Current location - Education and Training Encyclopedia - Graduation thesis - Sample essay arrangement of graduation thesis of computer college
Sample essay arrangement of graduation thesis of computer college
You have to write a paper to graduate from computer college. The following is my graduation thesis of Computer College, I hope it will help you.

Analysis and Countermeasures of Campus Network Security Problems

Abstract: With the continuous development of society and the replacement of the times, the network has gradually become the most essential part of people's lives. With the advent of the information age, the network has entered thousands of households and played an irreplaceable role in people's lives anytime and anywhere. While people enjoy the convenience brought by the network, they are also threatened by the security of network information. As a place for students to study, campus can spread knowledge to students more conveniently and effectively with the help of the network. At the same time, campus network security also needs our great attention.

Keywords: campus network; Security; Countermeasures

Preface of 0

Students are the future of the whole country and society, and it is the unshirkable responsibility of every member of society to provide them with a good learning and living environment. In recent years, with the further popularization of digital teaching on campus, students begin to use network devices such as mobile phones. Campus network is more and more used in students' life, and it covers a wider range. Therefore, the problems existing in the campus network should attract the attention of the society and take active measures to solve them.

1 security risks of campus network

1. 1 Security vulnerabilities in system software and hardware.

At present, most schools use Windows as the main computer system, which is also the most widely used system in people's lives. Bring your own server, TCP/IP protocol, firewall and so on. Because of its wide application and people's familiarity with the system, this system is vulnerable to external network attacks, resulting in information leakage or resource loss.

1.2 network supervision is not in place.

As a new educational discipline, computer science is increasingly welcomed by students with the trend of the times. While studying this science, students are often full of curiosity and eager to try. Their first choice is usually their own campus network platform. Due to the malicious interference of students, the gateway of the school is affected, and even the network is abnormal and information is lost when teachers teach. At the same time, teachers' awareness of network security is weak and they don't care about the loss of abnormal information on the network. Non-computer teachers can't tell the reason for the information problem. They only rely on restarting computer hardware facilities to solve the problem, thinking that it is caused by the computer hardware itself, which makes the supervision of malicious attacks on students' networks lax and lacking.

1.3 malicious attacks by outsiders intercept school resources.

Most colleges and universities are not only the cradle of teaching and educating people, but also scientific research institutes. In order to gain benefits, some outsiders will maliciously attack the school network, steal campus resources and even damage the campus knowledge system.

1.4 malicious virus intrusion

Nowadays, in the network era, information exchange is inevitable, and malicious viruses sometimes appear in network information, such as panda burning incense, Trojan horse, super virus, etc. It may be network information files, source code or hidden in a USB flash drive. Therefore, when students obtain network resources, it is very likely that they will fall into the trap of viruses unconsciously.

1.5 Availability of campus network

Campus network is a local area network for teachers and students of the school, and it is a limited resource. However, schools usually have a large number of students online at the same time, such as choosing courses at a fixed time, students taking online courses at a fixed time and so on. The topological complexity of campus network is extremely high, which also leads to the problem that students can't enter the system and the system collapses.

2 the causes of campus network security problems

2. 1 The school's own network security system is not perfect.

Although the school uses its own local area network to isolate itself from the external wireless network, information transmission is inevitable, and the school still needs to use the external network for information exchange, rather than an independent information island. Taking our hospital as an example, our office network adopts the local area network of China Petroleum, which greatly strengthens the information security of our hospital. At the same time, we also use wireless network to strengthen the use of school information. The threat of wireless network mainly lies in using the same computer as LAN, which makes the external factors that endanger information security have cracks and cannot achieve absolute information security.

2.2 teachers and students lack awareness of network security

On campus, middle school students attack the campus network from time to time, and some students attack each other on the network between schools for vicious competition, which leads to frequent network problems in schools. However, teachers can't accurately blame students' behavior, which leads to loopholes in education supervision.

