Information stand for the informatics office. Computer science room - what should it look like? Viewing the contents of a safe internet document

Hello everyone.
To begin with, I would like to have my own office.
But, you have to work where they put on schedule. Sometimes it turns out that in the classroom of literature and physics you have to conduct a lesson. And all because the "stigma" of a young specialist still hangs on me! And this title suggests that I can run around the offices.
There is an informatics office, but there is more often the technology is carried out, drawing, well, or the head teacher sits.
And it is decorated as follows: the walls are whitewashed, in two corners there are antique wardrobes with age-old dust. Since they are decrepit, it makes no sense to open them and store anything in them. 14 PC. This office is also assigned to the teacher of informatics (years 58-60). She does not allow me to hang up posters, store teaching materials, or sit at her table. And yes! nothing can be printed on the printer, since she refueled it with her own money!
Here is a place for your "favorite" work.

Edited 23-11-2016 22:28

Danilina Yulia Nikolaevna

I sincerely sympathize with you. I myself am the "mistress" of the study, but I have another teacher in it every Wednesday. Everything is fine. I even try not to go to her. All the same, this is a school office, not mine. Yes, I invest a lot in it, but I understand that as I invested, I will part. In general, I do not understand teachers who behave this way. On the contrary, you need to look for support in a young specialist. They can do so much! For the general benefit)) And the fact that drawing lessons are being held in the office or just the head teacher is sitting, and computer science is running around the offices - it's generally a nightmare. Complete the lack of professionalism of the administration.

Avkhadeeva Raisa Ivanovna

I sympathize, Olga Vladislavovna! I can't imagine how you can do computer science without an office. I am 61 years old, my partner is 30 years old (this is my former student) and we get along well with her, in her office (career guidance) English is taught in the morning, and then computer science. For two days she has lessons in my office, and any teacher can take the key and hold their own event, if necessary. At MFPs, children make copies, print their reports, sometimes there are queues at recess. We have a computer with ID in every office, and printers are not everywhere, but there is also in the teacher's room. You can't do without a PC, we have been using the NetSchool electronic journal for 4 years. All cartridges are refilled at the expense of the school, and we buy paper ourselves.

I have been working in my office for 8 years now. Designing a computer science classroom at school is a topic that worries many teachers. The computer science room at the school is the center for the formation of information culture, deep mastery of new information technologies for their successful use in the educational and subsequent professional activities of students. When designing an office, I pay great attention to demonstration media.

The stands in the computer science classroom should attract the attention of students, be useful and interesting. For this purpose, in my office there are stands on the main topics of the course and informatics: "Algorithms", "Logic", "Keyboard device", etc. These stands are lightweight, removable, easy to store.

At the "Interesting About Known" stand I try to post information about various objects or things ... facts and concepts that have been known to many for a long time

In the office there is a stand "Preparing for exams", it provides up-to-date information. useful tips for successfully passing the exam and exam

The safety stand contains the basic rules of behavior in the office, the rules of landing at the computer, and in a separate folder are collected sets of exercises to relieve tension in the arms, neck, torso and eyes.

My office is rich in computer technology, I’m not ashamed to boast: 13 stationary computers for students. The teacher's workplace is equipped with two printers, a scanner, a projector


The use of wall displays in a general educational institution plays a special role in the educational process. Informatics cabinet stands should facilitate:

· Understanding the importance of studying the discipline, its history, role in the modern world and development prospects in the future.

· The general development of the student's personality, awareness and assimilation of both the principles of operation of technical means and their hardware components, and software.

· Providing visibility in the educational process, giving a real idea of ​​the laws and programming languages, the architecture of computers and other devices, the level of development of electronics in the past and at the present stage.

· Better memorization and assimilation of educational material by referring to information placed in wall displays, presented in a compact and systematic manner.


Material for the stand in the computer science room


As a material from which the stands of a computer science office can be made, it is possible to use:

· Protected paper base. In this capacity, typographic posters made of coated thick paper, information tapes made of thin or thick colored cardboard, elements laminated or coated with industrial foil are used.

