The topic of legal protection of programs and data. Lecture: Legal protection of programs and data. Protection of information

Programs for the computer and database include the law of the Russian Federation to the legal protection of programs for electronic computing machines and databases "to the objects of copyright. Programs for computers are provided legal guard As works of literature, but databases - as collections. Copyright applies to any programs for computer and databases, both issued and not issued to the light presented in objective form, regardless of their material carrier, appointment and dignity.

Copyright applies to programs for computer and database, which are the result of the author's creative activities. The creative nature of the author's activities is assumed until the opposite is proven. Legal protection applies to all types of computer programs (including oS and software complexes) that can be expressed in any language and in any form, including the source text and the object code.

Legal protection applies to databases, represent the result of creative labor on the selection and data organization. Databases are protected regardless of whether the data on which they are based or they include, copyright objects. Legal protection does not apply to ideas and principles underlying a computer program or a database or an element of them, including the ideas and principles of the organization of the interface and the algorithm, as well as programming languages.

Copyright for programs for computer and database is not related to the right of ownership of their material carrier. Any transfer of rights to the material carrier does not entail transmitting any rights to computer programs and databases.

Copyright for the program for a computer or database arises due to their creation. To recognize and implement the copyright for a computer for a computer or database, data is not required to deposit registration or compliance with other formalities. The copyright holder for the alert of its rights can, starting the first issue of a program for a computer or database, to use a copyright security mark consisting of three elements

  • * letters with in circle or in parentheses;
  • * Names (name) of the copyright holder;
  • * The year of the first issue of a computer program or a database into light.

Copyright is valid from the moment of the creation of a program of a computer or a database throughout the author's life and 50 years after his death. The deadline for the end of the copyright and the computer for the computer and the database created in co-authorship is calculated since the death of the last author who survived other co-authors. Copyright for a computer for a computer or database, issued anonymously or under a pseudonym, acts from the moment they are launched in the world for 50 years.

The personal rights of the author on a computer for a computer or database are guarded indefinitely. Copyright for a program for a computer or database, first issued in the territory of the Russian Federation or not issued to the light, nor in its territory in which -the objective form is operating in the territory of the Russian Federation. It is recognized by the author, his heirs or other successors of the author, regardless of citizenship. Copyright is also recognized for citizens Russian FederationThe program for a computer or a database of which is released into light or is in which -etic objective form on the territory of a foreign state, or for their successors. For other persons, copyright for a computer program or a database, first issued or those in an objective form on the territory of a foreign state, are recognized in accordance with international treaties of the Russian Federation.

The author of the computer program or the database is recognized as an individual, as a result of the creative activity of which they are created. If a program for a computer or database created by joint creative activities of two and more individualsRegardless of whether a computer program or a database is consisting of a computer, each of which has an independent value, or is indivisible, each of these individuals is recognized by the author of such a computer or database program. If parts of a computer program or database have an independent value, each of the authors has the right to authorship on the part created by it. The author of the computer program or database, regardless of its property rights, belongs to the following personal rights: the right of authorship - i.e. The right to be considered the author of a computer program or database; right to the name - i.e. The right to define the author's name indication in the computer or database program: under your name, under the conditional name (pseudonym) or anonymous; The right to inviolability (integrity) - i.e. The right to protect both the program for a computer or database and their names from any kind of distortion or other encroachments that can cause damage to honor and dignity of the author.

Property rights to the computer program or database can be transferred in fully or partially to other individuals or legal entities. The contract is in writing and must establish the following essential conditions: the volume and methods of using the program for a computer or database, the order of you fee and the amount of WHO award, the term of the contract.

Property rights to the program for a computer or database are inherited in the manner prescribed by law. Property rights to the program for a computer or database created in the order of service duties or on the task of the employer belong to the employer if the author is not provided in the contract between it and the author. The payment procedure and the amount of remuneration are established by the Treaty between the author and the employer. The copyright holder of all property rights to the computer for a computer or database directly or through its representative during the term of copyright may, as desire to register a program for a computer or a database by submitting an application to the Russian Agency for EUM, databases and topologies Integrated microcircuits (hereinafter - agency).

The contract on the complete concession of all property rights to the registered program for a computer or database is subject to registration in the agency. Using a computer program or database by third parties (users) is carried out on the basis of a contract with the copyright holder, with the exception of resale.

