Free Essay

Computer Science

In:

Submitted By steven90
Words 2638
Pages 11
Chapter 4:

More on Logical, Information, and Text Functions

Introduction
Logical functions are those that involve Boolean values. The Boolean values are TRUE and FALSE. Some logical functions return a Boolean value as their result, others use the Boolean result of a comparison to choose between alternative calculations.

There are six functions listed in the logical group in Excel 2003 – the functions AND, FALSE, IF, NOT, OR, TRUE – and a seventh in Excel 2007 – the function IFERROR. You’ll see the use of most of these in this lab. First, however, it’s worthwhile to become familiar with the logical operators.

Logical Operators
TRUE and FALSE are common concepts. They are values which pertain to statements. For example, the statement “It is morning.” is either TRUE or FALSE. We recognize that its truth value may change, but at any particular time the statement is either TRUE or FALSE.

What may be hidden here is the existence of an implied comparison. To determine the truth value of any statement we compare our understanding of the meaning of the claim with the facts. Strictly speaking the statement “It is morning.” means the time of day is after midnight and before noon. To decide if it’s TRUE we need to know the actual time of day and compare it to our criteria.

It’s in these comparisons that we use Logical Operators:

|Comparison |Symbol |
|less than |< |
|less than or equal to |= |
|greater than |> |
|less than or greater than | |

A comparison typically involves checking if two values are equal or if one is less than the other, for example. To test if some cell that you have named Price contains a value that is larger than some other cell that you have named oldPrice you would use the comparison Price > oldPrice. If the value in cell Price was indeed greater than the value in cell oldPrice the value of the comparison expression Price > oldPrice would be true, otherwise the value would be false.

Logical Functions
As mentioned above, there are six or seven functions listed in the logical group in Excel.

The functions TRUE and FALSE really do not merit much discussion. They have no arguments, and as such are no different that the Boolean values themselves. In other words, entering the formula
= FALSE() into a cell produces the display FALSE. This same display can be caused by simply entering the word into the cell. So why is there such a function? Unfortunately, if there is a good reason, it’s been lost. We can assume that historically there was a perceived need for these functions and that there has never been a good reason to eliminate them. Whatever the case, we will not use them.

The more traditional Boolean operators are AND, OR, NOT. These are used to build complex Boolean expressions. NOT() is the inverter. It evaluates the Boolean expression that is its argument and returns the opposite value. So

NOT (TRUE) = FALSE NOT (FALSE) = TRUE

AND and OR have the meanings with which you are by now familiar, but note again their implementation as functions rather than operators. We use AND as an operator when we say “The hour is greater than midnight AND less than Noon.” However, in Excel, the formula begins with the function name which is followed by the arguments in parentheses. Assume there is a cell named TimeOfDay which contains the hour portion of the current time. To build an Excel function to determine if it’s morning we need a formula like this:

= AND (TimeOfDay >= 0, TimeOfDay < 12)

Of course, both of these comparisons must evaluate as TRUE in order for the formula to return TRUE – that’s what AND means.

The OR function is implemented in a similar fashion. Suppose, for example, a spreadsheet is used to determine if customers are eligible for an off-hours discount offered between the hours of 10:00 p.m. and 7:00 a.m. It could use the following formula which takes advantage of the fact that Excel stores times in 24-hour format:

= OR (TimeOfDay < 7, TimeOfDay >= 22)

IS Functions
There is another group of useful functions in Excel called Information Functions because they provide information about the cells to which they refer. Not all of these produce Boolean results and are therefore of limited interest to us at this time. These others, however, can be very useful:
|Function |Returns TRUE if |
|ISBLANK (Reference) |Reference refers to an empty cell. |
|ISERR (Reference) |Reference refers to any error Reference except #N/A. |
|ISERROR (Reference) |Reference refers to any error Reference (#N/A, #REFERENCE!, #REF!, #DIV/0!, #NUM!, #NAME?, |
| |or #NULL!). |
|ISLOGICAL (Reference) |Reference refers to a logical Reference. |
|ISNA (Reference) |Reference refers to the #N/A (Reference not available) error Reference. |
|ISNONTEXT (Reference) |Reference refers to any item that is not text. (Note that this function returns TRUE if |
| |Reference refers to a blank cell.) |
|ISNUMBER (Reference) |Reference refers to a number. |
|ISREF (Reference) |Reference refers to a reference. |
|ISTEXT (Reference) |Reference refers to text. |

