Computer academic year model essay 1: Reform strategy of computer professionals training in colleges and universities Abstract: In view of the problems existing in the training of computer application technology professionals in colleges and universities, from the perspective of cultivating applied talents, this paper puts forward a series of reform measures, aiming at improving the training quality of computer professionals.
Keywords: industrial upgrading; Computer; personnel training
Research background of 1
The innovation and upgrading of information technology industry and the continuous emergence of new technologies and new products have prompted the society to increase the demand for high-end skilled talents in computer application technology. Keeping pace with the times, the reform and innovation of talent training mode is very important for the training of high-end talents in computer specialty. In order to fully implement the "Twelfth Five-Year" education development plan in Anhui Province and give full play to the role of vocational education in providing intellectual support and talent support for local economic construction, the author puts forward the reform and innovation of the training mode of computer application professionals under the background of industrial upgrading, which is conducive to the in-depth development of computer specialty and meets the needs of the development of new information industry, thus providing talent support for industrial transformation and upgrading.
2 problems in the training mode of computer professionals
2. 1 Homogeneous computer professional curriculum system
At present, China lacks a large number of "software blue-collar workers" who can engage in basic work, and even more lacks senior software talents who know both technology and management. However, in reality, the training mode of computer professionals in colleges and universities in China is too single, and the quality homogeneity of students is also serious, which is difficult to meet the needs of market demand and the development of software industry. The curriculum system of computer specialty in ordinary colleges and universities is comparable to that in demonstration schools. The curriculum system in all parts of the country tends to be homogeneous, and the specialty construction and personnel training lack characteristics, which is not suitable for local economic and industrial development [1].
2.2 Professional education lags behind the renewal of professional knowledge.
Judging from the development of information technology, the direction is increasing day by day, the division of labor is becoming more and more detailed, and the knowledge structure and skill quality matched in different disciplines are often very different, but the accumulation and transmission of knowledge in colleges and universities can't keep up with the speed of information technology and knowledge update. Due to the lack of necessary teaching reform, the course content lags far behind the progress of modern technology, which leads to the school's disconnection from society, industry and post in terms of curriculum, teaching content and training mode.
2.3 rigid and backward teaching methods
In order to impart knowledge to the greatest extent, teachers mostly adopt teaching methods and pay attention to unilateral indoctrination in teaching, which leads to students' low independent thinking ability, practical application ability and initiative creation ability. Teaching methods can not meet the needs of cultivating high-quality talents with innovative spirit, practical ability and social competitiveness.
2.4 assessment methods are single and rigid
The assessment method of most courses is either examination or assessment. A large number of formatted written or computer test questions cause students to memorize, lacking flexible and diverse assessment methods, which greatly attacks students' learning enthusiasm, reduces students' chances of contacting new knowledge, is not conducive to students' practical application ability, and seriously hinders the quality of students' talent training.
2.5 There are too few comprehensive practical links.
There is still a tendency to emphasize theory over practice, knowledge transfer over ability training in teaching. The content of practical teaching is insufficient, and the institutional arrangement of practical projects is basically a theoretical system. Theory courses and practice courses are synchronized, and there are few vertical links between the practice projects before and after, and there are few horizontal links between different courses, which can not meet the needs of practical work [2].
3. Reform and Practice of Computer Professional Training Mode
3. 1 Marketization of personnel training objectives
Actively adapt to the changes in the demand of the talent market, take employment as the guide, adhere to the principle of educating people, put moral education first, and actively cultivate students' practical ability, creative ability, employability and entrepreneurial ability; Actively adapt to the needs of regional and industrial economic development, establish a linkage mechanism according to the college's own conditions, and design talent training objectives in a timely manner.
3.2 Modularization and specialization of the curriculum system
According to the market, the specialty is set up, the training plan is formulated according to the post requirements, and the course module is designed according to the ability requirements, which fully reflects the specialty in the process of teaching material construction. The curriculum system is divided into basic quality modules, basic skills modules, professional skills modules and skills expansion modules. The basic quality module mainly cultivates students' noble sentiment, law-abiding consciousness, honest quality, solid cultural foundation and hard-working spirit; The basic skills module mainly trains students' basic computer assembly and maintenance ability, skilled use of office software and basic image processing ability; Professional skills module consists of three parts: software programming, network construction and web page design, which mainly cultivates students' professional skills and is the core part of this major. Expanding skills mainly cultivates students' communication skills and teamwork spirit. Teaching material construction is the guarantee of ability training, and we insist on professionalism in the selection of teaching materials. By selecting teaching materials for higher vocational colleges, cooperating with enterprises to develop teaching materials and establishing school-based teaching materials, the content of teaching materials is specialized and the curriculum system is structured. What students learn in school is necessary for work, so as to achieve the purpose of applying what they have learned.
