Professional Documents
Culture Documents
Document
Document
אא
< <hç‰^£]<Ýç×Â<ÜŠÎ<<–<Ýç×ÃÖ]<íé×Ò<<–<ð^Ãß‘<íÃÚ^q
ﺍﻟﻄﺒﻌﺔ ﺍﻷﻭﱃ
2009
ﲨﻴﻊ ﺣﻘﻮﻕ ﺍﻟﺘﺄﻟﻴﻒ ﻭ ﺍﻟﻄﺒﻊ ﻭﺍﻟﻨﺸﺮ ﳏﻔﻮﻇﺔ ﻟﻠﻤﺆﻟﻒ
ﺍﶈﺘﻮﻳﺎﺕ
Contents
ﺍﶈﺘﻮﻳﺎﺕ
I
44 ﻋﻤﻠﻴﺔ اﻟﺠﻤﻊ 1-7-2
45 ﻋﻤﻠﻴﺔ اﻟﻄﺮح 2-7-2
47 ﻋﻤﻠﻴﺔ اﻟﻀﺮب 3-7-2
48 ﻋﻤﻠﻴﺔ اﻟﻘﺴﻤﺔ 4-7-2
48 اﻟﻤﺘﻤﻤﺎت ﻓﻲ اﻟﻨﻈﺎم اﻟﺜﻨﺎﺋﻲ 8-2
49 اﻟﻤﺘﻤﻢ اﻷول 1-8-2
50 اﻟﻤﺘﻤﻢ اﻟﺜﺎﻧﻲ 2-8-2
51 اﻟﺘﺮﻣﻴﺰ 9-2
51 ﻧﻈﺎم BCD 1-9-2
52 ﻧﻈﺎم اﻻﺳﻜﻲ 2-9-2
II
85 اﻟﺘﺼﻨﻴﻒ ﺡﺴﺐ ﺡﻖ اﻟﻮﺹﻮل ﻟﺨﺪﻣﺎت اﻟﺸﺒﻜﺔ 2-3-4
86 اﻟﺘﺼﻨﻴﻒ ﺡﺴﺐ اﻟﻌﻼﻗﺔ ﺏﻴﻦ اﻷﺟﻬﺰة 3-3-4
87 اﻟﺘﺼﻨﻴﻒ ﺡﺴﺐ اﻟﺘﻘﻨﻴﺔ اﻟﻤﺴﺘﺨﺪﻣﺔ 4-3-4
88 وﺳﺎﺋﻞ اﻟﺘﺮاﺳﻞ 4-4
88 اﻷوﺳﺎط اﻟﻤﻮﺟﻬﺔ 1-4-4
92 اﻷوﺳﺎط ﻏﻴﺮ اﻟﻤﻮﺟﻬﺔ 2-4-4
94 اﻟﺸﺒﻜﺎت اﻟﻼﺳﻠﻜﻴﺔ 5-4
95 ﻓﻮاﺋﺪ اﻟﺸﺒﻜﺎت اﻟﻼﺳﻠﻜﻴﺔ 1-5-4
95 ﺕﺼﻨﻴﻒ اﻟﺸﺒﻜﺎت اﻟﻼﺳﻠﻜﻴﺔ 2-5-4
98 ﺵﺒﻜﺔ اﻻﻧﺘﺮﻧﺖ 6-4
99 آﻴﻒ یﻌﻤﻞ اﻻﻧﺘﺮﻧﺖ 1-6-4
99 ﻃﺮق اﻻﺕﺼﺎل ﺏﺎﻻﻧﺘﺮﻧﺖ 2-6-4
101 ﻣﺼﻄﻠﺤﺎت ﻓﻲ اﻻﻧﺘﺮﻧﺖ 3-6-4
III
142-125 ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺩﺱ :ﻣﻘﺪﻣﺔ ﰲ ﻓﲑﻭﺳﺎﺕ ﺍﳊﺎﺳﻮﺏ
127 اﻟﻤﻘﺪﻣﺔ 1-6
128 ﺕﻌﺮف اﻟﻔﻴﺮوس 2-6
132 اﻟﺒﺮاﻣﺞ اﻟﺨﺒﻴﺜﺔ 3-6
137 أﺽﺮار اﻟﺒﺮاﻣﺞ اﻟﺨﺒﻴﺜﺔ 4-6
139 اﻟﺒﺮاﻣﺞ اﻟﻤﻀﺎدة ﻟﻠﻔﻴﺮوﺳﺎت 5-6
141 آﻴﻒ ﻧﺤﺎﻓﻆ ﻋﻠﻰ ﺡﺎﺳﻮب ﺥﺎﻟﻲ ﻣﻦ اﻟﻔﻴﺮوﺳﺎت 6-6
160-157 ﺍﳌﺼــﺎﺩﺭ
ﺍﳌﻼﺣــﻖ
180-161
IV
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ
ﻣﻘﺪﻣـﺔ ﻋﺎﻣـﺔ
General Introduction
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ
ﻣﻘﺪﻣـــﺔ ﻋﺎﻣﺔ
General Introduction
ﺍﳌﻘـﺪﻣـﺔ 1-1
3
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ......................................................................ﻣﻘﺪﻣﺔ ﻋﺎﻣﺔ
ﺍﳌﻌﺎﳉﺔ
اﻟﺬاآﺮة اﻟﺮﺋﻴﺴﻴﺔ
Main Memory
وﺣﺪة اﻟﺤﺴﺎب
واﻟﻤﻨﻄﻖ
ِALU
4
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ......................................................................ﻣﻘﺪﻣﺔ ﻋﺎﻣﺔ
ﻴﻤﻜﻥ ﺘﻘﺴﻴﻡ ﻤﺭﺍﺤل ﺍﻟﺘﻁﻭﺭ ﺍﻟﺘﻘﻨﻲ ﻟﻠﺤﺎﺴﻭﺏ ﺇﻟﻰ ﻓﺘﺭﺍﺕ ﺯﻤﻨﻴﺔ ﺘﺴﻤﻰ
ﺍﻷﺠﻴﺎل ) (Generationsﻭﻫﻲ :
.1ﺍﻟﺠﻴل ﺍﻷﻭل First Generation
ﻭﻴﺸﻤل ﻫﺫﺍ ﺍﻟﺠﻴل ﺍﻟﻔﺘﺭﺓ ﺍﻟﺯﻤﻨﻴﺔ ﻤﻥ 1959 – 1945ﻡ ،ﻭﻤﻥ ﺨﺼﺎﺌﺼﻪ :
ﺍﺴﺘﺨﺩﺍﻡ ﺍﻟﺼﻤﺎﻤﺎﺕ ﺍﻟﻤﻔﺭﻏﺔ Vacuum Tube
5
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ......................................................................ﻣﻘﺪﻣﺔ ﻋﺎﻣﺔ
ﺴﺭﻋﺔ ﺘﻨﻔﻴﺫ ﺍﻟﻌﻤﻠﻴﺎﺕ ﻓﻴﻬﺎ ﻤﺌﺎﺕ ﺁﻻﻑ ﻤﻥ ﺍﻟﻌﻤﻠﻴﺎﺕ ﻓﻲ ﺍﻟﺜﺎﻨﻴﺔ ﺍﻟﻭﺍﺤﺩﺓ.
ﺍﻟﺘﺭﺍﻨﺯﺴﺘﻭﺭﺍﺕ Transistors
6
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ......................................................................ﻣﻘﺪﻣﺔ ﻋﺎﻣﺔ
7
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ......................................................................ﻣﻘﺪﻣﺔ ﻋﺎﻣﺔ
8
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ......................................................................ﻣﻘﺪﻣﺔ ﻋﺎﻣﺔ
3-1ﻣﻜﻮﻧﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﻤﻥ ﺘﻌﺭﻴﻑ ﺠﻬﺎﺯ ﺍﻟﺤﺎﺴﻭﺏ ،ﻴﻤﻜﻥ ﺘﻘﺴﻴﻡ ﻤﻜﻭﻨﺎﺘﻪ ﺇﻟﻰ ﻗﺴﻤﻴﻥ :ﺍﻷﺠﻬـﺯﺓ
ﺍﻟﺩﻗﻴﻘﺔ ﺍﻭ ﻤﺎ ﻴﻁﻠﻕ ﻋﻠﻴﻬﺎ ﺍﻟﻤﻜﻭﻨﺎﺕ ﺍﻟﻤﺎﺩﻴﺔ ) (Hardwareﻭﺍﻟﺒﺭﻤﺠﻴﺎﺕ )(Software
ﺍﻟﺘﻲ ﺘﺭﺒﻁ ﻤﺎ ﺒﻴﻥ ﻫﺫﻩ ﺍﻷﺠﻬﺯﺓ.
-1ﻭﺤﺩﺍﺕ ﺍﻹﺩﺨﺎل
ﻫﻲ ﺍﻷﺠﻬﺯﺓ ﺍﻟﺘﻲ ﺘﻤﺜل ﺤﻠﻘﺔ ﺍﻟﺭﺒﻁ ﺒﻴﻥ ﺍﻟﻤﺴﺘﺨﺩﻡ ﻭﺍﻟﺤﺎﺴﻭﺏ ،ﺇﺫ ﻴﺘﻡ ﺇﺩﺨﺎل
ﺍﻟﺒﺭﺍﻤﺞ ﻭﺍﻟﺒﻴﺎﻨﺎﺕ ﺇﻟﻰ ﺍﻟﺤﺎﺴﻭﺏ ﻋﻥ ﻁﺭﻕ ﻭﺤﺩﺍﺕ ﺇﺩﺨﺎل ﻤﺘﻨﻭﻋﺔ ﻤﺜل :
ﻟﻭﺤﺔ ﺍﻟﻤﻔﺎﺘﻴﺢ )(Keyboard
ﺍﻟﻔﺄﺭﺓ )(Mouse
ﺴﻭﺍﻗﺎﺕ ﺍﻷﻗﺭﺍﺹ ﺍﻟﻤﺨﺘﻠﻔﺔ.
ﺍﻷﻗﺭﺍﺹ ﺍﻟﻘﺎﺒﻠﺔ ﻟﻺﺯﺍﻟﺔ )(USB
9
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ......................................................................ﻣﻘﺪﻣﺔ ﻋﺎﻣﺔ
10
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ......................................................................ﻣﻘﺪﻣﺔ ﻋﺎﻣﺔ
-2ﻭﺤﺩﺍﺕ ﺍﻹﺨﺭﺍﺝ
ﻫﻲ ﺃﺠﻬﺯﺓ ﺍﻟﻭﺴﺎﺌﻁ ﺍﻟﻤﺘﻌﺩﺩﺓ ﺍﻟﺘﻲ ﺘﺴﺘﻠﻡ ﺍﻟﻨﺘﺎﺌﺞ ﻤﻥ ﻭﺤﺩﺓ ﺍﻟﻤﻌﺎﻟﺠﺔ ﺍﻟﻤﺭﻜﺯﻴﺔ
ﻭﻋﺭﻀﻬﺎ ﻋﻠﻰ ﺃﺠﻬﺯﺓ ﻭﺤﺩﺍﺕ ﺍﻹﺨﺭﺍﺝ ﺍﻟﻤﺘﻨﻭﻋﺔ ﻤﺜل :
ﺍﻟﺸﺎﺸﺎﺕ )(Monitors
ﺍﻟﻁﺎﺒﻌﺎﺕ )(Printers
ﺴﻭﺍﻗﺎﺕ ﺍﻷﻗﺭﺍﺹ ﺍﻟﻤﺨﺘﻠﻔﺔ.
ﺍﻷﻗﺭﺍﺹ ﺍﻟﻘﺎﺒﻠﺔ ﻟﻺﺯﺍﻟﺔ )(USB
ﺍﻟﺴﻤﺎﻋﺎﺕ )(Speakers
ﻭﻜﻤﺎ ﻤﻭﻀﺢ ﻓﻲ ﺍﻷﺸﻜﺎل ﺍﻵﺘﻴﺔ:
ﺍﻟﺸﺎﺸﺔ )(Monitor
11
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ......................................................................ﻣﻘﺪﻣﺔ ﻋﺎﻣﺔ
ﺍﻟﻁﺎﺒﻌﺔ )(Printer
ﺍﻟﺴﻤﺎﻋﺎﺕ )(Speakers
-3ﻭﺤﺩﺍﺓ ﺍﻟﻤﻌﺎﻟﺠﺔ
.2ﻭﺤﺩﺓ ﺍﻟﺘﺤﻜﻡ : Control Unitﻫﻲ ﺃﺴﺎﺱ ﻭﺤﺩﺓ ﺍﻟﻤﻌﺎﻟﺠﺔ ﺍﻟﻤﺭﻜﺯﻴﺔ ﺘﺄﺨﺫ ﻋﻠﻰ
ﻋﺎﺘﻘﻬﺎ ﺍﻟﺴﻴﻁﺭﺓ ﻭﺍﻟﺘﺤﻜﻡ ﻋﻠﻰ ﻜﺎﻓﺔ ﺍﻟﻔﻌﺎﻟﻴﺎﺕ ﻭﺍﻟﻌﻤﻠﻴﺎﺕ ﺩﺍﺨل ﺍﻟـ ، .CPUﺇﺫ
ﺘﻘﻭﻡ ﺒﺠﻠﺏ ﺍﻷﻭﺍﻤﺭ ﻤﻥ ﺍﻟﺫﺍﻜﺭﺓ ﻭﺇﺼﺩﺍﺭ ﺃﻭﺍﻤﺭ ﺍﻟﺘﺤﻜﻡ ﻟﺘﻨﻔﻴﺫﻫﺎ.
12
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ......................................................................ﻣﻘﺪﻣﺔ ﻋﺎﻣﺔ
13
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ......................................................................ﻣﻘﺪﻣﺔ ﻋﺎﻣﺔ
14
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ......................................................................ﻣﻘﺪﻣﺔ ﻋﺎﻣﺔ
ﺨﻼﻴﺎ ﺨﺯﻥ ﻟﻠﺸﺤﻨﺎﺕ ﺍﻟﻜﻬﺭﺒﺎﺌﻴﺔ ﻟﺫﻟﻙ ﺘﺤﺘﺎﺝ ﺇﻟـﻰ ﺇﻨﻌـﺎﺵ ﻤﺴـﺘﻤﺭ ﻻﻥ
ﺍﻟﺸﺤﻨﺔ ﺍﻟﻜﻬﺭﺒﺎﺌﻴﺔ ﺘﺘﻼﺸﻰ ﻤﻊ ﺍﻟﺯﻤﻥ.
ﺫﺍﻜﺭﺓ ﺍﻟﻭﺼﻭل ﺍﻟﻌﺸﻭﺍﺌﻲ ﺍﻟﻤﺴﺘﻘﺭ ) :(Static RAMﻻ ﺘﺤﺘﺎﺝ ﺇﻟﻰ ﻋﻤﻠﻴﺔ
15
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ......................................................................ﻣﻘﺪﻣﺔ ﻋﺎﻣﺔ
ﺍﻟﻘﺭﺹ ﺍﻟﺼﻠﺏ
ﺍﻟﻘﺭﺹ ﺍﻟﻤﺭﻥ ) : Floppy Disk (FDﺍﻟﻘﺭﺹ ﺍﻟﻤﺭﻥ ﻤﺼﻨﻭﻉ ﻤﻥ ﻤـﺎﺩﺓ
ﺒﻼﺴﺘﻴﻜﻴﺔ ﻤﻐﻁﺎﺓ ﺒﻤﺎﺩﺓ ﻗﺎﺒﻠﺔ ﻟﻠﺘﻤﻐﻨﻁ ﻭﻤﺤﻔﻭﻅﺔ ﺩﺍﺨل ﻏﻼﻑ ﻟﺤﻤﺎﻴﺔ ﺍﻟﺴﻁﺢ
ﺍﻟﻤﻤﻐﻨﻁ .ﻴﻘﺴﻡ ﺍﻟﻘﺭﺹ ﺍﻟﻤﺭﻥ ﻤﻥ ﺍﻟﺩﺍﺨل ﺇﻟـﻰ ﻋـﺩﺩ ﻤـﻥ ﺍﻟﻤﺴـﺎﺭﺍﺕ
) (Tracksﻭﻜل ﻤﺴﺎﺭ ﻤﻨﻬﺎ ﻴﻨﻘﺴﻡ ﺇﻟﻰ ﻋﺩﺩ ﻤـﻥ ﺍﻟﻘﻁﺎﻋـﺎﺕ ).(Sectors
ﺘﺘﻭﻓﺭ ﻫﺫﻩ ﺍﻷﻗﺭﺍﺹ ﺒﻌﺩﺓ ﺃﻨﻭﺍﻉ ﻭﻓﻘﺎ ﻟﻘﻁﺭﻫﺎ ﻭﺴﻌﺘﻬﺎ ﺍﻟﺨﺯﻨﻴﺔ ﻭﺍﻟﻤﺘـﺩﺍﻭل
ﻤﻨﻬﺎ ﻫﻭ ) (3.5ﺍﻨﺞ ﻭﺴﻌﺘﻪ ﺍﻟﺨﺯﻨﻴﺔ ) (1.44ﻤﻴﻜﺎﺒﺎﻴﺕ .ﻭﻜﻤﺎ ﻤﻭﻀﺢ ﻓـﻲ
ﺍﻟﺸﻜل ﺍﻵﺘﻲ:
3.5اﻥﺞ
5.25اﻥﺞ
16
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ......................................................................ﻣﻘﺪﻣﺔ ﻋﺎﻣﺔ
ﺘﺘﻡ ﻋﻤﻠﻴﺔ ﺨﺯﻥ ﺍﻟﺒﻴﺎﻨﺎﺕ ﻋﻠﻰ ﺍﻷﻗﺭﺍﺹ ﻋﻥ ﻁﺭﻴﻕ ﻋﻤل ﺍﻟﺘﺠﺎﻭﻴﻑ )(Pits
ﻭﺍﻷﺭﻀﻴﺔ ) (Landsﺒﻭﺍﺴﻁﺔ ﺸﻌﺎﻉ ﻟﻴﺯﺭ ﻋﻠﻰ ﺴﻁﺢ ﺍﻟﻘﺭﺹ .ﻴﺘﻤﻴﺯ ﻫـﺫﺍ
ﺍﻟﻘﺭﺹ ﺒﺄﻨﻪ ﻻ ﻴﻤﻜﻥ ﻤﺴﺢ ﺍﻟﺒﻴﺎﻨﺎﺕ ﺍﻟﻤﺨﺯﻭﻨﺔ ﻋﻠﻴﻪ ﻜﻤﺎ ﻴﻤﺘـﺎﺯ ﺒﻤﻘﺎﻭﻤﺘـﻪ
ﺍﻟﻌﺎﻟﻴﺔ ﻟﻠﻌﻭﺍﻤل ﺍﻟﺒﻴﺌﻴﺔ ﻤﻘﺎﺭﻨﺔ ﺒﺎﻷﻗﺭﺍﺹ ﺍﻟﻤﺭﻨﺔ.
17
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ......................................................................ﻣﻘﺪﻣﺔ ﻋﺎﻣﺔ
18
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ......................................................................ﻣﻘﺪﻣﺔ ﻋﺎﻣﺔ
ﺍﻟﺤﺎﺴﻭﺏ ﺇﺫ ﻻ ﻴﻤﻜﻥ ﺤﺫﻓﻬﺎ ﺃﻭ ﺘﻐﻴﺭ ﻤﺤﺘﻭﻴﺎﺘﻬﺎ .ﻭﺘﻘﺴﻡ ﺒﺭﻤﺠﻴﺎﺕ ﺍﻟﻨﻅﺎﻡ ﺇﻟﻰ ﺜﻼﺙ
ﻤﺠﺎﻤﻴﻊ :
ﺃﻨﻅﻤﺔ ﺍﻟﺘﺸﻐﻴل ) :(Operating Systemsﻫﻲ ﺍﻟﺒﺭﺍﻤﺞ ﺍﻟﻤﺴﺅﻭﻟﺔ ﻋﻥ ﺃﺩﺍﺭﺓ
ﺍﻟﻤﻜﻭﻨﺎﺕ ﺍﻟﻤﺎﺩﻴﺔ ﻟﻠﺤﺎﺴﻭﺏ.
ﺍﻟﻤﺘﺭﺠﻤﺎﺕ ) : (Compilersﻫﻲ ﺍﻟﺒﺭﺍﻤﺞ ﺍﻟﻤﺴﺅﻭﻟﺔ ﻋﻥ ﺘﺭﺠﻤﺔ ﺃﻭﺍﻤﺭ
ﺍﻟﺒﺭﻨﺎﻤﺞ ﺍﻟﻤﺼﺩﺭ ﺇﻟﻰ ﻟﻐﺔ ﺍﻵﻟﺔ )(Machine Language
ﺍﻟﺘﻲ ﻴﺴﺘﻁﻴﻊ ﺍﻟﺤﺎﺴﻭﺏ ﻓﻬﻤﻬﺎ.
ﺍﻟﺒﺭﺍﻤﺞ ﺍﻟﺨﺩﻤﻴﺔ :ﻫﻲ ﺍﻟﺒﺭﺍﻤﺞ ﺍﻟﺘﻲ ﺘﺅﺩﻱ ﻭﻅﻴﻔﺔ ﺃﻭ ﻭﻅﺎﺌﻑ ﻤﺤﺩﺩﺓ ،ﻤﺜل
ﺒﺭﺍﻤﺞ ﻜﺸﻑ ﻭﻤﻌﺎﻟﺠﺔ ﺍﻟﻔﻴﺭﻭﺱ.
19
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ......................................................................ﻣﻘﺪﻣﺔ ﻋﺎﻣﺔ
20
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ......................................................................ﻣﻘﺪﻣﺔ ﻋﺎﻣﺔ
ﻭﻴﻤﻜﻥ ﺍﺴﺘﺨﺩﺍﻤﻬﺎ ﻋﻠﻰ ﺃﺠﻬﺯﺓ ﺤﺎﺴﻭﺏ ﻤﺨﺘﻠﻔﺔ ﺒﻐﺽ ﺍﻟﻨﻅﺭ ﻋﻥ ﺍﻟﺸﺭﻜﺎﺕ ﺍﻟﻤﺼﻨﻌﺔ
ﻟﻬﺎ .ﻭﻓﻴﻤﺎ ﻴﻠﻲ ﻨﺒﺫﺓ ﻋﻥ ﺃﻫﻡ ﻟﻐﺎﺕ ﻫﺫﺍ ﺍﻟﻤﺴﺘﻭﻯ :
Θﻟﻐﺔ :LISPﻤﺨﺘﺼﺭ ﺇﻟـﻰ ) ، (List Processingﺼـﻤﻤﺕ ﻤـﻥ ﻗﺒـل
) (1960 - 1959) (John McCarthyﺘﺴﺘﺨﺩﻡ ﻓﻲ ﺍﻟﺒﺤﻭﺙ ﺍﻟﻌﻠﻤﻴﺔ ﻜﻠﻐﺔ
ﺫﻜﺎﺀ ﺍﺼﻁﻨﺎﻋﻲ.
Θﻟﻐﺔ :Prologﻤﺨﺘﺼﺭ ﺇﻟﻰ ) ، (Programming in Logicﺼﻤﻤﺕ ﻓـﻲ
ﻓﺭﻨﺴﺎ ﻓﻲ ﺍﻟﺴﺒﻌﻴﻨﻴﺎﺕ .ﺘﺴﺘﺨﺩﻡ ﻜﻠﻐﺔ ﺫﻜﺎﺀ ﺍﺼﻁﻨﺎﻋﻲ ﻓﻲ ﻤﺠﺎل ﺍﻷﻨﻅﻤـﺔ
ﺍﻟﺨﺒﻴﺭﺓ ).(Expert Systems
Θﻟﻐﺔ : Pascalﺼﻤﻤﺕ ﻤﻥ ﻗﺒـل Niklaus Wirthﻋـﺎﻡ ، 1971ﺘﻌـﺩ
ﺃﻭل ﻟﻐــﺔ ﻤﺼــﻤﻤﺔ ﺒﻌــﺩ ﻅﻬــﻭﺭ ﻤﺼــﻁﻠﺢ ﺍﻟﻠﻐــﺎﺕ ﺍﻟﻤﻬﻴﻜﻠــﺔ
).(Structured Language
Θﻟﻐﺔ :BASICﻤﺨﺘﺼﺭ ﺇﻟـﻰ ) Beginner’s All-purpose Symbolic
، (Instruction Codeﺼﻤﻤﺕ ﻤﻥ ﻗﺒـل John Kemenyﻭ Thomas
Kurtsﻋﺎﻡ .1965ﺘﻌﺘﺒﺭ ﻟﻐﺔ BASICﻤﻥ ﺍﻟﻠﻐﺎﺕ ﺍﻟﺭﻤﺯﻴـﺔ ﺍﻟﻤﺘﻌـﺩﺩﺓ
ﺍﻹﻏﺭﺍﺽ ﻟﻠﻤﺒﺘﺩﺌﻴﻥ.
Θﻟﻐﺔ :FORTRANﻤﺨﺘﺼﺭ ﺇﻟﻰ )، (FORMULA TRANSLATION
ﺼﻤﻤﺕ ﻤﻥ ﻗﺒل John Backusﻓﻲ ﺍﻟﻔﺘﺭﺓ .1958-1954ﺘﻌﺘﺒﺭ ﻫـﺫﻩ
ﺍﻟﻠﻐﺔ ﻤﻥ ﺃﻫﻡ ﺍﻟﻠﻐﺎﺕ ﺍﻟﺘﻲ ﺘﺴﺘﺨﺩﻡ ﻓﻲ ﺍﻟﺘﻁﺒﻴﻘﺎﺕ ﺍﻟﻬﻨﺩﺴﻴﺔ ﻭﺍﻟﺭﻴﺎﻀﻴﺔ.
Θﻟﻐﺔ :Cﺼﻤﻤﺕ ﻓﻲ ﻤﻌﺎﻤل Bellﺍﻷﻤﺭﻴﻜﻴﺔ ﻤﻥ ﻗﺒـل Dennis Ritchie
ﻋﺎﻡ .1972ﺘﻌﺘﺒﺭ ﻫﺫﻩ ﺍﻟﻠﻐﺔ ﻤﻥ ﺍﻟﻠﻐﺎﺕ ﺍﻟﺘﻲ ﺍﺴـﺘﺨﺩﻤﺕ ﻟﻜﺘﺎﺒـﺔ ﻨﻅـﺎﻡ
ﺍﻟﺘﺸﻐﻴل ) (Unixﻭﻫﻲ ﺘﺠﻤﻊ ﺒﻴﻥ ﻟﻐﺎﺕ ﺍﻟﻤﺴﺘﻭﻯ ﺍﻟﻭﺍﻁﺊ ﻭﺍﻟﻌﺎﻟﻲ.
Θﻟﻐﺔ : C++ﺼﻤﻤﺕ ﻓﻲ ﻤﻌﺎﻤل Bellﺍﻷﻤﺭﻴﻜﻴﺔ ﻜﻨﺴﺨﺔ ﻤﻁﻭﺭﺓ ﻟﻠﻐـﺔ C
ﻤﻥ ﻗﺒل Bjarne Stroustrupﻓﻲ ﺒﺩﺍﻴﺔ ﺍﻟﺜﻤﺎﻨﻴﻨﻴﺎﺕ .ﻭﺘﻌـﺩ ﻫـﺫﻩ ﺍﻟﻠﻐـﺔ
21
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ......................................................................ﻣﻘﺪﻣﺔ ﻋﺎﻣﺔ
ﻫﻲ ﺍﻟﺒﺭﺍﻤﺞ ﺍﻟﻤﺴﺅﻭﻟﺔ ﻋﻥ ﺃﺩﺍﺭﺓ ﺍﻟﻤﻜﻭﻨﺎﺕ ﺍﻟﻤﺎﺩﻴﺔ ﻟﻠﺤﺎﺴﻭﺏ .ﺇﻥ ﻨﻅﺎﻡ ﺍﻟﺘﺸﻐﻴل
ﻴﻤﺜل ﺤﻠﻘﺔ ﺍﻻﺘﺼﺎل ﺒﻴﻥ ﺍﻟﻤﺴﺘﺨﺩﻡ ﻭﺍﻟﺤﺎﺴﻭﺏ ،ﻓﺎﻟﻤﺴﺘﺨﺩﻡ ﻴﺘﻌﺎﻤل ﻤـﻊ ﻤﻜﻭﻨـﺎﺕ
ﺍﻟﺤﺎﺴﻭﺏ ﺍﻟﻤﺨﺘﻠﻔﺔ ﻤﻥ ﺨﻼل ﻨﻅﺎﻡ ﺍﻟﺘﺸﻐﻴل ﺍﻟﺫﻱ ﻴﻨﻅﻡ ﺍﻟﻌﻤﻠﻴﺎﺕ ﺍﻟﺘـﻲ ﻴﻘـﻭﻡ ﺒﻬـﺎ
ﺍﻟﺤﺎﺴﻭﺏ .ﻭﻟﻬﺫﺍ ﻴﻤﻜﻥ ﺘﺸﺒﻴﻪ ﻨﻅﺎﻡ ﺍﻟﺘﺸـﻐﻴل ﺒﺎﻟﻤـﺩﻴﺭ ) (Managerﺍﻟـﺫﻱ ﻴـﺩﻴﺭ
ﻤﺸﺭﻭﻋﹰﺎ ﻤﻌﻴﻨﹰﺎ ،ﻭﻟﻜﻲ ﻴﻜﺘﺏ ﻟﻬﺫﺍ ﺍﻟﻤﺸﺭﻭﻉ ﺍﻟﻨﺠﺎﺡ ﻭﺒﻜﻔﺎﺀﺓ ﻋﺎﻟﻴﺔ ﻓﺎﻥ ﻋﻠﻰ ﺍﻟﻤـﺩﻴﺭ
ﺃﻥ ﻴﻘﻭﻡ ﺒﺘﻨﻅﻴﻡ ﺃﻨﺸﻁﺔ ﺍﻟﻤﺸﺭﻭﻉ ﻭﺍﻟﻤﻭﺍﺭﺩ ﺍﻟﻤﺴﺘﺨﺩﻤﺔ ﻓﻲ ﺘﻨﻔﻴﺫ ﻫﺫﻩ ﺍﻷﻨﺸﻁﺔ ﺒﻬﺩﻑ
ﺘﻨﻔﻴﺫ ﺍﻟﻤﺸﺭﻭﻉ ﺒﺄﻗل ﻭﻗﺕ ﻤﻤﻜﻥ ﻭﺒﺄﻜﻔﺄ ﺍﺴﺘﻐﻼل ﻟﻠﻤﻭﺍﺭﺩ ﺍﻟﻤﺘﺎﺤﺔ.
ﻴﻌﺩ ﻨﻅـﺎﻡ ﺍﻟﺘﺸـﻐﻴل (Microsoft Disk Operating System ) MS-DOS
ﺍﻷﺴﺎﺱ ﻷﻨﻅﻤﺔ ﺍﻟﺘﺸﻐﻴل ﻟﻠﺤﺎﺴﻭﺏ ﺍﻟﺸﺨﺼﻲ ) .(Personal Computer- Cﻭﻴﺘﻤﻴﺯ
ﻫﺫﺍ ﺍﻟﻨﻅﺎﻡ ﺒﺄﻨﻪ ﺴﻬل ﺍﻻﺴﺘﺨﺩﺍﻡ ﻭﻴﻌﻤل ﻋﻠﻰ ﺃﺠﻬﺯﺓ ﺍﻟﺤﻭﺍﺴـﻴﺏ ﺫﻭﺍﺕ ﺍﻟﻤﻌﺎﻟﺠـﺎﺕ
22
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ......................................................................ﻣﻘﺪﻣﺔ ﻋﺎﻣﺔ
ﺍﻟﻘﺩﻴﻤﺔ ﻤﺜل ﻤﻌﺎﻟﺠﺎﺕ ﻋﺎﺌﻠﺔ ) .(80xﻭﺍﻟﺘﻲ ﺘﻌﺘﺒﺭ ﺍﺭﺨﺹ ﺍﻷﺠﻬﺯﺓ ﻭﺘﻠﺒﻲ ﻤﺘﻁﻠﺒـﺎﺕ
ﺍﻻﺴﺘﺨﺩﺍﻤﺎﺕ ﺍﻟﺸﺨﺼﻴﺔ .ﺤﻴﺙ ﺃﻥ ﻨﻅﺎﻡ ﺍﻟﺘﺸﻐﻴل MS-DOSﻴﺴﻤﺢ ﺒﺘﺸﻐﻴل ﺒﺭﻨـﺎﻤﺞ
ﺘﻁﺒﻴﻘﻲ ﻭﺍﺤﺩ.