· Plastic. Modern types of plastics are hypoallergenic, durable, safe due to their plasticity and strength. Plastic can be used as a base or as building blocks. Information screens made of plastic can be used as flat wall displays carrying text and figurative information, or as miniature display racks for light items.

· Wood. A wide range of modern wooden structures offered by the industry for decorating wall displays of educational institutions, includes: slatted or solid plywood or cork panels, small hanging racks, glazed boxes.

· Metal. In educational institutions, it is used rather limitedly, due to its high cost, processing difficulties, and high weight. However, metal is very functional as a supporting frame for computer science classrooms made of organic glass or plastic.


Programming stands in the informatics office


These information screens should provide a visual representation to students regarding:

· Program architectures;

· The total number of programming languages ​​that exist today, their functional differences and areas of application;

· Examples of compiling algorithms and coding options for various simple processes in the languages ​​being studied;

· A general visual representation of the process of data processing by the machine, the capacities involved, the hardware components.

Since this topic in the course of the studied discipline is one of the most difficult, information should be presented in the most complete, easy-to-understand and assimilable form.


Information on the stand in the informatics office

The main criteria for choosing information content for the stands of an informatics office are:

· The usefulness and relevance of the presented data in the educational process. So, for example, the general image of a computer and peripheral devices in modern times does not carry practically any useful information load - children see with their own eyes, use mice, monitors, and system units during lessons and at home. But the same computer, disassembled and placed on a glazed rack, can be successfully used in the educational process.

The archive contains: rules of conduct, great scientists, titles


"RULES OF BEHAVIOR"

BASIC PROVISIONS

    Persons who have undergone a medical examination and full instructions are allowed to work in an informatics office.

    You can work only on working computers.

    Know the rules of operation of the equipment used.

    You need to know how to properly turn the equipment on and off.

    Before turning on the general power supply, check the initial position of all switches and turn them off if they are on.

    Do not disassemble the equipment, both during operation and after it.

    Do not turn on computers without the teacher's permission.

    After turning on the computer, check the stability and clarity of the image on the monitor screen.

    The duration of work with computers should not exceed:

For 1st grade students - 10 minutes;

For students in grades 2-5 - 15 minutes;

For students in grades 6-7 - 20 minutes;

For students in grades 8-9 - 25 minutes;

For students in grades 10-11 - with two lessons of informatics in a row, in the first - 30 minutes, in the second - 20 minutes, after which, during recess, perform special exercises that relieve visual fatigue.

    In case of short circuit: sparks, burning smell, turn off the power supply and inform the teacher about it.

    If you feel unwell, headache, dizziness, etc., stop working and inform the teacher about it.

    Do not touch the connectors and connecting cables of the equipment.

    It is forbidden to use water and foam fire extinguishers to extinguish equipment that has ignited, since these means are current conductors and, therefore, can lead to a short circuit and shock to the person doing the extinguishing.

    In the event of a fire, it must be extinguished with the help of primary means, which include: sand, fire-fighting cloth, manual chemical fire extinguishers (air-foam, carbon dioxide, bromoethyl, powder) and fire-fighting equipment.

OFFICE OF INFORMATICS

Computer equipment should be placed on special tables that provide:

    tilt angle for the monitor;

    wide enough to accommodate all computer devices;

    a sufficient distance (at least 60 cm) from the eyes of students to the surface of the monitor.

The chairs on which students are to work should be as follows:

    height-adjustable seats (take into account the height of the students);

    adjustable backrest height.

RULES OF CONDUCT FOR STUDENTS IN THE CABINET OF INFORMATICS

    Strictly comply with safety and health regulations during work.

    Follow the teacher's commands, during emergencies, act according to the rules set out above and be sure to contact the teacher.

    Do not run, jump, or fight while in this room.

    Come to the office without outerwear.

    Work only with clean, dry hands.

    Do not place any objects on computer devices (monitor, system unit, keyboard, mouse, etc.).

    Do not eat in the office, including at workstations near computers.

