and accounting of personnel, personnel departments, labor and wages, personnel management departments; as well as analysis of documentation supporting the activities of these services. It allows you to combine theoretical training with practical activities in specific workplaces. Practice tasks include:

    • monitoring, diagnostics and recovery of computer systems and complexes
    • systemo Maintenance computer systems and complexes
    • debugging of hardware-software systems and complexes;
    • installation, configuration and configuration of the operating system, drivers, resident programs;
    • maintaining customer databases;
    • demonstrating the capabilities of complex technical systems;
    • advising on the use of complex technical systems;
    • informing the consumer about the operating conditions of the selected options technical solutions, license agreements.
    • During the practice in the specialty profile, it is necessary to perform the following types of work:
    • characteristics of the enterprise. Analysis of the external and internal environment of the organization;
    • description of the technical and software park of the enterprise;
    • development of methods and regulations for preventive maintenance of computer equipment;
    • development of a system for modernizing the technical and software park of the enterprise;
    • development of information security policy rules;
    • designing the organization's database structure;
    • general description of the configuration/database, interface, input and output forms;
    • configuring and setting up the database, setting data access privileges;
    • drawing up instructions for the user when using a particular database management system;
    • developing a presentation of the organization's products.

    Chapter 1. Analysis of the structure of the organization, description of the hardware and software of the organization

    1.1. Organization structure

    Princip Company is one of the largest companies in the city of Smolensk, specializing in the production and sale of computers, solving network integration issues, as well as in the supply of office and mobile equipment, components and consumables.

    The stores offer the widest selection of modern computer equipment: personal and laptop computers, monitors, office equipment from the world's leading manufacturers (Samsung, Acer, Phillips, Toshiba, MSI, Intel, AMD, Asus, Dell, LG, Canon, Epson and many others).

    Huge selection of consumables (paper, cartridges for inkjet and laser printers, toner, ink, etc.)

    Today it is a supplier of many large state and commercial organizations in Smolensk and the Smolensk region.

    It also became the first Smolensk manufacturer of computers certified according to GOST and having an international quality certificate ISO 9001. This allows us to speed up and simplify the process of servicing our customers' equipment and offer computers of the highest quality at the best prices.

    It is the first Smolensk company to be a Microsoft Gold Certified Partner with the "Management of licenses in organizations" competence, offering customers software under various licensing programs, which allows them to choose the best option.

    1.2. Description of the organization's hardware

    Nowadays, the vast majority of organizations use modern automated systems and computer equipment, software and storage media.

    The institution has 12 computers.

    The computer hardware for the workstation includes:

    • processor type and frequency - Intel Core 2 Duo 2.4 Hz;
    • the amount of RAM - 2048 MB;
    • hard disk type and size - WDCWD1600AAJS-61 WAA0 (IDE500GB);
    • motherboard type - integrated;
    • type of video card - built-in;
    • type CD-ROM-DVD-R;
    • sound card type - built-in;
    • network card type - ETHERNET (100 MB/s);
    • BIOS type - rewritable;
    • monitor type and size - LCD 17''.

    Workstation PC system software includes:

    • OS - Windows XP Professional;
    • manufacturer - Microsoft;
    • bit depth OS-32;
    • the file system used is NTFS;
    • type of supported interface - graphical.

    Minimum requirements for computer architecture when installing this OS:

    • 2.4 Hz Intel processor or faster;
    • at least 64 MB of RAM (at least 128 MB recommended);
    • at least 1.5 GB free space on the hard drive;
    • CD or DVD drive;
    • keyboard, Microsoft Mouse.

    The organization has an S5000MB (S5332LNi) server as a server computer: Core i5-4590 / 8 GB / 2 x 1 TB SATA RAID.

    The server computer hardware includes:

    • Intel processor
    • Drive Interface SATA 6Gb/s
    • Type of HDD
    • RAM 8 GB
    • Network card 10/100/1000 Mbps

    The organization uses the following peripherals HP LASERJET P2035, HP LASERJET PRO COLOR CP1025, HP LASERJET PRO P1102, HP SCANJET 300, Samsung ML-1210

    1.3. Description of the software used in the organization

    Software is used as the operating system Microsoft Windows XP Professional.

    Personal computer software:

    • Microsoft Office 2007
    • KasperskyAnti-Virus
    • 1C: Enterprise (1C: Accounting).
    • 1C: TRADE AND WAREHOUSE 7.7
    • Windows 2000 Server SP4

    Windows XP Professional is an operating system (OS) of the Windows NT family of Microsoft Corporation. It was released on April 25, 2005 as a version of Windows XP for the personal computer platform.

    Kaspersky Antivirus (KAV) is antivirus software developed by Kaspersky Lab. Provides the user with protection against viruses, Trojans, spyware, rootkits, adware, and unknown threats with the help of proactive protection, which includes the HIPS component (only for older versions called "Kaspersky internet security 2009+, where '+' - serial number of the previous register, annually increased by one in accordance with the number of the year following the year of issue next version antivirus"). Initially, in the early 1990s, it was called -V, then - AntiViral Toolkit Pro.

    1C: Enterprise is a system of programs for automating various areas of economic activity. A specific software product included in the 1C: Enterprise program system includes those functions and capabilities that meet the purpose of this product.