اﻟﺘﻄﺒﻴﻘﺎت Applications
ﻥﻈﺎم اﻟﺘﺸﻐﻴﻞ
ﻡﺸﻐﻼت اﻷﺝﻬﺰة )(Device Drivers
ﻴﺴﻤﺢ ﺒﻤﺸﺎﻫﺩﺓ ﺍﻟﻨﺹ ﻭﺍﻟﺭﺴﻭﻡ ﺘﻤﺎﻤﺎ ﻜﻤﺎ ﺴﺘﻅﻬﺭ ﻋﻨﺩ ﻁﺒﺎﻋﺘﻬﺎ.
23
ﻣﻘﺪﻣﺔ ﻋﺎﻣﺔ...................................................................... ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ
.ﺍﻟﻨﻅﺎﻡ
( ﻤـﻥ ﺃﻜﺜـﺭ ﺃﻨﻅﻤـﺔ ﺍﻟﺘﺸـﻐﻴل ﺘﺤـﺩﻴﺜﹰﺎWindows) ﻴﻌﺘﺒﺭ ﻨﻅﺎﻡ ﺍﻟﺘﺸﻐﻴل
( ﺃﻥ ﻫﻨـﺎﻙ ﺇﺼـﺩﺍﺭ )ﻨﺴـﺨﺔ، ﻭﺒﻔﺘﺭﺓ ﺯﻤﻨﻴـﺔ ﻗﺼـﻴﺭﺓ، ﺤﻴﺙ ﻨﺠﺩ،ﻭﺘﻁﻭﻴﺭﺍﹰ
ﺍﻟﺠـﺩﻭل ﺍﻵﺘـﻲ ﻴﻭﻀـﺢ ﺍﻟﺘﻁـﻭﺭ ﺍﻟﺘﻘﻨـﻲ.ﺠﺩﻴﺩﺓ ﻗﺩ ﻨﺯﻟـﺕ ﺇﻟـﻰ ﺍﻷﺴـﻭﺍﻕ
.(Windows) ﻹﺼﺩﺍﺭﺍﺕ ﻨﻅﺎﻡ ﺍﻟﺘﺸﻐﻴل
24
ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ ......................................................................ﻣﻘﺪﻣﺔ ﻋﺎﻣﺔ
ﻏﻴﺭ ﻤﺘﻼﺌﻡ ﻤﻊ ﺃﻨﻅﻤﺔ ﺘﺸﻐﻴل ﺃﺨﺭﻯ ﻤﻤﺎ ﺃﺩﻯ ﺇﻟﻰ ﻋﺩﻡ ﺍﻨﺘﺸﺎﺭ ﺍﺴﺘﺨﺩﺍﻤﻪ
ﻜﻭﻨﻪ ﻤﻜﺘﻭﺏ ﺒﻠﻐﺔ ﺒﺭﻤﺠﺔ ﻤﺴﺘﻭﻯ ﻋﺎﻟﻲ ﻭﻫﻲ ﻟﻐﺔ .C
25
26
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ
ﻣﻘﺪﻣـــﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
An Introduction to
Numbering Systems
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ
ﻣﻘﺪﻣـــﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
An Introduction to Numbering Systems
1-2ﺍﳌﻘـﺪﻣـﺔ
ﻜﺎﻨﺕ ﺍﻷﻨﻅﻤﺔ ﺍﻟﻌﺩﺩﻴﺔ ﻭﺤﺴﺎﺒﻬﺎ ﺃﺴﺎﺱ ﺘﻨﻅﻴﻡ ﺍﻟﺤﻴﺎﺓ ﻤﻨﺫ ﺍﻟﻘﺩﻡ ،ﻓﻠﻘﺩ ﺍﺴﺘﺨﺩﻤﺕ
ﻤﺨﺘﻠﻑ ﺍﻟﺤﻀﺎﺭﺍﺕ ﻓﻲ ﺒﻼﺩ ﻭﺍﺩﻱ ﺍﻟﺭﺍﻓﺩﻴﻥ ﻭﻤﺼﺭ ﺒﺤﺩﻭﺩ 3400ﻕ.ﻡ ﻨﻅﺎﻡ ﺍﻟﺤﺴﺎﺏ
ﺍﻟﺒﺴﻴﻁ ﺍﻟﺫﻱ ﻴﻌﺘﻤﺩ ﻋﻠﻰ ﺍﻟﻌﺩﺩ ﻋﺸﺭﺓ ،ﻭﺭﺒﻤﺎ ﻴﺭﺠﻊ ﺍﻟﺴﺒﺏ ﻓﻲ ﺫﻟﻙ ﺇﻟﻰ ﺃﺼﺎﺒﻊ ﺍﻟﻴﺩ
ﺍﻟﻌﺸﺭﺓ ﺍﻟﺘﻲ ﺍﺴﺘﺨﺩﻤﻬﺎ ﺍﻟﻨﺎﺱ ﻓﻲ ﺤﺴﺎﺒﺎﺘﻬﻡ ﺍﻟﺒﺴﻴﻁﺔ ﺃﻭل ﺍﻷﻤﺭ ،ﻭﻜل ﻤﺎ ﺴﺒﻕ ﻤﻥ ﺘﻠﻙ
ﺍﻷﻨﻅﻤﺔ ﻭﺍﺴﺘﺨﺩﺍﻤﺎﺘﻬﺎ ،ﺭﺍﺠﻊ ﺇﻟﻰ ﺍﻟﺤﺎﺠﺔ ﺍﻟﺒﺩﺍﺌﻴﺔ ﺍﻟﺒﺴﻴﻁﺔ ﻟﺘﻠﻙ ﺍﻟﻘﺒﺎﺌل ﻭﺍﻟﺘﺠﻤﻌﺎﺕ ﻓﻲ
ﺘﺴﻴﻴﺭ ﺃﻤﻭﺭﻫﻡ ﺍﻟﺤﻴﺎﺘﻴﺔ.
ﻫﻨﺎﻟﻙ ﻋﺩﺩ ﻤﻥ ﺍﻷﻨﻅﻤﺔ ﺍﻟﻌﺩﺩﻴﺔ ﺸﺎﺌﻌﺔ ﺍﻻﺴﺘﺨﺩﺍﻡ ﻓﻲ ﺍﻟﺤﺎﺴﻭﺏ ﻭﺍﻟﺘﻲ ﺘﺨﺘﻠﻑ ﻓﻴﻤﺎ
ﺒﻴﻨﻬﺎ ﻤﻥ ﺤﻴﺙ ﺍﻷﺴﺎﺱ ﻭ ﻋﺩﺩ ﺍﻷﺭﻗﺎﻡ ﺍﻟﻤﻜﻭﻨﺔ ﻟﻬﺎ ﻭﻫﻲ :
.1ﺍﻟﻨﻅﺎﻡ ﺍﻟﻌﺸﺭﻱ .Decimal Number
.2ﺍﻟﻨﻅﺎﻡ ﺍﻟﺜﻨﺎﺌﻲ .Binary System
.3ﺍﻟﻨﻅﺎﻡ ﺍﻟﺜﻤﺎﻨﻲ .Octal System
.4ﺍﻟﻨﻅﺎﻡ ﺍﻟﺴﺎﺩﺱ ﻋﺸﺭ .Hexadecimal
29
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
2-2ﺍﻟﻨﻈﺎﻡ ﺍﻟﻌﺸﺮﻱ
30
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
3-2ﺍﻟﻨﻈﺎﻡ ﺍﻟﺜﻨﺎﺋﻲ
31
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
4-2ﺍﻟﻨﻈﺎﻡ ﺍﻟﺜﻤﺎﻧﻲ
32
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
33
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
34
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
ﻴﻤﻜﻥ ﺘﺸﻜﻴل ﺠﺩﻭل ﻟﻠﻤﻘﺎﺭﻨﺔ ﺒﻴﻥ ﺍﻷﻋﺩﺍﺩ ﺍﻟﻤﻜﻭﻨﺔ ﻟ ﻨﻅﻤﺔ ﺍﻟﻌﺩﺩﻴﺔ ﻭﻜﻤﺎ ﻴﻠﻲ :
35
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
ﺘﺸﺘﺭﻙ ﺍﻷﻨﻅﻤﺔ ﺍﻟﻌﺩﺩﻴﺔ ﻓﻴﻤﺎ ﺒﻴﻨﻬﺎ ﺒﻌﺩﺩ ﻤﻥ ﺍﻷﺭﻗﺎﻡ ،ﻓﻤﺜﻼ ﺘﺸﺘﺭﻙ ﻜل ﺍﻷﻨﻅﻤﺔ
ﺍﻟﻌﺩﺩﻴﺔ ﺒﺎﻟﺭﻗﻤﻴﻥ ) (0،1ﻓﻲ ﺤﻴﻥ ﻴﺸﺘﺭﻙ ﺍﻟﻨﻅﺎﻤﺎﻥ ﺍﻟﻌﺸﺭﻱ ﻭﺍﻟﺴﺎﺩﺱ ﻋﺸﺭﻱ ﺒﺎﻷﺭﻗﺎﻡ
ﻤﻥ 0ﻭﺤﺘﻰ ، 9ﺒﻴﻨﻤﺎ ﻴﺸﺘﺭﻙ ﺍﻟﻨﻅﺎﻡ ﺍﻟﻌﺸﺭﻱ ﻭﺍﻟﺜﻤﺎﻨﻲ ﻭﺍﻟﺴﺎﺩﺱ ﻋﺸﺭ ﺒﺎﻷﺭﻗﺎﻡ ﻤﻥ
0ﻭﺤﺘﻰ .7ﻭﻓﻴﻤﺎ ﻴﻠﻲ ﺒﻌﺽ ﺍﻟﺘﺤﻭﻴﻼﺕ ﺒﻴﻥ ﺍﻷﻨﻅﻤﺔ ﺃﻋﻼﻩ.
ﺍﳊﻞ:
ﺒﺎﻗﻲ ﺍﻟﻘﺴﻤﺔ ﻨﺎﺘﺞ ﺍﻟﻘﺴﻤﺔ ﻋﻤﻠﻴﺔ ﺍﻟﻘﺴﻤﺔ
53 ÷ 2 26 1
26 ÷ 2 13 0
13 ÷ 2 6 1
6÷2 3 0
3÷2 1 1
1÷2 0 1
36
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
37
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
38
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
ﻭﻨﻅﺭﺍ ﻟﻌﺩﻡ ﺘﻭﻗﻑ ﻋﻤﻠﻴﺔ ﺍﻟﻀﺭﺏ ﻴﻤﻜﻥ ﺍﻻﻜﺘﻔﺎﺀ ﺒﺄﺭﺒﻊ ﻤﺭﺍﺘﺏ ﻜﺴﺭﻴﺔ ﹸﺜﻤﺎﻨﻴﺔ ﻟﺫﻟﻙ ﻓﺄﻥ
ﺍﻟﻌﺩﺩ ﺍﻟﻌﺸﺭﻱ (0.32)10ﻴﻜﺎﻓﺊ ﺍﻟﻌﺩﺩ .(0.2436)8
39
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
ﻭﻨﻅﺭﺍ ﻟﻌﺩﻡ ﺘﻭﻗﻑ ﻋﻤﻠﻴﺔ ﺍﻟﻀﺭﺏ ﻴﻤﻜﻥ ﺍﻻﻜﺘﻔﺎﺀ ﺒﺄﺭﺒﻊ ﻤﺭﺍﺘﺏ ﻜﺴﺭﻴﺔ ﹸﺜﻤﺎﻨﻴﺔ ﻟﺫﻟﻙ ﻓﺄﻥ
ﺍﻟﻌﺩﺩ ﺍﻟﻌﺸﺭﻱ (0.825)10ﻴﻜﺎﻓﺊ ﺍﻟﻌﺩﺩ .(0.6463)8
40
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
ﻭﻨﻅﺭﺍ ﻟﻌﺩﻡ ﺘﻭﻗﻑ ﻋﻤﻠﻴﺔ ﺍﻟﻀﺭﺏ ﻴﻤﻜﻥ ﺍﻻﻜﺘﻔﺎﺀ ﺒﺜﻼﺙ ﻤﺭﺍﺘﺏ ﻜﺴﺭﻴﺔ ﺴﺎﺩﺱ ﻋﺸﺭﻱ
ﻟﺫﻟﻙ ﻓﺄﻥ ﺍﻟﻌﺩﺩ ﺍﻟﻌﺸﺭﻱ (0.35)10ﻴﻜﺎﻓﺊ ﺍﻟﻌﺩﺩ .(0.599)16
41
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
ﻭﻨﻅﺭﺍ ﻟﻌﺩﻡ ﺘﻭﻗﻑ ﻋﻤﻠﻴﺔ ﺍﻟﻀﺭﺏ ﻴﻤﻜﻥ ﺍﻻﻜﺘﻔﺎﺀ ﺒﺜﻼﺙ ﻤﺭﺍﺘﺏ ﻜﺴﺭﻴﺔ ﺴﺎﺩﺱ ﻋﺸﺭﻱ
ﻟﺫﻟﻙ ﻓﺄﻥ ﺍﻟﻌﺩﺩ ﺍﻟﻌﺸﺭﻱ (0.825)10ﻴﻜﺎﻓﺊ ﺍﻟﻌﺩﺩ .(0.D33)16
ﺍﳊﻞ :ﻴﺘﻡ ﺘﻘﺴﻴﻡ ﺍﻟﻌﺩﺩ ﺍﻟﺜﻨﺎﺌﻲ ﺇﻟﻰ ﺜﻼﺜﺔ ﺨﺎﻨﺎﺕ ﻭ ﻜل ﺜﻼﺜﺔ ﺨﺎﻨﺎﺕ ﺜﻨﺎﺌﻴﺔ ﺴﻭﻑ ﺘﻤﺜل
42
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
43
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
44
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
2 .5
+ 1 .5
4 .0
ﺍﳊﻞ:
1
1001
0101
1110
ﻟﻠﺘﺄﻜﺩ ﻤﻥ ﺼﺤﺔ ﺍﻟﺠﻤﻊ ﻨﺠﺭﻱ ﻋﻤﻠﻴﺔ ﺍﻟﺠﻤﻊ ﺍﻟﺴﺎﺒﻘﺔ ﻓﻲ ﺍﻟﻨﻅﺎﻡ ﺍﻟﻌﺸﺭﻱ :
ﺍﻟﻌﺩﺩ (1001)2ﻴﻜﺎﻓﺊ (9)10
ﺍﻟﻌﺩﺩ (101)2ﻴﻜﺎﻓﺊ (5)10
9
+ 5
14
45
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
ﻗﻭﺍﻋﺩ ﺍﻟﻁﺭﺡ ﺘﻭﻀﺢ ﻋﻤﻠﻴﺔ ﺍﻟﻁﺭﺡ ﺒﺎﻟﻨﻅﺎﻡ ﺍﻟﺜﻨﺎﺌﻲ ﻟﺭﻗﻤﻴﻥ .ﻨﺎﺘﺞ ﻋﻤﻠﻴﺔ ﺍﻟﻁﺭﺡ
ﻴﺘﻜﻭﻥ ﻤﻥ ﺍﻟﻔﺭﻕ ) (Differenceﻭﺍﻻﺴﺘﻌﺎﺭﺓ ) .(Borrowﻨﻼﺤﻅ ﻓﻲ ﺤﺎﻟﺔ ﻁﺭﺡ 1ﻤﻥ 0
ﺘﻜﻭﻥ ﺍﻟﻨﺘﻴﺠﺔ 11ﺃﻱ ﻫﻨﺎﻟﻙ ﺍﺴﺘﻌﺎﺭﺓ ﻤﻘﺩﺍﺭﻫﺎ 1ﻤﻥ ﺍﻟﺨﺎﻨﺔ ﺍﻟﺘﺎﻟﻴﺔ ﺍﻟﻌﻠﻴﺎ ﻭﺍﻟﺘﻲ ﺘﻜﺎﻓﺊ
) (2ﻓﻲ ﺍﻟﻨﻅﺎﻡ ﺍﻟﻌﺸﺭﻱ :
ﻟﻠﺘﺄﻜﺩ ﻤﻥ ﺼﺤﺔ ﻨﺎﺘﺞ ﻋﻤﻠﻴﺔ ﺍﻟﻁﺭﺡ ﻨﺠﺭﻱ ﻋﻤﻠﻴﺔ ﺍﻟﻁﺭﺡ ﺍﻟﺴﺎﺒﻘﺔ ﻓﻲ ﺍﻟﻨﻅﺎﻡ ﺍﻟﻌﺸﺭﻱ:
46
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
1.50
ﻣﺜﺎﻝ :ﺠﺩ ﻨﺎﺘﺞ ﻋﻤﻠﻴﺔ ﺍﻟﻀﺭﺏ ﻟﻠﻌﺩﺩﻴﻴﻥ ﺍﻟﺜﻨﺎﺌﻴﻴﻥ (1001)2 :ﻭ .(101)2
ﺍﳊﻞ:
1001
* 101
1001
0000
1001
1 01101
ﻟﻠﺘﺄﻜﺩ ﻤﻥ ﺼﺤﺔ ﻨﺎﺘﺞ ﻋﻤﻠﻴﺔ ﺍﻟﻀﺭﺏ ﻨﺠﺭﻱ ﻋﻤﻠﻴﺔ ﺍﻟﻀﺭﺏ ﺍﻟﺴﺎﺒﻘﺔ ﻓﻲ ﺍﻟﻨﻅﺎﻡ ﺍﻟﻌﺸﺭﻱ:
ﺍﻟﻌﺩﺩ (1001)2ﻴﻜﺎﻓﺊ (9)10
ﺍﻟﻌﺩﺩ (101)2ﻴﻜﺎﻓﺊ (5)10
9
5 *
45
47
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
ﻣﺜﺎﻝ :ﺠﺩ ﻨﺎﺘﺞ ﻋﻤﻠﻴﺔ ﺍﻟﻘﺴﻤﺔ ﻟﻠﻌﺩﺩﻴﻴﻥ ﺍﻟﺜﻨﺎﺌﻴﻴﻥ (101101)2 :ﻭ .(101)2
ﺍﳊﻞ:
1001
101 101101
101
000101
101
000
ﻟﻠﺘﺄﻜﺩ ﻤﻥ ﺼﺤﺔ ﻨﺎﺘﺞ ﻋﻤﻠﻴﺔ ﺍﻟﻘﺴﻤﺔ ﻨﺠﺭﻱ ﻋﻤﻠﻴﺔ ﺍﻟﻘﺴﻤﺔ ﺍﻟﺴﺎﺒﻘﺔ ﻓﻲ ﺍﻟﻨﻅﺎﻡ ﺍﻟﻌﺸﺭﻱ:
ﺍﻟﻌﺩﺩ (101101)2ﻴﻜﺎﻓﺊ (45)10
ﺍﻟﻌﺩﺩ (101)2ﻴﻜﺎﻓﺊ (5)10
9
5 45
45
00
ﺍﻟﻨﺎﺘﺞ (1001)2ﻴﻜﺎﻓﺊ .(9)10
ﺘﺴﺘﺨﺩﻡ ﺍﻟﻤﺘﻤﻤﺎﺕ ﻓﻲ ﻋﻤﻠﻴﺔ ﺨﺯﻥ ﺍﻷﻋﺩﺍﺩ ﺍﻟﺴﺎﻟﺒﺔ ﻭ ﻜﺫﻟﻙ ﻷﺠﺭﺍﺀ ﻋﻤﻠﻴﺔ ﺍﻟﻁﺭﺡ
ﻓﻲ ﺍﻟﻨﻅﺎﻡ ﺍﻟﺜﻨﺎﺌﻲ .ﻴﻭﺠﺩ ﻨﻭﻋﻴﻥ ﻤﻥ ﺍﻟﻤﺘﻤﻤﺎﺕ:
48
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
49
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
ﺘﺭﻙ ﺃﻭل 1ﻋﻠﻰ ﻴﻤﻴﻥ ﺍﻟﻌﺩﺩ ﺍﻟﺜﻨﺎﺌﻲ ﺜﻡ ﺘﻐﻴﻴﺭ ﻗﻴﻤﺔ ﺍﻟﺨﺎﻨﺎﺕ ﺍﻟﺒﺎﻗﻴﺔ 1ﺇﻟﻰ 0ﻭ 0
ﺇﻟﻰ .1
50
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
1000 8
1001 9
51
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
52
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻧﻲ .................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻷﻧﻈﻤﺔ ﺍﻟﻌﺪﺩﻳﺔ
ﺍﻟﺤﺭﻭﻑ ،ﺍﻷﺭﻗﺎﻡ ﻭﻜﺎﻓﺔ ﺍﻟﺭﻤﻭﺯ ﺍﻟﻤﺴﺘﺨﺩﻤﺔ ﻓﻲ ﺃﺠﻬﺯﺓ ﺍﻟﺤﺎﺴﺏ .ﻓﻲ ﺤﻴﻥ ﺘﺘﻭﻓﺭ
ﻤﺠﻤﻭﻋﺎﺕ ﺃﺨﺭﻯ ﺘﺴﺘﺨﺩﻡ ﺸﻔﺭﺓ ﺫﺍﺕ ﺜﻤﺎﻨﻴﺔ ﺨﺎﻨﺎﺕ .ﻭﺍﻟﺠﺩﻭل ﺍﻵﺘﻲ ﻴﻌﺭﺽ ﺒﻌﻀﹰﺎ ﻤﻥ
ﺠﺩﻭل ﺭﻤﻭﺯ ﺍﻻﺴﻜﻲ ).(ASCII
ﺍﻟﺘﻤﺜﻴل ASCII
ﺍﻟﺭﻤﺯ
ﺒﺎﻟﻨﻅﺎﻡ ﺍﻟﺜﻨﺎﺌﻲ ﺒﺎﻟﻨﻅﺎﻡ ﺍﻟﺴﺎﺩﺱ ﻋﺸﺭ
53
54
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻟﺚ
ﻣﻘﺪﻣـــﺔ ﰲ ﺍﳋﻮﺍﺭﺯﻣﻴﺎﺕ
An Introduction to
Algorithms
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻟﺚ
ﻣﻘﺪﻣـــﺔ ﰲ ﺍﳋﻮﺍﺭﺯﻣﻴﺎﺕ
An Introduction to Algorithms
ﺍﳌﻘـﺪﻣـﺔ 1-3
57
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻟﺚ ................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﳋﻮﺍﺭﺯﻣﻴﺎﺕ
58
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻟﺚ ................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﳋﻮﺍﺭﺯﻣﻴﺎﺕ
ﺗﻌﺮﻳﻒ اﻟﻤﺴﺄﻟﺔ
)(Problem Definition
Analysis
Design
آﺘﺎﺏﺔ اﻟﺨﻮارزﻡﻴﺔ
)(Algorithm
Implementation
آﺘﺎﺏﺔ اﻟﺒﺮﻧﺎﻡﺞ
)(Program
Compilation
ﺨﻁﻭﺍﺕ ﺤل ﺍﻟﻤﺴﺎﺌل
ﻭﻓﻲ ﺍﻟﺤﻘﻴﻘﺔ ﺇﻥ ﻓﻬﻡ ﺍﻟﻤﺴﺄﻟﺔ ﺍﻟﻤﻁﻠﻭﺏ ﺤﻠﻬﺎ ﻴﻌﺘﺒﺭ ﺃﻜﺜﺭ ﺍﻟﻘﻭﺍﻋﺩ ﺃﻭﻟﻭﻴﺔ ،ﺇﺫ ﺃﻥ
ﺍﻟﻔﻬﻡ ﺍﻟﺼﺤﻴﺢ ﻟﻬﺎ ﻴﺅﺩﻱ ﺇﻟﻰ ﺍﻟﺘﺴﻠﺴل ﺍﻟﻤﻨﻁﻘﻲ ﺍﻟﺼﺤﻴﺢ ﻟﺒﻘﻴﺔ ﺍﻟﻘﻭﺍﻋﺩ ،ﻋﻠﻰ ﺃﻥ ﻴﺨﻀﻊ
ﻫﺫﺍ ﺍﻟﻔﻬﻡ ﺇﻟﻰ ﺒﻌﺽ ﺍﻟﻤﺴﻠﻤﺎﺕ ﺍﻟﺭﻴﺎﻀﻴﺔ ﺃﻭ ﺍﻟﻤﻨﻁﻘﻴﺔ ﺩﻭﻥ ﺍﻟﺨﻭﺽ ﻓﻲ ﺒﻌﺽ ﺍﻟﺘﻔﺎﺼـﻴل
ﻻ ﻤﻥ ﺘﺒﺴﻴﻁﻬﺎ ،ﻜﺄﻥ ﻴﻜﻭﻥ ﻭﻀﻊ ﺤﻠﻭل ﺒﻌﻴﺩﺓ ﻜل ﺍﻟﺒﻌﺩ
ﺍﻟﺘﻲ ﺘﺅﺩﻱ ﺇﻟﻰ ﺘﻌﻘﻴﺩ ﺍﻟﻤﺴﺄﻟﺔ ﺒﺩ ًﹸ
ﻋﻥ ﺇﻤﻜﺎﻨﻴﺔ ﺘﺤﻭﻴﻠﻬﺎ ﺇﻟﻰ ﺨﻁﻭﺍﺕ ﻗﺎﺒﻠﺔ ﻟﻠﺒﺭﻤﺠﺔ ﺃﻭ ﺇﻟﻰ ﻨﻤﻭﺫﺝ ﺭﻴﺎﻀﻲ ،ﻭﻋﻠﻴﻪ ﻴﻔﻀـل
59
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻟﺚ ................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﳋﻮﺍﺭﺯﻣﻴﺎﺕ
ﺘﻌﺭﻴﻑ ﺍﻟﻤﺸﻜﻠﺔ ﺒﻜﻠﻤﺎﺕ ﺒﺴﻴﻁﺔ ﻏﻴﺭ ﻗﺎﺒﻠﺔ ﻟﻠﺘﺄﻭﻴل ،ﺃﻱ ﺍﺴﺘﺨﺩﺍﻡ ﻤﻔﺭﺩﺍﺕ ﻤﻥ ﺍﻟﻠﻐﺔ ﺍﻟﺘـﻲ
ﻨﺘﻜﻠﻡ ﺒﻬﺎ ﻭﻨﻔﻬﻤﺎ ،ﺩﻭﻥ ﺍﻟﺨﻭﺽ ﻓﻲ ﻤﻔﺭﺩﺍﺕ ﺘﻌﻁﻲ ﺃﻜﺜﺭ ﻤﻥ ﻤﻌﻨﻰ .ﻭﺒﺎﻟﺘﺎﻟﻲ ﻴﻜﻭﻥ ﻫﻨﺎﻙ
ﻓﻬﻡ ﺨﺎﻁﺊ ﻟﻠﻤﺴﺄﻟﺔ.
60
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻟﺚ ................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﳋﻮﺍﺭﺯﻣﻴﺎﺕ
اﻹدﺥﺎﻻت
Algorithm
ﻤﺠﻤﻭﻋﺔ ﻤﺘﺴﻠﺴﻠﺔ ﻤﻥ ﺍﻟﺘﻌﻠﻴﻤﺎﺕ
ﺍﻟﻤﻌﺭ ﺔ ﺘﻌﺭﻴﻔﹰﺎ ﺠﻴﺩﹰﺍ
اﻹﺥﺮاﺟﺎت
ﻭﺒﺸﻜل ﻋﺎﻡ ،ﻴﻤﻜﻥ ﺃﻥ ﻴﻜﻭﻥ ﻟﻠﺨﻭﺍﺭﺯﻤﻴﺔ ﻋﺩﺓ ﺘﻌﺭﻴﻔﺎﺕ ،ﻻ ﺘﺨﺘﻠﻑ ﺠﻤﻴﻌﻬﺎ ﻤﻥ
ﺤﻴﺙ ﺍﻟﻤﻀﻤﻭﻥ ﻭﺍﻟﻬﺩﻑ ،ﻭﻟﻜﻥ ﺍﻻﺨﺘﻼﻑ ﺍﻟﻭﺤﻴﺩ ﺒﻴﻥ ﻫﺫﻩ ﺍﻟﺘﻌﺭﻴﻔﺎﺕ ،ﻫﻭ ﻨﻭﻉ ﺍﻟﻤﺸﻜﻠﺔ
ﺍﻟﻤﻁﻠﻭﺏ ﺤﻠﻬﺎ ،ﻜﺄﻥ ﻴﻜﻭﻥ ﺍﻟﺘﻌﺭﻴﻑ ﻴﺘﺠﻪ ﻜﺜﻴﺭﺍ ﻟﻠﻤﻔﺎﻫﻴﻡ ﺍﻟﺭﻴﺎﻀﻴﺔ ،ﻋﻨﺩﻤﺎ ﻴﻜﻭﻥ ﺍﻟﺤل
ﺍﻟﺭﻴﺎﻀﻲ ﻫﻭ ﺍﻟﺤل ﺍﻷﻤﺜل ﻟﻠﻤﺸﻜﻠﺔ ،ﺃﻭ ﺃﻥ ﻴﺘﺠﻪ ﺍﻟﺘﻌﺭﻴﻑ ﺇﻟﻰ ﺍﻟﻤﺼـﻁﻠﺤﺎﺕ ﺍﻟﻬﻨﺩﺴـﻴﺔ
ﺃﻜﺜﺭ ﻤﻥ ﺍﻻﺘﺠﺎﻩ ﺍﻟﺭﻴﺎﻀﻲ ﻋﻨﺩﻤﺎ ﺘﻜﻭﻥ ﺍﻟﻤﺸﻜﻠﺔ ،ﻤﺸﻜﻠﺔ ﻫﻨﺩﺴﻴﺔ ،ﻭﻫﻜـﺫﺍ .ﻭﻓﻴﻤﺎ ﻴﻠـﻲ
ﺒﻌﺽ ﻤﻥ ﻫﺫﻩ ﺍﻟﺘﻌﺭﻴﻔﺎﺕ:
61
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻟﺚ ................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﳋﻮﺍﺭﺯﻣﻴﺎﺕ
ﺍﳊﻞ :
.1اﻟﺒﺪاﻳﺔ.
.2اﻗﺮأ اﻟﻌﺪد اﻷول .A
.3اﻗﺮأ اﻟﻌﺪد اﻟﺜﺎﻧﻲ .B
.4اﻗﺮأ اﻟﻌﺪد اﻟﺜﺎﻟﺚ .C
.5ﺟﺪ ﻣﺠﻤﻮع اﻷﻋﺪاد اﻟﺜﻼﺙﺔ .S=A+B+C
.6ﺟﺪ اﻟﻤﻌﺪل .Average = S/3
.7أﻃﺒﻊ .Average
.8اﻟﻨﻬﺎﻳﺔ.