3.3 Work-integrated learning education methods
Establish an educational model that combines productive labor with social practice. On the basis of modularization and specialization of the curriculum system, the education mode of combining work with study is established. Mainly through course training, modular training, comprehensive training and internship to improve the education model. In the teaching process of each course in the module, knowledge and practice are combined through course practice to cultivate students to understand and use it; Modular training is completed on the basis of course training, which helps students to synthesize course knowledge and build corresponding abilities through simulation projects; Comprehensive training is completed at the end of the semester. Through comprehensive training, students' comprehensive skills and professional quality are cultivated. In-post practice allows students to apply professional knowledge in the working environment, sum up their learning results and improve their professional ability in specific work practice. The arrangement of students' internship practice adopts flexible mechanism, which can take the form of students' internship in enterprises, guidance from enterprise personnel in schools, establishment of simulated working environment in colleges and establishment of campus virtual companies for students to operate.
3.4 Diversification of teaching organizations
In order to achieve the goal of talent training in the experimental area, a teaching organization model of "2+0.5+0.5" is put forward, that is, two years of solid teaching and skill training in the school, then 0.5 years of comprehensive training, and then 0.5 years of practical teaching and job training in the off-campus training base. In the specific organizational form, the way of task-driven, project-oriented, case display, teamwork, work simulation and work-study alternation is adopted to move teachers' lectures to practical training places, which is the integration of classroom and practical places and achieves the purpose of "teaching and doing". In addition, make full use of the network environment to establish an open learning and training exchange platform [3].
3.5 Diversity of teaching staff
The training of computer application talents must highlight the goal orientation of "application" and emphasize the combination of theory and practice, knowledge and skills, talent training and market demand [4]. The cultivation of applied talents needs to be realized through diversified teachers. This requires us to build a team of teachers with high attainments and rich practical experience, which is an important guarantee to achieve teaching objectives, realize talent training, promote discipline development and ensure the implementation of dual-system talent training.
References:
Li Chunjie. Research on the ability-oriented training mode reform of computer professionals [J]. Journal of bohai university (Natural Science Edition), 201,32 (2): 176- 179.
[2] Du Juan, Liu Zhigang Jianyi. Research on the integrated teaching mode of cultivating applied talents of computer major [J]. China Electric Power Education, 20 1 1(8):38-39.
[3] Li Wancheng, Gui Ying. On the Cultivation of Innovative Talents in Computer Science [J]. Information System Engineering, 2011(1): 75-76.
[4] fan ying Training Mode of Computer Professionals in Higher Vocational Colleges [J]. New Campus (Theoretical Edition), 20 10(6):52-52
Computer school year Fan Wen II: Thoughts on computer network security prevention Abstract: 2 1 century is the information age. As the source of information, computers have penetrated into every aspect of our lives, which is followed by computer network security issues. Network security is closely related to our life. How to ensure the security of our own information is an important issue facing computer networks, and both countries and individuals are extremely concerned about security issues. Starting with the basic concept of computer network security, this paper analyzes the present situation of network security and the preventive measures to solve these threats.
Keywords: computer network; Security; counter-measure
With the wide application of computers, computer network security has become the focus of modern information society. Computer network security restricts the development of computer technology and affects the stability of people's daily life. But computer security needs the exploration of the whole society, and finally find a stable computer network environment. The so-called computer network security includes hardware security and software security. Hardware security mainly refers to ensuring that the hardware devices that make up the computer will not be destroyed by nature or man-made. These damages cause the computer to fail to operate normally, which generally means that the communication lines of the computer hard disk and other equipment are not damaged. Computer software security means that the computer should ensure the integrity, confidentiality and reliability of information in the process of transmitting information. Integrity means that information remains intact in transmission and will not be modified or tampered with; Confidentiality means that information can only be read and rewritten by authorized people and cannot be stolen or modified at will; Reliability means that the information is true and valid, and it is not out of date or illegal [1].
1 Main threats to computer networks
The main threats to computer network security are divided into hardware threats and software threats. Hardware threat refers to the threat to the hardware devices that make up the computer, and software threat refers to the threat that the computer faces when transmitting information.
1. 1 hardware security threats. The carrier of computer network is computer hardware. If the hardware is destroyed, the computer network system will be greatly restricted or even paralyzed. The security threat of computer hardware is relatively simple, which mainly refers to whether the lines, servers and other equipment of computer network are affected by fire and radiation.
1.2 software security threats. The Internet was originally designed for academic discussion, and the protocol signed for port setting is in an open state. This open state is the reason for the rapid development of the Internet, and it also causes complex network security problems. This kind of congenital defect allows many lawless elements to take advantage of it, causing countless security risks. The following mainly introduces the causes of common network security problems.
1.2. 1 users' safety awareness is weak. Many users do not pay attention to protecting their private information when using public computers, leaving a lot of personal information on the computer, such as the computer remembering the password. There are also many users who disclose their personal information to strangers at will, which has great security risks. At the development level, it is also a major security risk that software developers inadvertently create software security vulnerabilities that are vulnerable to hackers.