These functions are often used as the Logical_test in an IF function. For example, it's possible that the cell a formula will use as the divisor might be blank. The formula would then produce an error because the blank cell has value 0, and division by 0 is impossible. To prevent this from happening the formula can be included as one value of an IF, and one of the IS functions can test to see if it should be performed. For example a column called Average could be calculated as follows:
= IF (ISBLANK (Count), "", Total / Count)
This formula "looks" at the current value of Count to see if the cell is empty. If it is, the cell is left blank because "" represents the NULL string, i.e. a string with no characters. Only if the ISBLANK function returns FALSE will the calculation be attempted by Excel.

Of course it might happen that the contents of Count might not be a number. In such a case the ISBLANK function will report FALSE, but the text will evaluate to 0 and the error message will appear. So it might be better to use a different test:
= IF (ISNUMBER (Count), Total / Count, "")
Or if the number might be 0…
= IF (AND (ISNUMBER (Count), Count > 0), Total / Count, "")

Text Functions
Another group of Excel functions help manipulate strings of text. Of the twenty-seven listed in Excel Help we are only interested in a handful at this time.

|LEFT |Returns the leftmost characters from a text value |
|RIGHT |Returns the rightmost characters from a text value |
|MID |Returns a specific number of characters from a text string starting at the position you specify |
|LEN |Returns the number of characters in a text string |
|EXACT |Checks to see if two text values are identical |
|CONCATENATE |Joins several text items into one text item |
|UPPER |Converts text to uppercase. |
|LOWER |Converts all uppercase letters in a text string to lowercase. |
|TEXT |Formats a number and converts it to text |
|VALUE |Converts a text argument to a number |

The LEFT, RIGHT, and MID functions are provided so that a formula can examine the characters at specific positions within a string. For example:
= LEFT (“Hi ho”, 2) returns the string “Hi”. It copies 2 characters from the left end of the string.

Similarly,
= RIGHT (“Hi ho”, 2) returns the string “ho” because it copies 2 characters from the right end of the string.

The MID function has a different form.
= MID (“Hi ho”, 2, 3) produces the string “i h”, i.e. 3 characters starting from position 2.

These can be combined in a variety of interesting ways. For example,
= LEFT (RIGHT (“Hi ho”, 2), 1) returns 1 character from the LEFT end of the string produced by taking 2 characters from the RIGHT end of the original string – the second-last character.

Frequently, we don’t know the contents of the string that will be present. The LEN function returns the number of characters in a string. Here is formula that returns all but the first character from the string stored in ProductCode:
= RIGHT (ProductCode, LEN (ProductCode) -1)

The EXACT function has a Boolean result. It returns TRUE only if 2 strings are exactly the same. It is most useful when the data is case sensitive. Since Excel treats “a” and “A” as the same for purposes of logical comparison, it’s helpful to have a function that can report that they’re different.

Exercise 1
Open the file Lab4_Ex1.xls, Exercise 1 in Support Files (Chapter 4) on the course website. (Sheet 1 should be visible and empty.)

Ex 1.1 1. In A1 type “HI” 2. In A2 type “hi” 3. In A3 type “=A1=A2” This is a formula that will produce TRUE if the cells are the same. 4. In B3 type “=EXACT(A1, A2)”

Note that in Excel being the same is different from being EXACT. Can you think of a good reason for Excel to be designed so that “HI” = “hi”? Write your answer on the worksheet you just created. Rename the sheet.

The CONCATENATE function is used to create strings out of bits and pieces. For example, CONCATENATE(“Hi”,”Ho”) produces “HiHo”.

Ex 1.2
Switch to the Accounts sheet. It lists Surnames and Given Names for a group of fictitious people. Your task is to create another column in which to calculate each person’s user identification number. The rule for these IDs is to join the first letter of the Given Name to the whole Surname, and convert the resulting string to UPPERCASE.