62
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻟﺚ ................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﳋﻮﺍﺭﺯﻣﻴﺎﺕ
ﻡﻌﻨﺎﻩ اﻟﺮﻡﺰ
اﻟﺒﺪاﻳﺔ واﻟﻨﻬﺎﻳﺔ
Start/Stop
اﻹدﺥﺎل واﻹﺥﺮاج
Input/output
اﻟﻌﻤﻠﻴﺎت اﻟﺤﺴﺎﺏﻴﺔ
Calculation / Storing
اﺗﺨﺎذ اﻟﻘﺮار
Decision Making
اﻟﺘﻜﺮار واﻟﺪوران
Looping / Iteration
63
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻟﺚ ................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﳋﻮﺍﺭﺯﻣﻴﺎﺕ
اﻟﺒﺪاﻳﺔ
إدﺥﺎل اﻟﻌﺪدﻳﻦ
AوB
ﻧﻌﻢ
A=B
آﻼ
ﻧﻌﻢ آﻼ
A< B
أﻃﺒﻊ اﻟﻌﺪد
اﻷﺻﻐﺮ
اﻟﻨﻬﺎﻳﺔ
64
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻟﺚ ................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﳋﻮﺍﺭﺯﻣﻴﺎﺕ
ً ً
ﻣﺜﺎﻝ : :ﺍﺭﺳﻢ ﳐﻄﻄﺎ ﺍﻧﺴﻴﺎﺑﻴﺎ ﻹﳚﺎﺩ ﳎﻤﻮﻉ ﻭﻣﻌﺪﻝ ﺛﻼﺙ ﺃﻋﺪﺍﺩ ﺻﺤﻴﺤﺔ.
اﻟﺒﺪاﻳﺔ
إدﺥﺎل اﻷﻋﺪاد
اﻟﺜﻼﺛﺔ Aو Bو C
A+B+C
= Average
3
أﻃﺒﻊ
Average
اﻟﻨﻬﺎﻳﺔ
ً ً
ﻣﺜﺎﻝ :ﺍﻛﺘﺐ ﺧﻮﺍﺭﺯﻣﻴﺔ ﻭﺍﺭﺳﻢ ﳐﻄﻄﺎ ﺍﻧﺴﻴﺎﺑﻴﺎ ﻹﳚﺎﺩ ﻣﺮﺑﻊ ﻋﺸﺮﺓ ﺃﻋﺪﺍﺩ ﺻﺤﻴﺤﺔ.
ﺍﳊﻞ :اﻟﺨﻮارزﻡﻴﺔ
.1اﻟﺒﺪاﻳﺔ.
65
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻟﺚ ................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﳋﻮﺍﺭﺯﻣﻴﺎﺕ
اﻟﺒﺪاﻳﺔ
C=0
C=C+1
اﻗﺮأ ﻗﻴﻤﺔ
اﻟﻌﺪد N
Y=N * N
أﻃﺒﻊ
NوY
هﻞ
C>=10 آﻼ
ﻧﻌﻢ
اﻟﻨﻬﺎﻳﺔ
66
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻟﺚ ................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﳋﻮﺍﺭﺯﻣﻴﺎﺕ
ً ً
ﻣﺜﺎﻝ :ﺍﻛﺘﺐ ﺧﻮﺍﺭﺯﻣﻴﺔ ﻭﺍﺭﺳﻢ ﳐﻄﻄﺎ ﺍﻧﺴﻴﺎﺑﻴﺎ ﳊﺴﺎﺏ ﻗﻴﻤﺔ ﺍﻟﺪﺍﻟﺔ ) F(X,Yﻭﺍﳌﻌﺮﻓﺔ ﻛﻤﺎ ﻳﻠﻲ :
X−Y If X > Y
F(X, Y) = X 2 + Y 2 If X = Y
X+Y If X < Y
.1اﻟﺒﺪاﻳﺔ.
.9اﻟﻨﻬﺎﻳﺔ
67
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻟﺚ ................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﳋﻮﺍﺭﺯﻣﻴﺎﺕ
اﻟﻤﺨﻄﻂ اﻻﻧﺴﻴﺎﺏﻲ:
اﻟﺒﺪاﻳﺔ
أﻗﺮأ ﻗﻴﻢ
XوY
ﻧﻌﻢ
X=Y
آﻼ
F=X2+Y2
ﻧﻌﻢ
X >Y
آﻼ F=X-Y
F=X + Y
أﻃﺒﻊ ﻗﻴﻢ
Xو Yو F
اﻟﻨﻬﺎﻳﺔ
68
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻟﺚ ................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﳋﻮﺍﺭﺯﻣﻴﺎﺕ
ً ً
ﻣﺜﺎﻝ:ﺍﻛﺘﺐ ﺧﻮﺍﺭﺯﻣﻴﺔ ﻭﺍﺭﺳﻢ ﳐﻄﻄﺎ ﺍﻧﺴﻴﺎﺑﻴﺎ ﳊﺴﺎﺏ ﻗﻴﻤﺔ Sﻣﻦ ﺍﳌﺘﻮﺍﻟﻴﺔ ﺍﻟﺘﺎﻟﻴﺔ :
x x x x
S = 1+ + + + ... +
!1! 2! 3 !n
ﺍﳊﻞ :اﻟﺨﻮارزﻡﻴﺔ
.1اﻟﺒﺪاﻳﺔ.
.12اﻟﻨﻬﺎﻳﺔ
69
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻟﺚ ................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﳋﻮﺍﺭﺯﻣﻴﺎﺕ
اﻟﻤﺨﻄﻂ اﻻﻧﺴﻴﺎﺏﻲ:
اﻟﺒﺪاﻳﺔ
I=1
J=1, Fact=1
آﻼ
J<=I
ﻧﻌﻢ
Fact=Fact*J
J=J+1
ﻧﻌﻢ
I<=n
آﻼ
أﻃﺒﻊ S
اﻟﻨﻬﺎﻳﺔ
70
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻟﺚ ................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﳋﻮﺍﺭﺯﻣﻴﺎﺕ
= ) f (n
{ nn
0
for all integer n ≥ 1
otherwise
ﺍﳊﻞ:
begin
;read r1
if r1 ≤ 0 then write 0
else
begin
;r2 Å r1
71
ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻟﺚ ................................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﳋﻮﺍﺭﺯﻣﻴﺎﺕ
;r1 Å r1-1
while r3 > 0 do
begin
; r2 Å r2 * r1
r 3 Å r3 – 1
;end
write r2
end
end
ﻣﺜﺎﻝ :
ﺍﻛﺘﺐ ﺧﻮﺍﺭﺯﻣﻴﺔ ﻟﱰﺗﻴﺐ ﻋﻨﺎﺻﺮ ﺍﻟﻘﺎﺋﻤـﺔ ) (Aﻭﺍﻟﺘـﻲ ﲢﺘـﻮﻱ ﻋﻠـﻰ
ً
) (nﻣﻦ ﺍﻷﻋﺪﺍﺩ ﺗﺮﺗﻴﺒﺎ ﺗﺼﺎﻋﺪﻳﺎ.
ﺍﳊﻞ :
ﻟﻨﻔﺘﺭﺽ ﺃﻨﻨﺎ ﺴﻭﻑ ﻨﺴﺘﺨﺩﻡ ﺨﻭﺍﺭﺯﻤﻴﺔ ) (Insertion sortﻟﺘﺭﺘﻴـﺏ ﻫـﺫﻩ
ﺍﻟﻘﺎﺌﻤﺔ ،ﻋﻠﻤﺎ ﺃﻥ ﻫﺫﻩ ﺍﻟﺨﻭﺍﺭﺯﻤﻴﺔ ﺘﻘﻭﻡ ﺒﻤﻘﺎﺭﻨـﺔ ﻋﻨﺼـﺭﻴﻥ ﻤﺘﺠـﺎﻭﺭﻴﻥ
] A[iﻭ ] A[i − 1ﻭﻜﻤﺎ ﻴﻠﻲ:
Insertion sort algorithm
Step1: for i ← 2 to n
Step2: ]do key ← A[i
Step3: j←i−1
Step4: while j > 0 and A[j] > key
Step5: ]do A[j + 1] ← A[j
Step6: A[j + 1] ← key
72
ﻣﻘﺪﻣﺔ ﰲ ﺍﳋﻮﺍﺭﺯﻣﻴﺎﺕ................................................................ ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻟﺚ
: ﻣﺜﺎﻝ
.(L) ﺍﻛﺘﺐ ﺧﻮﺍﺭﺯﻣﻴﺔ ﻹﳚﺎﺩ ﺍﻛﱪ ﻋﻨﺼﺮ ﰲ ﺍﻟﻘﺎﺋﻤﺔ
: ﺍﳊﻞ
Algorithm LargestNumber
Input : A non-empty list of numbers L.
Output: The largest number in the list L.
largest ← L0
for each item in the list L ≥ 1, do
if the item > largest, then
largest ← the item
return largest
73
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ
ﺍﳌﻘـﺪﻣـﺔ 1-4
ﻤﻨﺫ ﻅﻬﻭﺭ ﺍﻟﺠﻴل ﺍﻷﻭل ﻟﻠﺤﺎﺴﺒﺎﺕ ﺍﺤﺘﻠﺕ ﻫﺫﻩ ﺍﻷﺠﻬﺯﺓ ﻤﻜﺎﻨﺔ ﺒﺎﺭﺯﺓ ﻓﻲ ﻤﺨﺘﻠـﻑ
ﺍﻟﻤﺠﺎﻻﺕ ﺍﻟﻌﻠﻤﻴﺔ ﻭﺍﻟﺘﻁﺒﻴﻘﻴﺔ ﺤﻴﺙ ﻜﺎﻨﺕ ﺃﺠﻬﺯﺓ ﺍﻟﺤﺎﺴﻭﺏ ﻜﺒﻴﺭﺓ ﺍﻟﺤﺠﻡ ﻭﻤﺯﻭﺩﺓ ﺒﻤﻌﺎﻟﺞ
ﻭﺍﺤﺩ ﻭ ﻤﻘﺩﺍﺭ ﻀﺌﻴل ﻤﻥ ﺍﻟﺫﺍﻜﺭﺓ .ﻭﻗﺩ ﺴﺎﻫﻡ ﺘﻁﻭﺭ ﺍﻟﺘﻜﻨﻭﻟﻭﺠﻴﺎ ﻓـﻲ ﺍﻨﺘﺸـﺎﺭ ﺃﺠﻬـﺯﺓ
ﺍﻟﺤﺎﺴﻭﺏ ﺒﺼﻭﺭﺓ ﻜﺒﻴﺭﺓ ﻤﻤﺎ ﺴﻤﺢ ﺒﺎﺴﺘﺨﺩﺍﻡ ﻋﺩﺓ ﺃﺠﻬﺯﺓ ﻟﻠﻤﺸﺎﺭﻜﺔ ﻓﻲ ﺍﻟﻤﻭﺍﺭﺩ ﺍﻟﻤﺘﺎﺤـﺔ
ﻭﻜﺎﻥ ﻻﺒﺩ ﻤﻥ ﻭﺠﻭﺩ ﻭﺴﻴﻠﺔ ﺭﺒﻁ ﻭﺍﺘﺼﺎل ﺒﻴﻥ ﻫﺫﻩ ﺍﻷﺠﻬﺯﺓ ﻭﺍﻟﺘﻲ ﺃﻁﻠﻕ ﻋﻠﻴﻬﺎ ﺒﺸﺒﻜﺎﺕ
ﺍﻟﺤﺎﺴﻭﺏ ) (Computer Networksﻭﺍﻟﺘﻲ ﺘﺘﺄﻟﻑ ﻤﻥ ﻋﺩﺩ ﻤﻥ ﺍﻟﺤﺎﺴﺒﺎﺕ ﻤﻭﺼﻠﺔ ﻤﻊ
ﺒﻌﻀﻬﺎ ﺒﻭﺍﺴﻁﺔ ﺨﻁﻭﻁ ﻨﻘل ﺍﻟﺒﻴﺎﻨﺎﺕ .ﻭﺍﻟﺤﻭﺍﺴﻴﺏ ﺍﻟﺘﻲ ﺘﻘﺩﻡ ﺍﻟﺒﻴﺎﻨﺎﺕ ﺃﻭ ﺍﻟﻤـﻭﺍﺭﺩ ﻓـﻲ
ﺍﻟﺸﺒﻜﺎﺕ ﻴﻁﻠﻕ ﻋﻠﻴﻬﺎ ﺍﺴﻡ ﺍﻟﻤﺯﻭﺩﺍﺕ ) (Serversﻭﺍﻟﺘﻲ ﺘﺯﻭﺩ ﺍﻟﺸﺒﻜﺔ ﺒﺠﻤﻴـﻊ ﺍﻟﻤـﻭﺍﺭﺩ
ﺍﻟﻤﺘﺎﺤﺔ ،ﺒﻴﻨﻤﺎ ﻴﻁﻠﻕ ﻋﻠﻰ ﺍﻟﺤﻭﺍﺴﻴﺏ ﺍﻟﺘﻲ ﺘﺴﺘﻔﻴﺩ ﻤﻥ ﻫﺫﻩ ﺍﻟﺒﻴﺎﻨﺎﺕ ﺃﻭ ﺍﻟﻤﻭﺍﺭﺩ ،ﺍﺴـﻡ
ﺍﻟﺯﺒﺎﺌﻥ ) (Clientsﻭﺍﻟﺘﻲ ﺘﺴﺘﺨﺩﻡ ﻤﻭﺍﺭﺩ ﺍﻟﺸﺒﻜﺔ ﺍﻟﻤﺘﺎﺤﺔ ﻭﻻ ﻴﻜﻭﻥ ﻟﺩﻴﻬﺎ ﺃﻴﺔ ﻤﺼـﺎﺩﺭ
ﺨﺎﺼﺔ.ﺃﻤﺎ ﺍﻟﻨﺩ ) (Peerﻓﻴﻤﺘﺎﺯ ﺒﻘﺩﺭﺘﻪ ﻋﻠﻰ ﺍﺴﺘﺨﺩﺍﻡ ﻤﺼﺎﺩﺭ ﺍﻟﺸﺒﻜﺔ ﺍﻟﻤﺘﺎﺤﺔ ﺇﻀﺎﻓﺔ ﺍﻟﻰ
ﻤﺼﺎﺩﺭﻩ ﺍﻟﺨﺎﺼﺔ .ﻤﻥ ﺍﻟﻤﻤﻜﻥ ﻟﺠﻬﺎﺯ ﻭﺍﺤﺩ ﺃﻥ ﻴﻠﻌﺏ ﻓﻲ ﺍﻟﻭﻗـﺕ ﻨﻔﺴـﻪ ﺩﻭﺭ ﺍﻟﻤـﺯﻭﺩ
ﻭﺍﻟﺯﺒﻭﻥ ،ﻓﻤﺜﻼ ﻴﺴﺘﻁﻴﻊ ﺠﻬﺎﺯ ﻤﺎ ﻋﻠﻰ ﺍﻟﺸﺒﻜﺔ ﺃﻥ ﻴﻜﻭﻥ ﻤﺯﻭﺩﺍ ﻟﻠﻁﺎﺒﻌﺔ ﻭ ﻓـﻲ ﻨﻔـﺱ
ﺍﻟﻭﻗﺕ ﻴﻜﻭﻥ ﺯﺒﻭﻥ ﻟﻠﺤﺼﻭل ﻋﻠﻰ ﺒﻴﺎﻨﺎﺕ ﻤﻥ ﻤﺯﻭﺩ ﺁﺨﺭ.
76
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
.1ﺍﻟﻤﺸﺎﺭﻜﺔ ﻲ ﺍﻟﻤﻭﺍﺭﺩ
ﻓﻲ ﺤﺎل ﻋﺩﻡ ﻭﺠﻭﺩ ﺸﺒﻜﺔ ﺒﻴﻥ ﺍﻷﺠﻬﺯﺓ ﻤﻥ ﺍﻟﺼﻌﺏ ﻨﻘل ﺍﻟﻤﻠﻔﺎﺕ ﺃﻭ ﺍﻟﺒﺭﺍﻤﺞ ﻤﻥ
ﺠﻬﺎﺯ ﻵﺨﺭ ﺇﻻ ﺒﻭﺍﺴﻁﺔ ﺍﻷﻗﺭﺍﺹ ﺍﻟﺼﻠﺒﺔ ﺃﻭ ﺍﻷﻗﺭﺍﺹ ﺍﻟﻘﺎﺒﻠﺔ ﻟﻺﺯﺍﻟﺔ ﻭﻫـﺫﻩ ﺍﻟﻌﻤﻠﻴـﺔ
ﺘﺴﺘﻐﺭﻕ ﻭﻗﺘﹰﺎ ﻭﺠﻬﺩﹰﺍ ﻜﺒﻴﺭﹰﺍ .ﺃﻤﺎ ﻓﻲ ﺤﺎل ﺍﻷﺠﻬﺯﺓ ﺍﻟﻤﺭﺘﺒﻁﺔ ﻤﻊ ﺒﻌﻀﻬﺎ ﺒﻭﺍﺴﻁﺔ ﺸـﺒﻜﺔ
ﻓﺎﻷﻤﺭ ﺃﺴﻬل ﺒﻜﺜﻴﺭ ﺤﻴﺙ ﺘﻨﻘل ﺍﻟﻤﻌﻠﻭﻤﺎﺕ ﺒﺴﺭﻋﺔ ﻜﺒﻴﺭﺓ ﻋﺒﺭ ﺍﻟﻭﺴـﻁ ﺍﻟﻨﺎﻗـل ﻭﻴﻤﻜـﻥ
ﻤﻼﺤﻅﺔ ﺃﻱ ﺘﻐﻴﻴﺭ ﻋﻠﻰ ﺍﻟﻤﻌﻠﻭﻤﺎﺕ ﻟﺩﻯ ﺠﻤﻴﻊ ﻋﻨﺎﺼﺭ ﺍﻟﺸﺒﻜﺔ.
ﻴﻤﻜﻥ ﺍﻟﺘﺤﻜﻡ ﺒﺠﻤﻴﻊ ﺍﻟﺒﺭﺍﻤﺞ ﻭﺍﻟﻤﻠﻔﺎﺕ ﺍﻟﻤﻭﺠﻭﺩﺓ ﻋﻠﻰ ﺍﻷﺠﻬﺯﺓ ﻤﻥ ﺨﻼل ﺠﻬﺎﺯ
ﻤﺭﻜﺯﻱ ﻓﻲ ﺍﻟﺸﺒﻜﺔ ﻴﻌﺭﻑ ﺒﺎﻟﻤﺯﻭﺩ ) (Serverﺍﻟﺫﻱ ﻴﻜﻭﻥ ﻤﺴﺅﻭ ﹰ
ﻻ ﻋﻥ ﺠﻤﻴﻊ ﺍﻟﻤﻠﻔـﺎﺕ
ﻭﺍﻟﺒﺭﺍﻤﺞ ﻓﻲ ﺍﻟﺸﺒﻜﺔ ﻭﻴﺴﻤﺢ ﻟ ﺠﻬﺯﺓ ﺍﻷﺨﺭﻯ ﺒﺎﻟﻭﺼﻭل ﺇﻟﻰ ﺍﻟﻤﻌﻠﻭﻤـﺎﺕ ﻓﻘـﻁ ﻋﻨـﺩ
ﺍﻟﺤﺎﺠﺔ ﺇﻟﻴﻬﺎ .
77
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﺘﺘﻤﺘﻊ ﺍﻟﺸﺒﻜﺎﺕ ﺒﺴﺭﻋﺔ ﻭﺃﺩﺍﺀ ﻭ ﻤﻭﺜﻭﻗﻴﺔ ﻋﺎﻟﻴﺔ ﺠﺩﺍ ﻓﻲ ﺍﻟﻌﻤل ﻓﻌﻨﺩ ﺤﺩﻭﺙ ﺨﻠل
ﻤﻌﻴﻥ ﻓﺎﻥ ﺍﻟﺸﺒﻜﺔ ﺘﻭﻓﺭ ﺒﺩﺍﺌل ﻭ ﺒﺎﻟﺘﺎﻟﻲ ﺘﺴﻤﺢ ﻟﻤﺴﺘﺨﺩﻤﻲ ﺍﻟﺸﺒﻜﺔ ﻤﻥ ﻤﺘﺎﺒﻌﺔ ﺍﻟﻌﻤل ﺒﺄﻗل
ﻓﺘﺭﺓ ﻤﻤﻜﻨﺔ.
ﺘﻭﻓﺭ ﺃﻨﻅﻤﺔ ﺍﻟﺸﺒﻜﺎﺕ ﻤﻭﺍﺼﻔﺎﺕ ﺃﻤﺎﻥ ﻋﺎﻟﻴﺔ ﻟﻠﺒﻴﺎﻨﺎﺕ ﻤﻥ ﺨﻼل ﺤﻤﺎﻴﺔ ﺍﻟﻤﻠﻔـﺎﺕ
ﻤﻥ ﺍﻷﺸﺨﺎﺹ ﺍﻟﻐﻴﺭ ﻤﺨﻭل ﻟﻬﻡ ﺒﺎﻟﺩﺨﻭل ﻟﻠﺸﺒﻜﺔ ﻭ ﻜﺫﻟﻙ ﺘﺤﺩﻴﺩ ﺴﻤﺎﺤﻴﺎﺕ ﺍﻟﺩﺨﻭل ﺇﻟﻴﻬﺎ
ﻭ ﻏﻴﺭﻫﺎ ﻤﻥ ﺍﻟﻘﻴﻭﺩ ﺍﻟﺘﻲ ﺘﺴﺎﻫﻡ ﻓﻲ ﻤﻨﻊ ﺍﺨﺘﺭﺍﻕ ﺍﻟﺸﺒﻜﺔ ﻤﻥ ﺍﻟﺨﺎﺭﺝ ﻤﻤﺎ ﻴﻌﻁـﻲ ﺃﻤـﻥ
ﻋﺎﻟﻲ ﻟﻠﻤﻌﻠﻭﻤﺎﺕ ﻓﻲ ﺍﻟﺸﺒﻜﺔ .
ﺃﺩﻯ ﻅﻬﻭﺭ ﺍﻟﺸﺒﻜﺎﺕ ﺇﻟﻰ ﻅﻬﻭﺭ ﺍﻻﻨﺘﺭﻨﺕ ﺍﻟﺫﻱ ﻴﻭﻓﺭ ﺍﻟﻌﺩﻴـﺩ ﻤـﻥ ﺍﻟﺨـﺩﻤﺎﺕ
ﻟﻠﻤﺴﺘﺨﺩﻤﻴﻥ ﻤﺜل ﺘﺼﻔﺢ ﺍﻟﻤﻭﺍﻗﻊ ﻭﺍﻟﺒﺭﻴﺩ ﺍﻻﻟﻜﺘﺭﻭﻨﻲ ﻭﺍﻟﺘﺠﺎﺭﺓ ﺍﻻﻟﻜﺘﺭﻭﻨﻴﺔ ﻭﻏﻴﺭﻫﺎ ﻤـﻥ
ﺍﻟﺨﺩﻤﺎﺕ .
78
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
.2ﺃﺠﻬﺯﺓ ﺍﻟﺸﺒﻜﺔ :ﻭﻫﻲ ﺍﻷﺠﻬﺯﺓ ﺍﻟﺘﻲ ﺘﺴﺘﺨﺩﻡ ﻓﻲ ﺘﻭﺠﻴﻪ ﺍﻟﻤﻌﻠﻭﻤﺎﺕ ﺇﻟﻰ ﻭﺠﻬﺘﻬﺎ
ﺍﻟﺼﺤﻴﺤﺔ ﻤﺜل :
79
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﻭﻫﻲ ﺍﻟﺒﺭﻤﺠﻴﺎﺕ ﺍﻟﺘﻲ ﻴﺘﻡ ﺇﻨﺯﺍﻟﻬﺎ ﻭ ﺍﺴﺘﺨﺩﺍﻤﻬﺎ ﻓﻲ ﺍﻟﺸﺒﻜﺔ ﻭﺍﻟﺘﻲ ﻴﺘﻡ ﺘﺼﻨﻴﻔﻬﺎ
ﺇﻟﻰ:
80
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
• ﺸﺒﻜﺔ ﺍﻟﺭﺒﻁ ﺍﻟﺨﻁﻲ : Bus Networkﺘﺭﺘﺒﻁ ﺃﺠﻬﺯﺓ ﻫﺫﺍ ﺍﻟﻨﻭﻉ ﺒﻭﺍﺴﻁﺔ ﻨﺎﻗل
) (Busﺍﺘﺼﺎل ﺭﺌﻴﺴﻲ ﻤﺯﺩﻭﺝ ﺍﻻﺘﺠﺎﻩ ﻋﻥ ﻁﺭﻴﻕ ﻨﻘﺎﻁ ﺘﻔـﺭﻉ ) .(Tapﺘﺭﺴـل
ﺍﻟﺒﻴﺎﻨﺎﺕ ﻋﻠﻰ ﺸﻜل ﺇﺸﺎﺭﺍﺕ ﻜﻬﺭﺒﺎﺌﻴﺔ ﺇﻟﻰ ﺠﻤﻴـﻊ ﺤﻭﺍﺴـﻴﺏ ﺍﻟﺸـﺒﻜﺔ ﻭﻴﺴـﺘﻘﺒل
ﺍﻟﻤﻌﻠﻭﻤﺎﺕ ﻓﻘﻁ ﺍﻟﺤﺎﺴﻭﺏ ﺍﻟﺫﻱ ﻴﺘﻁﺎﺒﻕ ﻋﻨﻭﺍﻨﻪ ﻤﻊ ﻋﻨﻭﺍﻥ ﻫﺫﻩ ﺍﻟﺒﻴﺎﻨﺎﺕ ﺍﻟﻤﺭﺴﻠﺔ ،
ﻋﻠﻤﺎ ﺍﻨﻪ ﻓﻲ ﻟﺤﻅﺔ ﻭﺍﺤﺩﺓ ﻴﺴﺘﻁﻴﻊ ﺤﺎﺴﻭﺏ ﻭﺍﺤﺩ ﻓﻘﻁ ﺇﺭﺴﺎل ﺒﻴﺎﻨﺎﺘﻪ ﻋﺒﺭ ﺍﻟﺨـﻁ.
ﺍﻟﻨﺎﻗل .ﻭﻜﻤﺎ ﻓﻲ ﺍﻟﺸﻜل ﺍﻵﺘﻲ:
81
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﻓﻲ ﺤﺎﻟﺔ ﻋﻁل ﺃﻱ ﺠﻬﺎﺯ ﻓﺎﻨﻪ ﻻ ﻴﺅﺜﺭ ﻋﻠﻰ ﻋﻤل ﺍﻟﺸﺒﻜﺔ . .i
ﻗﻠﺔ ﺍﻟﺘﻜﻠﻔﺔ ﻨﻅﺭﺍ ﻟﻭﺠﻭﺩ ﺨﻁ ﺘﻭﺯﻴﻊ ﻭﺍﺤﺩ ﻴﺭﺒﻁ ﺠﻤﻴﻊ ﺍﻷﺠﻬﺯﺓ. .ii
ﺘﺘﻤﺘﻊ ﺠﻤﻴﻊ ﺍﻷﺠﻬﺯﺓ ﺒﻤﺴﺘﻭﻯ ﻭﺼﻭل ﻤﺘﺴﺎﻭﻱ ﺤﻴﺙ ﻴﻤﻜﻥ ﺍﻥ ﺘﻌﻤل .iii
ﺩﻭﻥ ﺍﻟﺤﺎﺠﺔ ﻟﻭﺠﻭﺩ ﺍﻟﻤﺯﻭﺩﺍﺕ ). (Server
ﺴﻬﻭﻟﺔ ﺇﻀﺎﻓﺔ ﺃﺠﻬﺯﺓ ﺃﺨﺭﻯ ﺇﻟﻰ ﺍﻟﺸﺒﻜﺔ . .iv
82
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
.iﻻ ﻴﺅﺜﺭ ﻋﻁل ﺇﻱ ﺠﻬﺎﺯ ﻓﻲ ﺍﻟﺸﺒﻜﺔ ﻋﻠﻰ ﻋﻤﻠﻬﺎ ﺒﺎﺴﺘﺜﻨﺎﺀ ﻋﻁل ﺍﻟﻤﺯﻭﺩ
).(Server
.iiﺴﻬﻭﻟﺔ ﺘﺭﺍﺴل ﺍﻟﺒﻴﺎﻨﺎﺕ ﻭ ﺘﺤﺩﻴﺜﻬﺎ ﻜﻭﻨﻬﺎ ﻤﺘﻭﻓﺭﺓ ﻓﻲ ﺠﻬﺎﺯ ﻭﺍﺤﺩ.
.iiiﺴﻬﻭﻟﺔ ﺇﺩﺍﺭﺓ ﺍﻟﺸﺒﻜﺔ ﻤﻊ ﺘﺤﺩﻴﺩ ﺼﻼﺤﻴﺎﺕ ﻜل ﻤﺤﻁﺔ ﺤﺴﺏ ﺍﻟﺤﺎﺠﺔ.
83
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﻫﻲ ﺍﺤﺩ ﺃﻨﻭﺍﻉ ﺸﺒﻜﺎﺕ ﺍﻟﺤﺎﺴﻭﺏ ﻭﺘﻘﻊ ﺒـﻴﻥ ﺍﻟﺸـﺒﻜﺎﺕ ﺍﻟﻤﺤﻠﻴـﺔ )(LANs
ﻭﺍﻟﺸﺒﻜﺎﺕ ﺍﻟﻭﺍﺴﻌﺔ ) .(WANsﻭﺘﺘﻜﻭﻥ ﻤﻥ ﺭﺒﻁ ﻋﺩﺩ ﻤﻥ ﺍﻟﺸﺒﻜﺎﺕ ﺍﻟﻤﺤﻠﻴﺔ ﻭﺠﻌﻠﻬـﺎ
ﺘﻌﻤل ﻜﺸﺒﻜﺔ ﻭﺍﺤﺩﺓ ﻀﻤﻥ ﻤﺴﺎﺤﺔ ﺠﻐﺭﺍﻓﻴﺔ ﺍﻜﺒﺭ ﻤﻥ ﺘﻠﻙ ﺍﻟﻤﺴﺘﺨﺩﻤﺔ ﻤـﻊ ﺍﻟﺸـﺒﻜﺎﺕ
ﺍﻟﻤﺤﻠﻴﺔ ﻤﺘﻤﺜﻠﺔ ﺒﻤﺩﻴﻨﺔ ﺃﻭ ﺠﺎﻤﻌﺔ .ﺍﻟﺸﻜل ﺍﻟﺘﺎﻟﻲ ﻴﻭﻀﺢ ﻤﺨﻁﻁ ﻟﻠﺸﺒﻜﺔ: MAN
84
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﺘﻭﻓﻴﺭ ﻭﺴﻴﻠﺔ ﻨﻘل ﺃﻤﻨﺔ ﻭ ﺴﺭﻴﻌﺔ ﻟﻠﺒﻴﺎﻨﺎﺕ ﻋﺒﺭ ﺍﻟﻌﻘﺩ ﺍﻟﻤﺨﺘﻠﻔﺔ. .i
85
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
.1ﺸﺒﻜﺔ ﺍﻟﻨﺩ ﻟﻠﻨﺩ :Peer to Peerﻭﻫﻲ ﺸﺒﻜﺔ ﺘﻜـﻭﻥ ﻓﻴﻬـﺎ ﺠﻤﻴـﻊ ﺍﻷﺠﻬـﺯﺓ
ﻤﺘﺴﺎﻭﻴﺔ ﻓﻲ ﺍﻟﻤﺭﺘﺒﺔ ﺒﺤﻴـﺙ ﻻ ﻴـﺘﺤﻜﻡ ﺍﺤـﺩ ﺍﻷﺠﻬـﺯﺓ ﺒـﺎﻷﺠﻬﺯﺓ ﺍﻷﺨـﺭﻯ ،
ﻭﻴﻤﻜﻥ ﻷﻱ ﺠﻬﺎﺯ ﺁﻥ ﻴﻁﻠﺏ ﻤﻠﻔـﺎﺕ ﻭﺒـﺭﺍﻤﺞ ﺍﻭ ﺍﺴـﺘﺨﺩﺍﻡ ﻤـﻭﺍﺭﺩ ﺍﻷﺠﻬـﺯﺓ
ﺍﻷﺨﺭﻯ ﻭﺘﻜﻤﻥ ﺴﻬﻭﻟﺘﻪ ﺒﺎﻥ ﺍﻟﻤﺴـﺘﺨﺩﻡ ﻴﺴـﺘﻁﻴﻊ ﺭﺒـﻁ ﺠﻬـﺎﺯﻩ ﻤـﻊ ﺍﻟﺸـﺒﻜﺔ
ﺒﻤﺠـﺭﺩ ﺇﻀـﺎﻓﺔ ﺒﻁﺎﻗـﺔ ﺍﻟﺸـﺒﻜﺔ ) (Network Interface Cardﺃﻭ ﺍﺴـﺘﺨﺩﺍﻡ
ﻨﻅﺎﻡ ﺍﻟﺘﺸﻐﻴل ﺍﻟﻤﻁﻠﻭﺏ.
