Lo Que Se De Computación

Total Page:16

File Type:pdf, Size:1020Kb

Lo Que Se De Computación ISBN: 978-968-9304-57-9 lo que se de computación COORDINADORES Luis Manuel Martínez Hernández Paula Elvira Ceceñas Torrero María Elizabeth Leyva Arellano COORDINADORES Luis Manuel Martínez Hernández Paula Elvira Ceceñas Torrero María Elizabeth Leyva Arellano Autores Luis Manuel Martínez Hernández Universidad Juárez del Estado de Durango (UJED) Instituto de Investigaciones Históricas - UJED Facultad de Ciencias Exactas – UJED Facultad de Psicología – UJED Universidad Pedagógica de Durango Red Durango de Investigadores Educativos, A. C. Verónica Clementina Ontiveros Hernández Universidad Pedagógica de Durango María Elizabeth Leyva Arellano Facultad de Ciencias Químicas – UJED Área Básica - UJED Alumnos de la Facultad de Ciencias Exactas – UJED Karla Karina Sánchez Torres Valeria Yaneth Flores Casas Brianda Estefania Saenz Fuente Eduardo Reza Gurrola Cyntia Mayte Salazar Rios Raymundo Galindo Alvarez Dorely Diaz Centeno Carlos Alberto Márquez Alanis Franci del Rocio Almeida Torres Maria José Hernández Silva Carlos Omar Silva Aguirre Revisión Yareli Villalba Segovia Yenifer Rivas García 2 Primera Edición: Octubre de 2015 Editado en México ISBN: 978-968-9304-57-9 Editor: Universidad Juárez del Estado de Durango Coeditores: Red Durango de Investigadores Educativos, A. C. Benemérita y Centenaria Escuela Normal del Edo. de Dgo. Universidad Pedagógica de Durango Centro de Actualización del Magisterio (Durango) Instituto Universitario Anglo Español Instituto de Investigaciones Históricas - UJED Facultad de Ciencias Exactas – UJED Facultad de Psicología - UJED Facultad de Ciencias Químicas - Durango – UJED Escuela de Lenguas - UJED Pintura de la portada (al óleo): Manuel Alejandro Martínez Leyva –”Paisaje nevado” Diseño de portada Manuel Alejandro Martínez Leyva Corrección de estilo: Mtra. Paula Elvira Ceceñas Torrero Este libro no puede ser impreso, ni reproducido total o parcialmente por ningún otro medio sin la autorización por escrito de los editores Editado en México 3 INTRODUCCIÓN En la actualidad la utilización de nuevas palabras sobre todo en el área de la Informática, la Computación y la Ciencia de la Información aparecen constantemente, al igual que algunos términos que se utilizan como parte de un vocabulario común. Palabras como ADSL, Autopista de la información, Avatar, Bluetooth, Buscadores, CAD, Cibercultura, Ciberespacio, CD, Comunidad virtual, Conectividad, Correo electrónico, CSS, Dominio, DVD Extranet, Flickr,Fotoblog, FTP, Grupo de noticias, Herramientas telemáticas como Hipertexto, Hipervínculo Homepage, HTML, Hotspots, HTTP, Internet, Intranet, iPhone, Ipod, LAN, LCD, MAN, Metabuscadores, MP3, MP4, MP5, Multimedia, Notebook, NTIC, Página Web, PALM, PDAs, Podcasting, Portales temáticos, Post, Protocolo, Proveedor, RSS, Servidor, Sitio, Sociedad de la Información, Sociedad del Conocimiento, Tag, TCP/IP, Técnica, Tecnología, Tecnología multimedial, Trackback, URL, Videoconferencia, Videolog, VoIP, VPN, Weblog, Wii, WI-FI, WI-MAX, World Wide Web, entre otras muchas que se crean y otras que desaparecen, son importantes para nuestras comunicación con las demás personas ya que ellas nos permiten entender el significado que debemos comprender. Es por ello, que en este libro hacemos una breve síntesis de conceptos tan básicos como lo que es una computadora, que es un lenguaje de programación, que es un virus, hasta la introducción a lo que son las redes sociales y las redes sociales mas comunes hasta el momento de la publicación de este libro. Esperando que la información aquí contenida pueda interiorizarse y la hagan suya como parte del conocimiento general que debemos tener en esta sociedad del conocimiento. 4 ÍNDICE LA COMPUTADORA ……………………………………………………………………. 