The TEXT and VALUE functions are used to convert data from one type to another. Notice that this is very different from simply applying a format. A format changes the way the data is displayed, but these functions actually change the data. If you display a number as text it can still be used in calculations, but if you change a number into a text string it CANNOT be used to compute further values – unless you convert it back.

Ex 1.3
Switch to the sheet named Binary Conversion. It should look like Figure 4.1.

Figure 4.1 – the Binary Conversion Worksheet
[pic]

The Base cell is used to specify the base of the number that will be Input. When values are entered in the cells the sheet converts from the base specified into Decimal. To do this you will need several formulae.

Normal form is required because Excel will ignore any leading zeroes in the Input. To guarantee that the number has 8 digits it will be necessary to convert it to a string and pad the left end with 0’s as necessary. This can all be accomplished with the TEXT function.
TEXT (value, format_text) value is a numeric value, a formula that evaluates to a numeric value, or a reference to a cell containing a numeric value. format_text is a number format in text form from the Category box on the Number tab in the Format Cells dialog box.
For our purposes we can specify exactly 8 digits using the format specification: “00000000”. The formula for Normal form then is:
= TEXT (Input, “00000000”)
Now that the data is in Normal_form we can create a single formula to extract each digit and place it in the appropriate cell in the range named bit. This formula requires some thought. How can Excel copy characters from a string into different cells? The key to the answer is in the fact that the digits are characters. We can therefore use a TEXT function. The formula will be located in cells C7 through J7. In C7 it needs to select the first character from Normal_form, while in D7 it needs to select the second character, etc. The MID function looks like the best choice.

We know the name of the string and the number of characters needed so the formula will resemble this one:
=MID (Normal_form, start_position, 1)

Of course, the calculation of start_position is still the key.

You might be tempted to simply replace start_position with an integer: 1 in cell C7, 2 in D7, etc. But this is clearly NOT the best way to handle the task. Hard coding literal values in formulae is generally a bad idea. What’s needed is an expression that will generate the appropriate sequence of digits, namely 1 in C7, 2 in D7, etc.

As it turns out, we have a descending sequence of integers just above in the Exponent row. Subtracting a descending sequence from the length of the string will produce the numbers we need. This part can be accomplished with
LEN (Normal_form) – Exponent
So substitute this expression for start_position to complete the formula.

You will also need to write a formula to calculate the cells in the value range. These values are simply the Base raised to the Exponents.

With the value and bit ranges defined you can multiply them together to get the extension values and SUM these to get Decimal.

Binary Addition

Figure 4.2 illustrates a half adder. Its results can be expressed in Boolean algebra as follows:
Sum = A XOR B
Carry = A AND B
Figure 4.2 – a half adder

To express these in Excel requires a little more work. Carry is easy:

Carry =AND(A,B)

but there is no XOR function so you will need to construct a formula to perform the task. An exclusive OR is TRUE when either one of its arguments is TRUE, but not when both are TRUE. The “not both” part is simply NOT(AND( )), so an expression for Sum could look like this:
Sum =AND(OR(A,B),NOT(AND(A,B)))

A full adder (shown in Figure 4.3), of course, has a few more gates, one of which is OR, but this shouldn’t pose any problems.

Figure 4.3 – a full adder
[pic]

While it’s certainly possible to describe each output in a single Boolean expression (and therefore a single Excel formula) these will be very complex. For example, they can be expressed as follows:

Sum =AND(OR(AND(OR(A,B),NOT(AND(A,B))),CarryIn), NOT(AND(AND(OR(A,B),NOT(AND(A,B))),CarryIn)))

Carry out =OR(AND(A, B),AND(AND(OR(A, B),NOT(AND(A,B))),CarryIn)

These are very hard to understand! A better way to implement these formulas is to name and define the output for each logic gate. That way downstream gates can simply use the results of other gates by name. Figure 4.4 shows one way to label the gates.