.2ﺸﺒﻜﺔ ﺍﻟﺯﺒﻭﻥ /ﺍﻟﺨﺎﺩﻡ :Client to Serverﻭﻫﻲ ﺸﺒﻜﺔ ﺘﺤﺘﻭﻱ ﻋﻠﻰ ﻋﺩﺩ ﻤـﻥ
ﺍﻷﺠﻬﺯﺓ ﺘﻌﺘﺒﺭ ﻜﻤﺯﻭﺩﺍﺕ ﻟﻠﻤﻌﻠﻭﻤﺎﺕ ﺘﺴﻤﻰ ﺨﻭﺍﺩﻡ ) (Serversﻭﺒـﺎﻗﻲ ﺍﻷﺠﻬـﺯﺓ
ﺘﻌﺘﺒﺭ ﻤﺴﺘﺨﺩﻤﺔ ﻟﻠﻤﻌﻠﻭﻤﺎﺕ ﻭﺘﺴﻤﻰ ﺯﺒﺎﺌﻥ ) ، (Clientsﺒﺤﻴﺙ ﺘﻁﻠﺏ ﺍﻟﺯﺒﺎﺌﻥ ﻤـﻥ
ﺍﻟﺨﺎﺩﻡ ﺍﻟﺒﺭﺍﻤﺞ ﻭﺍﻟﻤﻠﻔﺎﺕ ﻭﻏﻴﺭﻫﺎ .ﺘﻤﺘﺎﺯ ﻫﺫﻩ ﺍﻟﻁﺭﻴﻘﺔ ﺒﺎﻟﻘﻭﺓ ﻭﺍﻷﻤﺎﻥ ﻭﺇﻤﻜﺎﻨﻴﺔ ﺭﺒﻁ
86
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﻋﺩﺩ ﺍﻜﺒﺭ ﻤﻥ ﺍﻷﺠﻬﺯﺓ .ﻭﺘﺴﺘﺨﺩﻡ ﻓﻲ ﺍﻟﻤﺅﺴﺴﺎﺕ ﺍﻟﻜﺒﻴﺭﺓ ﻭﻴﺤﺘﺎﺝ ﺠﻬﺎﺯ ﺍﻟﺨﺎﺩﻡ ﺇﻟﻰ
ﺇﺩﺍﺭﺓ ﻤﻥ ﺸﺨﺹ ﻤﺘﺨﺼﺹ.
ﺘﺨﺘﻠﻑ ﺴﺭﻋﺔ ﻨﻘل ﺍﻟﺒﻴﺎﻨﺎﺕ ﺩﺍﺨل ﺍﻟﺸﺒﻜﺔ ﻓﻬﻨﺎﻙ "ﺍﻻﻴﺜﺭﻨﺕ ﺍﻟﻌﺎﺩﻴﺔ" ﻭﺴـﺭﻋﺘﻬﺎ
10ﻤﻴﻐﺎﺒﺕ /ﺍﻟﺜﺎﻨﻴﺔ " ،ﺍﻻﻴﺜﺭﻨﺕ ﺍﻟﺴﺭﻴﻌﺔ" ﻭﺴﺭﻋﺘﻬﺎ 100ﻤﻴﻐﺎﺒﺕ /ﺍﻟﺜﺎﻨﻴﺔ ﻭ "ﺠﻴﺠﺎ
ﺒﺕ ﺍﻻﻴﺜﺭﻨﺕ" ﻭﺴﺭﻋﺘﻬﺎ 1ﺠﻴﻐﺎﺒﺎﻴﺕ /ﺍﻟﺜﺎﻨﻴﺔ.
• ﺍﻟﺤﺼﻭل ﻋﻠﻰ ﻁﺭﻴﻕ ﻟﻠﺘﻔﺎﻫﻡ ﺒﻴﻥ ﺍﻷﺠﻬﺯﺓ ﻋﻠﻰ ﺍﻟﺸﺒﻜﺔ ﻭ ﺘﺤﺩﻴﺩ ﻁﺭﻴﻘﺔ
ﻤﺘﻔﻕ ﻋﻠﻴﻬﺎ ﻹﺭﺴﺎل ﻭ ﺍﺴﺘﻘﺒﺎل ﺍﻟﺒﻴﺎﻨﺎﺕ.
• ﺘﻔﺎﺩﻱ ﺤﺼﻭل ﺍﻟﺘﺼﺎﺩﻡ ﺒﻴﻥ ﺍﻹﺸﺎﺭﺍﺕ ﻭ ﺍﻟﺫﻱ ﻴﺤﺼل ﻋﻨﺩ ﻗﻴﺎﻡ ﺠﻬﺎﺯﻴﻥ
ﺒﺈﺭﺴﺎل ﺒﻴﺎﻨﺎﺘﻬﻤﺎ ﻓﻲ ﻭﻗﺕ ﻭﺍﺤﺩ.
87
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
88
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﺇﻀﺎﻓﺔ ﻟﺫﻟﻙ ﺘﺴﺘﺨﺩﻡ ﺒﻌﺽ ﺍﻷﺴﻼﻙ ﺍﻟﻤﺤﻭﺭﻴﺔ ﻁﺒﻘﺔ ﺃﻭ ﻁﺒﻘﺘﻴﻥ ﻤﻥ ﺍﻟﻘﺼـﺩﻴﺭ ﻜﺤﻤﺎﻴـﺔ
ﺇﻀﺎﻓﻴﺔ.
ﺍﻟﻨﻭﻉ ﺍﻷﻭل ﻫﻭ ﺴﻠﻙ ﻤﺭﻥ ﺭﻓﻴﻊ ﻴﺼل ﻗﻁﺭﻩ ﺍﻟﻰ 0.6ﺴﻡ ﻭ ﻴﻭﺼل ﻤﺒﺎﺸﺭﺓ ﺍﻟﻰ
ﺒﻁﺎﻗﺔ ﺍﻟﺸﺒﻜﺔ .ﺃﻤﺎ ﺍﻟﻨﻭﻉ ﺍﻟﺜﺎﻨﻲ ﻓﻬﻭ ﺴﻠﻙ ﺜﺨﻴﻥ ﻤﺘﺼﻠﺏ ﻭ ﻏﻴﺭ ﻤﺭﻥ ﻭ ﻴﺼل ﻗﻁﺭﻩ ﺍﻟﻰ
1.2ﺴﻡ ﻭﻷﻨﻪ ﺃﺜﺨﻥ ﻤﻥ ﺍﻟﻨﻭﻉ ﺍﻷﻭل ﻓﺈﻨﻪ ﻴﺴﺘﻁﻴﻊ ﺍﻟﻭﺼﻭل ﺍﻟﻰ ﻤﺴـﺎﻓﺎﺕ ﺃﺒﻌـﺩ ﺩﻭﻥ
ﺘﻭﻫﻴﻥ ﻟﻺﺸﺎﺭﺓ ،ﻓﺒﻴﻨﻤﺎ ﻻ ﻴﺼل ﺍﻟﺴﻠﻙ ﺍﻷﻭل ﻷﻜﺜﺭ ﻤﻥ 185ﻤﺘﺭ ﻴﺼل ﺍﻟﺴﻠﻙ ﺍﻟﺜﺨﻴﻥ
ﺍﻟﻰ 500ﻤﺘﺭ.
ﺘﺘﻜﻭﻥ ﺍﻷﺴﻼﻙ ﺍﻟﻤﻠﺘﻭﻴﺔ ﻓﻲ ﺃﺒﺴﻁ ﺼﻭﺭﻫﺎ ﻤـﻥ ﺯﻭﺝ ﻤـﻥ ﺃﺴـﻼﻙ ﻨﺤﺎﺴـﻴﺔ
ﻤﻌﺯﻭﻟﺔ ﻭﻤﻠﺘﻔﺔ ﺤﻭل ﺒﻌﻀﻬﺎ ﺍﻟﺒﻌﺽ .ﻴﻌﻤل ﻫﺫﺍ ﺍﻹﻟﺘﻔﺎﻑ ﻋﻠﻰ ﺘﻘﻠﻴـل ﺘـﺄﺜﻴﺭ ﺍﻟﺘـﺩﺍﺨل
ﺍﻟﻜﻬﺭﻭﻤﻐﻨﺎﻁﻴﺴﻲ ﺸﻴﺌﺎ ﻤﺎ.
89
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
90
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﻭ ﺤﻴﺙ ﺃﻥ ﻜل ) (Coreﻻ ﻴﺴﺘﻁﻴﻊ ﻨﻘل ﺍﻟﻀﻭﺀ ﺃﻭ ﺍﻹﺸﺎﺭﺓ ﺇﻻ ﻓﻲ ﺍﺘﺠﺎﻩ ﻭﺍﺤﺩ ﻓﻘﻁ ﻓﺈﻨـﻪ
ﻻﺒﺩ ﻤﻥ ﺍﺴﺘﺨﺩﺍﻡ ﺃﻟﻴﺎﻑ ﺒﺼﺭﻴﺔ ﻟﻺﺭﺴﺎل ﻭ ﺃﺨﺭﻯ ﻟﻼﺴﺘﻘﺒﺎل .ﺘﻭﻓﺭ ﺍﻷﻟﻴـﺎﻑ ﺍﻟﺒﺼـﺭﻴﺔ
ﺍﻟﻤﺯﺍﻴﺎ ﺍﻟﺘﺎﻟﻴﺔ:
91
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
92
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
93
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﺘﻭﻓﺭ ﺍﻷﺴﻼﻙ ﺨﻴﺎﺭﺍﺕ ﻓﻌﺎﻟﺔ ﻟﺘﺒﺎﺩل ﺍﻟﺒﻴﺎﻨﺎﺕ ﻭ ﺍﻟﻤﻭﺍﺭﺩ ﻋﺒﺭ ﺍﻟﺸﺒﻜﺎﺕ ،ﻭ ﻟﻜـﻥ
ﺍﻷﺴﻼﻙ ﻜﻭﺴﻁ ﺇﺭﺴﺎل ﻻ ﻴﺨﻠﻭ ﻤﻥ ﺍﻟﻌﻴﻭﺏ .ﻴﻌﺘﺒﺭ ﺍﻟﻌﻴﺏ ﺍﻷﺴﺎﺴﻲ ﻟ ﺴﻼﻙ ﻫﻭ ﻋـﺩﻡ
ﻤﺭﻭﻨﺘﻬﺎ ،ﻓﺈﻥ ﺍﻷﺴﻼﻙ ﺇﺫﺍ ﻤﺩﺕ ﻭ ﺭﻜﺒﺕ ﻴﺼﺒﺢ ﻤﻥ ﺍﻟﺼﻌﺏ ﻨﺴﺒﻴﺎ ﺇﻋﺎﺩﺓ ﺘﺭﻜﻴﺒﻬﺎ ﻓـﻲ
ﻤﻜﺎﻥ ﺁﺨﺭ ﺩﻭﻥ ﺒﺫل ﺠﻬﺩ ﻭ ﻤﻀﺎﻴﻘﺔ ﻟﻠﻤﺴﺘﺨﺩﻤﻴﻥ ،ﻜﻤﺎ ﺃﻨﻬﺎ ﻻ ﺘﻭﻓﺭ ﺍﺘﺼﺎﻻ ﻟﻠﻤﺴﺘﺨﺩﻤﻴﻥ
ﻜﺜﻴﺭﻱ ﺍﻟﺘﻨﻘل.
ﻻ ﻟﻠﺘﺸﺒﻴﻙ ﻓﻲ ﺍﻵﻭﻨﺔ ﺍﻷﺨﻴﺭﺓ ،ﻭﺍﻟﺴﺒﺏ
ﺒﺩﺃﺕ ﺍﻟﺸﺒﻜﺎﺕ ﺍﻟﻼﺴﻠﻜﻴﺔ ﺘﺸﻜل ﺨﻴﺎﺭﹰﺍ ﻓﻌﺎ ﹰ
ﻓﻲ ﺫﻟﻙ ﻴﺘﻠﺨﺹ ﻓﻲ :
• ﺍﻟﺘﻁﻭﺭﺍﺕ ﺍﻟﻤﺘﻼﺤﻘﺔ ﻓﻲ ﺍﻟﺘﻘﻨﻴﺎﺕ ﻭﺍﻟﻤﻨﺘﺠﺎﺕ ﺍﻟﻼﺴﻠﻜﻴﺔ.
• ﺍﻻﻨﺨﻔﺎﺽ ﺍﻟﻤﺘﻭﺍﺼل ﻓﻲ ﺍﻷﺴﻌﺎﺭ ،ﻨﻅﺭﺍ ﻟﻠﺘﻨﺎﻓﺱ ﺍﻟﻤﺘﺯﺍﻴﺩ ﺒﻴﻥ ﺍﻟﻤﺼﻨﻌﻴﻥ.
• ﺍﻟﻁﻠﺏ ﺍﻟﻤﺘﺯﺍﻴﺩ ﻋﻠﻰ ﻫﺫﻩ ﺍﻟﺸﺒﻜﺎﺕ ﺒﺴﺒﺏ ﺍﻟﺤﺭﻴﺔ ﺍﻟﻜﺒﻴﺭﺓ ﺍﻟﺘﻲ ﺘﻭﻓﺭﻫﺎ
ﻟﻠﻤﺴﺘﺨﺩﻤﻴﻥ ﻓﻲ ﺍﻟﺘﻨﻘل ﺩﻭﻥ ﺃﻥ ﻴﺅﺜﺭ ﺫﻟﻙ ﻋﻠﻰ ﻋﻤﻠﻬﻡ.
• ﻴﻤﻜﻥ ﺘﺸﺒﻴﻪ ﺍﻟﺸﺒﻜﺎﺕ ﺍﻟﻼﺴﻠﻜﻴﺔ ﺒﺸﺒﻜﺎﺕ ﺍﻟﻬﺎﺘﻑ ﺍﻟﻤﺤﻤﻭل ﻓﺎﻟﻤﺴﺘﺨﺩﻡ
ﻴﺴﺘﻁﻴﻊ ﺍﻟﺘﻨﻘل ﺒﺤﺭﻴﺔ ﻭ ﻴﺒﻘﻰ ﻤﻊ ﺫﻟﻙ ﻤﺘﺼﻼ ﺒﺎﻟﺸﺒﻜﻪ .
94
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
96
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﺘﺴﺘﺨﺩﻡ ﺸﺒﻜﺎﺕ ﺭﺍﺩﻴﻭ ﺍﻟﻁﻴﻑ ﺍﻹﻨﺘﺸﺎﺭﻱ ﻋﺩﺓ ﺘﺭﺩﺩﺍﺕ ﻤﻌﺎ ﻟﻨﻘل ﺍﻹﺸﺎﺭﺓ ﻤﻤﺎ ﻴﻘﻠل
ﻤﻥ ﺍﻟﻤﺸﺎﻜل ﺍﻟﻤﺘﻌﻠﻘﺔ ﺒﺎﻹﺭﺴﺎل ﺃﺤﺎﺩﻱ ﺍﻟﺘﺭﺩﺩ.
ﺘﺭﺴل ﺍﻟﺒﻴﺎﻨﺎﺕ ﺒﺎﺴﺘﺨﺩﺍﻡ ﺩﻴﻭﺩ ﺒﺎﺙ ﻟﻠﻀﻭﺀ )(Light Emitting Diode- LED
ﺃﻭ ﺩﻴﻭﺩ ﻗﺎﺫﻑ ﻟﻠﻴﺯﺭ ).(Injection Laser Diode -ILD
ﺇﺸﺎﺭﺍﺕ ﺍﻷﺸﻌﺔ ﺘﺤﺕ ﺍﻟﺤﻤﺭﺍﺀ ﻻ ﺘﺴﺘﻁﻴﻊ ﺍﺨﺘﺭﺍﻕ ﺍﻟﺠﺩﺭﺍﻥ ﺃﻭ ﺍﻷﺠﺴﺎﻡ ﺍﻟﺼﻠﺒﺔ
ﻜﻤﺎ ﺃﻨﻬﺎ ﺘﻀﻌﻑ ﺇﺫﺍ ﺘﻌﺭﻀﺕ ﻹﻀﺎﺀﺓ ﺸﺩﻴﺩﺓ .ﺇﺫﺍ ﺍﻨﻌﻜﺴﺕ ﺇﺸـﺎﺭﺍﺕ ﺍﻷﺸـﻌﺔ ﺘﺤـﺕ
ﺍﻟﺤﻤﺭﺍﺀ ﺒﺎﻟﺠﺩﺭﺍﻥ ﻓﺈﻨﻬﺎ ﺘﺨﺴﺭ ﻨﺼﻑ ﻁﺎﻗﺘﻬﺎ ﻤﻊ ﻜل ﺍﻨﻌﻜﺎﺱ ،ﻭﻨﻅﺭﹰﺍ ﻟﻤﺩﺍﻫﺎ ﻭﺜﺒﺎﺘﻬـﺎ
ﺍﻟﻤﺤﺩﻭﺩ ﻓﺈﻨﻬﺎ ﺘﺴﺘﺨﺩﻡ ﻋﺎﺩﺓ ﻓﻲ ﺍﻟﺸﺒﻜﺎﺕ ﺍﻟﻤﺤﻠﻴﺔ ﺍﻟﺼﻐﻴﺭﺓ.
ﺘﺴﺘﺨﺩﻡ ﺸﺒﻜﺎﺕ ﺍﻹﺭﺴﺎل ﺒﺎﺴﺘﺨﺩﺍﻡ ﺍﻷﺸﻌﺔ ﺘﺤﺕ ﺍﻟﺤﻤﺭﺍﺀ ﺜﻼﺙ ﺘﻘﻨﻴﺎﺕ ﻫﻲ:
97
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﻴﻌﺘﻤﺩ ﻤﻘﺩﺍﺭ ﺍﻟﺘﻭﻫﻴﻥ ﻓﻲ ﺇﺸﺎﺭﺍﺕ ﺍﻷﺸﻌﺔ ﺘﺤﺕ ﺍﻟﺤﻤﺭﺍﺀ ﻋﻠﻰ ﻜﺜﺎﻓﺔ ﻭ ﻭﻀﻭﺡ
ﺍﻷﺸﻌﺔ ﺍﻟﻤﺒﺜﻭﺜﺔ ﻜﻤﺎ ﻴﻌﺘﻤﺩ ﻋﻠﻰ ﺍﻟﻅﺭﻭﻑ ﺍﻟﻤﻨﺎﺨﻴﺔ ﻭﺍﻟﻌﻘﺒﺎﺕ ﻓﻲ ﻁﺭﻴﻕ ﺍﻷﺸﻌﺔ ،ﻭ ﻜﻠﻤﺎ
ﻜﺎﻨﺕ ﺍﻷﺸﻌﺔ ﻤﺼﻭﺒﺔ ﺒﺸﻜل ﺃﺩﻕ ﻜﻠﻤﺎ ﻗل ﻤﺴﺘﻭﻯ ﺍﻟﺘﻭﻫﻴﻥ ﻜﻤﺎ ﺃﻨﻪ ﻴﺼﺒﺢ ﻤﻥ ﺍﻟﺼـﻌﺏ
ﺍﻋﺘﺭﺍﺽ ﺍﻷﺸﻌﺔ ﺃﻭ ﺍﻟﺘﺠﺴﺱ ﻋﻠﻴﻬﺎ.
98
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﻭﻴﺘﻡ ﺒﺎﺴﺘﺨﺩﺍﻡ ﺠﻬﺎﺯ ﺍﻟﻤﻭﺩﻡ ) (Modemﻤﻊ ﺘﻭﻓﺭ ﻤﺯﻭﺩ ﺨﺩﻤﺔ ﺍﻻﻨﺘﺭﻨﺕ ﺍﻟﻤﺤﻠﻲ
) .(Internet Service Provider - ISPﻫﺫﺍ ﺍﻟﻨﻭﻉ ﻤﻥ ﺍﻻﺘﺼﺎل ﻫﻭ ﺍﻟﻁﺭﻴﻘﺔ ﺍﻟﻤﻌﺘـﺎﺩﺓ
ﻟﺩﻯ ﻤﺴﺘﺨﺩﻤﻲ ﺍﻻﻨﺘﺭﻨﺕ ﻓﻲ ﺍﻟﻤﻨﺎﺯل .ﻭﺍﻟﻤﻭﺩﻡ ﻋﺒﺎﺭﺓ ﻋﻥ ﺠﻬـﺎﺯ ﺇﺭﺴـﺎل ﻭﺍﺴـﺘﻘﺒﺎل
ﻟﻠﺒﻴﺎﻨﺎﺕ ﻤﻊ ﺨﻁ ﺍﻟﻬﺎﺘﻑ ﺤﻴﺙ ﻴﻘﻭﻡ ﺒﺘﺤﻭﻴل ﺍﻹﺸﺎﺭﺍﺕ ﺍﻟﺭﻗﻤﻴﺔ ﺍﻟﺨﺎﺭﺠﺔ ﻤﻥ ﺍﻟﺤﺎﺴـﻭﺏ
ﺇﻟﻰ ﺇﺸﺎﺭﺍﺕ ﻜﻬﺭﺒﺎﺌﻴﺔ ﻤﻤﺎﺜﻠﺔ ﻹﺸﺎﺭﺍﺕ ﺍﻟﻬﺎﺘﻑ ﻭﺒﺎﻟﻌﻜﺱ.
99
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﻭﻴﺘﻡ ﺒﺎﺴﺘﺨﺩﺍﻡ ﺨﻁﻭﻁ ﺨﺎﺼﺔ ﺘﺼل ﻤﺒﺎﺸﺭﺓ ﺒﻴﻥ ﺍﻟﻤﻘﺴﻡ ﻭ ﺍﻟﺸﺒﻜﺔ ﺍﻟﻤﺤﻠﻴﺔ ﻭﺫﻟﻙ
ﻤﻘﺎﺒل ﺍﺠﻭﺭ ﺸﻬﺭﻴﺔ ﻟﻬﺫﻩ ﺍﻟﺨﺩﻤﺔ .ﻤﻤﻴﺯﺍﺕ ﻫﺫﺍ ﺍﻟﺨﻁ ﺍﻨﻪ ﻴﺒﻘﻰ ﻤﺘﺎﺤﺎ ﺒﺸﻜل ﻤﺴـﺘﻤﺭ ﻭﻻ
ﻴﺤﺘﺎﺝ ﺇﻟﻰ ﻁﻠﺏ ﺍﻻﺘﺼﺎل .ﻭﻫﺫﻩ ﺍﻟﻁﺭﻴﻘﺔ ﻤﺴﺘﺨﺩﻤﺔ ﻟﺩﻯ ﺍﻟﻤﺅﺴﺴﺎﺕ ﻭﺍﻟﺸﺭﻜﺎﺕ ﺍﻟﻜﺒﻴﺭﺓ.
ﺘﺘﻴﺢ ﻫﺫﻩ ﺍﻟﺨﺩﻤﺔ ﺍﻟﺤﺼﻭل ﻋﻠﻰ ﺴﺭﻋﺔ ﻋﺎﻟﻴﺔ ﺒﺎﺴﺘﺨﺩﺍﻡ ﺨﻁﻭﻁ ﺍﻟﻬﺎﺘﻑ ﺤﻴﺙ ﻴﺘﻡ
ﺘﻘﺴﻴﻡ ﺨﻁ ﺍﻟﻬﺎﺘﻑ ﺍﻟﻰ ﻤﺠﺎﻟﻴﻥ ﻤﻥ ﺍﻟﺫﺒﺫﺒﺎﺕ .ﺇﺫ ﻴﺘﻴﺢ ﻫﺫﺍ ﺍﻟﻨﻭﻉ ﻤﻥ ﺍﻟﺨﺩﻤـﺔ ﺍﺴـﺘﺨﺩﺍﻡ
ﺍﻟﻬﺎﺘﻑ ﻭﺍﻻﻨﺘﺭﻨﺕ ﻓﻲ ﻟﻭﻗﺕ ﻨﻔﺴﻪ .ﻫﻨﺎﻟﻙ ﻋﺩﺓ ﺃﻨﻭﺍﻉ ﺍﻨﺒﺜﻘﺕ ﻤﻥ ﻫﺫﺍ ﺍﻟﻨﻭﻉ ﺍﻋﺘﻤﺎﺩﹰﺍ ﻋﻠـﻰ
ﺍﻟﺘﻜﻨﻭﻟﻭﺠﻴﺎ ﺍﻟﻤﺴﺘﺨﺩﻤﺔ ﻓﻲ ﻜل ﻤﻥ ﺍﻟﻤﻘﺴﻡ ﺍﻟﻤﺴﺘﺨﺩﻡ ،ﺠﻭﺩﺓ ﺍﻷﺴﻼﻙ ،ﺍﻟﻤﺴـﺎﻓﺔ ﺒـﻴﻥ
ﺍﻟﻤﺸﺘﺭﻙ ﻭﺍﻟﻤﻘﺴﻡ ،ﺇﻀﺎﻓﺔ ﺇﻟﻰ ﻨﻭﻉ ﺍﻷﺠﻬﺯﺓ ﺍﻟﻤﺴﺘﺨﺩﻤﺔ ﻟﻬﺫﺍ ﺍﻟﻐﺭﺽ.
ﺘﺴﺘﺨﺩﻡ ﻋﻨﺩ ﺍﻟﺤﺎﺠﺔ ﺍﻟﻰ ﻨﻁﺎﻕ ﻭﺍﺴﻊ ﻤﻥ ﺘﺭﺍﺴل ﺍﻟﺒﻴﺎﻨﺎﺕ ﺍﻭ ﻓﻲ ﺤﺎﻟﺔ ﻋﺩﻡ ﺘﻭﻓﺭ
ﺨﻴﺎﺭﺍﺕ ﺍﺨﺭﻯ ﻟﻠﺭﺒﻁ .ﻋﻴﻭﺏ ﻫﺫﻩ ﺍﻟﻁﺭﻴﻘﺔ ﻫﻭ ﺍﺭﺘﻔﺎﻉ ﺘﻜﻠﻔﺔ ﺍﻟﺭﺒﻁ ﻭﺍﻷﺠﻬﺯﺓ ﺍﻟﻤﺴﺘﺨﺩﻤﺔ.
100
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﻨﻅﺭﺍ ﻻﺘﺴﺎﻉ ﺍﺴﺘﺨﺩﺍﻡ ﺍﻟﻬﻭﺍﺘﻑ ﺍﻟﺨﻠﻴﻭﻴﺔ ﻓﻘﺩ ﻗﺎﻤﺕ ﺸﺭﻜﺎﺕ ﺨﺩﻤﺎﺕ ﺍﻻﺘﺼﺎﻻﺕ
ﺍﻟﺨﻠﻴﻭﻴﺔ ﺒﺘﻭﻓﻴﺭ ﺨﻁﻭﻁ ﺍﻻﺘﺼﺎل ﻤﻊ ﺍﻻﻨﺘﺭﻨﺕ ﻋﻥ ﻁﺭﻴﻕ ﺍﻟﻬﺎﺘﻑ ﺍﻟﻤﺤﻤﻭل.
3-6-4ﻤﺼﻁﻠﺤﺎﺕ ﻲ ﺍﻻﻨﺘﺭﻨﺕ
101
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
102
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
103
ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺷﺒﻜﺎﺕ ﺍﳊﺎﺳﻮﺏ
104
ﺍﻟﻔﺼﻞ ﺍﳋﺎﻣﺲ
ﻣﻘﺪﻣـــﺔ ﰲ ﺍﻟﻮﺳﺎﺋﻂ ﺍﳌﺘﻌﺪﺩﺓ
An Introduction to
Multimedia
ﺍﻟﻔﺼﻞ ﺍﳋﺎﻣﺲ
ﻣﻘﺪﻣـــﺔ ﰲ ﺍﻟﻮﺳﺎﺋﻂ ﺍﳌﺘﻌﺪﺩﺓ
An Introduction to Multimedia
1-5ﺍﳌﻘـﺪﻣـﺔ
ﻤﺭّﺕ ﺤﺭﻜﺔ ﺍﻟﺘﻁﻭﺭ ﺍﻟﻌﻠﻤﻲ ﺒﻤﺠﻤﻭﻋﺔ ﻤﻥ ﺍﻟﺘﻐﻴﺭﺍﺕ ﻭﺍﻟﺘﻁﻭﺭﺍﺕ ﺒﺎﻋﺘﺒﺎﺭﻫﺎ
ﻋﻤﻠﻴﺔ ﻤﺴﺘﻤﺭﺓ ﻤﺘﺠﺩﺩﺓ ﻤﺘﻌﺩﺩﺓ ﺍﻟﻌﻨﺎﺼﺭ ﻭﺍﻟﻤﺩﺨﻼﺕ .ﻓﻲ ﻫﺫﻩ ﺍﻟﻤﺭﺤﻠﺔ ﺍﺴﻬﻡ ﺍﻟﺘﻁﻭﺭ
ﺍﻟﻀﺨﻡ ﻓﻲ ﺼﻨﺎﻋﺔ ﺍﻟﺤﺎﺴﻭﺏ ﻭﺍﻟﺒﺭﻤﺠﻴﺎﺕ ﺍﻟﻰ ﺍﺴﺘﺤﺩﺍﺙ ﺘﻁﺒﻴﻘﺎﺕ ﺠﺩﻴﺩﺓ ﻭﻤﺘﻨﻭﻋﺔ .ﻤﻥ
ﺃﺠل ﻫﺫﺍ ﺘﻡ ﺍﻟﺘﺭﻜﻴﺯ ﻋﻠﻰ ﺍﻟﺒﺤﺙ ﻭﺍﻟﺘﻁﻭﻴﺭ ﻟﺼﺎﻟﺢ ﺘﻁﺒﻴﻘﺎﺕ ﺍﻟﻭﺴﺎﺌﻁ ﺍﻟﻤﺘﻌﺩﺩﺓ ﻤﻥ ﻤﻜﻭﻨﺎﺕ
ﻤﺎﺩﻴﺔ ﻭ ﺒﺭﻤﺠﻴﺔ ﻭ ﺍﻟﺘﻲ ﺍﺼﺒﺤﺕ ﺍﻻﻜﺜﺭ ﺍﻨﺘﺸﺎﺭﺍ ﻋﺎﻟﻤﻴﺎ.
.1ﺍﻟﺘﻔﺎﻋﻠﻴﺔ Interaction
ﻴﻌﺭﻑ ﺍﻟﺘﻔﺎﻋل ﺒﻤﻔﻬﻭﻡ ﺍﻟﻔﻌل ﻭﺭﺩ ﺍﻟﻔﻌل ﺒﻴﻥ ﻤﺎ ﻴﻌﺭﻀﻪ ﺍﻟﺒﺭﻨﺎﻤﺞ ﻭﺍﻟﻤﺴﺘﺨﺩﻡ.
