-Data is the lowest level of knowledge and information is the second level
-Data by itself alone is not significant. Information is significant by itself.
-Observations and recordings are done to obtain data while analysis is done to obtain information.
2. Discuss how computer represents data and basic units of measuring information (up to GB):
Computer represents data using binary numeral system: - bit= binary unit (to 256) - bute- 8 bits - kb= 1024 byrtes - mb= 1024 Kb - gb= 1024 mb 3. Compare ASCII, EBCDIC and Unicode:
ASCII- American Standard Code for Information Interchange ASCII is a 7 digit (7- bit) code EBCDIC-Extended Binary- Coded Decimal Interchange Code (INM mainframes) EBCDIC- represents each character as a unique combination of 8 bits 8 bites=256 unique combinations Unicode- Universal International coding standard design to represent text based data. Unicode identifies each character using, 0s and 1s. It’s a larger code, consisting of 1 to 4 bytes
4. Discuss the difference between computers:
Mainframe-used by large organizations (hospital, university, bank, government offices) -manages a large amount of fertilized data. - located in climate-controlled data centers and connect to the rest of the company computers .via computer network
Supercomputer:
-$2 mil -\220 million - 50 – 50000 times faster than PC. - A large number of processors interconnected by a network. Small (microcomputers or pc)
-$500- $7000
- Desktop computers and work stations
- Laptop Computers
- Notebook Computers
- Palmtop Computers
• Server is a computer program running to serve the request of other programs
• Workstation
-high-end desktop or deskside microcomputer designed for technical applications.
-intended to be used by one person at time.
-popular for engineering, science and graphics
7. Briefly describe major hardware components:
• {Major} Central Processing Unit
-the chip located in the motherboard of a computer that performs the processing for a computer.
• Input devices: keyboard, mouse, scanner, microphone, webcam, touchscreen.
• Output devices: printer, monitor, projector, speakers, headphones
8. Give examples of volatile and non-volatile memory and discuss the differences. Volatile: RAM
When your electricity go out you will lost all of your data. When you shut down the computer info that haven’t saved destroys. Non-volatile: ROM
-The data is saved to a hard drive or flash drive
-All data that stored in this type of memory will retain when you shut down your computer.
9. Differences between RAM and ROM.
RAM (Random Access Memory)
• Temporary storage for a data, programs and the operating system while you are using PC
• It is volatile, meaning that the contents of memory are lost forever when computer is shut off
ROM (Read Only Memory)
• Consists of non-erasable hardware modules that store program instructions
• It is non-volatile (that is “only read”)
10) Cache Memory
Extremely fast memory that is built into CPU.
-In a typical processor it is volatile
-On hard drives it is nonvolatile
Registers
_Built into CPU high-speed memory
-Store data and intermediary results, temporally during processing
11) Advantages of using multi-core CPUs
-Contains the processing components all cores of multiple independent processors on a single CPU (Allows computers to work simultaneously or more that one task at a time)
12) Briefly describe how CPU works?
-CPU sits in the motherboard as the central unit. When a function program or peace of data is called, the CPU pulls the date from random access memory and any other hardware in order to process it.
-The CPU reads the instructions associated to the task before sending it back to RAM
13.Approaches for making faster and better computer: Improved architecture, Improved materials,
Pipelining Improved Multiprocessing and parallel processing
Improved architecture (smaller components, faster bus speeds, multiple CPU cores, etc.)
■ Improved materials (new backing materials, flexible circuits, etc.)
■ Pipelining: allows multiple instructions to be processed at one time
■ Multiprocessing and parallel processing: use multiple processors to speed up processing
14 Future trends in computing. Nanotechnology:quantum computing and operating computing the science of creating tiny computers and components (less than 100 nanometers in size
■ Some components today fit this definition
■ In the future, components may be built by working at the individual atomic and molecular levels
■ Quantum computing: a technology that applies the principles of quantum physics and quantum mechanics to computers
■ Optical computer: a computer that uses light, such as from laser beams or infrared beams, to perform digital computations
■ Opto-electronic computers use both optical and electronic components 3D chips: layer transistors to cut down on the surface area required
I5. Future trends in computing. Silicon photonics,terascale computing, and 3d chips.