1.2.2 The operating system is defective. Theoretically, there are security vulnerabilities in any operating system, and the loss can be avoided if the fault is eliminated before the vulnerability is illegally used. If a hacker controls a security hole, he will often use the hole to control the computer and paralyze it. This is a common means for hackers to steal computer information, and many users' information is inadvertently leaked out.
1.2.3 computer virus. Computer virus refers to a small computer program written by a hacker, usually to achieve a certain purpose. This program is difficult to delete, and it spreads very fast, which often leads to slow response or even paralysis of the computer. If the computer is infected for a long time, it may complete the virus evolution and cause more serious consequences. In this process, user information will also be illegally stolen by hackers, resulting in the loss of a large amount of data and personal information of users.
1.2.4 network hacker. Network hackers are the initiators of various computer viruses. Furthermore, the threat of hackers is far greater than the general network threat, and they are the source of the network threat. Network hackers know the computer operating system like the back of their hands. They use the loopholes in the computer system to write specific programs to achieve their own goals, not necessarily to steal information. Some hackers even attack computers just for fun or mischief. Hackers' destructive methods change in real time just like HIV. The difficulty lies not in clearing a specific computer virus, but in the unpredictable attack form, which is a problem that the modern Internet as a whole has to face [2].
2 Safety precautions
Unlimited security risks make security measures ineffective, and different security risks need the right medicine. Safety precautions should include not only technical precautions, but also social education, improve the safety legal system, and eliminate safety problems from people's subconscious.
2. 1 hardware considerations. The hidden dangers of hardware security mentioned above are mainly caused by the destruction of equipment. Protecting hardware security is an effective preventive measure, which mainly includes fire prevention, radiation prevention, cold prevention and freezing prevention. For large computer rooms, it is necessary to equip security personnel to ensure that the accident can be effectively handled and the disaster will not spread to a wider range. Security personnel should check all computer equipment on time to prevent problems before they happen. On this basis, the computer should be equipped with standby instruments and equipment, and normal equipment can be replaced in time in case of failure. For ordinary users, it is mainly to ensure that the computer is in a safe environment and will not be forcibly destroyed by criminals.
2.2 Improve users' safety awareness. Improper operation or weak safety awareness of computer users accounts for a large proportion of safety problems, and strengthening the safety awareness of computer users is the most important part of preventive measures. Computer users must learn certain safe use strategies and cultivate good safety awareness habits, which are very effective for general hacker attacks and computer threats.
2.3 Develop advanced network technology. The state actively recruits network-related talents to develop preventive software programs, which can not only discover advanced preventive strategies, but also attract some potential hackers, making them activists who make important contributions to network security, which is an important part of security measures. For example, the firewall technology, the main function of the firewall is to filter and control the connection between the computer and the external Internet, discover and prevent potential threats in time, and ensure the safe network environment of the computer. However, there are many defects in firewall technology, which can not effectively protect the information security of computer users inside the wall, and can do nothing about infected computer files and programs. On the one hand, we should develop the original advantages, on the other hand, we should break through the original bottlenecks. Another example is computer encryption technology. Encryption technology refers to converting original information into specific ciphertext through computer programs, and then translating ciphertext into original information through keys. This is the most commonly used security protection measure for modern computers. At present, encryption technology is mainly manifested in two forms. One is information encryption, that is, the original information is encrypted and locked by using the corresponding algorithm program to ensure information security. The second is the encrypted information transmission protocol, which is more complicated. The above two encryption forms can effectively prevent the computer from being infected by viruses, prevent hackers from invading and ensure the safe operation of the computer network [3].
2.4 Regular backup information and vulnerability scanning. Computer backup can effectively restore the original state of the system after the system is destroyed, successfully protect the system data in case of unpredictable disasters such as earthquakes, and ensure the normal and safe operation of the computer network. In the face of the ever-changing network environment, only constant inspection and repair can ensure the safety of computers. It is difficult to solve all problems only by the existing safety knowledge and experience of technicians. Users should always keep safety awareness, take the initiative to check, find loopholes in time and fix them to ensure system security.
3 Conclusion
With the rapid development of cloud computing and big data, the future network security environment will face more challenges. Both individuals and countries must attach importance to network security issues and use advanced network security prevention technologies to protect the network environment. On this basis, keep pace with the times and constantly learn safety knowledge. The state should also improve safety laws and regulations, strengthen citizens' safety awareness, and create an atmosphere of national prevention, so as to effectively solve safety problems.
refer to
[1] Yang Guang, Li Feifei, Yang Yang. Analysis of computer network security precautions [J]. Science and Technology Information, 20 1 1, 29: 70, 93.
[2] Wu Yanyan. Research on computer network security precautions [J]. Computer programming skills and maintenance, 20 13, 2: 83-84, 106.
[3] Fu Xin, Guo Peng. Research on computer network security risks and preventive measures [J]. Computer CD-ROM software and application, 2013,22:161,163.
Related articles of computer academic papers:
1. Selected model essays of university computer papers
2. University computer major graduation thesis: the discourse of the network
3. College computer major graduation thesis model essay
4. Selected model essays of computer science papers
5. University Computer Thesis