    All components of the 1C: Enterprise program system can be divided into the Technological Platform and Configurations. The technological platform is a set of various mechanisms used to automate economic activity and is independent of specific legislation and accounting methodology. Configurations are actually applied solutions. Each configuration is focused on the automation of a certain area of ​​economic activity and, of course, complies with the current legislation.

    "1C: Trade and Warehouse" is designed to account for any type of trading operations. Thanks to its flexibility and customizability, the system is able to perform all accounting functions - from maintaining directories and entering primary documents to receiving various statements and analytical reports.

    "1C: Trade and Warehouse" automates work at all stages of the enterprise and allows you to:

    • keep separate management and financial records
    • keep records on behalf of several legal entities
    • keep batch accounting of inventory with the ability to choose the method of writing off the cost (FIFO, LIFO, average)
    • keep separate records of own goods and goods taken for sale
    • handle the purchase and sale of goods
    • perform automatic initial filling of documents based on previously entered data
    • keep records of mutual settlements with buyers and suppliers, detail mutual settlements under individual agreements
    • generate the necessary primary documents
    • draw up invoices, automatically build a sales book and a purchase book, keep quantitative records in the context of customs declaration numbers
    • perform product reservation and payment control
    • keep a record of cash in current accounts and at the cash desk
    • keep records of commodity loans and control their repayment
    • keep records of goods transferred for sale, their return and payment

    In "1C: Trade and Warehouse" you can:

    • set the required number of prices of different types for each product, store supplier prices, automatically control and quickly change the price level
    • work with related documents
    • perform automatic calculation of write-off prices for goods
    • quickly make changes using group processing of directories and documents
    • keep records of goods in various units of measurement,
    • and cash - in different currencies
    • receive a wide variety of reports and analytical information on the movement of goods and money
    • automatically generate accounting entries for 1C: Accounting.

    "1C: Trade and Warehouse" contains the means to ensure the safety and consistency of information:

    • the ability to prohibit users from "direct" deletion of information
    • special data deletion mode with cross-reference control
    • the ability to prohibit users from editing data for past reporting periods
    • setting a ban on editing printed forms of documents
    • “locking” the system by the user during a temporary stoppage of work.

    Server computer software

    Windows 2000 Server is a feature-rich operating system that provides the functions of a file and print server, an application server, a Web server, and a communications server. New system in comparison with the previous one provides greater reliability, speed and ease of management. More importantly, Windows 2000 Server has a large set of distributed services built on top of Active Directory, a multi-purpose, scalable, Internet-based directory that is fully integrated with the system. Active Directory makes it much easier to administer systems and find resources on a corporate network.

    Numerous Web and Internet services included with Windows 2000 Server enable organizations to take advantage of Internet technologies by building sophisticated Web applications and streaming services (audio, video, and so on) using Windows 2000 Server as the platforms for building intranet networks.

    Windows 2000 Server is a promising target and instrumentation platform for Independent Software Vendors (ISVs) and custom business application developers because it supports and evolves the most advanced distributed application services such as DCOM, transaction servers, and message queuing . In addition, in order to increase Windows performance Server 2000 Server is the base product in the Microsoft server family that supports multi-processor symmetric processing (SMP) on two processors and up to 4 GB of memory.

    1.4. Description of the activities of the information technology department of the organization

    System Administrator Responsibilities:

    1. Installs operating systems and software necessary for operation on servers and workstations.

    2. Performs software configuration on servers and workstations.

    3. Maintains the software of servers and workstations in working order.

    4. Registers LAN users and mail server, assigns IDs and passwords

    5. Provides technical and software support to users, advises users on the operation of the local network and programs, draws up instructions for working with the software and brings them to the attention of users.

    6. Sets access rights and controls the use of network resources.

    7. Provides timely copying, archiving and backup of data.

    8. Takes measures to restore the operability of the local network in case of failures or failure of network equipment.

    9. Identifies user and software errors and takes action to correct them.

    10. Monitors the network, develops proposals for the development of the network infrastructure.

    11. Provides network security (protection against unauthorized access to information, viewing or changing system files and data), interworking security.

    12. Performs anti-virus protection of the local area network, servers and workstations.

    13. Prepares proposals for upgrading and purchasing network equipment.

    14. Controls the installation of local network equipment by third-party specialists.

    15. Reports to his immediate supervisor about cases of violation of the rules for using the local computer network and the measures taken.

    Chapter 2. Ensuring stable operation of computer systems and complexes

    2.1. A list of instructions necessary for organizing the workplace of a computer systems adjuster or a hardware and software systems adjuster.

    Hardware and software adjuster - a specialist who manages the operation of a computer and configures certain types of equipment related to computer technology and information support. The field of activity of this profession is the installation, maintenance and modernization of computer equipment, including hardware and software for personal computers, servers, as well as peripheral devices, equipment and computer office equipment.

    Means of labor (the main types of equipment and technologies used)

    – hardware and software of personal computers and servers;

    - periphery equipment;

    – multimedia equipment;

    – information resources of local and global computer networks.

    Main types of work (labor activities)

    – maintenance of hardware for personal computers, servers, peripheral devices and equipment, computer office equipment;

    – installation and maintenance of software for personal computers, servers, peripheral devices and equipment;

    - modernization of hardware for personal computers, servers, peripherals and equipment;

    – modernization of software for personal computers, servers, peripherals and equipment.