Resale or transmitting a different way of ownership of either other real rights to an instance of a program for a computer or database after the first sale or other transfer of ownership of this copy is allowed without the consent of the copyright holder and without paying it to additional remuneration. When selling and providing mass users with access to computer programs and databases, it is allowed to apply a special procedure for concluding contracts, for example by presenting the standard terms of the contract at the transmitted copies of computer programs and databases. The person legally owning an instance of a computer program or a database is entitled without receiving additional permission The copyright holder to carry out any actions related to the functioning of a computer program or database in accordance with its purpose, including recording and storage in the memory of the computer, as well as the correction of obvious errors. Recording and storage in memory of the computer are allowed for one computer or one user on the network, unless otherwise provided by the contract with the copyright holder.

The person legally owning an instance of a computer program or a database is entitled without the consent of the copyright holder and without paying additional remuneration to it: adapt the program for a computer or database; Manufacture or charge a copy of a copy of a computer for a computer or database provided that this copy is intended only for archival purposes only and, if necessary, to replace a legitimately acquired instance.

At the same time, a copy of the computer program or database cannot be used for other purposes and must be destroyed if the further use of this program for a computer or database ceases to be legitimate.

The person legally owning a copy of the computer for the computer has the right without the consent of the copyright holder and without paying additional remuneration to decompile or entrust the decompilingation of the computer program in order to study the coding and structure of this program under the following conditions: the information required to interact independently developed by this person's program for EUM with other programs is not available from other sources; The information obtained as a result of this decompiling can be used only to organize the interaction of an independent program developed by this person for a computer with other programs, and not for drawing up new program For computer, in its own way, essentially similar to the decompilingable computer program or to implement any other action that violates copyright; Decompiling is carried out in respect of only those parts of the computer program that is needed to organize such an interaction.

Instances of the computer or the database program, the manufacture or use of which entails copyright infringement entails the copyright.

The counterfeit are also copies protected in the Russian Federation and in accordance with the Law of the Russian Federation "On the legal protection of programs for electronic computing machines and databases" programs for computer or database imported to the Russian Federation from the state in which this program for a computer or database has never been guarded Or ceased to be protected by law.

The author of the program for a computer or database and other copyright holders have the right to demand: recognition of his rights; restoration of the situation that existed before violation of the right and termination of actions that violate the right or creating a threat to its violation; compensation for damages, in the amount of which include the amount of income, illegally obtained by the violator; Payments to the compensation violator in the amount determined at the discretion, the arbitration or arbitration court of the amount from 5000 times to 50000 times established by law minimum size wages in cases of violations in order to extract profits instead of damages; In addition to compensation for damages or payments to compensation at the discretion of a court or arbitral tribunal, a penalty of 10% of the amount, awarded by the court or arbitration court in favor of the plaintiff, in the revenue of the republican budget of the Russian Federation; The adoption of other measures provided for by legislative acts related to the protection of their rights.

For the protection of their right, copyright holders can apply to court, arbitration or arbitration court. The release under its name of a foreign program for a computer or database or illegal reproduction or distribution of such works entails criminal liability in accordance with the law.

With respect to databases, the Law of the Russian Federation "On the legal protection of programs for electronic computing machines and databases" provide protection only in part of the selection and location of the material included in the database.

In general, the database as an object of information legal relations should be protected by two institutions of law - intellectual property and aware ownership. (6. From 148-152)

Legal protection of programs and data. Legal protection of computer programs and databases for the first time in full introduced in the Russian Federation by law "On the legal protection of programs for electronic computing machines and databases", which entered into force on October 20, 1992

Legal protection provided by this Law applies to all types of programs for computers (including operating systems and software complexes) that can be expressed in any language and in any form.

To alerts on their rights, the program developer may, starting with the first issue of the program, use a copyright security mark consisting of three elements:

Letters with in circle or parentheses;

Names (name) of the copyright holder;

The year of the first issue of the program.

Protection of information.

Protection against illegal copying and use. Software protection To prevent copying distribution diskettes may consist of non-standard formatting. In addition, a coded program key can be placed on a diskette or CD-ROM, without which the program becomes unsuitable for operation and which is lost when copying.

Hardware protection against illegal use can be implemented using a hardware key-chase, which is usually attached to the parallel port of the computer.

Protection of access to the computer. To protect against unauthorized access to data stored on a computer, passwords are served. The computer allows access to its resources only to those users who are registered and introduced right password. Each particular user can only be allowed to access specific information resources. At the same time, it is possible to register all attempts to unauthorized access.

Protection of disks, folders and files. Each disk, folder and file can be protected from unauthorized access: for example, set specific access rights (full or reading), and different for various users.