9 EL TECLADO ……………………………………………………………………………18 EL RATÓN (MOUSE) …………………………………………………………………. 23 ICONOS Y VENTANAS ……………………………………………………………….. 24 QUÉ ES EL SOFTWARE ………………………………………………………………28 QUÉ ES UN PREPROCESADOR …………………………………………………… 29 • Funciones del preprocesador…………………………………………………. 29 • Qué es preprocesado …………………………………………………………. 30 • Función principal del preprocesado ………………………………………….. 30 SISTEMAS OPERATIVOS ……………………………………………………………. 31 • Conceptos de sistema operativo ………………………………………………32 • Evolución de los sistemas operativos …………………………………………36 • Windows ………………………………………………………………………….36 • Linux ………………………………………………………………………………40 • Sistemas operativos móviles …………………………………………………..47 • Los 6 sistemas operativos móviles mas utilizados y recomendables ………………………………………………………………. 49 SOFTWARE MATEMÁTICO …………………………………………………………. 56 • Hojas de cálculo ……………………………………………………………….. 58 PROGRAMAS DE PRESENTACIONES ……………………………………………. 63 • Microsoft Power Point …………………………………………………………. 66 PROCESADOR DE PALABRAS ………………………………………………………69 • Tipos …………………………………………………………………………….. 70 • Usos ………………………………………………………………………………71 • Ventajas y desventajas ……………………………………………………….. 73 PROCESADOR DE TEXTO ………………………………………………………….. 73 • Diferencia entre procesador de texto y procesador de palabras …………. 75 LENGUAJES DE PROGRAMACIÓN …………………………………………………87 COMPILADOR …………………………………………………………………………. 88 • Tipos de compiladores..…………………………………………………………93 LENGUAJES DE PROGRAMACIÓN ………………………………………………. 107 • Tipos de lenguaje de programación………………………………………… 108 • Intérpretes …………………………………………………………………….. 111 ALGUNOS LENGUAJES DE PROGRAMACIÓN ………………………………… 118 • RPG ……………………………………………………………………………. 119 • ADA ……………………………………………………………………………. 132 • FORTRAN …………………………………………………………………….. 135 • REXX ……………………………………………………………………………141 • JAVA …………………………………………………………………………… 146 • PROLOG ………………………………………………………………………. 151 • Lenguaje C………………………………………………………………………154 • Lenguaje C++………………………………………………………………….. 158 • RUBY …………………………………………………………………………...163 5 • ENSAMBLADOR ………………………………………………………………165 • COBOL ………………………………………………………………………… 168 • ALGOL ………………………………………………………………………….171 • CLIPS ………………………………………………………………………….. 174 • ABC ……………………………………………………………………………..176 • MODULA-2 ……………………………………………………………………. 178 • MODULA-3 ……………………………………………………………………..180 • SMALLTALK ……………………………………………………………………181 • CLIPPER ………………………………………………………………………..182 • PEARL …………………………………………………………………………..186 • PHP ……………………………………………………………………………..189 • VISUAL BASIC …………………………………………………………………192 • SQL ……………………………………………………………………………...196 • LOGO ………………………………………………………………………….. 199 • PYTHON ………………………………………………………………………. 201 • LISP …………………………………….……………………………………….203 • LENGUAJES DE PREPROGRAMACIÓN PARA TABLETS …………….. 205 • JAVA …………………………………………………………………………… 208 • LIVECODE ……………………………………………………………………..211 QUÉ SON LOS SISTEMAS OPERATIVOS PARA TABLETS ……………………220 QUÉ SON LOS VIRUS Y ANTIVIRUS …………………………………………….. 226 QUÉ ES UN VIRUS ………………………………………………………………….. 227 • Características de los virus……………………………………………………229 • Historia de los virus informáticos ……………………………………............230 LA TEORÍA Y DEFINICIÓN DE VIRUS INFORMÁTICOS ………………………..233 • Genesis de los virus informáticos ……………………………………………235 • Daños de los virus ……………………………………………………………. 236 CÓMO SE CREAN LOS VIRUS Y SU LENGUAJE ………………………………..237 VIRUS MÁS FAMOSOS DE LA HISTORIA ……………………………………….. 238 EJEMPLOS …………………………………………………………………………….242 PRIMER VIRUS DE LA HISTORIA ………………………………………………….244 EN QUÉ LENGUAJE ESTAN PROGRAMADOS …………………………………..249 VIRUS MAS FAMOSOS DE LOS ULTIMOS TIEMPOS …………………………..250 OTROS TIPOS POR DISTINTAS CARACTERÍSTICAS ………………………….253 SINTOMAS DEL VIRUS INFORMÁTICO …………………………………………..258 PROTECCIÓN CONTRA VIRUS …………………………………………………… 259 • Tipos de antivirus ………………………………………………………………260 • Cómo se crean ………………………………………………………………...262 • Para qué sirven ………………………………………………………………..263 • Métodos de protección ………………………………………………………. 