    Professional competencies

    – to put computer facilities into operation;

    - to diagnose the health, troubleshoot and failures of hardware of computer equipment;

    - replace consumables used in computing and office equipment;

    – install operating systems on personal computers and servers, as well as configure the user interface;

    – to administer operating systems of personal computers and servers;

    - install and configure the operation of peripheral devices and equipment;

    – install and configure application software for personal computers and servers;

    - diagnose the health, troubleshoot and crash the operating system and application software;

    – optimize the configuration of computer equipment depending on the requirements and tasks solved by the user;

    - remove and add components of personal computers and servers, replace them with compatible ones;

    - replace, remove and add the main components of peripheral devices, equipment and computer office equipment;

    – update and delete versions of operating systems of personal computers and servers;

    – update and delete versions of application software for personal computers and servers;

    – update and remove device drivers for personal computers, servers, peripherals and equipment;

    – update the firmware of computer components, servers, peripherals and equipment

    2.2. Studying the system of preventive maintenance of computers in the organization

    Safety requirements before starting work

    • Put on and carefully tuck in special clothing (dressing gown) and technological footwear (slippers) established in accordance with current standards, avoiding hanging ends and constraint when moving.
    • Check and verify the availability and serviceability of the fixed tool, devices to ensure safe work performance, personal protective equipment, fire extinguishing equipment.
    • Check the condition of general and ordinary lighting.
    • Do not carry out any work on the repair of fixtures, equipment, etc., if this is not part of the employee's responsibilities.
    • Report all shortcomings and malfunctions found during the inspection at the workplace to the shift supervisor for taking measures to eliminate them completely.
    • Place the tool in the workplace with maximum ease of use, avoiding the presence of unnecessary items in the work area.
    • Check availability of first aid kit.

    Safety requirements during work

    • Work only in serviceable and carefully fitted overalls and special equipment. shoes and use personal protective equipment required at the workplace in accordance with current regulations.
    • When servicing and repairing machines and equipment, the use of metal ladders is allowed. Work from boxes and other foreign objects is prohibited.
    • It is necessary to install the stepladder firmly, checking its stability before lifting. Ladders with a height of 1.3 m or more must be equipped with a stop.
    • Constantly monitor the health of the equipment. When leaving the machine or manipulator, the latter must be stopped and de-energized.
    • Work in the presence and serviceability of fences, interlocks and other devices that ensure labor safety, with sufficient illumination.
    • Do not touch moving mechanisms and rotating parts of machines, as well as energized live parts of equipment.
    • Keep your work area tidy and clean.
    • Keep foreign objects and tools away from moving mechanisms.
    • When starting the machine, machine, personally make sure that there are no workers in the area of ​​the machines.
    • All repair work on electrical installations, routine inspection, repairs should be carried out with the fuses (voltage) removed. Check the absence of voltage on current-carrying parts of electrical equipment with a voltmeter or voltage indicator.
    • To protect against burns when changing lamps in the equipment, the service technician must use cotton gloves, special keys and fixtures.
    • Immediately after carrying out the necessary shutdowns on the switching equipment (automatic device, knife switch, switch) disconnected during the preparation of the workplace, posters should be posted: “Do not turn on - people work!”, And disconnected for admission to work on overhead lines and cable lines - posters: “Do not turn on - work on the line!
    • For work, use a hand tool with insulating handles (pliers, pliers, wire cutters, screwdrivers), the dielectric coating should not be damaged and fit snugly to the handle.
    • Elimination of damage and repairs on the equipment must be carried out when the voltage is completely removed from the equipment.
    • The portable power tool used (soldering iron, step-down transformer) must be tested and have an inventory number, systematically and timely checked and repaired.

    Safety requirements in emergency situations

    • Each employee who discovers violations of the requirements of this instruction and labor protection rules or notices a malfunction of the equipment that poses a danger to people is obliged to report this to the immediate supervisor.
    • In cases where a malfunction of the equipment poses a threatening danger to people or the equipment itself, the employee who discovered it is obliged to take measures to terminate the operation of the equipment, and then notify the immediate supervisor about this. Troubleshooting is carried out in compliance with safety requirements.
    • If an accident occurs during work, it is necessary to immediately provide first aid to the victim, report the incident to your immediate supervisor and take measures to preserve the situation of the accident, if this is not associated with a danger to life and health of people.
    • When defeated electric shock it is necessary to release the victim from the action of the current as soon as possible, in case of working at height, take measures to prevent him from falling. Switch off the equipment using switches, a plug-in connector, cut the supply wire with a tool with insulated handles. If it is impossible to turn off the equipment quickly enough, other measures must be taken to free the victim from the action of the current. To separate the victim from current-carrying parts or wires, use a stick, board or some other dry object that does not conduct electricity, while the caregiver must stand on a dry, non-conductive place, or wear dielectric gloves.
    • If a fire occurs in a technical room, you should immediately start extinguishing it with the available means (carbon dioxide fire extinguishers, asbestos blankets, sand) and call the fire department.

    Safety requirements at the end of work

    • It is necessary to tidy up the workplace, tools and fixtures.
    • Notify the work manager of any malfunctions noticed during work and the measures taken to eliminate them
    • Put away the overalls in a specially designated place.

    Studying the system of preventive maintenance of computers in the organization

    Types of technical maintenance of SVT

    The type of maintenance is determined by the frequency and complex of technological operations to maintain the operational properties of the SVT.