ﻭﻴﻜﻭﻥ ﺒﻁﺭﻴﻘﺘﻴﻥ :
107
ﺍﻟﻔﺼﻞ ﺍﳋﺎﻣﺲ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻟﻮﺳﺎﺋﻂ ﺍﳌﺘﻌﺪﺩﺓ
.2ﺍﻟﺘﻜﺎﻤل Integration
ﻫﻭ ﻨﻅﺎﻡ ﺭﺒﻁ ﻏﻴﺭ ﺨﻁﻲ ﺒﺎﺴﺘﺨﺩﺍﻡ ﺍﻟﺭﻭﺍﺒﻁ ) (Linksﺍﻟﺘﻲ ﺘﺤﺘﻭﻱ ﻋﻠﻰ
ﺍﻟﻤﻌﻠﻭﻤﺎﺕ ﻤﻥ ﺍﻟﻨﻭﻉ ﻨﺹ ) (Textﻭﺍﻟﺘﻲ ﺘﻅﻬﺭ ﺒﺸﻜل ﺘﺘﺎﺒﻌﻲ ﺇﺫ ﻴﻌﺘﺒﺭ ﺍﻷﺴﺎﺱ ﻓﻲ
ﺍﻟﺘﺠﻭﺍل ﻓﻲ ﺸﺒﻜﺔ ﺍﻻﻨﺘﺭﻨﺕ .ﻭﻜﻤﺎ ﻤﻭﻀﺤﺔ ﺒﺎﻟﺸﻜل ﺍﻷﺘﻲ:
108
ﺍﻟﻔﺼﻞ ﺍﳋﺎﻣﺲ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻟﻮﺳﺎﺋﻂ ﺍﳌﺘﻌﺪﺩﺓ
ﺍﻟﺘﻁﻭﺭ ﺍﻟﺴﺭﻴﻊ ﻓﻲ ﺒﺭﺍﻤﺞ ﺍﻟﻭﺴﺎﺌﻁ ﺍﻟﻤﺘﻌﺩﺩﺓ ﺃﺩﻯ ﺇﻟﻰ ﺍﺴﺘﺨﺩﺍﻤﻬﺎ ﻓﻲ ﺍﻟﻌﺩﻴﺩ ﻤﻥ
ﺍﻟﻤﺠﺎﻻﺕ ﻤﻨﻬﺎ:
109
ﺍﻟﻔﺼﻞ ﺍﳋﺎﻣﺲ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻟﻮﺳﺎﺋﻂ ﺍﳌﺘﻌﺪﺩﺓ
110
ﺍﻟﻔﺼﻞ ﺍﳋﺎﻣﺲ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻟﻮﺳﺎﺋﻂ ﺍﳌﺘﻌﺪﺩﺓ
.4ﺍﻟﺼﻨﺎﻋﺔ :ﻭﻓﻲ ﺍﻟﻘﻁﺎﻉ ﺍﻟﺼﻨﺎﻋﻲ ﺘﺴﺘﺨﺩﻡ ﺍﻟﻭﺴﺎﺌﻁ ﺍﻟﻤﺘﻌﺩﺩﺓ ﻜﻭﺴﻴﻠﺔ ﻟﻠﻤﺴﺎﻋﺩﺓ ﻓﻲ
ﺘﻘﺩﻴﻡ ﻤﻌﻠﻭﻤﺎﺕ ﻟﺤﻤﻠﺔ ﺍﻷﺴﻬﻡ ،ﺍﻟﺭﺅﺴﺎﺀ ﻭﺯﻤﻼﺀ ﺍﻟﻌﻤل .ﻭﻫـﻲ ﺃﻴﻀـﺎ ﻤﻔﻴـﺩﺓ
ﻟﺘﻭﻓﻴﺭ ﺘﺩﺭﻴﺏ ﺍﻟﻤﻭﻅﻔﻴﻥ ،ﻭﺍﻹﻋﻼﻥ ،ﻭﺒﻴﻊ ﺍﻟﻤﻨﺘﺠﺎﺕ ﻓﻲ ﺠﻤﻴﻊ ﺃﻨﺤﺎﺀ ﺍﻟﻌﺎﻟﻡ ﻋﻥ
ﻁﺭﻴﻕ ﻭﺴﺎﺌل ﻏﻴﺭ ﻤﺤﺩﻭﺩﺓ ﻤﻥ ﺍﻟﺘﻘﻨﻴﺎﺕ ﺍﻟﻘﺎﺌﻤﺔ ﻋﻠﻰ ﺍﻻﻨﺘﺭﻨﺕ.
.5ﺍﻹﻨﺘﺭﻨ ﺕ :ﻟﻘﺩ ﺃﺼﺒﺤﺕ ﺸﺒﻜﺔ ﺍﻹﻨﺘﺭﻨﺕ ﺒﻴﺌﺔ ﻟﻠﻭﺴـﺎﺌﻁ ﺍﻟﻤﺘﻌـﺩﺩﺓ ﻤـﻥ ﺤﻴـﺙ
ﺍﺴﺘﺨﺩﺍﻤﻬﺎ ﻟﻠﺭﺴﻭﻤﺎﺕ ،ﺍﻟﺭﺴﻭﻡ ﺍﻟﻤﺘﺤﺭﻜﺔ ،ﻤﻠﻔﺎﺕ ﺍﻟﺼﻭﺕ ﻭﺍﻟﻔﻴـﺩﻴﻭ ﻭﺍﻟﺘـﻲ
ﺴﺎﻫﻤﺕ ﻓﻲ ﺘﻁﻭﺭ ﺍﻟﻌﺩﻴﺩ ﻤﻥ ﺍﻟﺘﻁﺒﻴﻘﺎﺕ.
111
ﺍﻟﻔﺼﻞ ﺍﳋﺎﻣﺲ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻟﻮﺳﺎﺋﻂ ﺍﳌﺘﻌﺪﺩﺓ
112
ﺍﻟﻔﺼﻞ ﺍﳋﺎﻣﺲ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻟﻮﺳﺎﺋﻂ ﺍﳌﺘﻌﺪﺩﺓ
4-5ﺍﻟﺼﻮﺕ Sound
113
ﺍﻟﻔﺼﻞ ﺍﳋﺎﻣﺲ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻟﻮﺳﺎﺋﻂ ﺍﳌﺘﻌﺪﺩﺓ
• ﻤﻌﺩل ﺍﺨﺫ ﺍﻟﻌﻴﻨﺔ :Sampling Rateﺍﻟﺫﻱ ﻴﺤﺩﺩ ﻋﺩﺩ ﺍﻟﻌﻴﻨﺎﺕ ﺨﻼل ﺍﻟﺜﺎﻨﻴﺔ ﺍﻟﻭﺍﺤﺩﺓ
ﻭﻫﺫﺍ ﻴﺨﻀﻊ ﺍﻟﻰ ﻨﻅﺭﻴﺔ ﻨﻴﻜﻭﻴﺴﺕ ﻟﻠﻌﻴﻨـﺎﺕ )(Nyquist’s Sampling Theorem
ﻭﺍﻟﺘﻲ ﺘﻨﺹ ﻋﻠﻰ ﺃﻥ ﻻ ﻴﻘل ﻤﻌﺩل ﺍﺨﺫ ﺍﻟﻌﻴﻨﺎﺕ ﻋﻥ ﻀﻌﻑ ﺃﻋﻠﻰ ﺘﺭﺩﺩ ﻓﻲ ﺍﻹﺸﺎﺭﺓ.
ﺇﻥ ﻤﻌﺩل ﺍﺨﺫ ﺍﻟﻌﻴﻨﺎﺕ ﺍﻟﻤﺴﺘﺨﺩﻡ ﻓﻲ ﺼﻨﺎﻋﺔ ﻭﺘﺴﺠﻴل ﺍﻷﻗﺭﺍﺹ ﺍﻟﻤﻭﺴﻴﻘﻴﺔ CDﻫﻭ
44.1ﻜﻴﻠﻭ ﻫﺭﺘﺯ ،ﺃﻱ 44100ﻋﻴﻨﺔ ﻓﻲ ﺍﻟﺜﺎﻨﻴﺔ ﺍﻟﻭﺍﺤﺩﺓ .ﻋﻨﺩ ﻫﺫﺍ ﺍﻟﻤﺴﺘﻭﻯ ﻓـﺈﻥ
ﺍﻟﻤﻭﺠﺔ ﺍﻟﺼﻭﺘﻴﺔ ﺍﻟﺭﻗﻤﻴﺔ ﺍﻟﻨﺎﺘﺠﺔ ﺘﻜﻭﻥ ﺍﻗﺭﺏ ﻤﺎ ﻴﻜـﻭﻥ ﺍﻟـﻰ ﺍﻟﻤﻭﺠـﺔ ﺍﻷﺼـﻠﻴﺔ
ﻭﻤﻨﺎﺴﺒﺔ ﺠﺩﺍ ﺍﻟﻰ ﻤﺴﺘﻭﻯ ﺍﺴﺘﺠﺎﺒﺔ ﺍﻹﺫﻥ ﺍﻟﺒﺸﺭﻴﺔ ﻭﻴﻤﻜﻥ ﺍﺴﺘﺨﺩﺍﻡ ﻤﻌﺩﻻﺕ ﻤﻨﺨﻔﻀﺔ
ﻟﻠﻌﻴﻨﺎﺕ ،ﻓﻜﻠﻤﺎ ﻜﺎﻥ ﻤﻌﺩل ﺍﺨﺫ ﺍﻟﻌﻴﻨﺎﺕ ﺍﻜﺒﺭ ﻜﻠﻤﺎ ﺍﺯﺩﺍﺩﺕ ﺠﻭﺩﺓ ﺍﻟﺼﻭﺕ ﺍﻟﻨﺎﺘﺞ.
114
ﺍﻟﻔﺼﻞ ﺍﳋﺎﻣﺲ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻟﻮﺳﺎﺋﻂ ﺍﳌﺘﻌﺪﺩﺓ
ﻭﺍﻟﺠﺩﻭل ﺍﻵﺘﻲ ﻴﻭﻀﺢ ﺃﻨﻭﺍﻉ ﻤﺨﺘﻠﻔﺔ ﻤﻥ ﻤﻌﺩل ﺍﺨﺫ ﺍﻟﻌﻴﻨﺎﺕ ﻤـﻊ ﺩﻗـﺔ ﺍﻟﻌﻴﻨـﺔ
ﻭﺍﻟﺴﻌﺔ ﺍﻟﺘﺨﺯﻴﻨﻴﺔ ﺍﻟﻤﺴﺘﺨﺩﻤﺔ ﻟﺘﺴﺠﻴل ﺍﻟﺼﻭﺕ ﺍﻟﺭﻗﻤﻲ ﻟﻤﺩﺓ ﺩﻗﻴﻘﺔ ﻭﺍﺤﺩﺓ :
.2ﺘﺴﺠﻴل ﺍﻟﺼﻭﺕ
ﻴﺴﺘﺨﺩﻡ ﺍﻟﻤﻴﻜﺭﻭﻓﻭﻥ ﻓﻲ ﻋﻤﻠﻴﺔ ﺘﺴﺠﻴل ﺍﻟﺼﻭﺕ ﺤﻴﺙ ﻴﻘﻭﻡ ﺒﺘﺤﻭﻴـل ﺍﻟﻤﻭﺠـﺎﺕ
ﺍﻟﺼﻭﺘﻴﺔ ﺍﻟﻰ ﺇﺸﺎﺭﺓ ﻜﻬﺭﺒﺎﺌﻴﺔ ﺘﻨﺎﻅﺭﻴﺔ .ﻴﺘﻡ ﺒﻌﺩ ﺫﻟﻙ ﺇﺩﺨﺎﻟﻬﺎ ﺍﻟﻰ ﺍﻟﺤﺎﺴﻭﺏ ﻋﻥ ﻁﺭﻴـﻕ
ﺒﻁﺎﻗﺔ ﺍﻟﺼﻭﺕ ) (Sound Cardﻭﻓﻲ ﺩﺍﺨل ﺒﻁﺎﻗﺔ ﺍﻟﺼﻭﺕ ﺘﻘﻭﻡ ﺩﺍﺌﺭﺓ ) (ADCﺒﺘﺤﻭﻴل
ﺍﻹﺸﺎﺭﺍﺕ ﺍﻟﺼﻭﺕ ﺍﻟﻜﻬﺭﺒﺎﺌﻴﺔ ﺍﻟﺘﻨﺎﻅﺭﻴﺔ ﺍﻟﻰ ﺇﺸﺎﺭﺍﺕ ﺼﻭﺕ ﻜﻬﺭﺒﺎﺌﻴﺔ ﺭﻗﻤﻴـﺔ .ﻭﻜﻤـﺎ
ﻤﻭﻀﺤﺔ ﺒﺎﻟﺸﻜل ﺍﻟﺘﺎﻟﻲ:
115
ﺍﻟﻔﺼﻞ ﺍﳋﺎﻣﺲ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻟﻮﺳﺎﺋﻂ ﺍﳌﺘﻌﺪﺩﺓ
.3ﺍﻻﺴﺘﻤﺎ ﺇﻟ ﺍﻟﺼﻭﺕ
ﺇﻥ ﻋﻤﻠﻴﺔ ﺘﺸﻐﻴل ﻤﻠﻑ ﺍﻟﺼﻭﺕ ﺘﺘﻁﻠﺏ ﺘﺤﻭﻴل ﺇﺸﺎﺭﺓ ﺍﻟﺼﻭﺕ ﺍﻟﻜﻬﺭﺒﺎﺌﻴـﺔ ﺍﻟﺭﻗﻤﻴـﺔ
ﺩﺍﺨل ﺠﻬﺎﺯ ﺍﻟﺤﺎﺴﻭﺏ ﺇﻟﻰ ﺇﺸﺎﺭﺍﺕ ﺼﻭﺕ ﻜﻬﺭﺒﺎﺌﻴﺔ ﺘﻨﺎﻅﺭﻴﺔ ﻟﻐﺭﺽ ﺇﺨﺭﺍﺠﻬﺎ ﻋﺒﺭ ﻤﻨﺎﻓﺫ
ﺍﻟﺤﺎﺴﻭﺏ ﺍﻟﻰ ﺃﺠﻬﺯﺓ ﺍﻹﺨﺭﺍﺝ .
116
ﺍﻟﻔﺼﻞ ﺍﳋﺎﻣﺲ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻟﻮﺳﺎﺋﻂ ﺍﳌﺘﻌﺪﺩﺓ
ﻤﻊ ﺒﻘﻴﺔ ﺍﻟﻤﻠﻔﺎﺕ ﺍﻟﺼﻭﺘﻴﺔ ﻻﻥ ﻤﻠﻔﺎﺕ MIDIﺘﺨﺯﻥ ﺍﻟﻨﻭﺘﺎﺕ ﺍﻟﻤﻭﺴﻴﻘﻴﺔ ﻓﻘﻁ ﻭﻻ
ﻴﻤﻜﻥ ﺘﺨﺯﻴﻥ ﺼﻭﺕ ﺍﻟﻐﻨﺎﺀ ﺃﻭ ﺍﻟﻜﻼﻡ .ﻴﻌﻤل ﻤﻊ Windowsﻭ .Macintosh
• ﻤﻠﻔﺎﺕ :(Real Media) RMﺇﻥ ﻤﻠﻑ ) (Real Mediaﻫﻭ ﻤﻠـﻑ ﺼـﻭﺘﻲ ﺃﻭ
ﻓﻴﺩﻴﻭ ﺘﻡ ﺘﺼﻤﻴﻤﻪ ﻭﺘﻁﻭﻴﺭﻩ ﻤﻥ ﻗﺒل ) .(Real Network Inc.ﻤﻠـﻑ ﺍﻟﺼـﻭﺕ
ﺍﻷﺴﺎﺴﻲ ﺒﺎﻤﺘﺩﺍﺩ ) (RMﻴﺸﻐﻠﻪ ﺒﺭﻨﺎﻤﺞ ) (Real Playerﻓﻲ ﺍﻟﻭﻗـﺕ ﺍﻟﺤﻘﻴﻘـﻲ
) (Real Timeﺒﺩﻭﻥ ﺍﻟﺤﺎﺠﺔ ﺇﻟﻰ ﺘﻨﺯﻴل ،ﻭﺇﻥ ﺍﻏﻠﺏ ﻤﻠﻔﺎﺕ ﺍﻟﺼﻭﺕ ﻓﻲ ﺸـﺒﻜﺔ
ﺍﻻﻨﺘﺭﻨﺕ ﻫﻲ ﻤﻠﻔﺎﺕ ﻤﻥ ﻫﺫﺍ ﺍﻟﻨﻭﻉ.
117
ﺍﻟﻔﺼﻞ ﺍﳋﺎﻣﺲ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻟﻮﺳﺎﺋﻂ ﺍﳌﺘﻌﺪﺩﺓ
5-5ﺍﻟﺼﻮﺭ Image
ﺍﻟﺭﺴﻭﻤﺎﺕ ﺍﻟﺜﺎﺒﺘﺔ ﺴﻭﺍﺀ ﻜﺎﻨﺕ ﺜﻨﺎﺌﻴﺔ ﺍﻷﺒﻌﺎﺩ ﺃﻡ ﺜﻼﺜﻴـﺔ ﺍﻹﺒﻌـﺎﺩ ﻴـﺘﻡ ﺇﻋـﺩﺍﺩﻫﺎ
ﺇﻤﺎ ﺒﺎﺴﺘﺨﺩﺍﻡ ﺍﺤﺩ ﺒﺭﺍﻤﺞ ﺍﻟﺭﺴﻡ ﺍﻟﻤﺘﻭﻓﺭﺓ ﻓﻲ ﺍﻟﺤﺎﺴﻭﺏ ﺃﻭ ﺭﺴﻤﻬﺎ ﻴـﺩﻭﻴﹸﺎ ﺜـﻡ ﺇﺩﺨﺎﻟﻬـﺎ
ﺇﻟﻰ ﺍﻟﺤﺎﺴﻭﺏ ﺒﺎﺴﺘﺨﺩﺍﻡ ﺍﻟﻤﺎﺴـﺢ ﺍﻟﻀـﻭﺌﻲ) .(Scannerﺃﻤـﺎ ﺍﻟﺼـﻭﺭ ﺍﻟﻔﻭﺘﻭﻏﺭﺍﻓﻴـﺔ
) (Photographsﺍﻟﺜﺎﺒﺘﺔ ﻓﻴﺘﻡ ﺨﺯﻨﻬﺎ ﺃﻭ ﺇﺩﺨﺎﻟﻬﺎ ﺍﻟﻰ ﺍﻟﺤﺎﺴﻭﺏ ﺒﺎﺴﺘﺨﺩﺍﻡ ﺍﻟﻤﺎﺴﺢ ﺍﻟﻀﻭﺌﻲ
Scannerﺃﻭ ﻜﺎﻤﻴﺭﺍ ﺍﻟﺘﺼﻭﻴﺭ ﺍﻟﺭﻗﻤﻲ ). (Digital Camera
118
ﺍﻟﻔﺼﻞ ﺍﳋﺎﻣﺲ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻟﻮﺳﺎﺋﻂ ﺍﳌﺘﻌﺪﺩﺓ
ﻓﻲ ﺤﺎﻟﺔ ﺍﻟﺸﺎﺸﺔ ﺃﺤﺎﺩﻴﺔ ﺍﻟﻠﻭﻥ ﺘﻜﻭﻥ ﻫﺫﻩ ﺍﻟﻤﺼﻔﻭﻓﺔ ﺜﻨﺎﺌﻴﺔ ﺍﻷﺒﻌﺎﺩ ،ﺃﻤﺎ ﻓﻲ ﺤﺎﻟﺔ
ﺍﻟﺸﺎﺸﺔ ﺍﻟﻤﻠﻭﻨﺔ ﺘﻜﻭﻥ ﻫﺫﻩ ﺍﻟﻤﺼﻔﻭﻓﺔ ﺜﻼﺜﻴﺔ ﺍﻷﺒﻌﺎﺩ .ﺍﻟﺘﺤﻜﻡ ﺒﺎﻟﻠﻭﻥ ﻴﺘﻡ ﻤﻥ ﺨﻼل ﻗﻴﻤﺔ ﻨﻘﺎﻁ
ﺍﻟﺼﻭﺭﺓ ، Pixelﻓﻲ ﺤﺎﻟﺔ ﻋﺭﺽ ﻟﻭﻨﻴﻥ ﻓﻘﻁ )ﺍﺴﻭﺩ ﻭﺍﺒﻴﺽ( ﻓﺈﻥ ﻗﻴﻤـﺔ ﻫـﺫﻩ ﺍﻟﻨﻘـﺎﻁ
ﺴﺘﻜﻭﻥ ﺃﻤﺎ 0ﺃﻭ .1
ﺍﻟﺼﻭﺭﺓ ﺍﻟﺭﻗﻤﻴﺔ ﻫﻲ ﻋﺒﺎﺭﺓ ﻋﻥ ﺼﻭﺭﺓ ﻤﺘﻜﻭﻨﺔ ﻤﻥ ﻨﻘﺎﻁ ﺘﺴـﻤﻰ Pixelﻭﻜـل
ﻨﻘﻁﺔ ﺘﺄﺨﺫ ﻟﻭﻨﻬﺎ ﻤﻥ ﻤﺯﻴﺞ ﺒﻴﻥ ﺍﻷﻟﻭﺍﻥ ﺍﻷﺴﺎﺴﻴﺔ ﺍﻟﺜﻼﺜﺔ ﺍﻷﺤﻤـﺭ ﻭﺍﻷﺨﻀـﺭ ﻭﺍﻷﺯﺭﻕ
) (RGBﻭﻜل ﻟﻭﻥ ﻴﻤﻜﻥ ﺃﻥ ﻴﻜﻭﻥ ﺒﺩﺭﺠﺎﺕ ﺘﺼل ﺇﻟﻰ 256x256x256ﻟﻭﻥ ﻓﻲ ﺤﺎﻟـﺔ
16,777,216 ﺍﺴﺘﺨﺩﺍﻡ 24ﺒﺕ ﻭﺒﺎﻟﺘﺎﻟﻲ ﻓﺎﻥ ﻤﺠﻤﻭﻉ ﺨﻠﻴﻁ ﺍﻷﻟﻭﺍﻥ ﺍﻷﺴﺎﺴﻴﺔ ﻴﺼل ﺇﻟﻰ
ﻤﻠﻴﻭﻥ ﺩﺭﺠﺔ ﻟﻭﻥ ﻤﺨﺘﻠﻔﺔ .ﻭﻴﻤﻜﻥ ﺘﺼﻨﻴﻑ ﺍﻟﺼﻭﺭ ﺍﻟﺭﻗﻤﻴﺔ ﺇﻟﻰ :
119
ﺍﻟﻔﺼﻞ ﺍﳋﺎﻣﺲ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻟﻮﺳﺎﺋﻂ ﺍﳌﺘﻌﺪﺩﺓ
.1ﺼﻴﻐﺔ GIF
ﺍﻟﺼﻭﺭ ﺒﺼﻴﻐﺔ ) Graphics Interchange Format (GIFﻫـﻲ ﻤـﻥ ﻨـﻭﻉ
ﺨﺭﻴﻁﺔ ﺍﻟﻨﻘﺎﻁ .ﻫﺫﻩ ﺍﻟﺼﻴﻐﺔ ﺘﺩﻋﻡ ﺍﻷﻟﻭﺍﻥ ﻭﺒﻌﻤﻕ ﻟﻭﻨﻲ ﻟﻐﺎﻴﺔ 8ﺒـﺕ ،ﺃﻱ 256ﻟـﻭﻥ
ﻭﻟﻜﻨﻬﺎ ﺃﻓﻀل ﻟﻌﺭﺽ ﺍﻟﺨﻁﻭﻁ ﺍﻟﺤﺎﺩﺓ ﻭﻟﻬﺫﺍ ﺍﻟﺴﺒﺏ ﺘﺴـﺘﺨﺩﻡ ﺒﻜﺜـﺭﺓ ﻓـﻲ ﺍﻟﻨﺼـﻭﺹ
ﻭﺍﻟﺸﻌﺎﺭﺍﺕ ﺍﻟﺼﻐﻴﺭﺓ ﻭﺍﻷﻴﻘﻭﻨﺎﺕ ﻭﺍﻷﺯﺭﺍﺭ ﻭﺍﻟﺨﻁـﻭﻁ ،ﻜﻤـﺎ ﺃﻨﻬـﺎ ﺘـﺩﻋﻡ ﺍﻟﺤﺭﻜـﺔ
) .(Animationﺍﻟﺼﻭﺭ ﺒﺼﻴﻐﺔ ) (GIFﺘﻜﻭﻥ ﻤﻀﻐﻭﻁﺔ ﺒﺼﻴﻐﺔ ﺍﻟﻀـﻐﻁ ﺒـﺩﻭﻥ ﻓﻘـﺩ
) (Lossless Compressionﻤﻥ ﺍﺠل ﺘﻘﻠﻴل ﺤﺠﻡ ﺍﻟﻤﻠﻑ ﺩﻭﻥ ﺍﻟﻤﺴﺎﺱ ﺒﺎﻟﻨﻭﻋﻴﺔ.
.2ﺼﻴﻐﺔ JPEG
ﺍﻟﺼﻭﺭ ﺒﺼﻴﻐﺔ (Joint Photographic Expert Group) JPEGﻫﻲ ﻜـﺫﻟﻙ
ﻤﻥ ﻨﻭﻉ ﺨﺭﻴﻁﺔ ﺍﻟﻨﻘﺎﻁ .ﺍﻟﺼﻭﺭ ﺒﺼﻴﻐﺔ JPEGﺘﻜﻭﻥ ﻤﻀﻐﻭﻁﺔ ﺒﺼﻴﻐﺔ ﺍﻟﻀﻐﻁ ﻤﻊ ﺍﻟﻔﻘﺩ
) (Lossy Compressionﻤﻥ ﺍﺠل ﺘﻘﻠﻴل ﺤﺠﻡ ﺍﻟﻤﻠﻑ.
ﻫﻨﺎﻟﻙ ﺴﺒﺒﺎﻥ ﻓﻲ ﺍﻨﺘﺸﺎﺭ ﺍﺴﺘﺨﺩﺍﻡ ﺼﻴﻐﺔ : JPEG
• ﺤﺠﻤﻬﺎ ﺍﻟﺼﻐﻴﺭ ﺍﻟﺫﻱ ﻴﺠﻌل ﻋﻤﻠﻴﺔ ﺇﺭﺴﺎﻟﻬﺎ ﺨﻼل ﺍﻟﺸﺒﻜﺔ ﺃﺴﺭﻉ ﻤـﻊ ﺍﺴـﺘﺨﺩﺍﻡ
ﻤﺴﺎﺤﺔ ﺨﺯﻨﻴﺔ ﺍﻗل.
• ﺘﺴﺘﻁﻴﻊ ﺨﺯﻥ ﺍﻟﻤﻌﻠﻭﻤﺎﺕ ﺒﺎﻟﻠﻭﻥ ﺍﻟﻁﺒﻴﻌﻲ ﺍﻟﻤﺘﻤﺜل ﺒﻨﻅﺎﻡ ﺃﻋﻠﻰ ﺩﺭﺠﺎﺕ ﺍﻷﻟـﻭﺍﻥ
24ﺒﺕ ،ﻭﺍﻟﺘﻲ ﺘﺼل ﻓﻴﻬﺎ ﻤﺠﻤﻭﻉ ﺨﻠﻴﻁ ﺍﻷﻟﻭﺍﻥ ﺇﻟﻰ 6,777,216ﻤﻠﻴﻭﻥ ﺩﺭﺠﺔ
ﻟﻭﻥ ﻤﺨﺘﻠﻔﺔ ﻭﻟﻬﺫﺍ ﺍﻟﺴﺒﺏ ﻴﺴﺘﺨﺩﻡ ﻋﺎﺩﺓ ﻟﻠﺼﻭﺭ ﺍﻟﺘﻲ ﻴﻜﻭﻥ ﻓﻴﻬﺎ ﺍﻟﻠﻭﻥ ﺃﻭ ﻅـﻼل
ﺍﻟﻠﻭﻨﻴﻥ ﺍﻟﺭﻤﺎﺩﻱ ﻭﺍﻷﺴﻭﺩ ﺫﺍﺕ ﺃﻫﻤﻴﺔ ﻜﺒﻴﺭﺓ.
120
ﺍﻟﻔﺼﻞ ﺍﳋﺎﻣﺲ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻟﻮﺳﺎﺋﻂ ﺍﳌﺘﻌﺪﺩﺓ
ﻀﻐﻁ ﺍﻟﺒﻴﺎﻨﺎﺕ ﻫﻭ ﺘﻘﻠﻴﺹ ﺤﺠﻡ ﺍﻟﺒﻴﺎﻨﺎﺕ ﻓﻲ ﺤﺎﻟﺔ ﺘﺨﺯﻴﻨﻬﺎ ﻭﻗﺩ ﺒﺩﺃ ﻋﻠﻰ ﻴﺩ
ﺍﻟﻌﺎﻟﻡ ﺸﺎﻨﻭﻥ ) (Shannonﻓﻲ ﺍﻟﻌﺎﻡ )1948ﻡ( ﻭﻜﺎﻥ ﻟﻀﻐﻁ ﺍﻟﺒﻴﺎﻨﺎﺕ ﺍﻟﺩﻭﺭ ﺍﻟﻜﺒﻴﺭ ﻓﻲ
ﺘﻁﻭﺭ ﺘﻁﺒﻴﻘﺎﺕ ﺍﻟﻭﺴﺎﺌﻁ ﺍﻟﻤﺘﻌﺩﺩﺓ ﻭﺍﻟﻁﻔﺭﺓ ﺍﻟﺘﻲ ﺤﺩﺜﺕ ﻓﻴﻬﺎ ﻓﻲ ﺍﻟﺴﻨﻭﺍﺕ ﺍﻟﻘﻠﻴﻠﺔ ﺍﻟﻤﺎﻀﻴﺔ.
ﻓﻴﻤﺎ ﻴﻠﻲ ﺒﻌﺽ ﺍﻟﺘﻁﺒﻴﻘﺎﺕ ﺍﻟﺘﻲ ﺘﻁﻭﺭﺕ ﺒﻔﻀل ﻫﺫﺍ ﺍﻟﻤﺠﺎل ﻭﻫﻲ :
-1ﺍﻟﺘﺼﻭﻴﺭ ﺍﻟﺭﻗﻤﻲ Digital Photography
ﺘﺤﺘﺎﺝ ﺍﻟﻭﺴﺎﺌﻁ ﺍﻟﻤﺘﻌﺩﺩﺓ ﻏﻴﺭ ﺍﻟﻤﻀﻐﻭﻁﺔ ،ﻤﺜل ﺍﻟﺼﻭﺭ ،ﺍﻟﺼﻭﺕ ﻭﺍﻟﻔﻴﺩﻴﻭ ﺇﻟﻰ
ﺴﻌﺔ ﺘﺨﺯﻴﻥ ﻜﺒﻴﺭﺓ .ﻋﻠﻰ ﺍﻟﺭﻏﻡ ﻤﻥ ﺍﻟﺘﻘﺩﻡ ﺍﻟﺴﺭﻴﻊ ﻓﻲ ﻜﺜﺎﻓﺔ ﺍﻟﺘﺨﺯﻴﻥ ﺍﻟﻜﻤﻲ ،ﻭﺴﺭﻋﺎﺕ
ﺃﺠﻬﺯﺓ ﺍﻟﻤﻌﺎﻟﺠﺔ ) ، (Processorﻓﺈﻥ ﺍﻟﺤﺎﺠﺔ ﻟﺴﻌﺔ ﺘﺨﺯﻴﻥ ﺍﻟﺒﻴﺎﻨﺎﺕ ﻤﺎ ﺯﺍﻟﺕ ﺘﺤﺘﺎﺝ ﺇﻟـﻰ
ﺘﻁﻭﻴﺭ ﺍﻟﺘﻘﻨﻴﺎﺕ ﺍﻟﻤﺘﻭﺍﻓﺭﺓ ﻻﺴﺘﻴﻌﺎﺏ ﻫﺫﺍ ﺍﻟﻜﻡ ﺍﻟﻬﺎﺌل ﻤﻥ ﺍﻟﻤﻌﻠﻭﻤﺎﺕ.
