Л. Глинчук, C. Яцюк, О. Кузьмич, Н. Багнюк, Н. Чернящук
{"title":"Аналіз вимог та методологія підбору тем для вивчення основ криптографічного захисту інформації.","authors":"Л. Глинчук, C. Яцюк, О. Кузьмич, Н. Багнюк, Н. Чернящук","doi":"10.36910/6775-2524-0560-2020-41-03","DOIUrl":null,"url":null,"abstract":"The requirements and features of teaching the course \"Cryptographic protection of information\" are considered and analyzed. The methodological analysis of expediency and urgency of taking into account the specified features and requirements at teaching of the corresponding training course is carried out, recommendations on how to be correctly guided in a choice of subjects and what to be guided are given. The main list of topics has been compiled and substantiated, according to which it is possible to vary the teaching methods depending on the number of hours given for the study of this course and the availability of additional subjects in this educational and professional program.","PeriodicalId":38688,"journal":{"name":"Journal of Computing and Information Technology","volume":"57 1","pages":"16-22"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computing and Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.36910/6775-2524-0560-2020-41-03","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 1
Abstract
The requirements and features of teaching the course "Cryptographic protection of information" are considered and analyzed. The methodological analysis of expediency and urgency of taking into account the specified features and requirements at teaching of the corresponding training course is carried out, recommendations on how to be correctly guided in a choice of subjects and what to be guided are given. The main list of topics has been compiled and substantiated, according to which it is possible to vary the teaching methods depending on the number of hours given for the study of this course and the availability of additional subjects in this educational and professional program.
期刊介绍:
CIT. Journal of Computing and Information Technology is an international peer-reviewed journal covering the area of computing and information technology, i.e. computer science, computer engineering, software engineering, information systems, and information technology. CIT endeavors to publish stimulating accounts of original scientific work, primarily including research papers on both theoretical and practical issues, as well as case studies describing the application and critical evaluation of theory. Surveys and state-of-the-art reports will be considered only exceptionally; proposals for such submissions should be sent to the Editorial Board for scrutiny. Specific areas of interest comprise, but are not restricted to, the following topics: theory of computing, design and analysis of algorithms, numerical and symbolic computing, scientific computing, artificial intelligence, image processing, pattern recognition, computer vision, embedded and real-time systems, operating systems, computer networking, Web technologies, distributed systems, human-computer interaction, technology enhanced learning, multimedia, database systems, data mining, machine learning, knowledge engineering, soft computing systems and network security, computational statistics, computational linguistics, and natural language processing. Special attention is paid to educational, social, legal and managerial aspects of computing and information technology. In this respect CIT fosters the exchange of ideas, experience and knowledge between regions with different technological and cultural background, and in particular developed and developing ones.