    GOST 28470-90 "System for the maintenance and repair of technical means of computer technology and informatics" defines the following types of maintenance

    • regulated;
    • periodic;
    • with periodic control;
    • with continuous monitoring.

    Scheduled maintenance should be carried out to the extent and taking into account the operating time provided for in the operational documentation for the SVT, regardless of the technical condition.

    Periodic maintenance should be carried out at intervals and to the extent specified in the operational documentation for the SVT.

    Maintenance with periodic monitoring should be carried out with the frequency of monitoring the technical condition of the computer and the necessary set of technological operations, depending on the technical condition of the computer, established in the technological documentation.

    Maintenance with continuous monitoring should be carried out in accordance with the operational documentation for the SVT or technological documentation based on the results of continuous monitoring of the technical condition of the SVT.

    Control of the technical condition of the SVT can be performed in static or dynamic modes.

    In the static mode, the control values ​​of voltages and clock frequencies remain constant throughout the entire cycle of preventive control, and in the dynamic mode, their periodic change is provided. Thus, due to the creation of heavy operating modes of the SVT, it is possible to identify elements that are critical in terms of reliability.

    Preventive control is carried out by hardware and software. Hardware control is carried out with the help of special equipment, instrumentation and stands, and software and hardware systems.

    Troubleshooting activities during preventive control can be divided into the following stages:

    • analysis of the nature of faults according to current state SVT;
    • control of environmental parameters and measures to eliminate their deviations;
    • localization of the error and determination of the location of the malfunction with the help of hardware and software of the SVT and with the help of additional equipment;
    • trouble-shooting;
    • resuming the solution of the problem.

    Currently, the following types of maintenance systems (STO) are most widely used:

    • Scheduled preventive maintenance;
    • Service according to technical condition;
    • Combined service.

    Scheduled preventive maintenance is based on the calendar principle and implements scheduled and periodic maintenance. These works are carried out in order to maintain the CVT devices in good condition, identify equipment failures, prevent failures and failures in the operation of the CVT.

    The frequency of scheduled preventive maintenance depends on the type of SVT and operating conditions (number of shifts and load).

    Advantages of the system - provides the highest availability of SVT.

    Disadvantages of the system - requires large material and physical costs.

    In general, the system includes the following types of maintenance (preventive maintenance):

    • control examinations (KO)
    • daily maintenance (ETO);
    • weekly maintenance;
    • two-week MOT;
    • ten-day maintenance;
    • monthly maintenance (TO1);
    • two-month maintenance;
    • semi-annual or seasonal (SRT);
    • annual maintenance;

    KO, ETO SVT includes inspection of devices, running a quick test of readiness (operability of devices), as well as work provided for by daily preventive maintenance (in accordance with the operating instructions) of all external devices (cleaning, lubrication, adjustment, etc.).

    During the two-week maintenance, diagnostic tests are run, as well as all types of two-week preventive maintenance provided for external devices.

    With monthly maintenance, it provides for a more complete check of the functioning of the computer with the help of the entire system of tests that are part of its software. The check is carried out at the nominal values ​​of the power sources with a preventive voltage change of + 5%.

    Preventive voltage change allows you to identify the weakest circuits in the system. Typically, circuits must maintain their performance when the voltage changes within the specified limits. However, aging and other factors cause gradual changes in the performance of the circuits, which can be detected on prophylactic regimens.

    CVT proactive voltage testing detects predictable faults, thereby reducing the number of hard-to-locate faults that lead to failures.

    During the monthly prophylaxis, all necessary work provided in the operating instructions for external devices.

    With a semi-annual (annual) maintenance (SRT), the same work is carried out as with a monthly maintenance. As well as all types of semi-annual (annual) maintenance work: disassembly, cleaning and lubrication of all mechanical components of external devices with their simultaneous adjustment or replacement of parts. In addition, the cables and power busbars are inspected.

    A detailed description of preventive maintenance is given in the operating instructions for individual devices attached to the SVT by the manufacturer.

    When maintaining on a technical condition, the performance of maintenance work is unscheduled and is performed as necessary based on the state of the object (test results), which corresponds to maintenance with continuous monitoring or maintenance with periodic monitoring.

    To unscheduled preventive maintenance include extraordinary preventive maintenance, prescribed mainly after the elimination of serious malfunctions of the SVT. The scope of preventive measures is determined by the nature of the malfunction and its possible consequences.

    The conclusion of the SVT for unscheduled preventive maintenance can also be carried out when the number of failures that occur over a certain set period of time exceeds the allowable values.

    The system requires the presence and correct use of various testing tools (software).

    The system allows minimizing the cost of operating the WTS, but the readiness of the WTS for use is lower than when using a planned preventive service station.

    With a combined maintenance system, “junior types of maintenance” are carried out as necessary, as with maintenance on condition, based on the operating time and operating conditions of a particular type of computer equipment or the results of its testing. The implementation of "senior types of maintenance" and repairs is planned.

    The rational organization of service stations should provide for the accumulation of static material based on the results of CVT operation in order to summarize, analyze and develop recommendations for improving the service structure, increasing the efficiency of using CVT, and reducing operating costs.