ﺍﻟﺠﺩﻭل ﺍﻟﺘﺎﻟﻲ ﻴﻭﻀﺢ ﺍﻟﺴﻌﺔ ﺍﻟﺨﺯﻨﻴﺔ ﻟﻤﻠﻔﺎﺕ ﺍﻟﺼﻭﺕ ﺍﻟﻐﻴﺭ ﻤﻀﻐﻭﻁﺔ )ﻟﻔﺘـﺭﺓ
ﺩﻗﻴﻘﺔ ﻭﺍﺤﺩﺓ(:
121
ﺍﻟﻔﺼﻞ ﺍﳋﺎﻣﺲ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻟﻮﺳﺎﺋﻂ ﺍﳌﺘﻌﺪﺩﺓ
ﺘﺤﺘﺎﺝ ﺘﻁﺒﻴﻘﺎﺕ ﺍﻹﻨﺘﺭﻨﺕ ﺍﻟﻤﺨﺘﻠﻔﺔ ﺍﻟﻤﺒﻨﻴﺔ ﻋﻠﻰ ﺍﻟﻭﺴﺎﺌﻁ ﺍﻟﻤﺘﻌﺩﺩﺓ ﺇﻟﻰ ﺍﻟﻤﺯﻴﺩ ﻤﻥ
ﺍﻟﻭﺴﺎﺌل ﺍﻷﻜﺜﺭ ﻓﻌﺎﻟﻴﺔ ﻟﻀﻐﻁ ﺍﻟﺒﻴﺎﻨﺎﺕ ﻭﺍﻟﺼﻭﺭ ﻭﻫﺫﺍ ﺃﺩﻯ ﺇﻟﻰ ﺠﻌل ﻀﻐﻁ ﻤﺜـل ﻫـﺫﻩ
ﺍﻟﺒﻴﺎﻨﺎﺕ ﺃﻤﺭﹰﺍ ﻀﺭﻭﺭﻴﹰﺎ ﻭﺫﻟﻙ ﺒﺎﻟﺘﺭﻜﻴﺯ ﻋﻠﻰ ﺘﻘﻨﻴﺔ ﺍﻟﺘﺨﺯﻴﻥ ﻭﺍﻻﺘﺼﺎل.
ﺘﻘﺴﻡ ﺨﻭﺍﺭﺯﻤﻴﺎﺕ ﻀﻐﻁ ﺍﻟﺒﻴﺎﻨﺎﺕ ﺍﻟﻰ ﻨﻭﻋﻴﻥ ﺭﺌﻴﺴﻴﻴﻥ ﻫﻤﺎ:
11111223333111222222
ﻥﺎﺕﺞ ﻋﻤﻠﻴﺔ اﻟﻀﻐﻂ ﻳﻜﻮن ﺑﺎﻟﺸﻜﻞ اﻵﺕﻲ:
)(1,5),(2,2),(3,4),(1,3),(2,6
122
ﺍﻟﻔﺼﻞ ﺍﳋﺎﻣﺲ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻟﻮﺳﺎﺋﻂ ﺍﳌﺘﻌﺪﺩﺓ
ﺤﻴﺙ ﻴﺘﻡ ﻓﻘﺩﺍﻥ ﺠﺯﺀ ﻤﻥ ﺍﻟﺒﻴﺎﻨﺎﺕ ﻨﺘﻴﺠﺔ ﻫﺫﺍ ﺍﻟﻀﻐﻁ ﻭﺘﻜﻭﻥ ﺍﻟﺒﻴﺎﻨﺎﺕ ﺍﻟﻨﺎﺘﺠﺔ ﺒﻌﺩ
ﻋﻤﻠﻴﺔ ﺍﻟﻀﻐﻁ ﻭﻓﻙ ﺍﻟﻀﻐﻁ ﻟﻴﺴﺕ ﻤﺘﻁﺎﺒﻘﺔ ﻤﻊ ﺃﺼل ﺍﻟﺒﻴﺎﻨﺎﺕ ) ﺘﻭﺠﺩ ﺍﻋﺘﺒﺎﺭﺍﺕ ﺘﺅﺨﺫ ﻓﻲ
ﺍﻟﺤﺴﺒﺎﻥ ﻋﻨﺩ ﺍﺴﺘﺨﺩﺍﻡ ﻫﺫﺍ ﺍﻟﻨﻭﻉ ﻭﺘﺄﺜﻴﺭ ﻫﺫﺍ ﺍﻟﻔﻘﺩ ﻋﻠﻰ ﻤﺴﺘﻘﺒل ﺍﻟﺒﻴﺎﻨﺎﺕ( .ﻭﻤـﻥ ﺃﺸـﻬﺭ
ﺍﻷﻤﺜﻠﺔ ﻟﻬﺫﺍ ﺍﻟﻨﻭﻉ ﺍﻟﺼﻭﺭ ﻤﻥ ﻨﻭﻉ ) (JPEGﻭﻤﻥ ﺃﻓﻀل ﺍﻷﻤﺜﻠﺔ ﻻﺴﺘﺨﺩﺍﻡ ﻫﺫﺍ ﺍﻟﻨﻭﻉ ﻫﻭ
ﻀﻐﻁ ﺍﻟﺒﻴﺎﻨﺎﺕ ﻓﻲ ﻤﺠﺎل ﺍﻟﻭﺴﺎﺌﻁ ﺍﻟﻤﺘﻌﺩﺩﺓ ) (Multimediaﻤﺜـل ﺍﻟﻔﻴـﺩﻴﻭ ﻭﺍﻟﺼـﻭﺭ
ﻭﺍﻟﺼﻭﺕ.
123
ﺍﻟﻔﺼﻞ ﺍﳋﺎﻣﺲ ...............................................................ﻣﻘﺪﻣﺔ ﰲ ﺍﻟﻮﺳﺎﺋﻂ ﺍﳌﺘﻌﺪﺩﺓ
124
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺩﺱ
ﻣﻘﺪﻣﺔ ﰲ ﻓﲑﻭﺳﺎﺕ ﺍﳊﺎﺳﻮﺏ
An Introduction to
Computer Viruses
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺩﺱ
ﻣﻘﺪﻣﺔ ﰲ ﻓﲑﻭﺳﺎﺕ ﺍﳊﺎﺳﻮﺏ
An Introduction to Computer Viruses
ﺍﳌﻘـﺪﻣـﺔ 1-6
ﻋﻨﺩﻤﺎ ﺒﺩﺃﺕ ﻓﻜﺭﺓ ﺒﻨﺎﺀ ﺃﻭل ﺠﻬﺎﺯ ﺤﺎﺴﻭﺏ ،ﻟﻡ ﺘﻜﻥ ﻫﻨﺎﻙ ﻤﺸﺎﻜل ﺘﺨﺭﻴﺒﻴﺔ ﺘﻭﺍﺠﻪ
ﺍﻟﻌﺎﻤﻠﻴﻥ ﻓﻲ ﻫﺫﺍ ﺍﻟﻤﺠﺎل ،ﺒل ﻜﺎﻥ ﺍﻟﺠﻤﻴﻊ ﻴﺒﺤﺙ ﻋﻥ ﺤﻠﻭل ﻟﻠﻤﺸﺎﻜل ﺍﻟﺘـﻲ ﺘـﻭﺍﺠﻬﻬﻡ ،
ﻭﺍﻟﺘﻲ ﻜﺎﻥ ﺃﻏﻠﺒﻬﺎ ﻤﺸﺎﻜل ﺘﻘﻨﻴﺔ ﻭﺘﺼﻨﻴﻌﻴﺔ ،ﻓﻤﺜﻼ ﻤﺨﺘﺭﻋﻭ ﺤﺎﺴﺒﺎﺕ ﺍﻟﺠﻴل ﺍﻷﻭل ﻜـﺎﻨﻭﺍ
ﻴﺒﺤﺜﻭﻥ ﻋﻥ ﺒﺩﻴل ﻟﻠﺼﻤﺎﻤﺎﺕ ﺍﻟﻤﻔﺭﻏﺔ ) ، (Vacuum Tubesﻟﻜﻲ ﻴﻘﻠﻠﻭﺍ ﺍﻟﺤﺠﻡ ﻭﻴﺯﻴﺩﻭﺍ
ﺴﺭﻋﺔ ﺍﻟﺘﻨﻔﻴﺫ ،ﻭﺍﻟﺸﻲﺀ ﻨﻔﺴﻪ ﻋﻥ ﺍﻟﺠﻴل ﺍﻟﺜﺎﻨﻲ ﻭﺍﻟﺜﺎﻟﺙ ..ﻭﻫﻜﺫﺍ.
ﻓﻲ ﺒﺩﺍﻴﺔ ﻫﺫﺍ ﺍﻷﻤﺭ ،ﻟﻡ ﻴﺘﻭﺼل ﺍﻟﻤﻬﺘﻤﻭﻥ ﻓﻲ ﻤﺠﺎل ﺍﻟﺤﺎﺴﻭﺏ ﺇﻟﻰ ﺘﻭﺼﻴﻑ ﻫﺫﺍ
ﺍﻟﺨﻁﺭ ﻭﻟﻡ ﻴﻁﻠﻘﻭﺍ ﻋﻠﻴﻪ ﺍﺴﻤﹰﺎ ﻭﺍﻀﺤﹰﺎ .ﻭﻟﻜﻥ ﺒﻌﺩﻤﺎ ﺘﻔﺎﻗﻡ ﻫﺫﺍ ﺍﻟﺨﻁﺭ ،ﻭﺃﺼـﺒﺢ ﺸـﺒﺤﹰﺎ
ﻴﺨﻴﻑ ﻜل ﻤﺴﺘﺨﺩﻤﻲ ﺍﻟﺤﺎﺴﻭﺏ ،ﺒﺩﺃﺕ ﺍﻟﺩﺭﺍﺴﺎﺕ ﺘﺒﺤﺙ ﻋﻥ ﻤﺼﺩﺭ ﻭﻨﻭﻉ ﻫﺫﺍ ﺍﻟﺨﻁـﺭ
ﺇﻟﻰ ﺃﻥ ﺘﻭﺼﻠﻭﺍ ﺇﻟﻰ ﺘﺸﺒﻴﻬﻪ ﺒﺎﻟﻔﻴﺭﻭﺱ ﺍﻟﺒﻴﻭﻟﻭﺠﻲ ﺍﻟﻤﻌﺭﻭﻑ ﺁﻨﺫﺍﻙ ،ﻟﻜﻭﻨﻪ ﻴﻨﺘﺸـﺭ ﻜﻤـﺎ
ﻴﻨﺘﺸﺭ ﻫﺫﺍ ﺍﻟﻔﻴﺭﻭﺱ .ﻭﺃﻁﻠﻘﻭﺍ ﻋﻠﻴﻪ ﺍﺴﻡ ﻓﻴﺭﻭﺱ ﺍﻟﺤﺎﺴﻭﺏ ).(Computer Virus
127
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺩﺱ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﻓﲑﻭﺳﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﻴﻌﺭّﻑ ﻴﺭﻭﺱ ﺍﻟﺤﺎﺴﻭﺏ ﻋﻠﻰ ﺍﻨﻪ ﺒﺭﻨﺎﻤﺞ ﺼﻐﻴﺭ ﻴﻘﻭﻡ ﺒﺘﺸﻐﻴل ﻨﻔﺴـﻪ ﺘﻠﻘﺎﺌﻴـﹰﺎ
ﺒﻐﺭﺽ ﺇﻟﺤﺎﻕ ﺍﻟﻀﺭﺭ ﺒﺎﻟﺠﻬﺎﺯ ﻓﻲ ﻭﻗﺕ ﻤﺤﺩﺩ ﺴﻭﺍﺀ ﻜﺎﻥ ﻓﻲ ﻨﻔﺱ ﻭﻗﺕ ﻓﺘﺢ ﺍﻟﻔﻴﺭﻭﺱ ﺃﻭ
ﻼ ﻨﻘﻭل ﺃﻥ ﺍﻟﻔﻴﺭﻭﺱ ﻴﻌﻤل ﺍﻟﺴﺎﻋﺔ 10:38ﺒﺘﺎﺭﻴ .2001/7/12
ﻀﻤﻥ ﺘﻭﻗﻴﺕ ﻤﻌﻴﻥ .ﻤﺜ ﹰ
ﻼ ﻋﻠـﻰ ﺠﻬـﺎﺯ
ﻭﻋﺎﺩﺓ ﻤﺎ ﻴﻠﺤﻕ )ﻴﻨﺴ ( ﺍﻟﻔﻴﺭﻭﺱ ﻨﻔﺴﻪ ﺒﺈﺤﺩﻯ ﺍﻟﺒﺭﺍﻤﺞ ﺍﻟﻤﻭﺠـﻭﺩﺓ ﻓﻌـ ﹰ
ﺍﻟﺤﺎﺴﻭﺏ ﺤﺎل ﺘﻨﻔﻴﺫ ﻫﺫﻩ ﺍﻟﺒﺭﺍﻤﺞ ،ﻭﻤﻨﻬﺎ ﻴﻨﺘﻘل ﺇﻟﻰ ﺍﻟﺒﺭﺍﻤﺞ ﺍﻟﺴﻠﻴﻤﺔ ﻭﻴﺼﻴﺒﻬﺎ.
ﺃﻤﺎ ﻋﻥ ﻜﻴﻔﻴﺔ ﺍﻨﺘﻘﺎل ﺍﻟﻔﻴﺭﻭﺴﺎﺕ ﺇﻟﻰ ﺤﻭﺍﺴﻴﺒﻨﺎ ﺍﻟﺸﺨﺼﻴﺔ ،ﻓﻴﺘﻡ ﻫﺫﺍ ﻤﻥ ﺨﻼل:
.1ﻨﺴ ﺃﻭ ﺘﺤﻤﻴل ﺒﻌﺽ ﺍﻟﺒﺭﺍﻤﺞ ﻤﻥ ﺼﻔﺤﺎﺕ ﺍﻻﻨﺘﺭﻨﺕ ،ﺇﺫ ﻨﻘـﻭﻡ ،ﺩﻭﻥ ﻋﻠـﻡ ،
ﺒﺘﺤﻤﻴل ﺒﺭﻨﺎﻤﺞ ﻤﻌﻴﻥ ﻭﻫﻭ ﻤﺼﺎﺏ ﺍﻟﻔﻴﺭﻭﺱ .ﻭﻋﻨﺩ ﺘﺸﻐﻴﻠﻪ ﻴﻨﺘﻘل ﺍﻟﻔﻴـﺭﻭﺱ ﻤـﻥ
ﺍﻟﺒﺭﻨﺎﻤﺞ ﺇﻟﻰ ﺍﻟﺤﺎﺴﻭﺏ ﻟﻴﺼﻴﺏ ) (Infectﺒﺫﻟﻙ ﺒﻌﺽ ﺍﻟﺒﺭﺍﻤﺞ ﺍﻟﺴﻠﻤﻴﺔ.
.2ﻴﻤﻜﻥ ﺃﻥ ﻴﻨﺘﻘل ﺍﻟﻔﻴﺭﻭﺱ ﻋﻨﺩ ﻓﺘﺢ ﺒﻌﺽ ﺍﻟﻤﻠﻔﺎﺕ ﺍﻟﻤﻠﺤﻘـﺔ )(Attachment files
ﺍﻟﺘﻲ ﺘﺄﺘﻲ ﻤﻊ ﺍﻟﺭﺴﺎﺌل ﺍﻻﻟﻜﺘﺭﻭﻨﻴﺔ ) (Emailsﻋﺒﺭ ﻋﻨﺎﻭﻴﻥ ﻭﻫﻤﻴﺔ .ﻭﻨﻨﺼﺢ ﻫﻨـﺎ
ﺒﻌﺩﻡ ﻓﺘﺢ ﺃﻱ ﺭﺴﺎﻟﺔ ﺍﻟﻜﺘﺭﻭﻨﻴﺔ ﻻ ﻨﻌﺭﻑ ﻤﺼﺩﺭﻫﺎ ،ﻟﻨﺘﺤﺎﺸﻰ ﻨﻘل ﺍﻟﻔﻴﺭﻭﺱ.
.3ﺍﻻﺸﺘﺭﺍﻙ ﻋﺒﺭ ﺍﻻﻨﺘﺭﻨﺕ ﻤﻊ ﺒﻌﺽ ﺍﻟﺒﺭﺍﻤﺞ ﺍﻟﺘﻲ ﺘﺴﺘﺨﺩﻡ ﺃﺴﻠﻭﺏ ﺍﻟﻤﺸـﺎﺭﻜﺔ ﻓـﻲ
ﺍﻟﻤﻠﻔﺎﺕ ).(Sharing
128
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺩﺱ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﻓﲑﻭﺳﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﺃﻤﺎ ﺍﻟﺠﻬﺎﺕ ﺍﻟﺘﻲ ﺘﻘﻑ ﻭﺭﺍﺀ ﻫﺫﻩ ﺍﻟﺒﺭﺍﻤﺞ ﻓﻬﻲ ﻋﺩﻴﺩﺓ ،ﻭﺘﺨﺘﻠﻑ ﺃﻫﺩﺍﻓﻬﺎ ﻭﻨﻭﺍﻴﺎﻫﺎ.
ﻭﻓﻴﻤﺎ ﻴﻠﻲ ﺃﻫﻡ ﺘﻠﻙ ﺍﻟﺠﻬﺎﺕ )ﺍﻟﺭﺴﻤﻴﺔ ﻭﻏﻴﺭ ﺍﻟﺭﺴﻤﻴﺔ( ﻭﺃﻫﺩﺍﻓﻬﺎ ﻭﻤﺼﺎﺩﺭ ﺘﻤﻭﻴﻠﻬﺎ:
129
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺩﺱ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﻓﲑﻭﺳﺎﺕ ﺍﳊﺎﺳﻮﺏ
130
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺩﺱ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﻓﲑﻭﺳﺎﺕ ﺍﳊﺎﺳﻮﺏ
.3ﺘﻭﻗﻑ ﻨﻅﺎﻡ ﺍﻟﺘﺸﻐﻴل ﺩﻭﻥ ﺴﺎﺒﻕ ﺇﻨﺫﺍﺭ ،ﻭﺨﺼﻭﺼـﹰﺎ ﻤـﻊ ﻨﻅـﺎﻡ ﺍﻟﺘﺸـﻐﻴل
) (Windowsﺒﺠﻤﻴﻊ ﺇﺼﺩﺍﺭﺍﺘﻪ.
.5ﺯﻴﺎﺩﺓ ﻓﻲ ﺤﺠﻡ ﺍﻟﻤﻠﻔﺎﺕ ﺒﺸﻜل ﻜﺒﻴﺭ ﻤﻤﺎ ﻴﺠﻌل ﻫﺫﻩ ﺍﻟﻤﻠﻔﺎﺕ ﺘﺴـﺘﻬﻠﻙ ﻤﺴـﺎﺤﺔ
ﺍﻜﺒﺭ ﻓﻲ ﺍﻷﻗﺭﺍﺹ ﺍﻟﺼﻠﺒﺔ .ﻭﻫﺫﺍ ﻴﻌﻨﻲ ﺃﻥ ﺍﻟﻔﻴﺭﻭﺱ ﻗﺩ ﺍﻟﺘﺼﻕ ﺒﻬﺫﻩ ﺍﻟﻤﻠﻔﺎﺕ.
.7ﻋﺩﻡ ﺍﻻﺴﺘﺠﺎﺒﺔ ﻟﺘﻨﻔﻴﺫ ﺒﻌﺽ ﺍﻟﺨﺩﻤﺎﺕ ﺍﻟﺘﻲ ﻴﻘﺩﻤﻬﺎ ﻨﻅﺎﻡ ﺍﻟﺘﺸـﻐﻴل ،ﻜﻔﺤـﺹ
ﺍﻟﻤﻜﻭﻨﺎﺕ ﺍﻟﻤﺎﺩﻴﺔ ﻭ ﺘﺸﻐﻴل ﺒﻌﺽ ﺍﻟﺘﻁﺒﻴﻘﺎﺕ ﺍﻟﺨﺩﻤﻴﺔ.
131
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺩﺱ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﻓﲑﻭﺳﺎﺕ ﺍﳊﺎﺳﻮﺏ
132
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺩﺱ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﻓﲑﻭﺳﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﺃﻭل ﺒﺭﻨﺎﻤﺞ ﺩﻴﺩﺍﻥ ﺘﻡ ﻜﺘﺎﺒﺘﻪ ﻜﺎﻥ ﻋﺎﻡ 1975ﻋﻠﻰ ﻴـﺩ )، (John Brunner
ﻭﻟﻡ ﻴﻌﺘﺒﺭ ﺤﻴﻨﻬﺎ ﻤﻥ ﺍﻟﺒﺭﺍﻤﺞ ﺍﻟﺨﺒﻴﺜﺔ ،ﺒل ﻜﺎﻥ ﺘﺼﻭﺭﹰﺍ ﻟﺒﻌﺽ ﻗﺼـﺹ ﺍﻟﺨﻴـﺎل
ﺍﻟﻌﻠﻤﻲ .ﻭﺒﻌﺩ ﺫﻟﻙ ﻗﺎﻡ ﻁﺎﻟﺏ ﺍﻟﺩﻜﺘﻭﺭﺍﻩ ) (Robert Morrisﻓﻲ ﻨﻬﺎﻴﺔ ﻋـﺎﻡ 1988
ﺒﺘﺼﻤﻴﻡ ﺒﺭﻨﺎﻤﺞ ﺩﻴﺩﺍﻥ ﺃﺨﺭ ﻴﻨﺘﺸﺭ ﺨﻼل ﺍﻻﻨﺘﺭﻨﺕ ،ﺍﺴﻤﺎﻩ ) ، (Morris Wormﺜﻡ
ﺃﻁﻠﻕ ﻋﻠﻴﻪ ).(Internet Worm
133
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺩﺱ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﻓﲑﻭﺳﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﺃﻤﺎ ﺴﺒﺏ ﺍﺨﺘﻴﺎﺭ ﺍﺴﻡ ﺤﺼﺎﻥ ﻁﺭﻭﺍﺩﺓ ﻋﻠﻰ ﻫﺫﻩ ﺍﻟﺒﺭﺍﻤﺞ ،ﻓﻴﻌﻭﺩ ﺇﻟﻰ ﺤﻜﺎﻴﺔ
ﺍﻟﺤﺼﺎﺭ ﺍﻟﺫﻱ ﻓﺭﻀﻪ ﺍﻟﻴﻭﻨﺎﻨﻴﻭﻥ ﻋﻠﻰ ﻤﺩﻴﻨﺔ ﻁﺭﻭﺍﺩﺓ ﻭﺍﻟﺫﻱ ﺍﺴﺘﻤﺭ ﻷﻜﺜﺭ ﻤﻥ ﻋﺸﺭ
ﺴﻨﻭﺍﺕ ﻟﻡ ﻴﺴﺘﻁﻴﻌﻭﺍ ﻓﻴﻬﺎ ﺩﺨﻭل ﺍﻟﻤﺩﻴﻨﺔ .ﻓﻌﻤل ﺍﻟﺒﻌﺽ ﻤﻨﻬﻡ ﻋﻠﻰ ﺍﻟﺘﻔﻜﻴﺭ ﺒﺨﺩﻴﻌﺔ
ﻟﺩﺨﻭل ﺍﻟﻤﺩﻴﻨﺔ .ﻭﺍﻟﺨﺩﻴﻌﺔ ﺘﻤﺕ ﺒﺼﻨﺎﻋﺔ ﺤﺼﺎﻥ ﻤﻥ ﺍﻟﺨﺸﺏ ﺤﻴـﺙ ﺍﺨﺘﺒـﺊ ﺒـﻪ
ﻤﺠﻤﻭﻋﺔ ﻤﻥ ﺍﻟﺠﻨﻭﺩ ﻭﺃﺭﺴل ﻜﻬﺩﻴﺔ ﻤﺼﺎﻟﺤﺔ ﺇﻟﻰ ﺍﻟﻁﺭﻭﺍﺩﻴﻴﻥ .ﻭﻓﻲ ﺍﻟﻠﻴـل ﺨـﺭﺝ
ﺍﻟﺠﻨﻭﺩ ﻤﻥ ﺩﺍﺨل ﺍﻟﺤﺼﺎﻥ ﻭﻓﺘﺤﻭﺍ ﺃﺒﻭﺍﺏ ﺍﻟﻤﺩﻴﻨﺔ ﻟﺒﻘﻴﺔ ﺍﻟﺠﻨﻭﺩ ،ﻟﺘﺴـﻘﻁ ﺃﻤـﺎﻤﻬﻡ
ﻤﺩﻴﻨﺔ ﻁﺭﻭﺍﺩﺓ.
134
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺩﺱ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﻓﲑﻭﺳﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﻭﻴﺒﻘﻰ ﺃﻥ ﻨﻘﻭل ﺃﻥ ﻫﻨﺎﻙ ﺍﻟﻜﺜﻴﺭ ﻤﻥ ﺍﻟﺒﺭﺍﻤﺞ ﺍﻟﺨﺒﻴﺜﺔ ﺍﻟﺘﻲ ﺘﺨﺘﻠﻑ ﻤﺴﻤﻴﺎﺘﻬﺎ ﻋـﻥ
ﺍﻷﻨﻭﺍﻉ ﺍﻟﻤﺫﻜﻭﺭﺓ ﺁﻨﻔﹰﺎ ،ﻭﻟﻜﻨﻬﺎ ﻻ ﺘﺨﺘﻠﻑ ﻤﻥ ﺤﻴﺙ ﺍﻷﻫـﺩﺍﻑ ﻭﺍﻹﻀـﺭﺍﺭ ﻭﺍﻟﺠﻬـﺎﺕ
ﺍﻟﻤﺴﺘﻔﻴﺩﺓ ﻤﻨﻬﺎ .ﻭﺍﻟﺠﺩﻭل ﺍﻵﺘﻲ ﻴﺒﻴﻥ ﺍﻟﻌﻼﻗﺔ ﺒﻴﻥ ﺃﻨﻭﺍﻉ ﺍﻟﺒﺭﺍﻤﺞ ﺍﻟﺨﺒﻴﺜﺔ ﻭﻓﻘـﹰﺎ ﻟﻠﺼـﻔﺎﺕ
ﺍﻟﺜﻼﺜﺔ ﺍﻟﺘﻲ ﺘﻡ ﺫﻜﺭﻫﺎ.
135
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺩﺱ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﻓﲑﻭﺳﺎﺕ ﺍﳊﺎﺳﻮﺏ
.1ﺍﻟﻤﺯﺍ ﺃﻭ ﺍﻟﺩﻋﺎﺒﺔ ) : (Jokesﻓﻲ ﺒﻌﺽ ﺍﻷﺤﻴﺎﻥ ﻴﻘﻭﻡ ﻤﺒﺭﻤﺠﻭ ﻫﺫﺍ ﺍﻟﻨﻭﻉ ﻤـﻥ
ﺍﻟﺒﺭﺍﻤﺞ ﺒﺈﺭﺴﺎل ﺭﺴﺎﻟﺔ ﺘﺤﺫﻴﺭﻴﺔ ﻤﻌﻴﻨﺔ ﺃﻭ ﺘﻨﺒﻴﻪ ﻤﻌﻴﻥ ﻟﻺﺨﺒﺎﺭ ﺒـﺄﻥ ﺍﻟﺤﺎﺴـﻭﺏ
ﺍﻟﺸﺨﺼﻲ ﻗﺩ ﺃﺼﻴﺏ ﺒﻔﻴﺭﻭﺱ ﻤﻌﻴﻥ ،ﻋﻠﻤﹰﺎ ﺍﻨﻪ ﻻ ﺘﻭﺠﺩ ﺃﻀﺭﺍﺭ ﻤﺎﺩﻴﺔ ﺤﻘﻴﻘﻴﺔ ﻤﻥ
ﺠﺭﺍﺀ ﻫﺫﻩ ﺍﻟﺒﺭﺍﻤﺞ.
136
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺩﺱ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﻓﲑﻭﺳﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﻴﻤﻜﻥ ﺘﺼﻨﻴﻑ ﺍﻟﺒﺭﺍﻤﺞ ﺍﻟﺨﺒﻴﺜﺔ ﻭﻓﻘﹰﺎ ﻟﺘﻘﻨﻴﺔ ﺘﺼﻤﻴﻤﻬﺎ ﻭﺃﺴﻠﻭﺏ ﺇﺼﺎﺒﺘﻬﺎ ﺇﻟﻰ ﻤﺎ ﻴﻠﻲ:
137
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺩﺱ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﻓﲑﻭﺳﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﺠﻤﻴﻊ ﺍﻷﻗﺭﺍﺹ ﺍﻟﻤﺴﺘﺨﺩﻤﺔ ﺴﺘﺼﺎﺏ ﺒﻨﻔﺱ ﺍﻟﻔﻴﺭﻭﺱ .ﻭﻓﻴﺭﻭﺴﺎﺕ ﻫﺫﺍ ﺍﻟﻨﻭﻉ ﻜﺜﻴﺭﺓ
ﻨﺫﻜﺭ ﻤﻨﻬﺎ (Form) :و ) (Disk Killerو ) (Michelangeloو ).(Stone virus
138
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺩﺱ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﻓﲑﻭﺳﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﺍﻷﻭل :ﻓﺤﺹ ) (Scanningﺠﻤﻴﻊ ﺍﻟﻤﻠﻔﺎﺕ ﻭﺘﺤﺩﻴﺩ ﻤﺩﻯ ﺃﺼﺎﺒﺘﻬﺎ ﺒﺈﺤﺩﻯ ﺍﻟﺒﺭﺍﻤﺞ ﺍﻟﺨﺒﻴﺜﺔ.
ﻭﺘﺘﻡ ﻫﺫﻩ ﺍﻟﻌﻤﻠﻴﺔ ﻤﻥ ﺨﻼل ﻤﻘﺎﺭﻨﺔ ﺍﻟﻤﻠﻔﺎﺕ ﺒﺠﺩﺍﻭل ﻗﺩ ﺃﻋﺩﺕ ﻤﺴﺒﻘﹰﺎ ﻭﺘﺤﺘﻭﻱ ﻋﻠﻰ
ﺴﻠﻭﻙ ﺍﻟﺒﺭﺍﻤﺞ ﺍﻟﺨﺒﻴﺜﺔ.
ﺍﻟﺜﺎﻨﻲ :ﺘﺤﺩﻴﺩ ﻁﺭﻕ ﺇﺯﺍﻟﺔ ﻫﺫﻩ ﺍﻟﺒﺭﺍﻤﺞ ﻤﻥ ﺍﻟﻤﻠﻔﺎﺕ ﻭﺘﺴـﻤﻰ ﻫـﺫﻩ ﺍﻟﻌﻤﻠﻴـﺔ ﺒـﺎﻟﺘﻨﻅﻴﻑ
) (Cleaningﺃﻭ ﺍﻹﺯﺍﻟﺔ ) .(Removingﻭﻜل ﻓﻴﺭﻭﺱ ﻟﻪ ﺸﻔﺭﺘﻪ ﺍﻟﺨﺎﺼـﺔ ،ﻟـﺫﺍ
ﻴﻘﺘﻀﻲ ﺃﻥ ﺘﻜﻭﻥ ﺍﻟﺒﺭﻤﺠﻴﺎﺕ ﺍﻟﻤﻀﺎﺩﺓ ﻋﻠﻰ ﻋﻠﻡ ﻤﺴﺒﻕ ﺒﻬﺫﻩ ﺍﻟﺸﻔﺭﺍﺕ ﻟﻴﺘﺴﻨﻰ ﻟﻬـﺎ
ﺍﺘﺨﺎﺫ ﺍﻹﺠﺭﺍﺀ ﺍﻟﻤﻨﺎﺴﺏ .ﻭﻓﻴﻤﺎ ﻴﻠﻲ ﺃﻫﻡ ﻭﺃﺸﻬﺭ ﺍﻟﺒﺭﻤﺠﻴﺎﺕ ﺍﻟﻤﻀﺎﺩﺓ ﻟﻠﻔﻴﺭﻭﺴـﺎﺕ
ﻭﻤﻁﺎﺒﻘﺘﻬﺎ ﻷﻨﻅﻤﺔ ﺍﻟﺘﺸﻐﻴل.