Figure 4.4 – a full adder
[pic]

In the case above there are 5 gates so we need 5 formulae:

|XOR1 |= AND (OR (A, B), NOT (AND (A, B))) |
|AND1 |= AND (A, B) |
|AND2 |= AND (C, XOR1) |
|Sum |= AND (OR (XOR1, C), NOT (AND (XOR1, C))) |
|Carry |= OR (AND1, AND2) |

Exercise 2
Open the file called Lab4_Ex2.xls, Exercise 2 in Support Files (Chapter 4) on the course website. The adder sheet is a skeleton for a 4-bit adder. Note that the sizes of the rows and columns have been adjusted so that they line up with the diagram as it is currently placed. Of course it can be moved without affecting the operation of the worksheet in any way. You will also notice that names have been defined for each gate. The cells to which these names are applied are behind the picture, so you will need to slide it out of the way to see them. Your task is to make the adder work. You will need to extract the bits from the numbers entered by the user and define formulas for each of the gates. Your final draft might look like Figure 4.5.

Figure 4.5 – a full adder implemented in Excel
[pic]

-----------------------
[pic]

[pic]

Similar Documents

Free Essay

Computer Science

...Computer science is challenging, and yet dynamic. It requires people in the field to keep learning and pushing the limit. That fast-pacing innovation of technology never stops amazing me, which excites my innate curiosity even more. I, however, had never thought about pursuing computer science as a career until I took an AP Computer Science class in my senior year. It sparked my interest and changed my thoughts after seeing what I could do with some simple line of codes. Despite many countless times staring into the monitor trying to figure out how to solve a problem, those “Aha” moments were more precious and exciting for me. For every minute like that, I was exhilarating and smiled as if I have just won an Olympics’ gold medal in a 100-meter racing swim lap. It fed my hunger for exploration to see what else I could do, maybe something beyond my imagination. Computer science gradually became my hobby in my senior year. I searched many online resources to finally find CodingBat, which allowed me to expand my Java knowledge.These experiences slowly pulled me into the course of a new career, computer science, and at The University of North Carolina at Greensboro pursuing a degree in computer science can provide me knowledge and skills to bring change to people’s daily lives starting from mobile application. I want to be a part of this evolution of technology and I hope to meet other creative, friendly, and ambitious people. My dream is to start my own business partnership during...

Words: 293 - Pages: 2

Premium Essay

The Fluidity of Computer Science

...The Fluidity of Computer Science. Gender Norms & Racial Bias in the Study of the Modern "Computer Science" Computer science or computing science designates the scientific and mathematical approach in computing. A computer scientist is a scientist who specialises in the theory of computation and the design of computers. Its subfields can be divided into practical techniques for its implementation and application in computer systems and purely theoretical areas. Some, such as computational complexity theory, which studies fundamental properties of computational problems, are highly abstract, while others, such as computer graphics, emphasize real-world applications. Still others focus on the challenges in implementing computations. For example, programming language theory studies approaches to description of computations, while the study of computer programming itself investigates various aspects of the use of programming languages and complex systems, and human-computer interaction focuses on the challenges in making computers and computations useful, usable, and universally accessible to humans. Computer science deals with the theoretical foundations of information, computation, and with practical techniques for their implementation and application. History The earliest foundations of what would become computer science predate the invention of the modern digital computer. Machines for calculating fixed numerical tasks such as the abacus have existed since antiquity...

Words: 2298 - Pages: 10

Free Essay

Computer Science

...____________________________________ Computer Science, An Overview ------------------------------------------------- Chapter 00 Introduction Read the introduction to the text. The answers to the following questions will appear in order as you read. What is computer science? ------------------------------------------------- The Role of Algorithms What is an algorithm? What are some examples of algorithms? What is a program? What is programming? What is software? What is hardware? Where did the study of algorithms come from? Once you discover an algorithm, do others need to understand it? When does the solution of a problem lie beyond the capabilities of machines? ------------------------------------------------- The History of Computing What are some of the ancestors of the Computer? Eventually, people began using gears for computing. Who are some of the people involved? Which of the men above produced something that was programmable? What were (and are) some uses of holes punched in cards? What kinds of devices replaced gears? What were some early computers? According to the text, what were the first commercially viable computers, and who built them? What happened in 1981? Who wrote the underlying software for the PC? What important development in computers happened as the Twentieth century was closing? What were two big developments for the Internet? (hint, look for the next two bolded phrases) As computers get smaller and...