Protection of information on the Internet. On the Internet on the Internet there is a different important information: Web sites, files, etc. If the computer is connected to the Internet, in principle, any user, also connected to the Internet, can access the information resources of this server. It is able to change or replace the Web page of the site, erase or, on the contrary, write a file, etc. To do not happen, access to the information resources of the server (its administration) is made by password.

If the server has an Internet connection and simultaneously serves as a local network server (an intranet server), it is possible unauthorized penetration from the Internet in local network. In order to avoid this, a software or hardware barrier is installed between the Internet and an intranet with a firewall (Firewall). The firewall monitors the transfer of data between networks and prevents unauthorized access.

All the themes of this section:

Publishing SPbGPU
UDC 681.3 (075) It is recommended for publishing a scientific and methodological council of the Pskov State Polytechnic Institute Reviewers: - Il

Basics of informatics
1. Information and information processes Basic concepts: information, information processes, information society, and

Information Technology
7. Treatment technology text information Basic concepts: text editor and processor, text file format, t

The concept of information. Information and information processes
The concept of information is quite widely used in the usual life of a modern person, so everyone has an intuitive idea what it is. Word information

Properties of information
A number of requirements are made to information, i.e. Any information should have certain properties: § Full-length information,

Data processing methods
In order to, on the basis of the data obtained,, that is, registered information, take some decision, it is necessary to produce with yes

Data structures
Working with large data sets is easier, when the data is ordered, that is, form a given structure. Three main types of structures are distinguished: Linene

Information processes
Definition. The information process is the process of perception, accumulation, storage, processing and transmission of information. § processes of perception, storage

Information Basics Management Processes
To talk about management processes, it is necessary to understand what is the control system. Definition. The system is an ordered set of heterogeneous email

Human information activity. The main characteristic features of the information society
The development of science, education led to the rapid increase in the amount of information, human knowledge. If at the beginning of the last century the total amount of human knowledge doubled every fifty years,

Language as a way of presenting information. Number of information
Recall one of the definitions of the concept of "information". Definition. Information is the content of the message, signal, memory, etc. Note.

Probabilistic approach to determining the number of information. The concept of entropy
If you pay attention to colloquial languages, such as Russian, then you can make interesting conclusions. To simplify theoretical studies in computer science it is believed that the Russian alphabet consists

Analog (continuous) and discrete form of representation
Information is a very capacious concept in which the whole world is located: all the variety of things and phenomena, the whole story, all the volumes of scientific research, the creation of poets and prose. And all this

Conclusion: any continuous (analog) value can be represented in discrete form. And the mechanism of such a transformation is obvious
Definition. The process of converting a continuous (analog) value in a discrete form is called analog-discrete conversion. Note. Be

Decimal and binary form of presentation
As already noted, discreteness is a case when an object or phenomenon has a finite (countable) number of diversity. To highlight concrete

Exponential forms of information
To represent very small or very large numbers, their standard positional representation becomes unreadable and difficult to carry out computational actions on such numbers.

Coding information. Binary coding. Units of measurement of the amount of information
To automate work with information related to various typesIt is very important to unify the presentation form, i.e. It is necessary to convert symbolic, textual and graphical information to such about

Number systems
Definition. The number system is called a set of characters (digits) and rules for their use to represent numbers. There are two types of number systems: §

Number Systems used in Computer
The positional principle is used and when recording binary numbers. In this case, the coefficients in the degrees of numbers 2 will be binary numbers 0 and 1. Number 5279 in a binary number system

Translation of numbers from a decimal number system to an arbitrary base system
In order to translate the number in decimal system Note, write it in the form of polynomial AS \u003d ANSN + AN-1

Transformation of the numbers from binary to the octal, hexadecimal system and back
These actions are carried out under simplified rules, taking into account the fact that the foundations of these numbering systems are multiple of a whole 2, i.e. 8 \u003d 23, and 16 \u003d 24. This means that when

A max (n) \u003d 2n-1
§ Activities with a sign - adding negative values \u200b\u200bleads to some new properties. Exactly half of all 2n numbers now

A \u003d (± m) · 2 ± p, and ½ ≤ m<1.
Example: -310 \u003d -0.11 · 210, where m \u003d 0.11 and p \u003d 10

Binary addition
The addition of binary numbers is similar to the addition of decimal. In both cases, the operation begin with the processing of the smallest significant digits located in the extreme right position. If the result of addition is the NIM