    At the computer, perform only those tasks that are suggested by the teacher.

    Do not install any configuration on the computer without the teacher's permission.

    Do not use your flash drives and CDs without the teacher's permission.

    Close all computer windows and programs before finishing their work, shutting down the computer.

Compliance with all of the above recommendations for organizing the educational process using computers and technical teaching aids should help maintain an optimal level of performance and functional state of the body, throughout all school sessions and complete safety for their life and health.

COMPLEX OF EXERCISES FOR EYES

The exercises are performed while sitting in a comfortable position, the spine is straight, the eyes are open, the gaze is straight, turned away from the monitor.

Option 1

1. To direct the gaze to the left-right, right-straight, up - straight, down - straight, without delay in each position. Repeat 5 times and 5 times in the opposite direction.

2. Close your eyes for one-two, open your eyes and look at the tip of your nose for three-four.

3. Circular eye movements: up to 5 circles left and right.

Option 2

1. Blink your eyes quickly for 15 seconds.

2. Close your eyes. Without opening your eyes, supposedly look from the left at the count "four times", return to the starting position. Also look to the right at the count "five to eight" and return to the starting position. Repeat 5 times.

3. Sit quietly with your eyes closed, relaxing for 5 seconds.

COMPLEX OF EXERCISES TO RELIEVE MUSCLE TENSION

Option 1

1. Extend and spread your fingers so that you feel the tension. Hold in this position for 5 seconds, relax, and then bend your fingers. Repeat the exercise 5 times.

2. Slowly and smoothly lower the chin, stay in this position for 2-3 seconds. and relax.

3. Sitting on a chair, raise your hands as high as possible, then gently lower them down, relax. Repeat the exercise 5 times.

4. Interlace your fingers and put them behind your head, bring your shoulder blades together, stay in this position for 5 s, and then relax. Repeat the exercise 5 times.

Option 2

Starting position - sitting on a chair.

1. Take a few deep breaths and exhales, stretch on a chair, bending your arms at the back of your head, tilting your head back and straightening your shoulders. Repeat 5 times.

2. Make bends and turns of the head. Repeat 5 times.

3. Make a light self-massage of the face and hands for 3-5 seconds.

Option 3

Starting position - standing, feet together, hands down.

1. Spread straight arms to the sides, palms up, take a breath.

2. Cross your arms in front of your chest, grasp your shoulders tightly, repeat 5 times.

3. Circular motion with the elbows forward for 5 s.

4. The same back. Breathe evenly.

View document content
"ADA LOVELACE"

ADA LOVELACE

1815-1852

Blaise Pascal

1623-1662

JOHN von NEUMAN

1903-1982

VIKTOR GLUSHKOV

1923-1982

SERGEY LEBEDEV

1902-1974

NIKLAUS WIRTH

Born 1934

ALAN TURING

1912-1952

Claude Shannon

1916-2001

GORDON MOORE

Born. 1929

ANDERS HEILSBERG

Born 1960

DOUGLAS ENGELBART

1925-2013

CHARLES BABBIDGE

1791-1871

View document content
"SAFE INTERNET"

SECURE INTERNET

TIPS FOR PARENTS

USEFUL CONTENT

It contains links and short annotations to trusted sources of entertainment and educational information. All resources are reliable, safe and developed by professionals, taking into account the psychological characteristics and needs of representatives of the young audience of users of the global network.

BASIC RULES FOR PUPILS

World Safer Internet Day is a holiday celebrated on the first Tuesday in February

Cool magazine is a modern interactive magazine for boys and girls of primary and secondary school age. The content of the magazine is very diverse and represents information of an entertaining and educational nature.

Klepa is an amazing collection of unique materials, from anecdotes to information on the school curriculum. Online games, quizzes, magazines, postcards and movies will help kids to have fun and enjoyable time, and most importantly - usefully!

Children's creativity and development This project is aimed at developing the intellectual abilities and creative skills of children.

Google Books Ngram Viewer [ www . books . google . com ] is a convenient and simple tool in "Google Labs" that performs operational data analysis and builds data visualization on this basis. Available in Russian.

