17 Belge Universite Ders Notlari

Sanat Egitimi – 2

Kisaca Sanat Egitimi baskalariyla bulusma koprusudur. Sanat Egitimi amaclarina bir kere daha bakacak olursak; 1- Gorsel yolla algilamayi ogrenmek 2- Yaraticiligi gelistirmek 3- Sanatin anlasilmasini-paylasilmasini saglamak 4- Kendini ifade etme yetenegi kazandirmak 5- Endustriye hizmet etmek 6- Yasami degistirmek 7- Sanat Egitimi yoluyla dogru gorme, ayritinin ayirtina varmayi saglamak 8- Sanat Egitimi duygu ve dusuncenin…

Sanat – Bilim Egitimi ve Yaraticilik-1

Sanat – Bilim Egitimi ve Yaraticilik-1 Taninmis bir sanatcimizin ogrencilerine ait olan bir sergiye gitmistim. Odanin ortasinda kendi etrafimda donerek izlerken calismalari, birinin onunde duraladim. Resim, hocanin mi yoksa ogrencisinin mi diye bir turlu karar verememistim cunku. Sergiyi bekleyen bir hanim resme surekli baktigimi gorunce " o resim, hocanin en basarili ogrencisinin " dedi. Basariya…

Cizgi

Cizgi Sanatin cizgi ile basladigi bir gercektir. Bu nedenle sanat egitiminde cizgi cok onemli ve temeldir. Goz nesneyi gorurken el cizgiyi gerceklestirir. Onceleri yani cocuklukta hayal dunyasi, cizgi yoluyla disari vurulurken buyume surecinde dis dunya gercekligi de egitim baglaminda, cizgi ile ortaya konur. Nesneyi gorme bicimi, zaman icinde gorme aliskanligi gelistikce temel elemanlara indirgenmeye baslar.…

Review of Frequently used UNIX Commands

REVIEW OF FREQUENTLY USED UNIX COMMANDS GENERAL COMMAND SYNTAX: $ command –[options] <arguments> DISPLAYING CONTENTS OF A DIRECTORY: $ ls      (simple form) $ ls –l   (long form) $ ls –la  [long form and all files including hidden files. (hidden filenames begin with a dot)] DISPLAYING FILENAMES THAT HAVE COMMON START/END: $ ls –l chapter*  (shows…

1.1. The New Insecurity

Since the terrorist attacks on September 11, 2001, computer security has taken on some new meanings. The first is positive. As part of a global tightening of belts and rolling up of sleeves, there emerged several outreaches designed to provide security training and certification to folks in all walks of life, from the consumer being…

1.1.1.1. Information Sharing and Analysis Centers

Akin to CERTs, Information Sharing and Analysis Centers (ISACs) help develop and promulgate "best practices" for protecting critical infrastructures and minimizing vulnerabilities. Many industries have established ISACs to allow these critical sectors to share information and work together to help better protect the economy. In the United States, Presidential Directive Number 63 and the Patriot…

1.1.2.1. Computer Crime

Computer crime has also become a major threat to business. According to the Federal Bureau of Investigation, computer crime is the most expensive form of commercial crime. In 2003, theft of information cost over $70 million, with an average cost of $2.6 million per theft. Also in 2003, denial of service attacks, which deprived companies…

1.1.2. The Sorry Trail

The story of network attacks, bugs, viruses, and criminal actions stretches as far as the computer industry itself. One of the first bugs to develop in a computer system was precisely that: a moth was found squished inside some relay contacts at a government installation. Lieutenant Grace Hopper collected that moth and duly pasted it…

1.1.1.3. No computer Is An Island

While once it was easy to ignore most warnings and scares as mere nuisances because most sites were isolated and unconnected, in today’s world, few computers stand alone. Viruses occur and spread with amazing speed, sometimes spanning the globe in hours or days (usually by stealing information, such as an email address book from one…