Binary subtraction
Binary subtraction is similar to decimal subtraction. As in the case of addition, the difference in subtraction in binary and decimal form consists only in the features of the bonnetic operations. Vych

Binary multiplication
Binary and decimal multiplication, as well as binary and decimal addition or subtraction, are largely similar. Multiplication is a quick way of addition of several identical numbers. Multiplication performs

Binary division
Division is an operation reverse by multiplication. In other words, when dividing, the subtraction operation is repeated until the reduced will not be less subtracted. The number of these repetitions shows how

Binary subtraction using additional codes
With the implementation of binary arithmetic in modern processor elements, the computer must be borne in mind that the possibilities of hardware "binary electronics" do not allow the operation directly

Logic expressions
With the help of the main set of boolean operations, you can build more complex logical statements. Example: Build a logical expression from simple logical opera

Logical element or not
The logical element is or-unrealizes the complex two-stage logical operation of two signals and is indicated on the scheme

Building addresses on logical elements
The presence of logical elements that implement logical operations allows you to implement the simplest operations of binary arithmetic, namely the operations of addition and subtraction (through addition using

Computer architecture
Definition. Computer) (from English Computer- Computer) is a programmable electronic device capable of processing Dunn

Basic hardware configuration of personal computer (PC)
Consider the computer device on the example of the most common computer system - personal computer. Definition. Personal Computer (PC) Call

System unit
The main hardware component of the computer is the system or maternal (Motherboard) board. On the motherboard implemented a highway

Microprocessors PC
Definition. Central Processor (CPU, from English. Central Processing Unit) is the main working component of the computer, which performs arithmetic and logic

RAM
Definition. RAM (RAM-operational storage device, from English. RAM-RANDOM ACCESS Memory-Memory with ProI

Magnetic drives
Smognitelinators The principle of recording information is based on the phenomenon of the magnetic field magnetization, storage of information is associated with the long-term preservation of this NAMAGN

Optical drives
Optical range of recording and reading information is based on the change in the angle of reflection of the laser beam from the surface of the opthetic (so optical

Keyboard
Definition. The keyboard is a device for entering information into a computer and feed control signals. Contains standard set of printed machine keys and some optional

Manipulators
To enter graphic information and to work with the graphical interface of programs, coordinate information entry devices are used: manipulators (mouse, trackball, etc.), joysticks, sen

Audio adapter
Definition. Audio adapter (Sound BlasterIlisovka board) is a special e-board that allows you to record sound, reproduce it and create pro

Monitor
Definition. The monitor is a universal information output device connected to the video card (video adapter). Video card directly supple

Printer
The printer is designed to output for paper (creating a "solid copy") of numeric, textual and graphic information. PR

Applied by
Application software is designed to develop and execute specific tasks (applications) of the user. Applied software running

File system and file structure
All programs and data are stored on the computer's external memory devices as files. Definition. File (File - Folder) is them

Simulation as a method of knowledge
In its activities, an artistic, scientific, practical person often creates a substantial system of that system, a process or phenomenon, with whom he has to deal with. The purpose of such a replacement of Yavl

Concept of information modeling technology
Stormy development of computer technologies, expanding the capabilities of computing equipment, the appearance of high-speed computing systems, new programming languages \u200b\u200bwith extended subtractions

Algorithm. Formal execution of algorithm
Any task is characterized by known values \u200b\u200b(source data) and relations between them, and values \u200b\u200bor relationships, the values \u200b\u200bof which are unknown and must be determined.

Properties of algorithm
All algorithms have a number of properties. We give the main properties of algorithms): § Mass algorithm

Methods of recording algorithm
There are three main ways to write or represent the algorithm: a verbal description, a description on the algorithmic language, a structural scheme (graphic scheme))

Algorithm 2.
Alg Nach If the root of the word begins with a call of consonant I, then at the end of the prefix to write "s" i otherwise on the end of the prefix

Basic algorithmic structures. Detailing algorithm
Algorithmic structures can be divided into three main types: linear, branching and cyclic. § The simplest is linear a

Methods for developing algorithm
There are two main methods of developing algorithms - the method of consistent detail Assembly method, § method of consistent detail

Creation tools
The source program is the usual text, so text editors are used to record it. To get a working program, you need this text or automatic

Basic elements of algorithmic programming languages
Any programming language is characterized by a certain set of structural elements. Such basic elements, in particular, include: alphabet and service words, structure of the program,

Main data types
Data may be simple. Types of data are divided into simply structured;

Subrogram
If a group of the same action is repeated in different places of the program, it is advisable to allocate them in the subroutine. Definition. The subprogramme is part of the program, OFO

Programming technologies
Definition. Programming technology is a system of methods, methods and techniques for developing and debugging the program. Currently found wide use of the following

Allowance for entering university
Under the general editors, Ph.D., Assistant V.S. Belova Technical editor V.S. Belov Computer Layout: Author's team

Legal protection of programs and databases. Protection of intellectual rights, as well as property rights applies to all types of programs for a computer that can be expressed in any language and in any form, including the source text in programming language and machine code. However, legal protection does not apply to ideas and principles underlying the program, including the ideas and principles of the organization of the interface and the algorithm.