Google Art Project With the help of the Google Art Project, Internet users can take a virtual tour of the world's leading museums, including the Hermitage and the Tretyakov Gallery, and see over a thousand works of art in great detail.

Smeshariki Children's social network Smeshariki "Shararam" is an interactive educational space where children can communicate with each other and learn useful skills, including in terms of safety rules on the Internet.

Fixies The heroes of the fixie series are big inventors, and their website is designed in an unusual way. It looks more like a desktop of a computer or a mobile phone, where large interesting sections are hidden behind small icons: cartoons about the adventures of fixies or stories from their lives.

Tweedy - Internet portal for children and adolescents 6-16 years old. The site has over 1.5 million registered users. For them, online games, virtual worlds, forums, a comic book constructor, news, chats, a social network, an online cinema, storage services for photo, video and audio files have been developed.

Street View Project provides access to key cultural heritage sites around the world, including the Roman Colosseum and Roman Forum, Pompeii, Notre Dame Cathedral, Westminster Abbey and many more.

Kidportal . ru [ www . kidportal . ru ] The site contains fables, children's chants, riddles, interesting facts, lullabies, etc.

Children's entertainment portal Murzilka On the children's portal of the magazine "Murzilka" you will find sections "Coloring", "Crosswords", "Our games", "Contests". They publish coloring pages that can be printed, children's crosswords, games, puzzles, riddles.

Podrastayka The site allows you to plunge into the cognitive world of childhood, get acquainted with many useful tips on a variety of topics, visit the Library section and choose an interesting book.

Children's portal "Fantasy Island" On the Fantasy Island portal, young users will find fascinating fairy tales, riddles, poems, coloring books, games and many, many other materials for positive spending of their free time.

The Internet is fraught with real dangers. First of all, these are chats and social networks, in which not at all friendly persons can ask for your children as “friends”. And a third of the children sent them their photographs or information about the family. On the other hand, only half of parents are interested in what sites their children visit, or with whom they contact there. So it turns out that half of the children know firsthand about sites with content for adults, or at least once have been sexually harassed. But that's not all. There is such a danger on the Internet as phishing. This is when cybercriminals elicit personal data about parents, passwords, information about bank accounts, etc. from gullible children. And often a small netizen provides this data without thinking about the consequences.

In order, as far as possible, to protect the child from all these threats as much as possible and to make the Internet for children, parents should follow some simple rules:

-the computer is best placed in the common room so that the child is not left alone with the Internet and can ask your advice if necessary;

-in order for your child not to become computer addicted, you should limit his stay in the virtual world using a regular alarm clock;

-be sure to use software designed to protect your stay on the Internet: antivirus, parental control programs, spam filters;

-discuss with the children the questions that arise while using the computer and the Internet, be interested in their virtual acquaintances, and teach them to be critical of all information on the network, and first of all the danger of transferring personal data.

Basic rules for elementary school students

Always ask your parents about unfamiliar things on the Internet. They will tell you what is safe to do and what is not.

Before you start making friends with someone online, ask your parents how to communicate safely.

Never tell strangers about yourself. Where you live, what school you go to, only your friends and family should know the phone number.

Don't send photos to people you don't know. It is not necessary for strangers to see photos of you, your friends or your family.

Don't live with people on the Internet without your parents. On the Internet, many people tell lies about themselves.

If you are upset or offended by someone, be sure to tell your parents.

Basic rules for middle school students

When registering on sites, try not to provide personal information, because it may be available to strangers. Also, it is not recommended to post your photo, thereby giving an idea of ​​how you look to strangers.

Use your webcam only when chatting with friends. Make sure that strangers do not have the opportunity to see your conversation, because it can be recorded.

Unwanted emails from strangers are called "Spam". If you receive such a letter, do not reply to it. If you reply to such a letter, the sender will know that you are using your e-mail box and will continue to send you spam.

If you received a message from an unknown address, it is better not to open it. Such emails may contain viruses.