267 • Los virus en la PC y en el ser humano …………………………………….. 268 VIRUS Y ANTIVIRUS …………………………………………………………………269 • Por qué los programadores crean virus ……………………………………..269 • Cómo se trasmiten …………………………………………………………….270 • ¿Cómo se si mi ordenador tiene virus? ……………………………………. 270 6 • ¿Qué daño puede causar? ………………………………………………….. 271 REDES SOCIALES ……………………………………………………………………274 • Redes sociales en internet ………………………………………………….. 275 • Historia de las redes sociales ……………………………………….………. 275 • Tipos de redes sociales …………………………………………………….…277 • Ventajas y desventajas de las redes sociales ……………………….……. 277 • Redes sociales más conocidas ………………………………………………278 • Impacto en la forma de comunicación ………………………..……………..279 • BADOO …………………………………………………………………………280 • LINKEDIN ………………………………………………………………………282 • FACEBOOK …………………………………………………………………….285 • INSTAGRAM ………………………………………………………………….. 306 • MESSENGER ………………………………………………………………….312 • FOURSQUARE ……………………………………………………………..... 317 • Hi5 ……………………………………………………………………………… 320 • SONICO ……………………………………………………………………….. 325 • TUENTI …………………………………………………………………………334 • SKIPE …………………………………………………………………………...337 • TWITTER ……………………………………………………………………… 350 • WHATSAPP ……………………………………………………………………362 SUGERENCIAS DE DIFERENTES LINK …………………………………………..372 7 QUÉ ES LA COMPUTADORA? Luis Manuel Martínez Hernández Académico Universidad Pedagógica de Durango y Universidad Juárez del Estado de Durango María Elizabeth Leyva Arellano Alumna de la Facultad de Ciencias Exactas Académico Universidad Juárez del Estado de Durango Verónica Clementina Ontiveros Hernández Académico Universidad Pedagógica de Durango 8 LA COMPUTADORA A simple vista, una computadora está compuesta por estas partes básicas: • La unidad central, consiste en una caja o carcasa que contiene una serie de elementos imprescindibles como son las unidades de disquete, unidades de cd-rom, el procesador, etc. Algunas de estas carcasas
Recommended publications
  • Hal Abelson Education: Princeton AB (Summa Cum Laude)
    Hal Abelson Education: Princeton A.B. (summa cum laude) 1969 MIT Ph.D. (Mathematics) 1973 Professional Appointments: 1994–present MIT Class of 1922 Professor MIT 1991–present Full Professor of Computer Sci. and Eng. MIT 1982–1991 Associate Professor of Electrical Eng. and Computer Sci. MIT 1979–1982 Associate Professor, Dept. of EECS and Division for Study and Res. in Education MIT 1977–1979 Assistant Professor, Dept. of EECS and DSRE MIT 1974–1979 Lecturer, Dept. of Mathematics and DSRE MIT 1974–1979 Instructor, Dept. of Mathematics and DSRE MIT Selected publications relevant to this proposal: 1. “Transparent Accountable Data Mining: New Strategies for Privacy Protection,” with T. Berners- Lee, C. Hanson, J, Hendler, L. Kagal, D. McGuinness, G.J. Sussman, K. Waterman, and D. Weitzner. MIT CSAIL Technical Report, 2006-007, January 2006. 2. “Information Accountability,” with Daniel J. Weitzner, Tim Berners-Lee, Joan Feigenbaum, James Hendler, and Gerald Jay Sussman, MIT CSAIL Technical Report, 2007-034, June 2007. Available at http://hdl.handle.net/1721.1/37600. 3. “The Creation of OpenCourseWare at MIT,” J. Science Education and Technology, May, 2007. 4. Structure and Interpretation of Computer Programs, Hal Abelson, Gerald Jay Sussman and Julie Sussman, MIT Press and McGraw-Hill, 1985, (published translations in French, Polish, Chinese, Japanese, Spanish, and German). Second Edition, 1996. 5. “The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption,” with Ross Ander- son, Steven Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Peter Neumann, Ronald Rivest, Jeffrey Schiller, and Bruce Schneier, in World Wide Web Journal, vol. 2, no.