2.3 External influences are inevitable.

Some outsiders pursue their own interests, crossing the moral bottom line, maliciously stealing school education and scientific research resources, making them leak out and even threatening national security. At the same time, malicious attacks by viruses on school networks and computer hardware occur from time to time. When students open links or information files to obtain information resources, the viruses they carry spread on the computer and even pollute the mobile hard disk, causing greater harm. These inevitable hazards spread wantonly in the campus network, seriously threatening the security of the campus network.

2.4 Campus network topology is low.

Due to the local limitation of the router, the network access cannot be completely covered. It is impossible for schools to use the same WIFI devices as the outside world to meet the requirements of thousands of teachers and students for network use.

3 campus network security solutions

3. 1 Improve the software and hardware system of the school.

On the basis of using Windows, schools can improve and adjust the system, improve the quality of servers and the degree of address access, strengthen the function of killing hardware vulnerabilities, and effectively control the influence of external network on campus LAN. For example, our school adopts all-China petroleum LAN interface for control, and effectively uses the internal supervision of the school to improve the safety of educational information by opening the process and informing the hazards, and then opens it for use after obtaining the commitment.

3.2 Strengthen campus internal network supervision

Teachers should not only educate students about network security in class, but also strengthen the actual supervision of websites. Students' IP addresses can be tracked by using the student account login system on the campus network, and the malicious attack monitoring system of campus accounts can be installed in conjunction with major universities to punish students who attack the school website, so as to achieve the purpose of effective real-time supervision. In addition, it is extremely important to cultivate students' consciousness. Only when students realize that their behavior has seriously threatened the network security of the school will they consciously protect the network security. At the same time, schools can also provide students with better ways to satisfy their curiosity. Schools can hold computer skills competitions. One student builds a network security system and a small local simulation network for the defender, and the other student as an attacker deciphers the defender's system and attacks the simulation website, and decides the outcome by setting a time limit. This not only promotes students' interest in learning computer, but also helps students to master learning knowledge more firmly and cultivate more advanced talents.

3.3 Prevent malicious attacks from outsiders

At present, it is impossible to effectively deal with the malicious theft and destruction of outsiders. Because outsiders are usually unable to determine the exact source of their IP addresses, they cannot locate them accurately. Therefore, at present, the effective preventive measures are: the computers that reserve important scientific research resources are not connected to the internet, and the unfamiliar IP addresses of online resources can be checked at any time to strengthen the complexity of the encryption system. Of course, at present, we are also studying the location method of unknown IP, and hope that the results will be put into use as soon as possible.

3.4 Prevention of malicious virus infection

Schools should strengthen students' safety awareness, and do not enter illegal Internet websites at will, browse abnormal web pages with unsafe warnings, or download abnormal network information files. At the same time, in Internet cafes and other public places with complicated webpages, try to avoid inserting the mobile hard disk into the computer and avoid the damage of the virus to the computer to the maximum extent. Of course, the root of this problem mainly lies in the existence and malicious spread of viruses, so schools should also strengthen ideological education for computer majors, let them know and understand the harm of viruses, improve students' quality and character, and make them become positive young people with ideals and ambitions.

3.5 Improve the access of campus LAN.

Campus is a gathering place for students, and a large number of students live on campus, which makes the network usage on campus more than in other places. The campus network cannot be viewed by evaluating the general network access. The centralized use of campus network is equivalent to thousands or even tens of thousands of families accessing a router at the same time. Therefore, the school should study and develop its own local area network, improve the topology of campus local area network as much as possible, and meet the requirements of students for network use as much as possible.

4 conclusion

This era is the era of the Internet, and people's lives are inseparable from the Internet all the time. On the street, we can usually see people holding mobile phones and Baidu maps looking for locations. Sitting on the light rail, we can see people reading and playing games online. In the library, we can see people looking for information in front of computers. The Internet takes up most of our time and life, and children after 00 don't even know how the world should work without the Internet. As a place for students to study, campus needs to use the network, and more network technologies will be applied to campus in the future. Campus network security is also an important issue today. Therefore, it is the social responsibility of each of us to find, analyze and solve campus network security problems. I hope people will be good people with moral cultivation, and don't be harmful elements who steal school resources against their conscience for personal interests. At the same time, we also hope that people will resist the generation and spread of the virus, maintain our public network and keep it clean and safe at all times.