139
ﻣﻘﺪﻣﺔ ﰲ ﻓﲑﻭﺳﺎﺕ ﺍﳊﺎﺳﻮﺏ........................................................... ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺩﺱ
140
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺩﺱ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﻓﲑﻭﺳﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﻤﻤﺎ ﻻ ﺸﻙ ﻓﻴﻪ ،ﺇﻥ ﺍﺴﺘﺨﺩﺍﻡ ﺍﻟﺒﺭﺍﻤﺞ ﺍﻟﻤﻀﺎﺩﺓ ﻟﻠﻔﻴﺭﻭﺴﺎﺕ ﻴﺤﻤﻲ ﺤﻭﺍﺴﻴﺒﻨﺎ ﻤﻥ
ﺍﻹﺼﺎﺒﺔ ﺒﺄﻱ ﻨﻭﻉ ﻤﻥ ﺃﻨﻭﺍﻉ ﺍﻟﺒﺭﺍﻤﺞ ﺍﻟﺨﺒﻴﺜﺔ .ﻭﻟﻜﻥ ﻴﺒﻘﻰ ﻤﻔﻬﻭﻡ ""ﺍﻟﻭﻗﺎﻴـﺔ ﺨﻴـﺭ ﻤـﻥ
ﺍﻟﻌﻼﺝ"" ﻫﻭ ﺍﻟﻘﺎﺌﻡ ﻤﻊ ﺘﻭﻓﺭ ﺍﻟﻌﺩﻴﺩ ﻤﻥ ﺍﻟﺒﺭﺍﻤﺞ ﺍﻟﻤﻀﺎﺩﺓ ﻟﻠﻔﻴﺭﻭﺴﺎﺕ .ﻓﻴﻤﺎ ﻴﻠﻲ ﻤﺠﻤﻭﻋـﺔ
ﻤﻥ ﺍﻟﻨﻘﺎﻁ ﺍﻟﺘﻲ ﻴﻔﻀل ﺍﻻﻟﺘﺯﺍﻡ ﺒﻬﺎ ﻟﻜﻲ ﺘﺒﻘﻰ ﺤﻭﺍﺴﻴﺒﻨﺎ ﺒﻌﻴـﺩﺓ ﻋـﻥ ﺨﻁـﺭ ﺍﻹﺼـﺎﺒﺔ
ﺒﺎﻟﻔﻴﺭﻭﺴﺎﺕ ﺃﻭ ﺃﻱ ﺒﺭﺍﻤﺞ ﺃﺨﺭﻯ.
141
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺩﺱ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﻓﲑﻭﺳﺎﺕ ﺍﳊﺎﺳﻮﺏ
.10ﺘﺄﻜﺩ ﺩﺍﺌﻤﹰﺎ ﻤﻥ ﻋﻤل ﻨﺴﺨﺔ ﺍﺤﺘﻴﺎﻁﻴﺔ ﻟﻨﻅﺎﻡ ﺍﻟﺘﺸﻐﻴل ،ﻭﺫﻟﻙ ﻤﻥ ﺨﻼل ﻤﺎ ﻴﺴﻤﻰ
ﻗﺭﺹ ﺍﻹﻨﻘﺎﺫ ) (Rescue Diskﻭﺍﻟﺫﻱ ﻴﺤﺘﻭﻱ ﺩﺍﺌﻤﺎ ﻋﻠﻰ ﺍﻟﻤﻠﻔـﺎﺕ ﺍﻟﺘﺸـﻐﻴﻠﻴﺔ
ﻟﻨﻅﺎﻡ ﺍﻟﺘﺸﻐﻴل.
142
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺑﻊ
ﻣﻘﺪﻣﺔ ﰲ ﺃﺧﻼﻗﻴﺎﺕ ﺍﳊﺎﺳﻮﺏ
An Introduction to
Computer Ethics
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺑﻊ
ﻣﻘﺪﻣﺔ ﰲ ﺃﺧﻼﻗﻴﺎﺕ ﺍﳊﺎﺳﻮﺏ
An Introduction to Computer Ethics
1-7ﺍﳌﻘـﺪﻣـﺔ
ﺃﺨﻼﻗﻴﺎﺕ ﺍﻟﺤﺎﺴﻭﺏ ﻫﻭ ﻓﺭﻉ ﺠﺩﻴﺩ ﻤﻥ ﻋﻠﻡ ﺍﻷﺨﻼﻗﻴﺎﺕ ﺍﻟﺘﻲ ﺘﻨﻤﻭ ﻭﺘﺘﻐﻴﺭ ﺒﺴﺭﻋﺔ
ﻤﺫﻫﻠﺔ ﻤﺘﺯﺍﻤﻨﺔ ﻤﻊ ﺘﻁﻭﺭ ﺘﻜﻨﻭﻟﻭﺠﻴﺎ ﺍﻟﺤﺎﺴﻭﺏ.
ﻤﺼﻁﻠﺢ ﺃﺨﻼﻗﻴﺎﺕ ﺍﻟﺤﺎﺴﻭﺏ ﻫﻭ ﻤﻔﻬﻭﻡ ﻤﻔﺘﻭﺡ ﻟﺘﻔﺴﻴﺭﺍﺕ ﻭﺍﺴﻌﺔ ﻭﻀﻴﻘﺔ ﻓﻲ ﻨﻔﺱ
ﺍﻟﻭﻗﺕ ،ﻋﻠﻰ ﺴﺒﻴل ﺍﻟﻤﺜﺎل ﻗﺩ ﺘﻔﻬﻡ ﺃﺨﻼﻗﻴﺎﺕ ﺍﻟﺤﺎﺴﻭﺏ ﺒﺸﻜل ﻀﻴﻕ ﻟﻠﻐﺎﻴﺔ ﻓﻲ ﻤﺤﺎﻭﻻﺕ
ﺍﻟﻔﻼﺴﻔﺔ ﻟﺘﻁﺒﻴﻕ ﺍﻟﻨﻅﺭﻴﺎﺕ ﺍﻷﺨﻼﻗﻴﺔ ﺍﻟﺘﻘﻠﻴﺩﻴﺔ ﻤﺜل ﻨﻅﺭﻴﺔ ﺍﻟﻤﻨﻔﻌﺔ ).(Utilitarianism
ﻭﻤﻥ ﺠﻬﺔ ﺃﺨﺭﻯ ﻴﻤﻜﻥ ﺘﻔﺴﻴﺭ ﻤﺼﻁﻠﺢ ﺃﺨﻼﻗﻴﺎﺕ ﺍﻟﺤﺎﺴﻭﺏ ﺒﺸﻜل ﻭﺍﺴـﻊ ﺠـﺩﺍ
ﻟﻴﺸﻤل ﻤﻌﺎﻴﻴﺭ ﺍﻟﻤﻤﺎﺭﺴﺔ ﺍﻟﻤﻬﻨﻴﺔ ،ﻗﻭﺍﻋﺩ ﺍﻟﺴﻠﻭﻙ ﻭﺠﻭﺍﻨﺏ ﻤﻥ ﻗﺎﻨﻭﻥ ﺍﻟﺤﺎﺴﻭﺏ ﻭﺤﺘـﻰ
ﺒﻌﺽ ﺍﻟﻤﻭﺍﻀﻴﻊ ﻓﻲ ﻋﻠﻡ ﺍﻻﺠﺘﻤﺎﻉ ﻭﻋﻠﻡ ﺍﻟﻨﻔﺱ.
2-7ﶈﺔ ﺗﺎﺭﳜﻴﺔ
.1ﺍﻟﻔﺘﺭﺓ ﻤﻥ ﻋﺎﻡ ) (1940ﺇﻟﻰ ) (1950ﻗـﺎﻡ ﺍﻟﺒﺭﻭﻓﻴﺴـﻭﺭ ﻨـﻭﺭﺒﺭﺕ ﻓﻴﻨـﺭ
) (Norbert Wienerﻤﻥ ﻤﻌﻬﺩ ) (MITﻟﻠﺘﻜﻨﻭﻟﻭﺠﻴﺎ ﻤﻥ ﺇﻨﺸﺎﺀ ﻤﺠـﺎل ﺠﺩﻴـﺩ
ﻟﻠﺒﺤﺙ ﺃﻁﻠﻕ ﻋﻠﻴﺔ ﻋﻠﻡ ﺍﻟﺘﺤﻜﻡ ﺍﻵﻟﻲ ) (Cyberneticsﻭﺍﻟـﺫﻱ ﻴﻤﺜـل ﻋﻠـﻡ
ﻤﻨﻅﻭﻤﺎﺕ ﺍﻟﻤﻌﻠﻭﻤﺎﺕ ﺍﻟﻤﺭﺘﺩﺓ .ﻭﻗﺩ ﺃﺩﻯ ﺍﻗﺘﺭﺍﻥ ﻤﻔﺎﻫﻴﻡ ﻋﻠﻡ ﺍﻟﺘﺤﻜﻡ ﺍﻵﻟﻲ ﻤـﻊ
ﺍﻟﺤﻭﺍﺴﻴﺏ ﺍﻟﺭﻗﻤﻴﺔ ﺍﻟﺘﻲ ﻜﺎﻨﺕ ﺘﺤﺕ ﺍﻟﺘﻁﻭﺭ ﻓﻲ ﺫﻟﻙ ﺍﻟﻭﻗﺕ ﺇﻟﻰ ﺍﺴـﺘﺨﻼﺹ
ﺒﻌﺽ ﺍﻻﺴﺘﻨﺘﺎﺠﺎﺕ ﺍﻷﺨﻼﻗﻴﺔ ﺤﻭل ﺍﻟﺘﻜﻨﻭﻟﻭﺠﻴﺎ ﺍﻟﺘﻲ ﻴﻁﻠﻕ ﻋﻠﻴﻬﺎ ﺃﻻﻥ "ﺘﻘﻨﻴـﺔ
ﺍﻟﻤﻌﻠﻭﻤﺎﺕ.
145
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺑﻊ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﺃﺧﻼﻗﻴﺎﺕ ﺍﳊﺎﺳﻮﺏ
146
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺑﻊ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﺃﺧﻼﻗﻴﺎﺕ ﺍﳊﺎﺳﻮﺏ
.1ﺃﺨﻼﻗﻴﺎﺕ ﺍﺴﺘﺨﺩﺍﻡ ﺍﻟﺤﺎﺴﻭﺏ ﺒﻴﻥ ﺍﻟﻤﺴﺘﺨﺩﻡ ﻭﺍﻟﺠﻬﺎﺯ ،ﻭﻓﻴﻬﺎ ﺘﺒﺭﺯ ﺃﻫﻤﻴﺔ ﺍﻟﺘﺭﺒﻴﺔ
ﻟﻤﺭﺍﻗﺒﺔ ﺍﻟﺫﺍﺕ .ﻭﻜﻤﺜﺎل ﻟﻬﺫﻩ ﺍﻷﺨﻼﻗﻴﺎﺕ ﻫﻭ ﻋﺩﻡ ﺇﺴﺎﺀﺓ ﺍﺴﺘﻌﻤﺎل ﺠﻬﺎﺯ ﺍﻟﺤﺎﺴﻭﺏ
ﻟﻤﺎ ﻓﻴﻪ ﻤﺼﻠﺤﺔ ﺍﻟﺠﻤﻴﻊ ﻭﻜﺫﻟﻙ ﺍﻟﺤﺭﺹ ﻋﻠﻰ ﺴﻼﻤﺔ ﺃﺠﺯﺍﺀ ﺍﻟﺠﻬـﺎﺯ ﻭﺒﺭﺍﻤﺠـﻪ
ﻭﻤﺤﺘﻭﻴﺎﺘﻪ .
.2ﺃﺨﻼﻗﻴﺎﺕ ﺍﺴﺘﺨﺩﺍﻡ ﺍﻟﺤﺎﺴﻭﺏ ﺒﻴﻥ ﺍﻟﺸﺨﺹ ﻭﻏﻴﺭﻩ ،ﻭﻴﻤﻜﻥ ﻟﻬﺫﺍ ﺍﻟﻨﻭﻉ ﺃﻥ ﻴﻜﻭﻥ
ﺒﻴﻥ ﺍﻟﻤﺴﺘﺨﺩﻡ ﻭﺃﻨﺎﺱ ﺁﺨﺭﻴﻥ .ﻭﻴﻤﻜﻥ ﺍﻟﺘﺤﻜﻡ ﺒﻪ ﻋﻥ ﻁﺭﻴـﻕ ﺘﺸـﺭﻴﻊ ﺒﻌـﺽ
ﺍﻟﻘﻭﺍﻨﻴﻥ ﺍﻟﺘﻲ ﺘﺤﻤﻲ ﺍﻟﻨﺎﺱ ﻭﺍﻟﻤﺴﺘﺨﺩﻤﻴﻥ .ﻭﻤﻥ ﺃﻤﺜﻠﺔ ﻫﺫﺍ ﺍﻟﻨﻭﻉ:
147
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺑﻊ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﺃﺧﻼﻗﻴﺎﺕ ﺍﳊﺎﺳﻮﺏ
4-7ﺟﺮﺍﺋﻢ ﺍﳊﺎﺳﻮﺏ
ﺃﺩﻯ ﺍﻟﺘﻁﻭﺭ ﺍﻟﺘﻘﻨﻲ ﻤﻨﺫ ﺍﻟﻌﺎﻡ ) (1990ﺇﻟﻰ ﺘﻭﺴﻴﻊ ﺍﺴﺘﺨﺩﺍﻡ ﺍﻟﺤﺎﺴﻭﺏ ﻭﺸـﺒﻜﺔ
ﺍﻻﻨﺘﺭﻨﺕ ﻭﺍﻟﺫﻱ ﻨﺘﺞ ﻋﻨﻪ ﻟﻴﺱ ﻓﻘﻁ ﺍﺘﺴﺎﻉ ﺍﻟﻤﻌﺭﻓﺔ ﻭﺇﻨﻤﺎ ﻅﻬﻭﺭ ﺍﻟﻌﺩﻴـﺩ ﻤـﻥ ﺍﻟﻤﺸـﺎﻜل
ﻭﺍﻟﻅﻭﺍﻫﺭ ﺍﻟﺠﺭﻤﻴﺔ ﺍﻟﻤﺘﺯﺍﻤﻨﺔ ﻤﻌﻬﻤﺎ .ﻭﻅﻬﺭ ﺘﺒﺎﻴﻥ ﻜﺒﻴﺭ ﺒﺸﺎﻥ ﺘﺴﻤﻴﺔ ﺍﻟﻅﺎﻫﺭﺓ ﺍﻟﺠﺭﻤﻴـﺔ
ﺍﻟﻨﺎﺸﺌﺔ ﻓﻲ ﺒﻴﺌﺔ ﺍﻟﺤﺎﺴﻭﺏ ﻭﺸﺒﻜﺔ ﺍﻻﻨﺘﺭﻨﺕ.
ﺍﻥ ﻤﻔﻬﻭﻡ ﺠﺭﻴﻤﺔ ﺍﻟﺤﺎﺴـﻭﺏ ﻤـﺭ ﺒﺘﻁـﻭﺭ ﺘـﺎﺭﻴﺨﻲ ﺘﺒﻌـﺎ ﻟﺘﻁـﻭﺭ ﺍﻟﺘﻘﻨﻴـﺔ
ﻭﺍﺴﺘﺨﺩﺍﻤﺎﺘﻬﺎ ،ﻓﻔﻲ ﺍﻟﻤﺭﺤﻠﺔ ﺍﻷﻭﻟﻰ ﻤﻥ ﺸﻴﻭﻉ ﺍﺴﺘﺨﺩﺍﻡ ﺍﻟﺤﺎﺴﻭﺏ ،ﻅﻬﺭﺕ ﺃﻭل ﻤﻌﺎﻟﺠﺎﺕ
ﻟﻤﺎ ﻴﺴﻤﻰ ﺒﺠﺭﺍﺌﻡ ﺍﻟﺤﺎﺴﻭﺏ ﻭﺍﻗﺘﺼﺭﺕ ﺍﻟﻤﻌﺎﻟﺠﺔ ﻋﻠﻰ ﻤﻘﺎﻻﺕ ﻭﻤﻭﺍﺩ ﺼـﺤﻔﻴﺔ ﺘﻨـﺎﻗﺵ
ﺍﻟﺘﻼﻋﺏ ﺒﺎﻟﺒﻴﺎﻨﺎﺕ ﺍﻟﻤﺨﺯﻨﺔ ﻭﺘﺩﻤﻴﺭ ﺃﻨﻅﻤﺔ ﺍﻟﺤﺎﺴﻭﺏ ﻭﺍﻟﺘﺠﺴﺱ ﺍﻟﻤﻌﻠﻭﻤﺎﺘﻲ ﻭﺍﻻﺴـﺘﺨﺩﺍﻡ
ﻏﻴﺭ ﺍﻟﻤﺸﺭﻭﻉ ﻟﻠﺒﻴﺎﻨﺎﺕ ﺍﻟﻤﺨﺯﻨﺔ ﻓﻲ ﻨﻅﻡ ﺍﻟﺤﺎﺴﻭﺏ .ﻭﻗﺩ ﺃﺜﻴﺭ ﺍﻟﺠﺩل ﺤﻭل ﻤﺎ ﺇﺫﺍ ﻜﺎﻨﺕ
ﺠﺭﺍﺌﻡ ﺒﺎﻟﻤﻌﻨﻰ ﺍﻟﻘﺎﻨﻭﻨﻲ ﺃﻡ ﻤﺠﺭﺩ ﺴﻠﻭﻜﻴﺎﺕ ﻏﻴﺭ ﺃﺨﻼﻗﻴﺔ ﻓﻲ ﺒﻴﺌﺔ ﺃﻭ ﻤﻬﻨﺔ ﺍﻟﺤﻭﺴﺒﺔ .
ﺘﻌﺭﻑ ﺍﻟﺠﺭﻴﻤﺔ ﻋﻤﻭﻤﺎ ،ﺒﺄﻨﻬﺎ "" ﻓﻌل ﻏﻴﺭ ﻤﺸﺭﻭﻉ ﺼﺎﺩﺭ ﻋﻥ ﺇﺭﺍﺩﺓ ﺠﻨﺎﺌﻴﺔ ﻴﻘﺭﺭ
ﻟﻪ ﺍﻟﻘﺎﻨﻭﻥ ﻋﻘﻭﺒﺔ ﺃﻭ ﺘﺩﺒﻴﺭﹰﺍ ﺍﺤﺘﺭﺍﺯﻴﹰﺎ "" .ﺃﻤﺎ ﺠﺭﻴﻤﺔ ﺍﻟﺤﺎﺴﻭﺏ ،ﻓﻠﻬﺎ ﻋﺩﺩ ﻟﻴﺱ ﺒﺎﻟﻘﻠﻴـل
ﻤﻥ ﺍﻟﺘﻌﺭﻴﻔﺎﺕ ،ﺘﺘﻤﺎﻴﺯ ﻭﺘﺘﺒﺎﻴﻥ ﺘﺒﻌﺎ ﻟﻠﻤﻭﻀﻭﻉ ﺍﻟﻤﻨﺘﻤﻴﺔ ﺇﻟﻴﻪ .ﻭﻤﻥ ﻫﺫﻩ ﺍﻟﺘﻌﺭﻴﻔﺎﺕ:
148
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺑﻊ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﺃﺧﻼﻗﻴﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﺴﺭﻗﺔ ﺍﻟﺒﺭﺍﻤﺞ :ﺴﺭﻗﺔ ﺍﻟﺒﺭﻤﺠﻴﺎﺕ ﺍﻟﺘﻁﺒﻴﻘﻴﺔ ،ﺴﻭﺍﺀ ﻜﺎﻨﺕ ﺘﺠﺎﺭﻴﺔ ﺃﻡ ﻋﻠﻤﻴـﺔ ﺃﻡ •
ﻁﺎﺌﻠﺔ ﻟﻠﻨﺎﺴﺨﻴﻥ.
ﺍﻟﺘﺠﺴﺱ :ﺒﻐﺭﺽ ﺍﻟﺤﺼﻭل ﻋﻠﻰ ﺍﻟﻤﻌﻠﻭﻤﺎﺕ ﺍﻟﻬﺎﻤﺔ ﻭﺫﺍﺕ ﺍﻟﻁﺒﻴﻌﺔ ﺍﻟﺴﺭﻴﺔ. •
ﺍﻟﺘﺨﺭﻴﺏ ﺍﻻﻟﻜﺘﺭﻭﻨﻲ :ﺘﺴﺘﻌﻤل ﻤﻥ ﻗﺒل ﻗﺭﺍﺼﻨﺔ ﺍﻟﺤﺎﺴﻭﺏ ،ﻭﺘﺘﻡ ﻋﻥ ﺒﻌـﺩ ﻤـﻥ •
149
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺑﻊ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﺃﺧﻼﻗﻴﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﺍﻟﻨﺎﺠﻤﺔ ﻋﻥ ﺘﻌﻁل ﻫﺫﻩ ﺍﻷﻨﻅﻤﺔ ،ﻭﻗﺩ ﺤﻜﻡ ﻋﻠﻰ ﻤﻭﺭﺱ ﺒﺎﻟﺴﺠﻥ ﻟﻤﺩﺓ 3ﺃﻋﻭﺍﻡ
ﻭﻋﺸﺭﺓ ﺁﻻﻑ ﺩﻭﻻﺭ ﻜﻐﺭﺍﻤﺔ.
.3ﺤﺎﺩﺜﺔ ﺸﺭﻜﺔ ﺍﻭﻤﻴﻐﺎ :ﻤﺼﻤﻡ ﻭﻤﺒﺭﻤﺞ ﺸﺒﻜﺎﺕ ﺍﻟﺤﺎﺴﻭﺏ ﻭﺭﺌﻴﺱ ﺴﺎﺒﻕ ﻟﺸﺭﻜﺔ
) (Omegaﻭﻴﺩﻋﻰ ﺍﻟﻴﻥ ﻟﻭﻴـﺩ) (Timothy Allen Lioydﺘـﻡ ﺍﻋﺘﻘﺎﻟـﻪ ﻓـﻲ
1998/2/17ﺒﺴﺒﺏ ﺇﻁﻼﻗﻪ ﻗﻨﺒﻠﺔ ﺇﻟﻜﺘﺭﻭﻨﻴﺔ ﻓﻲ ﻋﺎﻡ ) (1996ﺒﻌﺩ 20ﻴﻭﻤﹰﺎ ﻤﻥ
ﻓﺼﻠﻪ ﻤﻥ ﺍﻟﻌﻤل ،ﺍﺴﺘﻁﺎﻋﺕ ﻫﺫﻩ ﺍﻟﻘﻨﺒﻠﺔ ﺍﻥ ﺘﻠﻐﻲ ﻜﺎﻓﺔ ﺍﻟﺘﺼﺎﻤﻴﻡ ﻭﺒﺭﺍﻤﺞ ﺍﻹﻨﺘﺎﺝ
ﻷﺤﺩ ﻜﺒﺭﻯ ﻤﺼﺎﻨﻊ ﺍﻟﺘﻘﻨﻴﺔ ﺍﻟﻌﺎﻟﻴﺔ ﻓﻲ ﻨﻴﻭﺠﺭﺴﻲ ،ﻤﻠﺤﻘـﺎ ﺨﺴـﺎﺌﺭ ﺒﻠﻐـﺕ 10
ﻻ ﺤﻴﹰﺎ ﻋﻠﻰ ﻤﺨﺎﻁﺭ ﺠﺭﺍﺌﻡ ﺍﻟﺘﺨﺭﻴﺏ ﻓـﻲ
ﻤﻠﻴﻭﻥ ﺩﻭﻻﺭ ﻭﺘﻌﺘﺒﺭ ﻫﺫﻩ ﺍﻟﺤﺎﺩﺜﺔ ﻤﺜﺎ ﹰ
ﺒﻴﺌﺔ ﺍﻟﺤﺎﺴﻭﺏ.
.4ﺤﺎﺩﺜﺔ ﺴﺭﻗﺔ ﺃﺭﻗﺎﻡ ﺒﻁﺎﺌﻕ ﺍﻻﺌﺘﻤ ﺎﻥ :ﺤﺩﺜﺕ ﻓﻲ 2001/3/8ﻤﻥ ﻗﺒل ﺍﻟﻬـﺎﻜﺭﺯ
ﺍﻟﺭﻭﺱ ﺤﻴﺙ ﺩﺨﻠﻭﺍ ﻋﻠﻰ ﺸﺒﻜﺎﺕ ﺍﻟﺸﺭﻜﺎﺕ ﺍﻟﺘﻲ ﺘﺘﻌﺎﻤل ﺒﺎﻟﺘﺠـﺎﺭﺓ ﺍﻻﻟﻜﺘﺭﻭﻨﻴـﺔ
ﻭﻗﺎﻤﻭﺍ ﺒﺴﺭﻗﺔ ﺒﻴﺎﻨﺎﺕ ﺍﻟﻌﻤﻼﺀ ﻤﻊ ﺃﺭﻗﺎﻡ ﺍﻟﺒﻁﺎﺌﻕ ﺍﻻﺌﺘﻤﺎﻨﻴﺔ ﺤﻴﺙ ﺘﻡ ﺍﻟﻜﺸﻑ ﻋـﻥ
40ﻀﺤﻴﺔ ﻓﻲ ﺃﻜﺜﺭ ﻤﻥ 20ﻭﻻﻴﺔ ﺃﻤﺭﻴﻜﻴﺔ ﻭﻨﺘﻴﺠﺔ ﻟﺫﻟﻙ ﻓﻘﺩ ﺍﻋﺘﻤـﺩﺕ ﺁﻟﻴـﺎﺕ
ﺠﺩﻴﺩﺓ ﻟﻀﻤﺎﻥ ﺴﺭﻴﺔ ﺃﺭﻗﺎﻡ ﺍﻟﺒﻁﺎﺌﻕ ﺍﻻﺌﺘﻤﺎﻨﻴﺔ.
150
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺑﻊ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﺃﺧﻼﻗﻴﺎﺕ ﺍﳊﺎﺳﻮﺏ
151
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺑﻊ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﺃﺧﻼﻗﻴﺎﺕ ﺍﳊﺎﺳﻮﺏ
.3ﺍﻟﺤﺎﻗﺩﻭﻥ )(Malevolent
ﻴﺤﺭﻙ ﺃﻨﺸﻁﺔ ﻫﺫﻩ ﺍﻟﻤﺠﻤﻭﻋﺔ ﺍﻟﺭﻏﺒﺔ ﺒﺎﻻﻨﺘﻘﺎﻡ ﻭﺍﻟﺜﺄﺭ ﻭﻟﻬﺫﺍ ﻓﺈﻨﻬﻡ ﻴﻨﻘﺴﻤﻭﻥ ﺍﻤـﺎ
ﺇﻟﻰ ﻤﺴﺘﺨﺩﻤﻲ ﻟﻠﻨﻅﺎﻡ ﻤﺤل ﺍﻟﺠﺭﻴﻤﺔ ﺒﻭﺼﻔﻬﻡ ﻤﻭﻅﻔﻴﻥ ﺃﻭ ﻤﺸﺘﺭﻜﻴﻥ ،ﺃﻭ ﺇﻟﻰ ﻏﺭﺒﺎﺀ ﻋﻥ
ﺍﻟﻨﻅﺎﻡ ﺘﺘﻭﻓﺭ ﻟﺩﻴﻬﻡ ﺃﺴﺒﺎﺏ ﺍﻻﻨﺘﻘﺎﻡ ﻤﻥ ﺍﻟﻤﻨﺸﺄﺓ ﺍﻟﻤﺴﺘﻬﺩﻓﺔ ﻓﻲ ﻨﺸﺎﻁﻬﻡ .
.4ﺼﻐﺎﺭ ﺍﻟﺴﻥ
ﻫﺫﻩ ﺍﻟﻔﺌﺔ ﻫﻡ ﺍﻟﺸﺒﺎﺏ ﺍﻟﺒﺎﻟ ﺍﻟﻤﻔﺘﻭﻥ ﺒﺎﻟﻤﻌﻠﻭﻤﺎﺘﻴﺔ ﻭﺍﻟﺤﻭﺴﺒﺔ ﻭﻗﺩ ﻅﻬﺭﺕ ﺩﺭﺍﺴﺎﺕ
ﻭﻤﺅﻟﻔﺎﺕ ﺘﺩﺍﻓﻊ ﻋﻥ ﻫﺫﻩ ﺍﻟﻔﺌﺔ ،ﻟﺘﺨﺭﺠﻬﺎ ﻤﻥ ﺩﺍﺌﺭﺓ ﺍﻹﺠﺭﺍﻡ ﺇﻟﻰ ﺩﺍﺌﺭﺓ ﺍﻟﻌﺒﺙ ،ﻭﺃﺤﻴﺎﻨـﹰﺎ
ﺍﻟﺒﻁﻭﻟﺔ.
5-7ﺍﳋﺼﻮﺻﻴﺔ
ﺍﻟﺨﺼﻭﺼﻴﺔ ) (Privacyﻫﻲ ﺇﺤﺩﻯ ﺤﻘﻭﻕ ﺍﻹﻨﺴﺎﻥ ﺍﻟﺭﺌﻴﺴﻴﺔ ﺍﻟﺘﻲ ﻴﺒﺤﺙ ﻋﻨﻬـﺎ
ﺨﻼل ﻤﻤﺎﺭﺴﺎﺘﻪ ﻷﻨﺸﻁﺘﻪ ﺍﻟﺤﻴﺎﺘﻴﺔ ﺍﻟﻤﺨﺘﻠﻔﺔ ،ﻜﺎﻟﺤﻕ ﻓﻲ ﺍﻟـﺭﺃﻱ ﻭﺍﻟﺘﻌﺒﻴـﺭ ﻭﺍﻟﻤﺸـﺎﺭﻜﺔ
ﺍﻟﺴﻴﺎﺴﻴﺔ .ﻟﺫﻟﻙ ﻜﺎﻨﺕ ﺩﻋﻭﺓ ﺩﻴﻨﻨﺎ ﺍﻹﺴﻼﻤﻲ ﻟﻠﻤﺤﺎﻓﻅﺔ ﻋﻠﻰ ﺍﻷﺴﺭﺍﺭ ﺍﻨﻁﻼﻗﹰﺎ ﻤﻥ ﻜﻭﻨﻬـﺎ
152
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺑﻊ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﺃﺧﻼﻗﻴﺎﺕ ﺍﳊﺎﺳﻮﺏ
ﺘﺄﺘﻲ ﻓﻲ ﺇﻁﺎﺭ ﺍﻟﺘﺸﺭﻴﻌﺎﺕ ﺍﻟﺘﻲ ﺘﻨﻅﻡ ﺍﻟﻌﻼﻗﺎﺕ ﺒﻴﻥ ﺍﻟﻨﺎﺱ ﻭﺍﻟﺘﻲ ﺘﻬﺩﻑ ﺇﻟﻰ ﺘﻨﻤﻴـﺔ ﻫـﺫﻩ
ﺍﻟﻌﻼﻗﺎﺕ ﻭﺤﻤﺎﻴﺘﻬﺎ ﻤﻥ ﻜل ﻤﺎ ﻤﻥ ﺸﺎﻨﻪ ﺍﻥ ﻴﻨﺤﺭﻑ ﺒﻬﺎ ﻓﻲ ﺍﺘﺠﺎﻫﺎﺕ ﺨﺎﻁﺌﺔ.