To recognize copyright to the computer program, it does not require registration in any organization. Copyright to the program arises automatically when it is created. To alerts on their rights, the program developer may, starting with the first issue of the program, use a copyright security mark consisting of three elements:

Letters "C" in circle © or parentheses (C);

Names (name) of the copyright holder;

The year of the first release of the program in the light.

The author of the program belongs to the exclusive right to reproduce and disseminate the program with any ways, as well as modify the program. The organization or user legitimately owning the program (bought a license to use it) can carry out any actions related to the functioning of the program, including its recording and storage in the computer's memory.

You need to know and implement existing laws prohibiting illegal copying and using licensed software. Regarding organizations or users who violate copyright, the developer may require the court of compensation for damages and payments to the compensation violator.

Electronic signature. The electronic digital signature in the electronic document is recognized as a legally equivalent signature in the paper on paper.

When registering an electronic digital signature in specialized centers, the correspondent receives two keys: secret and open. The secret key is stored on a diskette or smart card and must be known only to the corresponding itself. The public key must be in all potential recipients of documents and is usually sent by email.

Protection against unauthorized access to information. To protect against unauthorized access to data stored on a computer, passwords are used. The computer allows access to SMS resources only to those users who are registered and entered the correct password. Each particular user can only be allowed to access specific information resources. This may register all attempts to unauthorized access.

Password protection is used when loading the operating system (when loading the system, the user must enter his password). However, such protection is easily overcome, as the user can refuse to enter a password. Password input can be installed in the BIOS SETUP program, the computer will not start loading the operating system if the correct password has been entered. It is not easy to overcome such protection, moreover, there will be serious data access issues if the user will forget this password.

From unauthorized access, each disk, folder and local computer file can be protected. For them, certain access rights can be installed (full, only reading, by password), and the rights may be different for various users.

Currently, biometric identification systems are increasingly used to protect against unauthorized access to information. The characteristics used in these systems are essential qualities of the person's personality and therefore cannot be lost and faked. Biometric information security systems include identification systems for fingerprints, speech recognition systems, as well as identification systems for the iris.

Protection of programs from illegal copying and use. Computer pirates, illegally replicating software, devalue the work of programmers, make programs to develop programs with economically unfavorable business. In addition, computer pirates often offer users unfinished programs, programs with errors or program demolism.

In order for the computer software to function, it must be installed (installed). Software is distributed by manufacturers in the form of distributions on the CD-ROM. Each distribution has its own serial number, which prevents illegal copying and installing programs.

Special protection can be used to prevent illegal copying of programs and data stored on the CD-ROM. A coded program key can be placed on the CD-ROM, which is lost when copying and without which the program cannot be installed.



Protection against illegal use of programs can be implemented using a hardware key that is usually attached to a parallel port of the computer. The protected program refers to the parallel port and requests the secret code. If the hardware key to the computer is not attached, the protected program determines the situation of protection and terminates.

Physical data protection on disks. To ensure greater reliability of data storage on hard drives, RAID arrays are used (Reduntant Arrays of Independent Disks - an excess array of independent disks). Multiple hard drives are connected to the RAID controller, which considers them as a single logic information carrier. When writing information, it is duplicated and saved on multiple disks at the same time, therefore, when you fail one of the disks, the data is not lost.

Protection of information on the Internet. If the computer is connected to the Internet, then, in principle, any attacker, also connected to the Internet, can access the information resources of this computer. If a server that has an Internet connection is simultaneously a local network server, it is possible unauthorized penetration from the Internet to a local network

To protect the computer connected to the Internet, from network viruses and hacker attacks between the Internet and computer is installed hardware or software firewall. The firewall monitors the transmission of data between the Internet and the local computer, detects suspicious actions and prevents unauthorized access to data.

Legal protection of programs and data. Protection of information.