References:

[1] Ruan Haibin. Analysis of campus network security problems and countermeasures under the background of informationization [J]. Network security technology and application, 20 17.

[2] Lin Yishui, Wu Yanping. Analysis and Countermeasures of Campus Network Security Based on Network Environment [J]. Network Security Technology and Application, 20 14.

[3] Guan. Campus network security analysis and countermeasures [J]. Network security technology and application, 20 13.

Application of Micro-course in Curriculum Reform of Software Technology Specialty

In today's information age, mobile clients such as mobile phones have become the main media of information dissemination. In this case, software technology majors at the forefront of science and technology must keep up with the pace of the times and use various information media for teaching, and micro-courses are one of the main ones.

Keywords microteaching; Software design; Curriculum revolution

Reducing teachers' burden and ensuring students' learning quality are the problems that people should think about now. This paper studies how to apply micro-courses in software technology specialty in colleges and universities.

1. Advantages of micro-courses

When it comes to the advantages of micro-courses, we have to mention the disadvantages of traditional curriculum education. Traditional education requires students to concentrate and listen carefully in a class, otherwise it may be easy to ignore some important test sites; Moreover, the schedule of traditional education is very regular, and sometimes one class may be absent because something can't be attended. When you come back, you can't make up the lessons, and you may make students unable to keep up with the progress of the teacher. Also, if students don't remember a class or several classes well, traditional education can't provide the best review, just listen to what the teacher said again; Finally, I have to say that there are always a few good teachers, and it is impossible for schools to give most students to these good teachers for education. These are the drawbacks of traditional classroom education, and the emergence of micro-classes has changed these situations: micro-classes can be repeated many times in a class, listening to lectures at any time, watching at any time, and time is more free. Micro-courses can also gather excellent teaching resources together, let students study freely and improve the utilization efficiency of excellent educational resources.

2. Design and development of micro-courses

Computer software technology major has natural advantages in designing micro-courses. Teachers majoring in general component technology can skillfully use computers and contact with various video production software, which is helpful for computer software technology teachers to design and develop micro-courses. To develop micro-courses, we must first choose the educational content, analyze the important concepts to be learned and the key and difficult points of teaching, and find vivid and interesting ways to show them with multimedia. Moreover, there is still a big difference between micro-courses and classroom teaching for software technology majors. Classroom teaching may be explained one lesson at a time according to the textbook, but micro-lessons can be explained one knowledge point at a time, and there is no time limit for each lesson. Therefore, the design and development of micro-courses must pay attention to this feature, explain the knowledge points and contact other knowledge points for education, so that students can fully grasp the knowledge they want to learn. After you decide what to say, you should make ppt, video, documents and other explanatory materials, then shoot and record them, and then combine them later. When shooting a video, the teacher must pay attention to the speed of speech to ensure that the video can make students hear the knowledge clearly. Moreover, teachers must adopt humorous and interesting ways to avoid making students feel sleepy when watching videos. Furthermore, post-production is an important part of the development of micro-courses, and there is a lot of work to be done in post-production of micro-courses. Including the editing and synthesis of various videos and audio, as well as the production of subtitles, and making various multimedia animations and other forms to talk with teachers. These are all very important. For example, the editing and synthesis of audio and video, such as the mismatch between video and audio, may make people feel that it is a small mistake, but it may make students uncomfortable with micro-lessons, divert their attention and reduce their learning efficiency. Such mistakes also include the mismatch between subtitles and videos, which will affect students' learning efficiency. Therefore, to ensure students' learning efficiency, it is necessary to be perfect without loopholes. The application of multimedia is also very important. Multimedia can help students improve their interest in learning and concentrate when studying. Therefore, we must combine multimedia with teachers' teaching, make use of the advantages of computer software specialty, and make excellent multimedia micro-courses to ensure students' learning quality.