    [Show full text]
  • Liste Von Programmiersprachen
    www.sf-ag.com Liste von Programmiersprachen A (1) A (21) AMOS BASIC (2) A# (22) AMPL (3) A+ (23) Angel Script (4) ABAP (24) ANSYS Parametric Design Language (5) Action (25) APL (6) Action Script (26) App Inventor (7) Action Oberon (27) Applied Type System (8) ACUCOBOL (28) Apple Script (9) Ada (29) Arden-Syntax (10) ADbasic (30) ARLA (11) Adenine (31) ASIC (12) Agilent VEE (32) Atlas Transformatikon Language (13) AIMMS (33) Autocoder (14) Aldor (34) Auto Hotkey (15) Alef (35) Autolt (16) Aleph (36) AutoLISP (17) ALGOL (ALGOL 60, ALGOL W, ALGOL 68) (37) Automatically Programmed Tools (APT) (18) Alice (38) Avenue (19) AML (39) awk (awk, gawk, mawk, nawk) (20) Amiga BASIC B (1) B (9) Bean Shell (2) B-0 (10) Befunge (3) BANCStar (11) Beta (Programmiersprache) (4) BASIC, siehe auch Liste der BASIC-Dialekte (12) BLISS (Programmiersprache) (5) Basic Calculator (13) Blitz Basic (6) Batch (14) Boo (7) Bash (15) Brainfuck, Branfuck2D (8) Basic Combined Programming Language (BCPL) Stichworte: Hochsprachenliste Letzte Änderung: 27.07.2016 / TS C:\Users\Goose\Downloads\Softwareentwicklung\Hochsprachenliste.doc Seite 1 von 7 www.sf-ag.com C (1) C (20) Cluster (2) C++ (21) Co-array Fortran (3) C-- (22) COBOL (4) C# (23) Cobra (5) C/AL (24) Coffee Script (6) Caml, siehe Objective CAML (25) COMAL (7) Ceylon (26) Cω (8) C for graphics (27) COMIT (9) Chef (28) Common Lisp (10) CHILL (29) Component Pascal (11) Chuck (Programmiersprache) (30) Comskee (12) CL (31) CONZEPT 16 (13) Clarion (32) CPL (14) Clean (33) CURL (15) Clipper (34) Curry (16) CLIPS (35)
    [Show full text]
  • Synthesizing Near-Optimal Malware Specifications from Suspicious
    Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors Somesh Jha∗, Matthew Fredrikson∗, Mihai Christodoresu†, Reiner Sailer‡, Xifeng Yan§ ∗University of Wisconsin–Madison, †Qualcomm Research Silicon Valley, ‡IBM T.J Watson Research Center, §University of California–Santa Barbara Abstract—Behavior-based detection techniques are a promis- and errors. ing solution to the problem of malware proliferation. However, We make the observation that behavioral specifications they require precise specifications of malicious behavior that do not result in an excessive number of false alarms, while still are best viewed as a form of discriminative specification.A remaining general enough to detect new variants before tradi- discriminative specification describes the unique properties tional signatures can be created and distributed. In this paper, of a given class, in contrast to the properties exhibited by we present an automatic technique for extracting optimally discriminative specifications a second mutually-exclusive class. This paper presents an , which uniquely identify a class automated technique that combines program analysis, graph of programs. Such a discriminative specification can be used by a behavior-based malware detector. Our technique, based mining, and stochastic optimization to synthesize malware on graph mining and stochastic optimization, scales to large behavior specifications. We represent program behaviors as classes of programs. When this work was originally published, graphs that are mined for discriminative patterns. As there the technique yielded favorable results on malware targeted are many ways in which malware can accomplish the same towards workstations (~86% detection rates on new malware). goal, we use these patterns as building blocks for construct- We believe that it can be brought to bear on emerging malware- based threats for new platforms, and discuss several promising ing discriminative specifications that are general across vari- avenues for future work in this direction.
