Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 8

first rewind previous Page / 1 next fast forward last

Search results

help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
The article contains a review of the methods of controlling the functioning of information systems. The use of these methods guarantees correctness of data contained in files, which is an indispensable condition for effective management of an enterprise. There have been presented two groups of control methods: system software, application software.
EN
The article contains a short review of the methods of the control of information systems such as: analysis of tests results, interviews, questionnaires, block diagrams and decision tables. The authoress points out advantages and shortcomings of these methods used in an area of applications not typical for them.
EN
Relational data bases are a novel but very dynamically developing field of knowledge. The article contains a review of the available and most popular systems of management of data bases. Its introductory part describes the rules concerning the relational model of data base elaborated by an American mathematician E. F. Codd and a short description of the SQL language being a standard of the structural language of questions increasingly more commonly used in the systems ,of management of relational data bases today. The core of the article are short presentations of the following data bases: Oracle 5.1,Ingres 5.0, Informix SQL and 4GL, SQLBase, Btrieve 4.1. and XQL 1.0,XDB II, SCO Integra, dBASE IV, Paradox 2.0, FoxBASE. In the final part of the article, the author presents a list of base processing speed tests containing the SQL language and a general list of the described data bases containing names of producers and minimal hardware requirements.The article ends with presentations of the present trends in development of the systems of management of data bases.
EN
The article deals with the control of input data in information systems. There are described in it the mode of procedure in case of detecting an error and the information which should be included in the report of errors. The authoress point at the advantages of collecting statistical data about errors occurring in a system.
EN
The article deals with problems concerning the control of the process of designing information systems and of the design documentation connected with it. Such controls aim at increasing the reliability of information systems. There have been described, among others, the following methods: source code review, comparison of a program with on attested version, program tracing, reprocessing, parallel simulation.
EN
The article discusses the problem of threats connected with introduction of informatics to data processing. There are analyzed typical deliberate and non-deliberate threats (computer offences) and ways of counteracting them.
7
100%
EN
The main problem encountered while conducting simulation experiments is referring an accepted model and results obtained by means of it to a simulated fragment of reality. All the problems appearing here are called ari evaluation of usefulness or an evaluation of adequacy of simulation models. This stage decides to what extent conclusions concerning a model can be transferred onto an analyzed system, i.e. to what extent a model is adequate in relation to a modelled reality. It is an important and at the same time a difficult problem connected with computer simulation. At the stage of evaluating a model’s usefulness it is necessary to construct a tool allowing to compare a model with an object it reflects. The author has presented a procedure of analyzing the adequacy of simulation models with application of statistical tests and spectrum analysis. This procedure is universal, as it makes allowances for the main problems, which can be encountered while evaluating usefulness of a model (i.e. whether there is or not an autocorrelation between subsequent results of an experiment and a different size of analyzed samples). Consequently, it can be applied to all classes of simulation models. The algorithm of the model's validation was implemented on the microcomputer of IBM PC class in an integrated environment of Turbo Pascal 5.0 language. The article consists of two parts. Its first part ("Evaluation o f adequacy of simulation models by means of statistical tests and spectrum analysis") describes the procedure of analyzing the usefulness of a model proposed by the author by means of statistical tests and spectrum analysis . The second part ("description of programme algorithms implementing an evaluation of adequacy of simulation models") presents programme algorithms used for statistical tests and spectrum analysis.
EN
The article contains a comprehensive review of the used methods of an automatic decreeing of Book-keeping vouchers. The first part of the article explains the term itself and the principles of decreeing vouchers in a descriptive way, as. well as the use of symbols and concepts from the sets theory. This is followed by presentation of the main characteristics of an automatic decreeing of economic operations and a review of the Polish solutions in this field and of the most common solutions adopted in the Soviet Union. The article unds with description of the procedure of an automatic decreeing elaborated by the authoress within the framework of her M.A. dissertation.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.