Legal protection of programs and data. Legal protection of computer programs and databases for the first time in full introduced in the Russian Federation by law "On the legal protection of programs for electronic computing machines and databases", which entered into force on October 20, 1992

Legal protection provided by this Law applies to all types of programs for computers (including operating systems and software complexes) that can be expressed in any language and in any form.

To alerts on their rights, the program developer may, starting with the first issue of the program, use a copyright security mark consisting of three elements:

Letters with in circle or parentheses;

Names (name) of the copyright holder;

The year of the first issue of the program.

Protection of information.

Protection against illegal copying and use. Software protection To prevent copying distribution diskettes may consist of non-standard formatting. In addition, a coded program key can be placed on a diskette or CD-ROM, without which the program becomes unsuitable for operation and which is lost when copying.

Hardware protection against illegal use can be implemented using a hardware key-chase, which is usually attached to the parallel port of the computer.

Protection of access to the computer. To protect against unauthorized access to data stored on a computer, passwords are served. The computer allows access to its resources only to those users who are registered and entered the correct password. Each particular user can only be allowed to access specific information resources. At the same time, it is possible to register all attempts to unauthorized access.

Protection of disks, folders and files. Each disk, folder and file can be protected from unauthorized access: for example, set specific access rights (full or reading), and different for various users.

Protection of information on the Internet. On the Internet on the Internet there are various important information: Web sites, files, etc. If the computer is connected to the Internet, then in principle any user, also connected to the Internet, can access the information resources of this server. It is able to change or replace the Web page of the site, erase or, on the contrary, write a file, etc. To do not happen, access to the information resources of the server (its administration) is made by password.

If the server has an Internet connection and simultaneously serves as a local network server (an intranet server), then unauthorized penetration from the Internet is possible to the local network. In order to avoid this, a software or hardware barrier is installed between the Internet and an intranet with a firewall (Firewall). The firewall monitors the transfer of data between networks and prevents unauthorized access.



The main logic devices of the computer (adder, register).

Since any logical operation can be represented as a combination of three basic operations (and, or not), any computer devices that produce processing or storage of information can be assembled from basic logic elements from both bricks.

The logical element I. To the inputs A and in the logical element, four pairs of signals of different values \u200b\u200bare sequentially fed, a sequence of four signals is obtained at the output, the values \u200b\u200bof which are determined in accordance with the truth table of the logical multiplication operation (Fig. 11).

Logical element or. The inputs of AI in the logical element are sequentially fed four pairs of signals of different values, a sequence of four signals is obtained at the output, the values \u200b\u200bof which are determined in accordance with the truth table of the logical addition operation (Fig. 12).

The logical element is not. Two signals are sequentially fed to the input A of the logical element, a sequence of two signals is obtained at the output,

The values \u200b\u200bof which are defined in accordance with the truth table of the logical denial (Fig. 13).

Adder. In order to maximize the work of the computer, the entire manifold of mathematical operations in the processor is reduced to the addition of binary numbers. Therefore, the main part of the processor is the adder, which provides such addition.

With the addition of binary numbers, the amount in this discharge is formed, and it is possible to transfer to a senior discharge. Denote the terms (A, B), transfer (P) and the amount (s). We construct a table of addition of single-digit binary numbers, taking into account the transfer to the senior discharge (Table 4).

Now, on the basis of the logical expression obtained, you can construct from the basic logic elements a semi-chart (Fig. 14).

This scheme is called a semi-shift, as it performs the summation of single-digit binary numbers without carrying out the transfer from the younger discharge.

Multi-defined processor adder consists of complete disposable adders. Each category is made a single-bit adder, and the output (transfer) of the adder of the junior discharge is connected to the input of the adder of the older discharge.

Trigger. The most important structural unit of the operational memory of the computer, as well as internal processor registers, is a trigger (Fig. 15). This device allows you to remember, store and read information (each trigger can store 1 bit of information).

To build a trigger, there are enough two logical elements "or" and two elements "not".

In the usual condition, the "O" signal is served at the trigger inputs, and the trigger stores "O". To write "1" to the input S (Installation), the signal "1" is fed. With consistent consideration of the passage of the signal according to the scheme, it can be seen that the trigger goes into this state and will be stable in it and after the signal at the input s will disappear. Trigger remembered "1", i.e., from the output of the trigger q can be considered "1".

To reset the information and prepare for receiving a new one, the "1" signal is applied to the input R (reset), after which the trigger will return to the original "zero" state.

3. Practical task T. Creating, editing, saving, and print text using a text editor.


Top.