    [Show full text]
  • Cyber Warfare a “Nuclear Option”?
    CYBER WARFARE A “NUCLEAR OPTION”? ANDREW F. KREPINEVICH CYBER WARFARE: A “NUCLEAR OPTION”? BY ANDREW KREPINEVICH 2012 © 2012 Center for Strategic and Budgetary Assessments. All rights reserved. About the Center for Strategic and Budgetary Assessments The Center for Strategic and Budgetary Assessments (CSBA) is an independent, nonpartisan policy research institute established to promote innovative thinking and debate about national security strategy and investment options. CSBA’s goal is to enable policymakers to make informed decisions on matters of strategy, secu- rity policy and resource allocation. CSBA provides timely, impartial, and insight- ful analyses to senior decision makers in the executive and legislative branches, as well as to the media and the broader national security community. CSBA encour- ages thoughtful participation in the development of national security strategy and policy, and in the allocation of scarce human and capital resources. CSBA’s analysis and outreach focus on key questions related to existing and emerging threats to US national security. Meeting these challenges will require transforming the national security establishment, and we are devoted to helping achieve this end. About the Author Dr. Andrew F. Krepinevich, Jr. is the President of the Center for Strategic and Budgetary Assessments, which he joined following a 21-year career in the U.S. Army. He has served in the Department of Defense’s Office of Net Assessment, on the personal staff of three secretaries of defense, the National Defense Panel, the Defense Science Board Task Force on Joint Experimentation, and the Defense Policy Board. He is the author of 7 Deadly Scenarios: A Military Futurist Explores War in the 21st Century and The Army and Vietnam.
    [Show full text]
  • The Botnet Chronicles a Journey to Infamy
    The Botnet Chronicles A Journey to Infamy Trend Micro, Incorporated Rik Ferguson Senior Security Advisor A Trend Micro White Paper I November 2010 The Botnet Chronicles A Journey to Infamy CONTENTS A Prelude to Evolution ....................................................................................................................4 The Botnet Saga Begins .................................................................................................................5 The Birth of Organized Crime .........................................................................................................7 The Security War Rages On ........................................................................................................... 8 Lost in the White Noise................................................................................................................. 10 Where Do We Go from Here? .......................................................................................................... 11 References ...................................................................................................................................... 12 2 WHITE PAPER I THE BOTNET CHRONICLES: A JOURNEY TO INFAMY The Botnet Chronicles A Journey to Infamy The botnet time line below shows a rundown of the botnets discussed in this white paper. Clicking each botnet’s name in blue will bring you to the page where it is described in more detail. To go back to the time line below from each page, click the ~ at the end of the section. 3 WHITE
    [Show full text]
  • Microsoft Word 1 Microsoft Word
    Microsoft Word 1 Microsoft Word Microsoft Office Word 2007 in Windows Vista Developer(s) Microsoft Stable release 12.0.6425.1000 (2007 SP2) / April 28, 2009 Operating system Microsoft Windows Type Word processor License Proprietary EULA [1] Website Microsoft Word Windows Microsoft Word 2008 in Mac OS X 10.5. Developer(s) Microsoft Stable release 12.2.1 Build 090605 (2008) / August 6, 2009 Operating system Mac OS X Type Word processor License Proprietary EULA [2] Website Microsoft Word Mac Microsoft Word is Microsoft's word processing software. It was first released in 1983 under the name Multi-Tool Word for Xenix systems.