    The list of necessary material and technical means for organizing and carrying out work on maintenance of the SVT

    The quality of operation of the SVT depends on the provision of spare parts, various devices consumables, providing control and measuring devices, tools, etc.. It is also of great importance to create the necessary conditions for the normal functioning computing facilities(temperature and humidity conditions, power supply mode, etc.) and for service personnel (climatic conditions, noise level, illumination, etc.).

    The operation of the CVT must be carefully planned. Planning should cover the whole range of issues related to how to draw up general program the work of the CVT, the distribution of computer time, etc., and to the entire work of the maintenance personnel.

    The rational organization of operation should provide for the accumulation of static material based on the results of the operation of the SVT in order to summarize, analyze and develop recommendations for improving the service structure, increasing the efficiency of using the SVT, and reducing operating costs.

    Diagnostic programs

    For PCs, there are several types of diagnostic programs (some of which are included with the computer) that allow the user to identify the causes of problems that occur in the computer. Diagnostic programs used in PCs can be divided into three levels:

    • BIOS diagnostic programs - POST (Power-OnSelfTest - power-on self-test procedure). Runs every time the computer is turned on.
    • Diagnostic programs for operating rooms Windows systems come with several diagnostic programs to test various computer components.
    • Diagnostic programs of firms - manufacturers of equipment.
    • Diagnostic programs for general purposes. Such programs, which provide thorough testing of any PC-compatible computers, are produced by many companies.

    Power-on Self Test (POST)

    POST is a sequence of short routines stored in the ROM BIOS on the motherboard. They are designed to check the main components of the system immediately after it is turned on, which, in fact, is the reason for the delay before loading the operating system.

    Each time you turn on your computer, it automatically checks its main components:

    • processor,
    • ROM chips,
    • auxiliary elements of the system board,
    • RAM and major peripherals.

    These tests are fast and not very thorough when a faulty component is found, a warning or error message (failure) is issued. Such failures are sometimes referred to as fatal mistakes(fatalerror). The POST procedure usually provides three ways to indicate a malfunction:

    • sound signals,
    • messages displayed on the screen
    • hexadecimal error codes issued to the I/O port.

    When POST detects a problem, the computer emits distinctive beeps that can help identify the failed item (or group of items). If the computer is working properly, then when you turn it on, you will hear one short beep; if a malfunction is detected, a whole series of short or long sound signals and sometimes a combination of them. The nature of the sound codes depends on the BIOS version and the company that developed it.

    In most PC-compatible models, the POST procedure displays the progress of testing the computer's RAM on the screen. If an error is detected during the POST procedure, a corresponding message is displayed, usually in the form of a numerical code of several digits, for example: 1790- Disk 0 Error. Using the operation and service manual, you can determine which malfunction corresponds to given code. Error codes issued by POST to I/O ports

    A lesser known feature of this procedure is that at the beginning of each test, POST outputs test codes to a special I/O port address, which can only be read using a special adapter card installed in the expansion slot. The POST board is installed in the expansion slot. At the time of the POST procedure, its built-in indicator will rapidly change two-digit hexadecimal numbers. If the computer unexpectedly stops testing or “freezes”, this indicator will display the code of the test during which the failure occurred. This allows you to significantly narrow the search for a faulty element. On most computers, POST codes to I/O port 80h

    Operating system diagnostic programs

    DOS and Windows include several diagnostic programs. Which provide performance of testing of components of SVT. Modern diagnostic programs have graphical shells and are part of the operating system. Such programs are, for example:

    • utility to clean the disk from unnecessary files;
    • utility to check the disk for errors;
    • utility for defragmenting files and free space;
    • data archiving utility;
    • file system conversion utility.

    All of these programs are also available in Windows.

    Diagnostic programs of equipment manufacturers

    Equipment manufacturers issue special specialized programs for diagnostics of specific equipment, specific manufacturer. The following groups of programs can be distinguished:

    • Hardware Diagnostic Programs
    • SCSI Device Diagnostic Programs
    • Network adapter diagnostic programs

    Diagnostic programs for general and special purposes

    Most test programs can be run in batch mode, which allows you to run a whole series of tests without operator intervention. You can create an automated diagnostic program that is most effective if you need to identify possible defects or run the same sequence of tests on multiple computers.

    These programs check all types system memory: basic (base), extended (expanded) and additional (extended). The location of the fault can often be determined down to a single chip or module (SIMM or DIMM)

    There are many such programs. This type software can be divided into the following categories:

    • Information programs;
    • Test programs;
    • Universal programs

    Information programs

    They are used in situations where it is necessary to find out a detailed configuration and test the computer for performance as much as possible without disassembling system unit or when, at first glance, everything works fine, but the user claims that his computer is constantly buggy and starts every other time. Or after a repair, such as replacing the electrolytic capacitors on the motherboard, a thorough diagnostic is required to make sure that the computer is working properly. They test a computer or individual components, and provide detailed information about its condition, functionality, and possible software and physical problems.

    Test programs

    They work on the principle of maximum load with various operations that emulate the work of a user at a computer, and measure overall performance system or the performance of individual components based on a comparison, with an already existing database.

    Universal programs

    Programs combining two categories of programs - informational and test. They allow not only to test the PC, but also to obtain comprehensive information about its components.

    There are quite a few different versions programs, but they are all focused solely on measuring the performance of a video system.