ﻟﻘﺩ ﺍﺨﺘﻠﻁ ﻤﻔﻬﻭﻡ ﺍﻟﺨﺼﻭﺼﻴﺔ ﻭﺍﺭﺘﺒﻁ ﻤﻊ ﻤﻔﻬﻭﻡ ﺤﻤﺎﻴﺔ ﺍﻟﺒﻴﺎﻨﺎﺕ ﻭﻫﻭ ﻤﺎ ﻴﻀـﻊ
ﺍﻟﺨﺼﻭﺼﻴﺔ ﻀﻤﻥ ﺇﻁﺎﺭ ﺍﻟﺤﻕ ﻓﻲ ﺤﻤﺎﻴﺔ ﺍﻟﺒﻴﺎﻨﺎﺕ ﺍﻟﺨﺎﺼﺔ .ﻓﻘﺩ ﺘﻁﻭﺭ ﻫﺫﺍ ﺍﻟﻤﻔﻬﻭﻡ ﻨﺘﻴﺠﺔ
ﻟﻠﺘﻁﻭﺭ ﺍﻟﺴﺭﻴﻊ ﻓﻲ ﺘﻘﻨﻴﺔ ﺍﻟﻤﻌﻠﻭﻤﺎﺕ ﻭﺃﻭل ﻤﻌﺎﻟﺠﺔ ﺘﺸﺭﻴﻌﻴﺔ ﻓﻲ ﻤﻴﺩﺍﻥ ﺤﻤﺎﻴـﺔ ﺍﻟﺒﻴﺎﻨـﺎﺕ
ﻜﺎﻨﺕ ﻋﺎﻡ ) (1970ﻓﻲ ﺃﻟﻤﺎﻨﻴﺎ ﻭ ﺘﺒﻌﻪ ﺴﻥ ﻗﺎﻨﻭﻥ ﻭﻁﻨﻲ ﻤﺘﻜﺎﻤل ﻓﻲ ﺍﻟﺴﻭﻴﺩ ﻋﺎﻡ )(1973
ﺜﻡ ﺍﻟﻭﻻﻴﺎﺕ ﺍﻟﻤﺘﺤﺩﺓ ﻋﺎﻡ ) (1974ﺜﻡ ﻓﺭﻨﺴﺎ ﻋﺎﻡ ) .(1978ﻭﻓﻲ ﻋـﺎﻡ ) (1981ﻭﻀـﻊ
ﺍﻻﺘﺤﺎﺩ ﺍﻷﻭﺭﻭﺒﻲ ﺍﺘﻔﺎﻗﻴﺔ ﺤﻤﺎﻴﺔ ﺍﻷﻓﺭﺍﺩ ﻤﻥ ﻤﺨﺎﻁﺭ ﺍﻟﻤﻌﺎﻟﺠﺔ ﺍﻵﻟﻴﺔ ﻟﻠﺒﻴﺎﻨﺎﺕ ﺍﻟﺸﺨﺼﻴﺔ.
ﻴﻌﺩ ﻤﻔﻬﻭﻡ ﺍﻟﺨﺼﻭﺼﻴﺔ ﻤﻥ ﺍﻟﺩﻭﺍﻓﻊ ﺍﻷﺴﺎﺴﻴﺔ ﻟ ﻤﻥ .ﻭﺘﻔﻬﻡ ﺍﻟﺨﺼﻭﺼﻴﺔ ﻋـﺎﺩﺓ
ﻋﻠﻰ ﺃﻨﻬﺎ ﺤﻕ ﺍﻷﻓﺭﺍﺩ ﻓﻲ ﺍﻟﺘﺤﻜﻡ ﻓﻲ ﺍﻟﻤﻌﻠﻭﻤﺎﺕ ﺍﻟﺘﻲ ﺘﺘﻌﻠﻕ ﺒﻬﻡ ﻭﺘﺤﺩﻴﺩ ﻤﻥ ﻴﺠﻭﺯ ﻟﻬـﻡ
ﺠﻤﻊ ﻫﺫﻩ ﺍﻟﻤﻌﻠﻭﻤﺎﺕ ﻭﺘﺨﺯﻴﻨﻬﺎ ،ﻭﻤﻥ ﻟﻬﻡ ﺍﻟﺤﻕ ﻓﻲ ﺇﻓﺸﺎﺌﻬﺎ.
ﻴﻤﻜﻥ ﺘﻘﺴﻴﻡ ﺍﻟﺨﺼﻭﺼﻴﺔ ﺇﻟﻰ ﺍﻷﻨﻭﺍﻉ ﺍﻟﺘﺎﻟﻴﺔ:
153
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺑﻊ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﺃﺧﻼﻗﻴﺎﺕ ﺍﳊﺎﺳﻮﺏ
.2ﺍﻟﻤﻠﻜﻴﺔ ﺍﻷﺩﺒﻴﺔ ﻭﺍﻟﻔﻨﻴﺔ :ﻫﻲ ﺍﻟﺤﻘﻭﻕ ﺍﻟﺘﻲ ﺘﺤﻤﻲ ﺍﻟﻤـﻭﺍﺩ ﺍﻟﻤﻜﺘﻭﺒـﺔ ﻜﺎﻟﻜﺘـﺏ،
ﻭﺍﻟﻤﻭﺍﺩ ﺍﻟﻔﻨﻴﺔ ﺍﻷﺩﺍﺌﻴﺔ ﻜﺎﻟﻤﺴﺭﺤﻴﺎﺕ ﻭﺍﻟﻤﻭﺴﻴﻘﻰ ،ﻭﺍﻟﻤﻭﺍﺩ ﺍﻟﺴﻤﻌﻴﺔ ﻜﺎﻷﺸـﺭﻁﺔ
ﺍﻟﺴﻤﻌﻴﺔ ،ﻭﺍﻟﺒﺭﻤﺠﻴﺎﺕ ﺍﻟﺤﺎﺴﻭﺒﻴﺔ ﻭﻗﻭﺍﻋﺩ ﺍﻟﺒﻴﺎﻨﺎﺕ ﻭﻏﻴﺭﻫﺎ
7-7ﺍﻣﻦ ﺍﻟﺒﻴﺎﻧﺎﺕ
ﺍﻟﻤﻘﺼﻭﺩ ﺒﺄﻤﻥ ﺍﻟﺒﻴﺎﻨﺎﺕ ﻫﻭ ﺤﻤﺎﻴﺔ ﺍﻟﺒﻴﺎﻨﺎﺕ ﻭﺍﻟﻤﻌﻠﻭﻤﺎﺕ ﻟﻤﻨﻊ ﻭﺼﻭل ﺍﻷﺸﺨﺎﺹ
ﻏﻴﺭ ﺍﻟﻤﺨﻭل ﻟﻬﻡ ﺍﻟﺤﺼﻭل ﻋﻠﻴﻬﺎ .ﻭﻤﻥ ﺍﻟﻨﺎﺤﻴﺔ ﺍﻷﻜﺎﺩﻴﻤﻴﺔ ﻴﻤﺜل ﺍﻟﻌﻠﻡ ﺍﻟﺫﻱ ﻴﺒﺤـﺙ ﻓـﻲ
ﻨﻅﺭﻴﺎﺕ ﺘﻭﻓﻴﺭ ﺍﻟﺤﻤﺎﻴﺔ ﻟﻠﻤﻌﻠﻭﻤﺎﺕ .ﻭﻤﻥ ﺍﻟﻨﺎﺤﻴﺔ ﺍﻟﻘﺎﻨﻭﻨﻴﺔ ﻓﺄﻥ ﺍﻤﻥ ﺍﻟﺒﻴﺎﻨﺎﺕ ﻴﻤﺜل ﺘـﺩﺍﺒﻴﺭ
ﺤﻤﺎﻴﺔ ﻭﺴﺭﻴﺔ ﻭﺴﻼﻤﺔ ﻤﺤﺘﻭﻯ ﺍﻟﻤﻌﻠﻭﻤﺎﺕ ﻭﻤﻜﺎﻓﺤﺔ ﺃﻨﺸﻁﺔ ﺍﻻﻋﺘﺩﺍﺀ ﻋﻠﻴﻬﺎ.
1-7-7ﺤﻤﺎﻴﺔ ﺍﻟﺒﻴﺎﻨﺎﺕ
ﻴﺴﺘﺨﺩﻡ ﺍﺼﻁﻼﺡ ﺤﻤﺎﻴﺔ ﺍﻟﺒﻴﺎﻨﺎﺕ ﻓﻲ ﻨﻁﺎﻕ ﺃﻨﺸﻁﺔ ﻤﻌﺎﻟﺠﺔ ﺍﻟﺒﻴﺎﻨـﺎﺕ ﺒﻭﺍﺴـﻁﺔ
ﻭﺴﺎﺌل ﺍﻟﺤﻭﺴﺒﺔ ﻭﺍﻻﺘﺼﺎل ﺇﺫ ﻤﻊ ﺸﻴﻭﻉ ﺍﻟﻭﺴﺎﺌل ﺍﻟﺘﻘﻨﻴﺔ ﻟﻤﻌﺎﻟﺠﺔ ﻭﺨﺯﻥ ﺍﻟﺒﻴﺎﻨﺎﺕ ﻭﺘﺩﺍﻭﻟﻬﺎ
ﻭﺍﻟﺘﻔﺎﻋل ﻤﻌﻬﺎ ﻋﺒﺭ ﺸﺒﻜﺎﺕ ﺍﻟﻤﻌﻠﻭﻤﺎﺕ ،ﻓﻘﺩ ﺍﺤﺘﻠﺕ ﺩﺭﺍﺴﺎﺕ ﺤﻤﺎﻴﺔ ﺍﻟﺒﻴﺎﻨـﺎﺕ ﻤﺴـﺎﺤﺔ
ﻭﺍﺴﻌﺔ ﻤﻥ ﺒﻴﻥ ﻤﺠﺎﻻﺕ ﺘﻘﻨﻴﺔ ﺍﻟﻤﻌﻠﻭﻤﺎﺕ ﺍﻟﻤﺨﺘﻠﻔﺔ.
154
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺑﻊ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﺃﺧﻼﻗﻴﺎﺕ ﺍﳊﺎﺳﻮﺏ
.1ﺍﻟﻤﻭﺜﻭﻗﻴﺔ )(Authentication
ﺇﻥ ﺍﻟﺩﺨﻭل ﺇﻟﻰ ﺃﻨﻅﻤﺔ ﺍﻟﺤﺎﺴﻭﺏ ﻭﻗﻭﺍﻋﺩ ﺍﻟﺒﻴﺎﻨﺎﺕ ﻭﻤﻭﺍﻗﻊ ﺍﻟﻤﻌﻠﻭﻤﺎﺘﻴـﺔ ﻋﻤﻭﻤـﺎ
ﻴﻤﻜﻥ ﺘﻘﻴﺩﻩ ﺒﺎﻟﻌﺩﻴﺩ ﻤﻥ ﻭﺴﺎﺌل ﺍﻟﺘﻌﺭﻑ ﻋﻠﻰ ﺸﺨﺼﻴﺔ ﺍﻟﻤﺴﺘﺨﺩﻡ ﻭﺘﺤﺩﻴﺩ ﻨﻁﺎﻕ ﺍﻻﺴﺘﺨﺩﺍﻡ
ﻭﻫﻭ ﻤﺎ ﻴﻌﺭﻑ ﺒﺄﻨﻅﻤﺔ ﺍﻟﺘﻌﺭﻴﻑ .ﻭﻭﺴﺎﺌل ﺍﻟﺘﻌﺭﻴﻑ ﺘﺨﺘﻠﻑ ﺘﺒﻌﺎ ﻟﻠﺘﻘﻨﻴﺔ ﺍﻟﻤﺴﺘﺨﺩﻤﺔ ﻭﻫﻲ
ﻨﻔﺴﻬﺎ ﻭﺴﺎﺌل ﺃﻤﻥ ﺍﻟﻭﺼﻭل ﺇﻟﻰ ﺍﻟﻤﻌﻠﻭﻤﺎﺕ ﺃﻭ ﺍﻟﺨﺩﻤﺎﺕ ﻓﻲ ﻗﻁﺎﻋﺎﺕ ﺍﺴﺘﺨﺩﺍﻡ ﺍﻟـﻨﻅﻡ ﺃﻭ
ﺍﻟﺸﺒﻜﺎﺕ ﺃﻭ ﻗﻁﺎﻋﺎﺕ ﺍﻷﻋﻤﺎل ﺍﻻﻟﻜﺘﺭﻭﻨﻴﺔ ﻭﺒﺸﻜل ﻋﺎﻡ ﻓﺈﻥ ﻫﺫﻩ ﺍﻟﻭﺴﺎﺌل ﺘﺘﻭﺯﻉ ﺇﻟﻰ ﺜﻼﺜﺔ
ﺃﻨﻭﺍﻉ :
• ﻤﺎ ﻴﻌﺭﻓﻪ ﺍﻟﺸﺨﺹ ﻤﺜل ﻜﻠﻤﺎﺕ ﺍﻟﺴﺭ ﺃﻭ ﺍﻟﺭﻤﺯ ﺃﻭ ﺍﻟﺭﻗﻡ ﺍﻟﺸﺨﺼﻲ ﺃﻭ ﻏﻴﺭ ﺫﻟﻙ.
155
ﺍﻟﻔﺼﻞ ﺍﻟﺴﺎﺑﻊ ...........................................................ﻣﻘﺪﻣﺔ ﰲ ﺃﺧﻼﻗﻴﺎﺕ ﺍﳊﺎﺳﻮﺏ
• ﻤﺎ ﻴﺭﺘﺒﻁ ﺒﺫﺍﺕ ﺍﻟﺸﺨﺹ ﻤﺜل ﺒﺼﻤﻪ ﺍﻹﺼﺒﻊ ﺃﻭ ﺒﺼﻤﻪ ﺍﻟﻌﻴﻥ ﻭﺍﻟﺼﻭﺕ ﻭﻏﻴﺭﻫﺎ.
.4ﺍﻟﺘﺸﻔﻴﺭ )(Encryption
ﻴﻌﺭﱠﻑ ﺍﻟﺘﺸﻔﻴﺭ ﺒﺄﻨﻪ ﻋﻤﻠﻴﺔ ﺘﺤﻭﻴل ﺍﻟﻤﻌﻠﻭﻤﺎﺕ ﺇﻟﻰ ﺸﻔﺭﺍﺕ ﻏﻴﺭ ﻤﻔﻬﻭﻤـﺔ ﻟﻤﻨـﻊ
ﺍﻷﺸﺨﺎﺹ ﻏﻴﺭ ﺍﻟﻤﺨﻭل ﻟﻬﻡ ﻤﻥ ﺍﻹﻁﻼﻉ ﻋﻠﻰ ﺍﻟﻤﻌﻠﻭﻤﺎﺕ ﺃﻭ ﻓﻬﻤﻬﺎ.ﻭﻤـﻥ ﺍﻟﻤﻌﻠـﻭﻡ ﺃﻥ
ﺸﺒﻜﺔ ﺍﻹﻨﺘﺭﻨﺕ ﺘﺸﻜل ﻓﻲ ﻫﺫﻩ ﺍﻷﻴﺎﻡ ﺍﻟﻭﺴﻁ ﺍﻷﻀﺨﻡ ﻟﻨﻘل ﺍﻟﻤﻌﻠﻭﻤﺎﺕ .ﻭﻻ ﺒﺩ ﻤـﻥ ﻨﻘـل
ﺍﻟﻤﻌﻠﻭﻤﺎﺕ ﺍﻟﺤﺴﺎﺴﺔ )ﻤﺜل ﺍﻟﺤﺭﻜﺎﺕ ﺍﻟﻤﺎﻟﻴﺔ( ﺒﺼﻴﻐﺔ ﻤﺸﻔﺭﺓ ﺇﻥ ﺃﺭﻴﺩ ﺍﻟﺤﻔﺎﻅ ﻋﻠﻰ ﺴﻼﻤﺘﻬﺎ
ﻭﺘﺄﻤﻴﻨﻬﺎ ﻤﻥ ﻋﺒﺙ ﺍﻟﻤﺘﻁﻔﻠـﻴﻥ ﻭﺍﻟﻤﺨـﺭﺒﻴﻥ ﻭﺘﹸﺴـﺘﺨﺩﻡ ﻤﻔـﺎﺘﻴﺢ ﺴـﺭﻴﺔ ﻓـﻲ ﻋﻤﻠﻴـﺔ
ﺍﻟﺘﺸﻔﻴﺭ ) (Encryptionﻭﻓﻙ ﺍﻟﺘﺸﻔﻴﺭ ) ، (Decryptionﻭﺍﻟﻤﻔﺎﺘﻴﺢ ﻋﺒـﺎﺭﺓ ﻋـﻥ ﺼـﻴ
ﺭﻴﺎﻀﻴﺔ ﻤﻌﻘﺩﺓ.
156
ﺍﳌﺼﺎﺩﺭ
ﺍﳌﺼﺎﺩﺭ ﻭﺍﳌﺮﺍﺟﻊ
References
• ﺍﳌﺮﺍﺟﻊ ﺍﻟﻌﺮﺑﻴﺔ
.8ﻤﺭﺍﺩ ﺸﻠﺒﺎﻴﺔ ،ﻨﻬﻠﺔ ﺩﺭﻭﻴﺵ ،ﻤﺎﻫﺭ ﺠﺎﺒﺭ ﻭﻨﺎﺌل ﺤﺭﺏ " ﺘﻁﺒﻴﻘﺎﺕ ﺍﻟﻭﺴﺎﺌﻁ
ﺍﻟﻤﺘﻌﺩﺩ" .ﺩﺍﺭ ﺍﻟﻤﺴﻴﺭﺓ.
159
• ﺍﳌﺮﺍﺟﻊ ﺍﻷﺟﻨﺒﻴﺔ
1. Ideas, Roger R. Flynn , 2002.Computer Sciences: Foundations , Macmil-
lan Reference USA.
2. William Stallings, 2005. Operating Systems: Internals and Design Prin-
ciples, 5/E : Prentice Hall.
3. M. Morris Mano, 1999. Digital Design : Prentice Hall.
4. McHoes, Ann McIver, 2002. Binary Number System: The Gale Group
INC.
5. Thomas H. Cormen , Charles E. Leiserson , Ronald L. Rivest and Clifford
Stein . 2001, Introduction to Algorithms-2nd/E:MIT press.
6. Shelly, G.B, Cashman, T.J. and Vermatt, M. E., 2001. Discovering com-
puters : Concepts for a digital world. Boston, MA: Course Technology.
7. Russell Dean Vines, 2002. Wireless Security Essentials: Wiley Publishing,
INC.
8. Werner Feibel ,1996. Encyclopedia of Networking : SYBEX INC.,
9. Jonathan Feldman, 2002. Sams Teach Yourself Network Troubleshooting
in 24 Hours : Macmillan Computer Publishing
10. http://en.wikipedia.org/wiki/Multimedia
11. Ze-Nian Li and Mark S Drew , 2003.Fundamentals of Multimedia: Pren-
tice Hall.
12. Mark, A. Ludwing, 1996. The Little Black Book Of Computer Viruses :
American Eagle publications, INC.
13. John Aycock , 2006. Computer Viruses and Malware: Springer.
14. Michael Erbschloe, , 2005. Trojans, Worms, and Spyware: Elsevier.
15. Desanto, M. ,2002. Computer virus tutorial. Retrieved from
http://shareware.about.com/library/weekly/aa022299.htm.
16. J. Aycock and N. Friess. 2006, Spam zombies from outer space. Technical
Report 2006-808-01,University of Calgary, Department of Computer
Science.
17. Robert N. Barger. 2008, Computer Ethics : A Case-Based Approach. Uni-
versity of Notre Dame.
18. Anderson, Michael, Susan Leigh Anderson, and Chris Armen. “Towards
Machine Ethics.” http://people.cs.uu.nl/virginia/aotp/papers/ To-
wards%20Machine%20Ethics.pdf>
19. Floridi, Luciano, and J.W. Sanders. “Artificial Evil and the Foundations of
Computer Ethics.” Ethics and Information Technology 3(1) (2001): 55–66.
160
ﺍﳌﻼﺣﻖ
ﺍﳌﻼﺣﻖ
Appendices
(A) اﻟﻤﻠﺤﻖ
File Formats of Multimedia
163
Audio Files ﻣﻠﻔﺎت اﻟﺼﻮت
Extension Description
.mp3 MPEG Layer-3 format
.wma Windows Media Audio format
.aif Audio Interchange File Format
.amr Adaptive Multi-Rate Codec File
.aob DVD-Audio Audio Object File
.au Audio File
.cdr Raw Audio CD Data
.midi (mid) Musical Instrument Digital Interface
.rm Real Audio File
.ram Real Audio Media
.wav WAVE Audio File
.bwf Broadcast Wave Format
.aac Advanced Audio Coding File
.iff Interchange File Format
.avi Audio Video Interleave File
164
Video Files ﻣﻠﻔﺎت اﻟﻔﻴﺪﻳﻮ
Extension Description
.3gp 3GPP Multimedia File
.asf Advanced Systems Format File
.asx Microsoft ASF Redirector File
.avi Audio Video Interleave File
.mov Apple QuickTime Movie
.mp4 MPEG-4 Video File
.mpg MPEG Video File
.qt Apple QuickTime Movie
.swf Macromedia Flash Movie
.wmv Windows Media Video File
.wm Windows Media File
165
(B) اﻟﻤﻠﺤﻖ
Common Character Sets
166
ANSI Character Set
ANSI code
Character Unicode Value (Hex) Description
(decimal)
5 0035 53 Digit five
6 0036 54 Digit six
7 0037 55 Digit seven
8 0038 56 Digit eight
9 0039 57 Digit nine
: 003A 58 Colon
; 003B 59 Semicolon
< 003C 60 Less-than sign
= 003D 61 Equals sign
> 003E 62 Greater-than sign
? 003F 63 Question mark
@ 0040 64 Commercial at
A 0041 65 Latin capital letter A
B 0042 66 Latin capital letter B
C 0043 67 Latin capital letter C
D 0044 68 Latin capital letter D
E 0045 69 Latin capital letter E
F 0046 70 Latin capital letter F
G 0047 71 Latin capital letter G
H 0048 72 Latin capital letter H
I 0049 73 Latin capital letter I
J 004A 74 Latin capital letter J
K 004B 75 Latin capital letter K
L 004C 76 Latin capital letter L
M 004D 77 Latin capital letter M
167
ANSI Character Set
ANSI code
Character Unicode Value (Hex) Description
(decimal)
N 004E 78 Latin capital letter N
O 004F 79 Latin capital letter O
P 0050 80 Latin capital letter P
Q 0051 81 Latin capital letter Q
R 0052 82 Latin capital letter R
S 0053 83 Latin capital letter S
T 0054 84 Latin capital letter T
U 0055 85 Latin capital letter U
V 0056 86 Latin capital letter V
W 0057 87 Latin capital letter W
X 0058 88 Latin capital letter X
Y 0059 89 Latin capital letter Y
Z 005A 90 Latin capital letter Z
[ 005B 91 Left square bracket
\ 005C 92 Reverse solidus
] 005D 93 Right square bracket
^ 005E 94 Circumflex accent
_ 005F 95 Low line
` 0060 96 Grave accent
a 0061 97 Latin small letter a
b 0062 98 Latin small letter b
c 0063 99 Latin small letter c
d 0064 100 Latin small letter d
e 0065 101 Latin small letter e
f 0066 102 Latin small letter f
168
ANSI Character Set
ANSI code
Character Unicode Value (Hex) Description
(decimal)
g 0067 103 Latin small letter g
h 0068 104 Latin small letter h
i 0069 105 Latin small letter i
j 006A 106 Latin small letter j
k 006B 107 Latin small letter k
l 006C 108 Latin small letter l
m 006D 109 Latin small letter m
n 006E 110 Latin small letter n
o 006F 111 Latin small letter o
p 0070 112 Latin small letter p
q 0071 113 Latin small letter q
r 0072 114 Latin small letter r
s 0073 115 Latin small letter s
t 0074 116 Latin small letter t
u 0075 117 Latin small letter u
v 0076 118 Latin small letter v
w 0077 119 Latin small letter w
x 0078 120 Latin small letter x
y 0079 121 Latin small letter y
z 007A 122 Latin small letter z
{ 007B 123 Left curly bracket
│ 007C 124 Vertical line
} 007D 125 Right curly bracket
~ 007E 126 Tilde
DEL 007F 127 Delete
169
(C) اﻟﻤﻠﺤﻖ
Numeric Equivalents
Numeric Equivalents
Decimal Hexadecimal Octal Binary
(Base 10) (Base 16) (Base 8) (Base 2)
1 01 01 00000001
2 02 02 00000010
3 03 03 00000011
4 04 04 00000100
5 05 05 00000101
6 06 06 00000110
7 07 07 00000111
8 08 10 00001000
9 06 11 00001001
10 0A 12 00001010
11 0B 13 00001011
12 0C 14 00001100
13 0D 15 00001101
14 0E 16 00001110
15 0F 17 00001111
16 10 20 00010000
17 11 21 00010001
18 12 22 00010010
19 13 23 00010011
20 14 24 00010100
21 15 25 00010101
22 16 26 00010110
170
Numeric Equivalents
Decimal Hexadecimal Octal Binary
(Base 10) (Base 16) (Base 8) (Base 2)
23 17 27 00010111
24 18 30 00011000
25 19 31 00011001
26 1A 32 00011010
27 1B 33 00011011
28 1C 34 00011100
29 1D 35 00011101
30 1E 36 00011110
31 1F 37 00011111
32 20 40 00100000
33 21 41 00100001
34 22 42 00100010
35 23 43 00100011
36 24 44 00100100
37 25 45 00100101
38 26 46 00100110
39 27 47 00100111
40 28 50 00101000
41 29 51 00101001
42 2A 52 00101010
43 2B 53 00101011
44 2C 54 00101100
45 2D 55 00101101
46 2E 56 00101110
171
Numeric Equivalents
Decimal Hexadecimal Octal Binary
(Base 10) (Base 16) (Base 8) (Base 2)
47 2F 57 00101111
48 30 60 00110000
49 31 61 00110001
50 32 62 00110010
51 33 63 00110011
52 34 64 00110100
53 35 65 00110101
54 36 66 00110110
55 37 67 00110111
56 38 70 00111001
57 39 71 00111000
58 3A 72 00111010
59 3B 73 00111011
60 3C 74 00111100
61 3D 75 00111101
62 3E 76 00111110
63 3F 77 00111111
64 40 100 01000000
65 41 101 01000001
66 42 102 01000010
67 43 103 01000011
68 44 104 01000100
69 45 105 01000101
70 46 106 01000110
172
Numeric Equivalents
Decimal Hexadecimal Octal Binary
(Base 10) (Base 16) (Base 8) (Base 2)
71 47 107 01000111
72 48 110 01001000
73 49 111 01001001
74 4A 112 01001010
75 4B 113 01001011
76 4C 114 01001100
77 4D 115 01001101
78 4E 116 01001110
79 4F 117 01001111
80 50 120 01010000
81 51 121 01010001
82 52 122 01010010
83 53 123 01010011
84 54 124 01010100
85 55 125 01010101
86 56 126 01010110
87 57 127 01010111
88 58 130 01011000
89 59 131 01011001
90 5A 132 01011010
91 5B 133 01011011
92 5C 134 01011100
93 5D 135 01011101
94 5E 136 01011110
173
Numeric Equivalents
Decimal Hexadecimal Octal Binary
(Base 10) (Base 16) (Base 8) (Base 2)
95 5F 137 01011111
96 60 140 01100000
97 61 141 01100001
98 62 142 01100010
99 63 143 01100011
100 64 144 01100100
101 65 145 01100101
102 66 146 01100110
103 67 147 01100111
104 68 150 01101000
105 69 151 01101001
106 6A 152 01101010
107 6B 153 01101011
108 6C 154 01101100
109 6D 155 01101101
110 6E 156 01101110
111 6F 157 01101111
112 70 160 01110000
113 71 161 01110001
114 72 162 01110010
115 73 163 01110011
116 74 164 01110100
117 75 165 01110101
118 76 166 01110110
174
Numeric Equivalents
Decimal Hexadecimal Octal Binary
(Base 10) (Base 16) (Base 8) (Base 2)
119 77 167 01110111
120 78 170 01111000
121 79 171 01111001
122 7A 172 01111010
123 7B 173 01111011
124 7C 174 01111100
125 7D 175 01111101
126 7E 176 01111110
127 7F 177 01111111
128 80 200 10000000
129 81 201 10000001
130 82 202 10000010
131 83 203 10000011
132 84 204 10000100
133 85 205 10000101
134 86 206 10000110
135 87 207 10000111
136 88 210 10001000
137 89 211 10001001
138 8A 212 10001010
139 8B 213 10001011
140 8C 214 10001100
141 8D 215 10001101
142 8E 216 10001110
175
Numeric Equivalents
Decimal Hexadecimal Octal Binary
(Base 10) (Base 16) (Base 8) (Base 2)
143 8F 217 10001111
144 90 220 10010000
145 91 221 10010001
146 92 222 10010010
147 93 223 10010011
148 94 224 10010100
149 95 225 10010101
150 96 226 10010110
151 97 227 10010111
152 98 230 10011000
153 99 231 10011001
154 9A 232 10011010
155 9B 233 10011011
156 9C 234 10011100
157 9D 235 10011101
158 9E 236 10011110
159 9F 237 10011111
160 A0 240 10100000
161 A1 241 10100001
162 A2 242 10100010
163 A3 243 10100011
164 A4 244 10100100
165 A5 245 10100101
166 A6 246 10100110
176
Numeric Equivalents
Decimal Hexadecimal Octal Binary
(Base 10) (Base 16) (Base 8) (Base 2)
167 A7 247 10100111
168 A8 250 10101000
169 A9 251 10101001
170 AA 252 10101010
171 AB 253 10101011
172 AC 254 10101100
173 AD 255 10101101
174 AE 256 10101110
175 AF 257 10101111
176 B0 260 10110000
177 B1 261 10110001
178 B2 262 10110010
179 B3 263 10110011
180 B4 264 10110100
181 B5 265 10110101
182 B6 266 10110110
183 B7 267 10110111
184 B8 270 10111000
185 B9 271 10111001
186 BA 272 10111010
187 BB 273 10111011
188 BC 274 10111100
189 BD 275 10111101
190 BE 276 10111110
177
Numeric Equivalents
Decimal Hexadecimal Octal Binary
(Base 10) (Base 16) (Base 8) (Base 2)
191 BF 277 10111111
192 C0 300 11000000
193 C1 301 11000001
194 C2 302 11000010
195 C3 303 11000011
196 C4 304 11000100
197 C5 305 11000101
198 C6 306 11000110
199 C7 307 11000111
200 C8 310 11001000
201 C9 311 11001001
202 CA 312 11001010
203 CB 313 11001011
204 CC 314 11001100
205 CD 315 11001101
206 CE 316 11001110
207 CF 317 11001111
208 D0 320 11010000
209 D1 321 11010001
210 D2 322 11010010
211 D3 323 11010011
212 D4 324 11010100
213 D5 325 11010101
214 D6 326 11010110
178
Numeric Equivalents
Decimal Hexadecimal Octal Binary
(Base 10) (Base 16) (Base 8) (Base 2)
215 D7 327 11010111
216 D8 330 11011000
217 D9 331 11011001
218 DA 332 11011010
219 DB 333 11011011
220 DC 334 11011100
221 DD 335 11011101
222 DE 336 11011110
223 DF 337 11011111
224 E0 340 11100000
225 E1 341 11100001
226 E2 342 11100010
227 E3 343 11100011
228 E4 344 11100100
229 E5 345 11100101
230 E6 346 11100110
231 E7 347 11100111
232 E8 350 11101000
233 E9 351 11101001
234 EA 352 11101010
235 EB 353 11101011
236 EC 354 11101100
237 ED 355 11101101
238 EE 356 11101110
179
Numeric Equivalents
Decimal Hexadecimal Octal Binary
(Base 10) (Base 16) (Base 8) (Base 2)
239 EF 357 11101111
240 F0 360 11110000
241 F1 361 11110001
242 F2 362 11110010
243 F3 363 11110011
244 F4 364 11110100
245 F5 365 11110101
246 F6 366 11110110
247 F7 367 11110111
248 F8 370 11111000
249 F9 371 11111001
250 FA 372 11111010
251 FB 373 11111011
252 FC 374 11111100
253 FD 375 11111101
254 FE 376 11111110
255 FF 377 11111111
180