If you receive letters with unpleasant and offensive content, if someone behaves in an inappropriate manner in your relationship, please report it.

If someone has upset or offended you, tell an adult.

Basic rules for high school students

It is not advisable to post personal information on the Internet. Personal information is your mobile phone number, email address, home address, and photos of you, your family or friends.

If you post photos or videos on the Internet, everyone can watch them.

Do not reply to Spam (unsolicited email).

Do not open files that were sent by people you do not know. You cannot know what these files actually contain - they may contain viruses or photos / videos with "aggressive" content.

Remember that virtual acquaintances may not be who they say they are.

If there are no relatives near you, do not meet in real life with people whom you have met on the Internet. If your virtual friend is really who he claims to be, he will normally take your concern for your own safety!

View document content
"GREAT SCIENTISTS"

ACHIEVEMENTS IN ICT SPHERE

TURING AWARD

PIONEER OF COMPUTER EQUIPMENT

INTERESTING FACTS FROM THE LIFE OF GREAT SCIENTISTS

INFORMATICS DAY, HOLIDAY , CELEBRATED 4 DECEMBER

AWARD WINNERS

1984 year

JOHN ATANASOV

1987 year

NIKLAUS WIRTH

1988 year

MARCHIAN HOFF

1993 year

JACK KILBY

1996 year

ALEXEY LYAPUNOV

1996 year

ROBERT KAN

TCP / IP protocols

1996 year

SERGEY LEBEDEV

1996 year

VIKTOR GLUSHKOV

1999 year

HERBERT FREEMAN

year 2000

GEORGE LOPATO

AWARD WINNERS

1972 year

EDSGER DEYKSTRA

1973 year

DONALD WHIP

1997 year

DOUGLAS ENGELBART

Human-machine interface

1998 year

JIM GRAY

1999 year

FREDERICK BROOKS

2005 year

PETER NAUR

2008 year

BARBARA LISKOV

year 2009

CHARLES TECKER

2010 year

LESLIE VELIANT

Contribution to the theory of algorithms

2011

JUDA PEARL

Viruses, worms and trojans

INFORMATION FOR TEACHERS

DANGERS ON THE INTERNET

Hackers and crackers

Spam on the Internet

1.

2.

3.

4.

5.

Additional rules

View document content
"GREAT SCIENTISTS1"

Medal "Computer Pioneer" is the most prestigious award of the IEEE Computer Society, established in 1981. Awarded for outstanding achievements in computer science, and the main contribution must be made more than 15 years ago.

AWARD WINNERS

1984 year

JOHN ATANASOV

Creation of ABC, one of the first computers

1987 year

NIKLAUS WIRTH

Pascal programming language development

1988 year

MARCHIAN HOFF

Creation of the first single-chip microprocessor

1993 year

JACK KILBY

Invention of the integrated circuit

1996 year

ALEXEY LYAPUNOV

Founded Soviet Cybernetics

1996 year

ROBERT KAN

TCP / IP protocols

1996 year

SERGEY LEBEDEV

The first Soviet computer MESM

1996 year

VIKTOR GLUSHKOV

The first in the USSR Institute of Cybernetics in Ukraine

1999 year

HERBERT FREEMAN

Computer graphics and image processing

year 2000

GEORGE LOPATO

RV family of mobile computers

Turing Award is the most prestigious award in computer science given by the Association for Computing Machinery for outstanding scientific and technical contribution.The award is sponsored by Intel and Google and is $ 250,000.

AWARD WINNERS

1972 year

EDSGER DEYKSTRA

Development of the ALGOL programming language

1973 year

DONALD WHIP

Creation of a series of books "The Art of Programming."

1997 year

DOUGLAS ENGELBART

Human-machine interface

1998 year

JIM GRAY

Fundamental ideas in the field of databases

1999 year

FREDERICK BROOKS

Historically significant contributions to OS and software

2005 year

PETER NAUR

Creation of the programming language Algol 60

2008 year

BARBARA LISKOV

Contribution to the basics of language programming and systems design

year 2009

CHARLES TECKER

Creation of Alto, the first modern PC

2010 year

LESLIE VELIANT

Contribution to the theory of algorithms

2011

JUDA PEARL

Fundamental contributions to artificial intelligence

Viruses, worms and trojans

INFORMATION FOR TEACHERS

DANGERS ON THE INTERNET

Viruses and worms are dangerous programs that can spread via email or web pages. Viruses can damage files or software stored on your computer.