[3] [4] [5] Versions were later written for several other platforms including IBM PCs running DOS (1983), the Apple Macintosh (1984), SCO UNIX, OS/2 and Microsoft Windows (1989). It is a component of the Microsoft Office system; however, it is also sold as a standalone product and included in Microsoft Microsoft Word 2 Works Suite. Beginning with the 2003 version, the branding was revised to emphasize Word's identity as a component within the Office suite; Microsoft began calling it Microsoft Office Word instead of merely Microsoft Word. The latest releases are Word 2007 for Windows and Word 2008 for Mac OS X, while Word 2007 can also be run emulated on Linux[6] . There are commercially available add-ins that expand the functionality of Microsoft Word. History Word 1981 to 1989 Concepts and ideas of Word were brought from Bravo, the original GUI writing word processor developed at Xerox PARC.[7] [8] On February 1, 1983, development on what was originally named Multi-Tool Word began.
    [Show full text]
  • Creating Java Applications Using Netrexx
    SG24-2216-00 Creating Java Applications Using NetRexx September 1997 IBML International Technical Support Organization SG24-2216-00 Creating Java Applications Using NetRexx September 1997 Take Note! Before using this information and the product it supports, be sure to read the general information in Appendix B, “Special Notices” on page 273. First Edition (September 1997) This edition applies to Version 1.0 and Version 1.1 of NetRexx with Java Development Kit 1.1.1 for use with the OS/2 Warp, Windows 95, and Windows NT operating systems. Because NetRexx runs on any platform where Java is implemented, it applies to other platforms and operating systems as well. SAMPLE CODE ON THE INTERNET The sample code for this redbook is available as nrxredbk.zip on the ITSO home page on the Internet: ftp://www.redbooks.ibm.com/redbooks/SG242216 Download the sample code and read “Installing the Sample Programs” on page 4. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. QXXE Building 80-E2 650 Harry Road San Jose, California 95120-6099 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. Copyright International Business Machines Corporation 1997. All rights reserved. Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Contents Figures . xi Tables . xv Preface . xvii How This Document is Organized ................................ xviii The Team That Wrote This Redbook ...............................
    [Show full text]
  • Fostering Learning in the Networked World: the Cyberlearning Opportunity and Challenge
    Inquiries or comments on this report may be directed to the National Science Foundation by email to: [email protected] “Any opinions, findings, conclusions and recommendations expressed in this report are those of the Task Force and do not necessarily reflect or represent the views of the National Science Foundation.” Fostering Learning in the Networked World: The Cyberlearning Opportunity and Challenge A 21st Century Agenda for the National Science Foundation1 Report of the NSF Task Force on Cyberlearning June 24, 2008 Christine L. Borgman (Chair), Hal Abelson, Lee Dirks, Roberta Johnson, Kenneth R. Koedinger, Marcia C. Linn, Clifford A. Lynch, Diana G. Oblinger, Roy D. Pea, Katie Salen, Marshall S. Smith, Alex Szalay 1 We would like to acknowledge and give special thanks for the continued support and advice from National Science Foundation staff Daniel Atkins, Cora Marrett, Diana Rhoten, Barbara Olds, and Jim Colby. Andrew Lau of the University of California at Los Angeles provided exceptional help and great spirit in making the distributed work of our Task Force possible. Katherine Lawrence encapsulated the Task Force’s work in a carefully crafted Executive Summary. Fostering Learning in the Networked World: The Cyberlearning Opportunity and Challenge A 21st Century Agenda for the National Science Foundation Science Foundation the National for A 21st Century Agenda Report of the NSF Task Force on Cyberlearning Table of Contents Executive Summary...............................................................................................................................................................................................................................5
