Q4 Computer Science
Л. Глинчук, C. Яцюк, О. Кузьмич, Н. Багнюк, Н. Чернящук
{"title":"Аналіз вимог та методологія підбору тем для вивчення основ криптографічного захисту інформації.","authors":"Л. Глинчук, C. Яцюк, О. Кузьмич, Н. Багнюк, Н. Чернящук","doi":"10.36910/6775-2524-0560-2020-41-03","DOIUrl":null,"url":null,"abstract":"The requirements and features of teaching the course \"Cryptographic protection of information\" are considered and analyzed. The methodological analysis of expediency and urgency of taking into account the specified features and requirements at teaching of the corresponding training course is carried out, recommendations on how to be correctly guided in a choice of subjects and what to be guided are given. The main list of topics has been compiled and substantiated, according to which it is possible to vary the teaching methods depending on the number of hours given for the study of this course and the availability of additional subjects in this educational and professional program.","PeriodicalId":38688,"journal":{"name":"Journal of Computing and Information Technology","volume":"57 1","pages":"16-22"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computing and Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.36910/6775-2524-0560-2020-41-03","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 1

摘要

对《信息密码保护》课程的教学要求和特点进行了思考和分析。对相应培训课程教学中考虑具体特点和要求的权宜之计和紧迫性进行了方法学分析,并就如何正确引导课程选择和指导内容提出了建议。主题的主要列表已经编制和证实,根据该列表,可以根据本课程的学习时数和本教育和专业计划中额外科目的可用性来改变教学方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Аналіз вимог та методологія підбору тем для вивчення основ криптографічного захисту інформації.
The requirements and features of teaching the course "Cryptographic protection of information" are considered and analyzed. The methodological analysis of expediency and urgency of taking into account the specified features and requirements at teaching of the corresponding training course is carried out, recommendations on how to be correctly guided in a choice of subjects and what to be guided are given. The main list of topics has been compiled and substantiated, according to which it is possible to vary the teaching methods depending on the number of hours given for the study of this course and the availability of additional subjects in this educational and professional program.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Computing and Information Technology
Journal of Computing and Information Technology Computer Science-Computer Science (all)
CiteScore
0.60
自引率
0.00%
发文量
16
审稿时长
26 weeks
期刊介绍: CIT. Journal of Computing and Information Technology is an international peer-reviewed journal covering the area of computing and information technology, i.e. computer science, computer engineering, software engineering, information systems, and information technology. CIT endeavors to publish stimulating accounts of original scientific work, primarily including research papers on both theoretical and practical issues, as well as case studies describing the application and critical evaluation of theory. Surveys and state-of-the-art reports will be considered only exceptionally; proposals for such submissions should be sent to the Editorial Board for scrutiny. Specific areas of interest comprise, but are not restricted to, the following topics: theory of computing, design and analysis of algorithms, numerical and symbolic computing, scientific computing, artificial intelligence, image processing, pattern recognition, computer vision, embedded and real-time systems, operating systems, computer networking, Web technologies, distributed systems, human-computer interaction, technology enhanced learning, multimedia, database systems, data mining, machine learning, knowledge engineering, soft computing systems and network security, computational statistics, computational linguistics, and natural language processing. Special attention is paid to educational, social, legal and managerial aspects of computing and information technology. In this respect CIT fosters the exchange of ideas, experience and knowledge between regions with different technological and cultural background, and in particular developed and developing ones.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信