+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Authors

Ratanova Olga V.

Degree
Senior Lecturer, Department of Digital Economy, Synergy University
E-mail
rov75@yandex.ru
Location
Moscow, Russia
Articles

Methods for creating automated tools of teaching of programming

The article discusses the issues of automated teaching of programming. Programming is one of the fastest growing and promising industries in the modern world. Based on information from recruitment agencies, there is now a shortage of highly specialized programmers, and it will only increase. Currently, employers have increased requirements for the qualification of programmers. Therefore, teaching programming in courses or advanced training of programmers is especially relevant. Automation makes learning more affordable. The role of automated learning on-line is increasing at this time. The article analyzes the principles of construction and typical elements of existing training courses. And it also analyzes methods of increasing the efficiency automated learning that can be done online. Creating circumstances under which the student received the necessary practical skills is an actual issue with such training. These are the skills of writing and debugging correct code in a programming language in the absence or with minimal presence of a teacher. Checking the code by the teacher, searching for errors and identifying inefficient code is an important point in full-time programming training. At this point, the student receives quick feedback from the teacher. Training tasks should be created so that code validation can be performed automatically. The article suggests changes and additions that will increase the effectiveness of existing automated courses of teaching of programming. The analysis of existing software code verification systems was performed. And the verification methods that are applicable in training were identified. Automatic verification of program code can take learning to a new higher level. Read more...

Categorization of interconnected objects of critical information infrastructure

The problem of building an information infrastructure resistant to computer attacks is relevant for organizing the work of any enterprise. Therefore, the ability to assess the existing or developing information infrastructure is very important. In this regard, the article deals with the problem of categorizing objects of critical information infrastructure in the context of the need to assess their relationship. The current legislative acts, which are the information base for determining the objects of critical information infrastructure and determining their purpose, structure and composition, are considered, as well as the criteria for the significance of objects are determined. The article also defines the links between critical information infrastructure objects, their resistance to computer attacks, as well as possible damage due to disruption of their functioning or the performance of a critical process. The article provides a description of the criteria that are subject to assessment and a methodology for assessing the stability of critical information infrastructure objects to computer attacks and assessing possible damage due to disruption of the functioning or performance of critical processes by objects of critical information infrastructure. An augmented solution is proposed for assessing the stability of the functioning of critical information infrastructure objects with various options for their connection. The possibility of assessing the cumulative damage due to disruption of the functioning of interconnected objects of critical information infrastructure is considered. Read more...