    When you start the program, in the main window you will see only the model of the video card and the characteristics of the monitor. For more information, click on SystemInfo , there you can find out - processor model, cache size, directX version and other system information. It is possible to select all or only some tests in the program. Almost all tests are run twice, at low and high detail, which gives greater accuracy. After the test, the program displays the result in the form of points that can be compared with another computer. The main thing is that the video system test is not complete without a critical load on other computer components. And if the computer under test coped with them, then most likely the main components are in order.

    Among the packages of service utilities, without a doubt, "the first among equals" is NortonUtilities manufactured by Symantec and has already grown to the 2001 version.

    The included SystemInformation utility provides conveniently grouped information on all major computer components. It is possible to detail information on some sections, as well as generate a report. Quite clearly and colorfully, with the use of pie charts, information about the efficiency and use of the disk is framed. You can test the processor by clicking the Benchmark button. The program gives a graph of the approximate speed of your system, the unit of measurement is the performance of a PC based on Intel processor 386SX-16MHz.

    Service equipment

    To troubleshoot and repair a PC, you need special tools that allow you to identify problems and fix them simply and quickly.

    These include:

    • a set of tools for disassembly and assembly;
    • chemicals (solution for wiping contacts), a spray bottle with coolant and a can of compressed gas (air) for cleaning computer parts;
    • a set of swabs for wiping contacts;
    • specialized improvised tools (for example, tools needed to replace microcircuits (chips));
    • service equipment.

    Service equipment is a set of devices designed specifically for diagnosing, testing and repairing computer hardware. Service equipment includes the following elements:

    • Measuring instruments test connectors for testing serial and parallel ports;
    • memory testing devices that allow you to evaluate the functioning of SIMM modules, DIP chips and other memory modules;
    • equipment for testing a computer power supply;
    • diagnostic devices and programs for testing computer components (hardware and software systems).

    Measuring instruments and test sockets for testing PC ports

    The following measuring instruments are used to check and repair a PC:

    • digital multimeter;
    • logic probes;
    • single pulse generators for testing digital circuits.

    Test connectors provide software and hardware testing of PC I/O ports (parallel and serial).

    Computer power supply testing equipment provides testing of PC power supplies and determination of their main characteristics. It is a set of equivalent loads, switching elements and measuring instruments.

    2.3. Description of monitoring, diagnostics and recovery of computer systems and complexes

    Status analysis and troubleshooting "SamsungML-1210"

    The printer does not pick up paper. The problem is in the capture roller. You need to do preventive maintenance.

    Technical description "SamsungML-1210"

    Main characteristics:

    • Printing technology - laser (Electrography);
    • Print speed - 12 PPM (pages per minute);
    • Toner saving mode up to 30%;
    • Resolution - 600 × 600 dpi;
    • Powerful 66 MHz processor;
    • Repeat the printing of the last sheet by pressing one button;
    • Compatibility (Linux, Macintosh, Windows).

    Other Features:

    • Tray (cassette) - 150 sheets;
    • Output tray - 100 sheets;
    • Paper size - Letter, legal, Monarch, com 10, C5, DL, A4, A5, B5;
    • Interface - USB, IEEE 1284 (parallel);
    • Processor - 66 MHz;
    • Memory (MB) - 8 MB;
    • Working cycle (pages per month) - 12000;
    • Supported operating systems - Windows 95/98/2000/Me/NT, Linux (Redhat 6.0), Macintosh OS 8.0 and later;
    • Emulation - Smart GDI;
    • Toner cartridge - Single cartridge: 2500 pages at 5% coverage, 1000 starter.
    • Power consumption (W):
    • Standby - 5;
    • In print mode - 180;
    • Warm-up time (sec.) - 25;
    • First page output (sec.) - 13;
    • Noise level (max., dB) - 47;
    • Fonts - Windows fonts;
    • Size (W × D × H) mm - 329 × 355 × 231;
    • Printer weight - 6.2 kg.

    Troubleshooting and failures "SamsungML-1210"

    The front cover opens, 2 screws are unscrewed.

    Unscrew 4 screws on the back.

    The back wall, the top cover is removed, the paper guides are taken out and the side walls are removed.

    Unscrew 3 screws that hold the laser. Disconnect 2 connectors located on the sides. The glass is wiped with a cotton swab or a clean piece of cloth.

    The gripper roller, which is held by 2 self-tapping screws, is actually unscrewed and cleaned with a special liquid. At the same time, the brake pad is cleaned. It is located in the machine under the pickup roller.

    Then the printer itself is cleaned. This operation can be performed with a vacuum cleaner or a compressor.

    Assembly is carried out in the reverse order.

    2.4. Identification of the shortcomings of the system for ensuring the stable operation of computer systems and complexes. Suggestions for improving this system

    The disadvantage of this organization is the lack of a maintenance schedule for PCs and peripheral equipment. In this regard, this schedule was proposed and developed.

    Chapter 3. Description of the information system used in the organization

    3.1 Analysis of the subject area for the information system

    Students organized in groups study in one of the specialties. Teachers are involved in the learning process. Educational process regulated curriculum, indicating the number of hours for each discipline and the form of control (test, exam). A teacher can lead classes in one or more disciplines.

    3.2 Analysis/development of the structure of the information system

    This figure shows a block diagram of the program execution, which means that information from directories is taken into the document.

    A use case diagram (use case diagram) in UML is a diagram that reflects the relationship between actors and use cases and is an integral part of the use case model that allows you to describe the system at a conceptual level.