Silicon Photonics is an emerging technology using standard silicon to send and receive optical information among computers and other electronic devices. The technology aims to address future bandwidth needs of data-intensive. In tera scale computing processors will consist of 100s of cores and are capable of performing trillions of calculations per second! Machines will become so powerful that none has imagined today. 3D multi-core chips will use up less energy and generate less heat. The 3D chips will most likely be mass produced for server applications before spreading to the mainstream computer electronics world.
16) Random Access,
Random Access, means that data can be retrieved directly from any location on the storage medium, in any order.
Sequential access- data can be retrieved in the order in which it is physically stored on the medium.
17) Magnetic Hard drive
- A hard drive consisting of one or more magnetic disks permanently sealed with an access mechanism/ write heads inside its drive.
Solid-stated drive ( SSD) a hard drive that uses flash memory instead of metal magnetic hard disks.
18. RAID
: a storage method that uses several hard rives working together.
Purpose: 1. To increase performance, 2. To protect critical data on storage.
Techniques: 1. Disk stripping, 2. Disk mirroring
19) CD,,DVD,,HVD
CD-700mb (0.7GB) single layer red laser, cheap, outdated for delivering music, software storing data.
DVD-(Digital Versatile Disk), 4,7 GB (DVD-5)-single layer) 8.5 GB (DVD-9)-dual layer, 9.4 GB – Double sided disk laser current, cheap. For software, movies, data.
Blu-Ray, 25 Gb(Single layer), 50 Gb(double layer), may support up to 6-8 layers in the future, blue laser, quite expensive. For high definition movies, HDTV, data.
HVD(Holographic Versatile Disk) 3,9 Tb, 2 lasers, very expensive, emerging.
20. flash memory – a chip=based storage medium that store data using electrons mobile phones, PDAs, laptop computers, digital cameras flash memory card – a small rectangular flash memory medium.
21. INPUT: OUTPUT: devices
INPUT:
- keyboard – an input device containing numerous keys that can be used to input letters, numbers…
- painting and touch devices – an input device that moves an on-screen pointer to allow the user to select objects on the screen (mouse, pen, touch screen)
-scanners- an input device that reads printed text and graphics and transfers them into a computer in digital form.
OUTPUT:
-printers – quality measured by dots per inch(dpi), speed is measured in pages per minute(ppm) types: laser printer (use toner powder), ink jet printers(use liquid ink), special purposes printer (photoprinter, 3D printer)
-Video card – installed inside computer or directly into motherboard, determines graphic capabilities of the computer.
-computer speakers: used to output sound from a computer
22. Scanners:
a. flatbed scanners-used to input photos, sketches, slides, book pages and other relatively flat documents into the computer
b. portable scanners – used to capture small amounts of text, the text is Typically transferred to a computer a later time.
c) integrated scanners – built into other devices, such as into the ITM machine shown here to capture images of deposited checks.
23→ printers in 21
24. CRTs are bigger and bulkier than LCD, they consume more power and prone to screen flicker. LCD monitors are more expensive than CRTs, they introduce the problem of viewing angles and generally have less accurate color replication.
OLED (organic light emitting diode) – display functions without a backlight. Thus it can be thinner and lighter than LCD
SOFTWARE
Types of operating systems
1.Mainframe OS (OS/390,Os/360) for room size
Server OS(windows/MacOS/Linux server) computers, that serve multiple users at ones over a network and allow the users to share hardware and software resourses
2. briefly describe any op. sys.
Windows: has been the predominant personal operating system for many years and still holds about 90% of the market. Windows95, Windows NT, Windows Me, Windows2000, WindowsXP, WVista, WSeven
3. Real Time
: is multitasking operating system that aims at executing real time applicaations.
-uses specialized scheduling algorithms so that they can achieve a deterministic nature of behavior
-the main object is quick and predictable response to events.