3. The application of micro-courses

After the micro-course is made, it must be applied to education and teaching. Many students may think that they are not aware of the benefits of micro-courses, so they have a coping attitude towards micro-courses. Some students may continue to show them and do other things by themselves to catch up with the progress. This is a very wrong application method. Therefore, in the application of micro-courses, students can take the initiative to watch through the following methods. Make a timetable. When students watch micro-lessons, make a micro-lesson schedule for students to ensure that students must watch the prescribed videos for a period of time. Ensure that students watch every video of the micro-lesson. In the operation of micro-courses, students must watch every video before they can read the current progress. Otherwise, according to the students' unfinished processing, students must watch a micro-lesson after reading a teaching micro-lesson. Set intermediate questions, some students turn a blind eye to the video after opening it, and let the video play itself to catch up with the progress. That won't do either. There must be several questions between micro-classes, and students can continue after answering the questions. This can not only prevent students from brushing classes, but also consolidate the knowledge that the micro-class teacher said through several questions. All these should be effectively used in the application of micro-courses. In addition, for the more difficult test sites, students must be taught several times, so as to ensure that students have a thorough understanding of these more difficult test sites, rather than simply reading them like other knowledge. Only in this way can the advantages of micro-courses be displayed.

abstract

The advantages of micro-courses have been described in detail, and the shortcomings of traditional education must be well applied in today's increasingly developed technology, especially for software technology majors, whose prices are relatively avant-garde. The teaching of software technology in the form of micro-lesson is helpful for students to experiment and program directly with computers after learning. This innovative teaching method is also conducive to the cultivation of innovation ability and the improvement of independent learning ability of software technology students. Therefore, universities must make good use of micro-courses in software technology teaching.

References:

[1]__ text, Chen Yong. Research on the Application of MATLAB in Mathematics Course of Software Technology Specialty in Higher Vocational Colleges [J]. Journal of Qingdao Vocational and Technical College, 20 15, (2):55-58.

[2] Wu Qiong. Investigation and Research on the Application of Micro-course Resources in Basic Teaching Points of Open University [J]. Journal of Nanjing Radio and TV University, 20 15, (4):24-29.

[3] Liang Zhu. A Study of Flip Classroom Based on the Application of Micro-course Resources in Experimental Teaching —— Taking Modern Educational Technology Course as an Example [J]. Education, 20 16, (21):181-182.

Analysis of Layering Technology in Computer Software Technology

Abstract: With the development of computer technology, computers are more and more widely used in real life, and the application of computer software in computers is also more and more common. Our development and utilization of computer software is also very common and extensive, but the existing computer software can no longer meet the needs of our lives, so we need to develop higher quality computer software, so the development of computer software has developed from a single one to multiple businesses. Next, briefly introduce the value of layered technology in computer software technology.

Keywords: layered technology; Computer software; Advantages of layered technology

With the wide application of computers and the development of computer software in our country, the functions of computer software can no longer meet our needs, so computer software has developed from two layers to multi-layers, but in this development process, middleware technology in computer software is a crucial link, and computer software layering technology is a new technology. However, with our research, we have mastered this technology to a certain extent. Now, layered technology, computer big data and computer software operating system together constitute the basic software of the computer. Now, the multi-layer technology of computer software has been widely used in our life and production. Using multi-layer technology of computer software can increase the adaptability and flexibility of computer to a certain extent. Thus, the layered technology of computer software plays a great role in our life.

1 computer layered software and its advantages

1. 1 The development of computer software is to develop higher quality computer software, make the functions of computer software more novel and convenient, and better serve our real life production activities. When developing software, there will be a component meeting to ensure the quality of the developed software, and the components can be used and combined separately. Components are divided into high-level components and low-level components. High-level components are generally regional components, and low-level components are mainly used to deal with large databases. Therefore, low-level components are generally considered as software for public services, but high-level components can be used between low-level components. In fact, the development of computer software is a comprehensive process, because every component of the computer is interrelated and dependent. If a new software is developed, it should be used in the old software that has been developed and utilized first, so that the new and old software are cheap enough to build and use, and the time spent on computer software development can be effectively reduced, and the quality of newly developed computer software can be better guaranteed.