    Precedent - the possibility of a simulated system (part of its functionality), thanks to which the user can get a specific, measurable and desired result. A use case corresponds to a particular service of the system, defines one of the options for its use, and describes a typical way of user interaction with the system. Use cases are typically used to specify external requirements for a system. .

    3.3 Description of the database management system/software used for development

    The 1C: Enterprise 8 software system includes a platform and application solutions developed on its basis for automating the activities of organizations and individuals. The platform itself is not a software product for use by end users, who usually work with one of the many application solutions (configurations) developed on this platform. This approach allows you to automate different kinds activities using a single technological platform.

    3.4. Instructions for users to work with the information system

    3.4.1 Purpose of the program

    The program allows:

    • based on the entered data allows you to view the information of interest.
    • to carry out automated selection of the necessary information.
    • generate and print documents for registration and reporting forms.

    program benefits « information system of the auto enterprise ":

    • convenience and ease of use;
    • small amount of occupied memory on hdd;
    • operational service.

    Functional purpose

    • the ability to independently manage the accounting methodology as part of setting up accounting policies and setting accounting parameters;
    • arbitrary structure of the account code makes it possible to use long codes of accounts (sub-accounts) and maintain multi-level charts of accounts with a large nesting level;
    • the ability to work with several charts of accounts allows you to keep records in several accounting systems;
    • contains built-in mechanisms for conducting quantitative and currency accounting;
    • on any account, you can maintain multidimensional and multilevel analytical accounting;
    • the user can independently create new types of subconto, add accounts and subaccounts;
    • business transactions are reflected in accounting mainly by entering configuration documents that are identical to primary accounting documents, it is possible to enter individual entries manually;
    • when reflecting business transactions in configuration documents, you can explicitly indicate accounting and tax accounts;
    • the applied accounting methodology ensures the simultaneous registration of each record of a business transaction, both according to accounting accounts and according to the necessary sections of analytical accounting, quantitative and currency accounting;

    Operational purpose

    The program should be operated by enterprises focused on the automotive industry, namely passenger and freight transport.

    Users of the program must be employees of the automotive industry.

    Composition of functions

    The program provides the ability to perform the following functions:

    • functions for creating a new (empty) file;
    • functions for opening (loading) an existing file;
    • inventory accounting;
    • inventory control;
    • accounting of trade operations;
    • accounting of commission trade;
    • accounting of agency contracts;
    • accounting of operations with containers;
    • accounting of banking and cash transactions;
    • accounting for settlements with counterparties;
    • accounting of fixed assets and intangible assets;
    • accounting of the main and auxiliary production;
    • accounting of semi-finished products;
    • accounting for indirect costs;
    • VAT accounting;
    • payroll accounting, personnel and personalized accounting;
    • income tax accounting;
    • simplified taxation system;
    • accounting for activities subject to a single tax on imputed income;
    • accounting of income and expenses of individual entrepreneurs - payers of personal income tax;

    3.4.2 Program execution conditions

    Climatic operating conditions under which the specified characteristics must be ensured must meet the requirements for technical equipment in terms of their operating conditions.

    Minimum composition of technical means

    The hardware should include an IBM-compatible personal computer (PC), which includes:

    • processor Pentium-1000 with a clock frequency, GHz - 10, not less;
    • motherboard with FSB, GHz - 5, not less;
    • RAM volume, GB - 2, not less;

    Minimum composition of software

    The system software used by the program must be represented by a licensed localized version of the operating system. You can use update package 8.3.5.1284.

    3.4.3 Program execution

    Program launch

    The program is launched by double-clicking the left mouse button on the label of the program "1C: Enterprise 8.3", then you need to select the "WIS Base" configuration and click the "Configurator" item. The selection window is shown in Figure 1.

    Figure 1 - Launching the infobase

    After launching the program module in the "1C: Enterprise 8.3" system, the "Working window of the 1C: Enterprise 8.3 system" will appear on the screen, it displays a menu and a toolbar in accordance with the selected user, it looks like this: the working window of the system is shown in Figure 2 .

    Figure 2 - Appearance configuration menu

    Menu operation

    This menu can be divided into:

    • menu "File";
    • menu "Edit";
    • menu "Configuration";
    • menu "Debug";
    • menu "Administration",
    • menu "Service",
    • menu "Windows",
    • Help menu

    You can choose the basic actions for editing and setting up a document, from creating and saving a new document to setting access rights to the infobase. You can also customize the interface for a specific user, use the help offered by the program to facilitate work.

    The main menu is the "Configuration" menu, because the structure of the infobase is created in it. Each configuration object has a unique set of properties. This set is described at the system level and cannot be changed during task configuration. The set of properties of a configuration object is determined mainly by its purpose in the 1C:Enterprise system.

    The main property of any configuration object is the name - the short name of the configuration object. When a new configuration object is created, it is automatically assigned a conditional name consisting of a word determined by the type of object and a number. This name can be changed while editing the properties of the configuration object, while the system keeps track of the uniqueness of the names. The configuration object name cannot be empty and cannot be longer than 255 characters.

    Some properties from the entire set of properties inherent in the configuration object are available for editing and can be changed in one way or another during the system configuration. The nature of the changes and their limits are also set at the system level. A specialist who configures the system can achieve the desired behavior of the object during system operation by purposefully changing the properties of the configuration object.