Embedded – designed to be used in the embedded computer systems
- Operates on small machines like PDAs with less authonomy
- Operates with limited number of resources
4. Personal computer OS (Windows 3.1,99,98,2000,XP,Vista,MC,Mac OS , linux)
-provide a good interface to a single user
-widely used for word processing, spreadsheets and Internet access
5,6 Opean Sourse is an approach to design,development and distribution offering practical accesability to a product's sourse code
Open sourse software (OSS) projects are built and maintained by a network of volunteer programmers
EX:
- Linux operating system-free open sourse unix like oS
- Open office org. office suite, which include word processor, spreadsheet, DBMS and presentation graphic software
-Mozilla Firefox, Internet browser
-Apache HTTP server
9. what is the dif appl and sys software
(8)system software:
-a set of generalized programs
-manages the resources of computer(CPU, input/output, storage devices)
-mediates between applications software and computer hardware
(7)Appl software
-programs to perform specific functions specified by end users(Excel, Word, access, Power Point)
-appl software must work through the system software to operate the computer.
1. The Difference Between the Internet and World Wide Web
What is The Internet?
The Internet is a massive network of networks, a networking infrastructure. It connects millions of computers together globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Internet. Information that travels over the Internet does so via a variety of languages known as protocols.
What is The Web (World Wide Web)?
The World Wide Web, or simply Web, is a way of accessing information over the medium of the Internet. It is an information-sharing model that is built on top of the Internet.
The Web is just one of the ways that information can be disseminated over the Internet. Usenet news groups, instant messaging and FTP. So the Web is just a portion of the Internet, albeit a large portion, but the two terms are not synonymous and should not be confused
2. TCP/IP
The Internet Protocol Suite is the set of communications protocols used for the Internet and other similar networks. It is commonly also known as TCP/IP named from two of the most important protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were the first two networking protocols defined in this standard. Modern IP networking represents a synthesis of several developments that began to evolve in the 1960s and 1970s, namely the Internet and local area networks, which emerged during the 1980s, together with the advent of the World Wide Web in the early 1990s. The Internet Protocol Suite consists of four abstraction layers. From the lowest to the highest layer, these are the Link Layer, the Internet Layer, the Transport Layer, and the Application Layer.[l][2] The layers define the operational scope or reach of the protocols in each layer, reflected loosely in the layer names. Each layer has functionality that solves a set of problems relevant in its scope
3. Internet protocol address
An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication^I] An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there."
4. Web server
A web server can be referred to as either the hardware (the computer) or the software (the computer application) that helps to deliver content that can be accessed through the lntemet.[l]
The most common use of Web servers is to host Web sites but there are other uses like data storage or for running enterprise applications.
5. HTTP
Short for HyperText Transfer Protocol, the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. For example, when you enter a URL in your browser, this actually sends an HTTP command to the Web server directing it to fetch and transmit the requested Web page
6. hyperlink
The most common example of hypertext today is the World Wide Web: webpages contain hyperlinks to webpages. For example, in an online reference work such as Wikipedia, many words and terms in the text are hyperlinked to definitions of those terms. Hyperlinks are often used to implement reference mechanisms, such as tables of contents, footnotes, bibliographies, indexes and glossaries.
In some hypertext, hyperlinks can be bidirectional: they can be followed in two directions, so both ends act as anchors and as targets. More complex arrangements exist, such as many-to-many links.
7. URL
Abbreviation of Uniform Resource Locator, the global address of documents and other resources on the World Wide Web. The first part of the address is called a protocol identifier and it indicates what protocol to use, and the second part is called a resource name and it specifies the IP address or the domain name where the resource is located. The protocol identifier and the resource name are separated by a colon and two forward slashes.