Worms spread faster than viruses — directly from one computer to another.For example, an email worm can send itself to email addresses from a user's address book. Internet worms search for computers that are connected to the Internet and do not have the latest security updates.

Trojan horses (Trojans) are dangerous programs that look safe, such as games, but can damage files after activation; the user will not be aware of this.

Hackers and crackers

Hackers and crackers are people who break into the security of data systems. They can invade an unprotected computer via the Internet and use it with evilwith intent, as well as steal or copy files and use them in illegal activities.

The best way to protect your computer from intruders is to use a firewall and keep your operating system up to date.

Spam on the Internet

Bulk unsolicited email messages are known as spam. It overloads e-mail systems and can block mailboxes. Senders sometimes use email worms as a means of sending spam.

Five rules for using email:

1. Never open suspicious messages or email attachments received from strangers. Instead, remove them immediately by choosing a command from the messages menu.

2. Never reply to spam.

3. Use a spam filter from your ISP or email program.

4. Create a new or use your family email address for Internet inquiries.

5. Never forward “happiness letters”. Instead, delete them right away.

Additional rules

1. Close questionable pop-ups

Pop-ups are small windows with content that prompts you to follow a link. When such a window is displayed, the safest way to close it is to click the X. There is no way to know for sure what will happen when you click No.

2. Beware of Fraud

It's easy to hide your identity on the Internet. Never divulge personal information on the Internet except to people you trust. When requesting the provision of personal information on a website, always review the Terms of Use or Privacy Policy to ensure that the website operator provides information about the use of the information received and transfers it to others.

View document content
"John von Neumann"

John von Neumann (1903 - 1957) - Hungarian-American mathematician. Best known as the forefather of modern computer architecture.

He could go to bed with an unsolved problem, and at three o'clock in the morning wake up with a ready answer. Then he went to the phone and called his employees. Therefore, one of Neumann's requirements for his employees was the willingness to be awakened in the middle of the night.

Neumann had an almost absolute memory. After many years he could retell the pages of the read

books, immediately translating the text into English or German.

When Neumann spoke at the blackboard, he very quickly covered its entire surface with various formulas, and then very quickly erased everything, so that not everyone had time to understand the course of his reasoning.

During a trip in a car, Neumann could get so carried away by the solution of a problem while driving that he lost his orientation in space and needed clarifications.

Claude Elwood Shannon (1916 - 2001) was an American engineer and mathematician. He is the founder of information theory, which has found application in modern high-tech communication systems.

Shannon was one of the first to suggest that machines can play games and learn by themselves. In 1950, he made a mechanical, electronically-controlled mouse named Theseus, which learned to find a way out of the maze.

Shannon was very fond of juggling. In retirement, he built several juggling machines and even created a general theory of juggling, which, however, did not help him break his personal best - juggling with four balls.

Donald Erwin Knuth (1938) is an American scientist. Author of the world famous series of books on basic algorithms.

In high school at Milwaukee Lutheran High School, he worried that low grades in math might prevent him from going to college, but this was an incomprehensible concern as he graduated with the highest rate of all time - 97.5%.

At the institute, when he first worked with a computer, Knut was very fired up by the new IBM 650, because of which he missed a date with his future wife, as he was too carried away.

Bill Gates (1955) is the chairman of the board and chief software architect at Microsoft.

Gates was expelled from Harvard University for academic failure. Many years later, the Harvard administration recognized him as their graduate and issued a diploma.

Gates wrote his first program, which helped to effectively plan classroom hours, while still in school. He used the program to enroll in a class with the cutest girls.

Gates loves cars, powerboats, and the game of poker.