1.2 Advantages of layered software. With the development and utilization of computer layered software, multi-layer computer software can gradually abstract the development and research of computer software, which can also optimize the functions of computer software. Applying this technology to practice can also expand the functions of the computer, and the functions of the computer software system will be reduced due to external factors, thus making the computer run better. Now through the application of layered technology, we have no special requirements for the form of computer interface. As long as the interface reaches a certain standard, it can be docked. This can better realize the docking with the computer.

2 Multi-layer technology in computer

With the development and research of computer software, our research on computer software has entered a higher level. The development of computer software has developed from the current two-tier, three-tier and four-tier direction, and multi-tier technology has been widely used in production and life, and has been continuously improved and perfected. Different levels of computer software have different functions. Here is a brief introduction.

2. 1 Two-tier structure technology and three-tier structure technology of computer software

This two-tier technology is mainly composed of large databases and clients. The user interface of the computer is mainly provided by the customers who use the computer, and the client also handles logical problems, then guides the customers to accept and query big data, and finally feeds back to the customers according to the query results. In practice, if the number of clients keeps increasing, we can't interact with them, which is the deficiency of software development. At the same time, there are also great risks in the process of communication between customers. This two-tier computer software can no longer meet our needs, so we began to research and develop higher quality computer software, so the three-tier technology developed accordingly. The newly developed three-tier computer software is developed on the basis of two-tier technology. Three-tier technology can realize human-computer interaction, better optimize data, effectively reduce the risk of users in the use process, and provide better help to customers. The three-tier technology of computer mainly includes three parts: excuse layer, data layer and business process. For example, Hitachi's ERP system software system adopts three-tier technology. Compared with the two-tier technology, the three-tier technology has many advantages, because it has a series of functions such as higher security, easier maintenance, scalability and reducing network load, but we should not blindly use the three-tier technology in the actual application process, but should proceed from the actual situation.

2.2 Four-layer mechanism technology of computer software

With the needs of people's production and life, our technical requirements for computer software are getting higher and higher. At the same time, with the development of dormant computer networks, computer applications have become more and more complex. In order to simplify the complicated program, we studied the original three-tier technology and developed four-tier computer technology. The four-layer technology of computer software is to add an encapsulation layer to the original data layer and business process. The encapsulation layer can provide different logic and data processing methods according to the needs of different users at runtime, which can improve the analysis of big data and improve the operating efficiency of computers, and better meet the needs of customers.

2.3 Middleware in computer software

Middleware is a kind of software technology when computer software develops to a certain extent, that is, the processing technology of big data. Using middleware can realize network interoperability and interconnection, even realize the enjoyment of network resources, and can greatly reduce the time spent on software development.

label

In order to meet customers' demand for computers, we should constantly strengthen technical research, develop better computer software, and constantly update computer technology to meet customers' demand.

References:

[1] Wanbo, Qiu. The application of layered technology in computer software development [J]. Computer Knowledge and Technology, 20 16, (25): 200-20 1.

[2] Li Junlin. Analysis on the application value of layered technology and plug-in technology in computer software technology [J]. Computer fan, 20 16, (09): 105.

[3] Li Xiaojian. Application analysis of layered technology in computer software development [J]. Communication power technology, 20 16, (02): 207-208.

Hong Xinjun. On the value of plug-in technology and layered technology in computer software technology [J]. Computer programming skills and maintenance, 20 16, (02): 10- 12.

Related articles:

1.5000 word computer graduation thesis

2. The latest model essay of college graduation thesis.

3. University computer information management graduation thesis

4. Computer professional college students cover letter model essay

5. College students' practical experience in computer network.