8. top-level, second-level
The top-level domains (TLDs) are the highest level of domain names of the Internet. They form the DNS root zone of the hierarchical Domain Name System. Every domain name ends in a top-level or first-level domain label. When the Domain Name System was created in the 1980s, the domain name space was divided into two main groups of domains.[3] The country code top-level domains (ccTLD) were primarily based on the two-character territory codes of ISO-3166 country abbreviations. In addition, a group of seven generic top-level domains (gTLD)
You May Also Find These Documents Helpful
-
Quantitative research accumulates information in numerical structure which can be put into classifications, or in rank request, or measured in units of estimation. This kind of information can be utilized to build charts and tables of crude information. Analyzes normally yield quantitative information, as they are concerned with measuring things. On the other hand, other examination routines, for example, perceptions and surveys can deliver both quantitative and qualitative data.…
- 129 Words
- 1 Page
Satisfactory Essays -
All of the servers will be virtual, and a backup of each server will be refreshed weekly and saved to cloud storage. All company data will be backed up and saved to cloud storage daily. All users requiring remote access will have a VPN set up with strict login requirements. These users will also have their laptops checked by the IT department on a monthly basis to ensure that they are in compliance with company security policy.…
- 348 Words
- 1 Page
Satisfactory Essays -
1. One megabyte equals approximately 1) 1,000 bits 2) 1,000 bytes 3) 1 million bytes 4) 1 million bits 5) 2,000 bytes 2. Data going into the computer is called? 1) Output 2) Algorithm 3) Input 4) Calculations 5) Flowchart 3. Which of the following refers to the memory in your computer? 1) RAM 2) DSL 3) USB…
- 5339 Words
- 22 Pages
Powerful Essays -
2. Currently the company does not run a network, nor does it have any servers. A stand-alone machine is connected to the Internet, which is the only connection to Web/e-mail connection. USB flash drives are used to share information.…
- 3232 Words
- 10 Pages
Powerful Essays -
6. A user file has opened a word processor, typed the numbers 123456789, and stored the document as a file called report 1. Which of the following determines, in part what bits the computer stores in the file to represent the text typed into the report.…
- 1315 Words
- 6 Pages
Good Essays -
6. A user has opened a word processor, typed the numbers 123456789, and stored the document as a file called report1. Which of the following determine, in part, what bits the computer stores in the file to represent the text typed into the report?…
- 527 Words
- 3 Pages
Satisfactory Essays -
6. A user has opened a word processor, typed the numbers 123456789, and stored the document as a file called report1. Which of the following determines, in part, what bits the computer stores in the file to represent the text typed into the report?…
- 856 Words
- 4 Pages
Good Essays -
We all know that digital electronics use the binary number system. However, with new computers containing 32, 64, and even 128 bit data busses, displaying numbers in binary is quite cumbersome. For example, a single piece of data on a 64-bit data bus would look like this:…
- 412 Words
- 4 Pages
Good Essays -
|audio, video |binary digits that can be stored & used by a computer. |ordered and given meaning to people. |…
- 14598 Words
- 59 Pages
Powerful Essays -
1. The researchers analyzed the data they collected as though it were at what level of measurement?…
- 600 Words
- 3 Pages
Better Essays -
The third numbering system that computers use is hexadecimal system, which is complex than the other two numbering systems. This refers to the base16 number system that consists of 16 symbols. The numbers are 0 to 9 and the letters A to F. The decimal number 15 is represented as F in the hexadecimal numbering system. The hexadecimal system is useful because it can represent every byte as two consecutive hexadecimal digits. It is easier for people to read hexadecimal numbers than binary numbers.…
- 315 Words
- 2 Pages
Satisfactory Essays -
* Measurement is an important skill used for data collection and data analysis. Careful attention to the accuracy and degree of uncertainty of each measuring device is necessary for proper data collection. Significant figures are used to record or report measurements accurately.…
- 625 Words
- 3 Pages
Good Essays -
A: It is a method to keep accurate information, the observation has all details recorded.…
- 304 Words
- 2 Pages
Satisfactory Essays -
(b) State the problem that will occur if a computer is to store the result as a byte.…
- 1437 Words
- 13 Pages
Satisfactory Essays -
Recording is a vital part of all kind of transactions. The widespread use of computers broadened the scope of recording process, and the term data processing now frequently encompasses recording. Data processing, in computer science is the analysis and organization of data by repeated use one or more computer programs.…
- 635 Words
- 3 Pages
Good Essays