    3.4.4 Operator messages

    Since the program is not a console (with an interface command line), and with a graphical user interface, classic text messages not expected. Error messages are displayed as windows on the desktop. Shown in Figure 3.

    3.5 Description of means, methods of information protection when working with an information system

    1C:Enterprise supports the ability to upload/download an infobase to a file. This mechanism is intended primarily for obtaining an infobase image, regardless of how data is stored. For example, loading/unloading an infobase to a file can be used to convert the file version to a client-server one.

    Sometimes this mode is also used to create backup information base, but this variant of its use has a number of disadvantages. The main disadvantage of this method of creating a backup is the need to use single-user mode to carry out this operation. With a large amount of information base, a break in the work of users can be quite large, which is not always acceptable.

    Depending on the variant of 1C: Enterprise (file or client-server), we can recommend the following ways to create a backup copy of the infobase:

    1) When using the 1C:Enterprise 8 file option, you can organize the process of creating an infobase backup copy by simply copying the 1CV8.1CD file to a separate directory or using data backup and recovery software. It should be taken into account that to ensure the integrity and consistency of data during the creation of a backup, the work of users with the infobase should be prohibited, however, the time required to create a backup is significantly less than when using uploading the infobase to a file.

    2) When using the client-server version of 1C: Enterprise 8, it becomes possible to create a backup copy of the infobase using the DBMS. For example, SQL Server allows data to be backed up while the database is in multi-user mode and available to all users.

    Using these methods gives the most accurate copy of the infobase state, which cannot always be obtained when using the infobase loading/unloading mode. For example, if the database is corrupted, then unloading some information may not be unloaded, while copying will preserve all the information, and after restoration, you can perform a database repair.

    The time spent by the infobase in single-user mode is also significantly reduced in the case of the file version of 1C: Enterprise 8, and in the case of the client-server version, single-user mode is not used at all.

    In addition, the positive point is that when using the above methods, you can use various specialized software tools to create backups.

    Conclusion

    During the internship in the direction 230000 Informatics and Computer Engineering in the specialty 230113 Computer systems and complexes the following tasks were performed:

    Formation and development of general and professional competencies in the field of the chosen specialty;

    Acquisition and formation of the necessary skills and experience of practical work to solve professional problems in a particular enterprise (organization) of the city and region;

    • Organization of independent professional activity, socialization in a specific type of activity.
    • Also, as a result of practical training in the direction 230000 Informatics and Computer Engineering in the specialty 230113 Computer Systems and Complexes, the following tasks were completed:
    • Consolidation, deepening and expansion of the acquired theoretical knowledge, skills and abilities;
    • Mastering professional competencies, production skills and new methods of work;
    • Mastering the norms of the profession in the motivational sphere: awareness of motives and spiritual values ​​in the chosen profession;
    • Mastering the basics of the profession in the operational sphere: familiarization and assimilation of the methodology for solving professional tasks (problems);
    • The study of different aspects of professional activity: social, legal, psychological, hygienic, technical, technological, economic.

    As a result of practical training, experience was gained in supporting workstations in working order, as well as in analyzing and structuring knowledge about information system branch.

    List of sources used

    1. Baidakov V., Dranishchev V., Krayushkin A., Kuznetsov I., Lavrov M., Monichev A. 1C:Enterprise 8.0 Embedded language description. [Text] /. In 4 volumes. - M .: Firm "1C", 2004. -2575 p.
    2. Belousov P.S., Ostroverkh A.V. Repair of workstations. [Text]/ Practical guide. - M .: LLC "1C-Publishing", 2008. -286 p.: ill.
    3. Gabets A.P. Solving operational problems. Methodological materials for the listener of the certified course. [Text] / M .: LLC "1C-Training Center No. 3", 2004. -116s.: Ill.
    4. A. P. Gabets and D. I. Goncharov, All About PC Design. [Text] / M .: 1C-Publishing LLC, 2008. -286 p.: ill.
    5. Gabets A.P., Goncharov D.I., Kozyrev D.V., Kukhlevsky D.S., Radchenko M.G. Professional development in the system 1C: Enterprise 8. - M .: LLC "1C-Publishing"; [Text] / St. Petersburg: Peter, 2007. - 808 p.: ill.
    6. Smooth A. A. 1C: Enterprise 8.0. - St. Petersburg: [Text] / Triton, 2005. - 256 p.: ill.
    7. Mitichkin S.A. Development in the system 1C Enterprise 8.0. [Text] / M .: 1C-Publishing LLC, 2003. - 413p. ill.
    8. Pankratov, F.G. 1C: Enterprise [ Electronic resource]: textbook / F.G. Pankratov. - M.: Businesssoft, 2005. - 1 electron. opt. disc (CD-ROM).
    9. Radchenko M.G. 1C:Enterprise 8.0. Practical developer guide. Examples and typical techniques. [Text] / M.:, 1C-Publishing LLC, 2004. -656 p.: ill.
    10. Radchenko M.G. Repair of computers and peripherals. [Text] / M.:, 1C-Publishing LLC, St. Petersburg: Peter, 2007. -512 p.: ill.
    11. Russian State Library [Electronic resource] / Center inform. RSL technologies; ed. Vlasenko T.V.; Web-master Kozlova N.V. - Electron, yes. – M. : Ros. state library, 1997 . – Access mode: http://www.rsl.ru, free