Words: 406 - Pages: 2

Premium Essay

Computer Science

...From an early age I’ve always been deeply interested in computing. It was my dad, introducing me to the computer systems at his work place that first sparked this interest. I can always remember the feeling of wanting to know just how computers worked, why they worked and what else they could do. This interest never left me, only growing more profound and passionate with every new discovery I made. From communicating with an artificial intelligence to seeing the wonders of the Internet for the first time, computers have left me fascinated with just how much power yet mystery they hold. My studies have all helped me to develop my understanding of the subject. While Computing has given me a greater insight into the business aspects of the computer industry, 
Physics have helped to improve my analytical and evaluative skills. My interest in computing has not been restricted to the classroom. Within the last few months I’ve used the knowledge that I’ve gained over the past twelve years to set up my own computer related business. This has given me a totally new perspective on how certain things function, and how business operates. The writing of a business plan was a totally alien experience for me, but over the course of three months I researched and planned, and finally when the plan was complete I was rewarded with the satisfaction of knowing that I had completed something that most people would never have the chance to do especially at my age. As well as spending time both...

Words: 357 - Pages: 2

Free Essay

Computer Science

...{ int numGrade = 70; char letter = 'F'; if (numGrade >= 80) { if (numGrade >= 90) letter = 'A'; else letter = 'B'; } else { if (numGrade >= 70) letter = 'C'; else letter = 'D'; } } F | F | F | F | F | F | F | F | F | F | F | F | F | F | F | D | D | D | D | D | D | D | D | D | D | D | D | D | D | D | C | C | C | C | C | C | C | C | C | C | C | C | C | C | C | B | B | B | B | B | B | B | B | B | B | B | B | B | B | B | A | A | A | A | A | A | A | A | A | A | A | A | A | A | A | { int numCookies = 0; while (numCookies < 4) { cout << "Daddy, how many cookies " "can I have? "; cin >> numCookies; } cout << "Thank you daddie!\n"; } 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 2 | 2 | 2 | 2 | 2 | 2 | 2 | 2 | 2 | 2 | 2 | 2 | 2 | 2 | 2 | 2 | 2 | 2 | 2 | 2 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 4 | 4 | 4 | 4 | 4 | 4 | 4 | 4 | 4 | 4 | 4 | 4 | 4 | 4 | 4 | 4 | 4 | 4 | 4 | 4 | { int iUp = 0; int iDown = 10; while (iUp < iDown) { cout << iUp << '\t' << iDown << endl; iUp++; iDown--; } } 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 |...

Words: 394 - Pages: 2

Premium Essay

Computer Science History

...Computer science is the scientific and practical approach to computation and its applications. It is the systematic study of the feasibility, structure, expression, and mechanization of the methodical procedures (or algorithms) that underlie the acquisition, representation, processing, storage, communication of, and access to information, whether such information is encoded as bits in a computer memory or transcribed in genes and protein structures in a biological cell.[1] A computer scientist specializes in the theory of computation and the design of computational systems.[2] Its subfields can be divided into a variety of theoretical and practical disciplines. Some fields, such as computational complexity theory (which explores the fundamental properties of Computational and intractable problems), are highly abstract, while fields such as computer graphics emphasize real-world visual applications. Still other fields focus on the challenges in implementing computation. For example, programming language theory considers various approaches to the description of computation, whilst the study of computer programming itself investigates various aspects of the use of programming language and complex systems. Human-computer interaction considers the challenges in making computers and computations useful, usable, and universally accessible to humans. The earliest foundations of what would become computer science predate the invention of the modern digital computer. Machines for...