    [Show full text]
  • A Critique of Abelson and Sussman Why Calculating Is Better Than
    A critique of Abelson and Sussman - or - Why calculating is better than scheming Philip Wadler Programming Research Group 11 Keble Road Oxford, OX1 3QD Abelson and Sussman is taught [Abelson and Sussman 1985a, b]. Instead of emphasizing a particular programming language, they emphasize standard engineering techniques as they apply to programming. Still, their textbook is intimately tied to the Scheme dialect of Lisp. I believe that the same approach used in their text, if applied to a language such as KRC or Miranda, would result in an even better introduction to programming as an engineering discipline. My belief has strengthened as my experience in teaching with Scheme and with KRC has increased. - This paper contrasts teaching in Scheme to teaching in KRC and Miranda, particularly with reference to Abelson and Sussman's text. Scheme is a "~dly-scoped dialect of Lisp [Steele and Sussman 19781; languages in a similar style are T [Rees and Adams 19821 and Common Lisp [Steele 19821. KRC is a functional language in an equational style [Turner 19811; its successor is Miranda [Turner 1985k languages in a similar style are SASL [Turner 1976, Richards 19841 LML [Augustsson 19841, and Orwell [Wadler 1984bl. (Only readers who know that KRC stands for "Kent Recursive Calculator" will have understood the title of this There are four language features absent in Scheme and present in KRC/Miranda that are important: 1. Pattern-matching. 2. A syntax close to traditional mathematical notation. 3. A static type discipline and user-defined types. 4. Lazy evaluation. KRC and SASL do not have a type discipline, so point 3 applies only to Miranda, Philip Wadhr Why Calculating is Better than Scheming 2 b LML,and Orwell.
    [Show full text]
  • The Computer As a Teaching Tool: Promising Practices. Conference Report (Cambridge, Massachusetts, July 12-13, 1984)
    DOCUMENT RESUME ED 295 g'6 IR 013 322 AUTHOR McDonald, Joseph P.; And Others TITLE The Computer as a Teaching Tool: Promising Practices. Conference Report (Cambridge, Massachusetts, July 12-13, 1984). CR85-10. INSTITUTION Educational Technology Center, Cambridge, MA. SPONS AGENCY Education Collaborative for Greater Boston, Inc., Cambridge, Mass. PUB DATE Apr 85 NOTE 25p.; For a report of a related conference, see IR 013 326. PUB TYPE Collected Works - Conference Proceedings (021) -- Reports - Descriptive (141) EDRS PRICE MF01/PC01 Plus Postage. DESCRIPTORS *Computer Assisted Instruction; *Computer Literacy; Computer Simulation; Curriculum Development; Elementrry Secondary Education; *Language Arts; *Mathematics Instruction; Microcomputers; Professional Development; Research Needs; *Science Instruction; Teacher Education; Teacher Role IDENTIFIERS Reality ABSTRACT This report of a 1984 conference on the computer as a teaching tool provides summaries of presentations on the role of the computer in the teaching of science, mathematics, computer literacy, and language arts. Analyses of themes emerging from the conference are then presented under four headings: (1) The Computer and the Curriculum (the computer keeps learning connected to experience; the computer provides access to the underlying disciplines of subjects; the computer challenges the curricular status quo; and the computer aids implementation of the curriculum); (2) The Computer and Reality (computer-based models and simulations only imperfectly represent reality; a program may mask operations that students should experience to give depth and stability to their learning; and computers sometimes need to be used in conjunction with other, more concrete, experiences); (3) Perspectives on Teaching Practice (teaching is rooted in a teacher's own interests, need to understand, and social commitment; and teaching is, to a significant extent, a product of circumstance, not an entirely rational enterprise); and (4) Teachers' Professional Development (strategies and goals are needed for teacher training).