Gates is passionate at work to the point of mania, passion for competition carries him more money.

He never ate at home because he didn't want to waste time preparing food.

As a child, Bill was very fond of swinging. If he has to think now, he starts skating.

At the age of 13, Bill Gates hacked into a school computer and gained access to classified information. Instead of punishment, the Seattle Computer Center hired Gates to test their programs.

Bill Gates received his first major royalties at the age of 15 for a program to regulate traffic. The fee was 20 thousand dollars.

He spent about thirty billion dollars of his funds on charity.

Parents were frightened by Gates' cravings for computers and even forbade him to approach this "infernal machine."

Bill Gates became a billionaire at the age of 31. If it were a country, it would rank thirty-seventh in the list of the richest countries in the world.

While still in school, Bill Gates and his friend Paul Allen began to create computer programs. Later, after reading the biography of Napoleon, on the basis of one of these programs, Bill created the game "Risk", the goal of which was world domination.

He is married and has three children. He prohibits his children from playing with Microsoft's Xbox 360 console.

It has been estimated that Bill makes $ 250 per second, which is $ 21.6 million a day, or $ 7.8 billion a year. If he gives out fifteen dollars to every person on Earth, then he will have another 5 million. And if he lost one dollar each time Windows hung, then his fortune would be zero in three years.


Sir Timothy John Berners-Lee (1955) - British scientist, inventor of URI, URL, HTTP, HTML, inventor of the World Wide Web.

Once Tim and his friend were caught carrying out a hacker attack, for which they were deprived of the right to use all university computers. Tim did not come to terms with being excommunicated from the device for which he was burning with passion and the guy constructed his own PC from an old TV, a character generator chip, bought for two microprocessor scholarships and found in a calculator trash heap.

At King's College at Oxford University, Tim had a sad incident: he was denied access to a computer in a nuclear physics laboratory for playing with toys that had nothing to do with science at an inopportune time.

Tim and his wife Nancy Carlson hate prying their noses into their family affairs. For detailed information about their family life, they call to contact a lawyer.

Tim speaks very quickly and it is absolutely impossible to keep up with his thought. When he lived in Geneva, his Swiss colleagues began to speak to him exclusively in French in order to slightly slow down the pace of the conversation.

One day he was giving a lecture in front of a huge audience, and suddenly there were problems with the computer. Tim coped with it and said: "Would I be standing here in front of you if everything worked as it should?"

After the Americans simplified the surname of Tim Kailliagu's right-hand man to Kayo, claims began to appear on various sources that the web was created by the Chinese Li and the Japanese Kayo.

He opposes the commercialization of the World Wide Web. In one of his interviews, Berners-Lee admitted that he "almost physically suffers from the all-consuming garbage on the Web."

I have been working in my office for 8 years now.

The design of a computer science classroom at school is a topic of concern to many teachers. TOThe abinet of informatics should become the center for the formation of information culture, deep mastery of new information technologies for their successful use in the educational and subsequent professional activities of students.

When designing an office, I pay great attention to demonstration media. For this, the office has organizedmini-museumfrom the history of computer technology

Stands in a computer science classroom should attract the attention of students, be useful and interesting. In my office there are stands on the main topics of the computer science course: "Algorithms", "Logic", "Keyboard device", etc. These stands are lightweight, removable, easy to store.

In the office there is a stand "Preparing for exams", it provides up-to-date information. useful tips for successfully passing the exam and the state exam.

The TB stand contains the basic rules of behavior in the office, the rules for landing at the computer, and in a separate folder are collected sets of exercises to relieve tension in the arms, neck, torso and eyes.

My office is rich in computer technology, I’m not ashamed to boast: 10 stationary computers for students. The teacher's workplace is equipped with two printers, a scanner, and a projector. The pride of my office is an interactive whiteboard elite Panaboard ... And also, to conduct lessons in classes that are not divided into subgroups (where there are less than 20 people.), I use laptops, they are stored in a mobile safe trolley. In addition, there is a document camera, an acoustic system: speakers, headphones, a microphone.