Words: 284 - Pages: 2

Premium Essay

The Importance Of Computer Science

...the last piece of the puzzle and making everything click is indescribable, a rush of adrenaline runs through my body and for a brief moment I am on top of the world. My brain is wired to enjoy solving problems logically, which is why I have always been so attracted to computer science, a subject founded on problem solving. Every algorithm that runs smoothly, every piece of hardware that configures without issues, every large project that wraps up on schedule, are all small victories that make it all worth it and fill me with purpose. All aspects of a computer’s inner workings are fascinating to say the least, understanding how a device or service functions can shift one’s perspective of the world and make them see their day-to-day menial tasks in a new light, which is what happened to me....

Words: 700 - Pages: 3

Premium Essay

History of Computer Science

...History of Computer Science Name: Kamyll Dawn Cocon Course, Yr. & Sec.: BSMT 1-D REACTION PAPER The topic of the video which is about the history of computer was kind of interesting since it high lightened our mind about where the computer had really came from. Not only have that, it also made us understand how the computers of today became very wonderful and powerful. Before, computers only existed in the imagination of humans and were believed that creating such monstrous device was impossible. It was a huge leap in the field of computer during the 19th century when Charles Babbage developed the 1st modern computer called the difference machine. The most advantageous feature of this machine is that it reflected Babbage’s attitude of being a perfectionist. Although his work was not finished, the detailed text that was written by Ada was significant in modifying his versions and for documentary purposes of his work. The rapid increase of the American population, on the other hand, triggered the development of a machine that will help the census tabulate such population very fast. Hermin Horrith’s occupation was very helpful to the development of this machine since he used business to gain money to revise his machine which had later evolved into the international business machine. Although war causes devastation to the environment as well as the people involved, it also had contributed to the development of computers, which is the birth of ENIAC, the first large-scale...

Words: 339 - Pages: 2

Premium Essay

Computer Science

...CIS101-012 Computer Fundamentals Professor Robotham Wallace, Brein Assignment#1 Date Assignment Given: 9/17/14 Due Date: 9/29/14 Brein Wallace Check Point Assignment #1 True/False True - Electronic components in computers process data using instructions, which are the steps that tell a computer how to perform a particular task. False - Screens for desktops cannot yet support touch. False - Smaller applications, such as at home, typically use a powerful, expensive server to support their daily operations. True - Smartphones typically communicate wirelessly with other devices or computers. False - Data conveys meaning to users, and information is a collection of unprocessed items, which can include text, numbers, images, audio and video. False - As widespread as computers appear to be, most daily activities do not involve the use of or depend on information from them. False - A scanner is a light sensing output device. False - Because it contains moving parts, flash memory is less durable and shock resistant than other types of media. The terms, web, and internet are interchangeable. True - One way to protect your computer from malware is to scan any removable media before using it. True - Operating systems are a widely recognized example of system software. True - You usually do not need to install web apps before you can run them. Multiple Choice 1. An INPUT DEVICE is any hardware component that allows you...

Words: 808 - Pages: 4

Premium Essay

Computer Science

...Von Neumann was a founding figure in computer science.[49] Von Neumann's hydrogen bomb work was played out in the realm of computing, where he and Stanislaw Ulam developed simulations on von Neumann's digital computers for the hydrodynamic computations. During this time he contributed to the development of the Monte Carlo method, which allowed solutions to complicated problems to be approximated using random numbers. He was also involved in the design of the later IAS machine. Because using lists of "truly" random numbers was extremely slow, von Neumann developed a form of making pseudorandom numbers, using the middle-square method. Though this method has been criticized as crude, von Neumann was aware of this: he justified it as being faster than any other method at his disposal, and also noted that when it went awry it did so obviously, unlike methods which could be subtly incorrect. While consulting for the Moore School of Electrical Engineering at the University of Pennsylvania on the EDVAC project, von Neumann wrote an incomplete First Draft of a Report on the EDVAC. The paper, whose public distribution nullified the patent claims of EDVAC designers J. Presper Eckert and John William Mauchly, described a computer architecture in which the data and the program are both stored in the computer's memory in the same address space.[50] John von Neumann also consulted for the ENIAC project, when ENIAC was being modified to contain a stored program. Since the modified ENIAC was...