    [Show full text]
  • Iptrust Botnet / Malware Dictionary This List Shows the Most Common Botnet and Malware Variants Tracked by Iptrust
    ipTrust Botnet / Malware Dictionary This list shows the most common botnet and malware variants tracked by ipTrust. This is not intended to be an exhaustive list, since new threat intelligence is always being added into our global Reputation Engine. NAME DESCRIPTION Conficker A/B Conficker A/B is a downloader worm that is used to propagate additional malware. The original malware it was after was rogue AV - but the army's current focus is undefined. At this point it has no other purpose but to spread. Propagation methods include a Microsoft server service vulnerability (MS08-067) - weakly protected network shares - and removable devices like USB keys. Once on a machine, it will attach itself to current processes such as explorer.exe and search for other vulnerable machines across the network. Using a list of passwords and actively searching for legitimate usernames - the ... Mariposa Mariposa was first observed in May 2009 as an emerging botnet. Since then it has infected an ever- growing number of systems; currently, in the millions. Mariposa works by installing itself in a hidden location on the compromised system and injecting code into the critical process ͞ĞdžƉůŽƌĞƌ͘ĞdžĞ͘͟/ƚŝƐknown to affect all modern Windows versions, editing the registry to allow it to automatically start upon login. Additionally, there is a guard that prevents deletion while running, and it automatically restarts upon crash/restart of explorer.exe. In essence, Mariposa opens a backdoor on the compromised computer, which grants full shell access to ... Unknown A botnet is designated 'unknown' when it is first being tracked, or before it is given a publicly- known common name.
    [Show full text]
  • C:\Andrzej\PDF\ABC Nagrywania P³yt CD\1 Strona.Cdr
    IDZ DO PRZYK£ADOWY ROZDZIA£ SPIS TREFCI Wielka encyklopedia komputerów KATALOG KSI¥¯EK Autor: Alan Freedman KATALOG ONLINE T³umaczenie: Micha³ Dadan, Pawe³ Gonera, Pawe³ Koronkiewicz, Rados³aw Meryk, Piotr Pilch ZAMÓW DRUKOWANY KATALOG ISBN: 83-7361-136-3 Tytu³ orygina³u: ComputerDesktop Encyclopedia Format: B5, stron: 1118 TWÓJ KOSZYK DODAJ DO KOSZYKA Wspó³czesna informatyka to nie tylko komputery i oprogramowanie. To setki technologii, narzêdzi i urz¹dzeñ umo¿liwiaj¹cych wykorzystywanie komputerów CENNIK I INFORMACJE w ró¿nych dziedzinach ¿ycia, jak: poligrafia, projektowanie, tworzenie aplikacji, sieci komputerowe, gry, kinowe efekty specjalne i wiele innych. Rozwój technologii ZAMÓW INFORMACJE komputerowych, trwaj¹cy stosunkowo krótko, wniós³ do naszego ¿ycia wiele nowych O NOWOFCIACH mo¿liwoYci. „Wielka encyklopedia komputerów” to kompletne kompendium wiedzy na temat ZAMÓW CENNIK wspó³czesnej informatyki. Jest lektur¹ obowi¹zkow¹ dla ka¿dego, kto chce rozumieæ dynamiczny rozwój elektroniki i technologii informatycznych. Opisuje wszystkie zagadnienia zwi¹zane ze wspó³czesn¹ informatyk¹; przedstawia zarówno jej historiê, CZYTELNIA jak i trendy rozwoju. Zawiera informacje o firmach, których produkty zrewolucjonizowa³y FRAGMENTY KSI¥¯EK ONLINE wspó³czesny Ywiat, oraz opisy technologii, sprzêtu i oprogramowania. Ka¿dy, niezale¿nie od stopnia zaawansowania swojej wiedzy, znajdzie w niej wyczerpuj¹ce wyjaYnienia interesuj¹cych go terminów z ró¿nych bran¿ dzisiejszej informatyki. • Komunikacja pomiêdzy systemami informatycznymi i sieci komputerowe • Grafika komputerowa i technologie multimedialne • Internet, WWW, poczta elektroniczna, grupy dyskusyjne • Komputery osobiste — PC i Macintosh • Komputery typu mainframe i stacje robocze • Tworzenie oprogramowania i systemów komputerowych • Poligrafia i reklama • Komputerowe wspomaganie projektowania • Wirusy komputerowe Wydawnictwo Helion JeYli szukasz ]ród³a informacji o technologiach informatycznych, chcesz poznaæ ul.
    [Show full text]