Words: 625 - Pages: 3

Premium Essay

A Career In Computer Science

...From childhood computers caught my eyes. There was something about them that always attracted my interest. Starting from paint, games , and then finally LOGO, my first ever experience with a programming language. It changed my whole perception about what we can do with computers. Gradually, in my high school I moved on to languages like C, Visual Basic, and C++ . This raised my interest towards computes more and it made me opt for Computer Science as my field in undergraduate course , in Maharaja Surajmal Institute Of Technology. In 2nd year I excelled in courses like software engineering and, java and web development, computer networks, computer architecture, database management system. These subjects fascinated me to so extent that I have...

Words: 886 - Pages: 4

Premium Essay

Computer Science

...(Passwords) One of windows vulnerabilities is that user accounts may have weak, nonexistent or unprotected passwords. The operating system and some third-party applications may create accounts with weak or nonexistent passwords. This in turn causes data to be vulnerable and with respect to user data it could be very damaging to a user’s organization if data is lost or removed without warning by an attacker. Also the connection of these systems to a shared network or perhaps the internet in the scenario of a business organization leaves the system vulnerable to an attacker. With respect to the data that is being sent across the network, there are certain countermeasures that could be taken, such as encrypting data that resides on the computer by using some well-known cryptographic algorithms currently being implemented to secure the system data even after password has been bypassed. Encrypting data provides a level of assurance that even if data is compromised, it is impractical to access the plaintext without significant resources, however controls should also be put in place to mitigate the threat of data exfiltration in the first place. Many attacks occur across a network, while others involve physical theft of laptops and other equipment holding sensitive information. Yet, in most cases, the victims are not aware that the sensitive data are leaving their systems because they are not monitoring data outflows. The movement of data across network boundaries both electronically...

Words: 2126 - Pages: 9

Premium Essay

Computer Science

...Computer architecture covers the design of system software, such as the operating system (the program that controls the computer), as well as referring to the combination of hardware and basic software that links the machines on a computer network. Computer architecture refers to an entire structure and to the details needed to make it functional. Thus, computer architecture covers computer systems, microprocessors, circuits, and system programs. Typically the term does not refer to application programs, such as spreadsheets or word processing, which are required to perform a task but not to make the system run. In designing a computer system, architects consider five major elements that make up the system's hardware: the arithmetic/logic unit, control unit, memory, input, and output. The arithmetic/logic unit performs arithmetic and compares numerical values. The control unit directs the operation of the computer by taking the user instructions and transforming them into electrical signals that the computer's circuitry can understand. The combination of the arithmetic/logic unit and the control unit is called the central processing unit (CPU). The memory stores instructions and data. The input and output sections allow the computer to receive and send data, respectively. Different hardware architectures are required because of the specialized needs of systems and users. One user may need a system to display graphics extremely fast...

Words: 752 - Pages: 4

Free Essay

Computer Science

...Social Issues and Ethics in Computer Science and Engineering Introduction Therac –25 is a medical linear accelerator that was developed by AELC .A linear accelerator (linac) is a particle accelerator, a gadget that increases the energy of electrically charged atomic particles. Linacs are use mainly in hospitals to treat cancer patients .During treatment a patient is exposed to beam of radiation in doses designed to kill a malignancy.(Grolier, 1985) The Software Engineering Code of Ethics and Professional Practice is a practical frame- work for moral decision-making related to problems that software engineers may encounter. (Quinn, 2013) Between June 1995 and January 1987, six patients were seriously injured and some killed by poor administration of radiation from the Therac-25 medical linear accelerator. This paper therefore seeks to explore the causes behind the accidents, the software bugs that were associated with the machine. In addition the paper will also cover some of list the clauses that are violated in the code of ethics of software engineering and explain how they relate to the action or inaction that led to the overexposure incident Technical errors in Therac-25 software One of the major weaknesses that is associated with Therac-25 software was in the lack of formal testing procedures. As results certain errors remained in the software as the product got distributed to the consumers. One of the errors that...

Words: 774 - Pages: 4

Free Essay

Computer Science

...Positive and Negative Impact of Computer in Society The Social Impact of Computer in Our Society From the time of the invention of the computers to the present day, computers have met tremendous changes. Time to time incorporation of the latest technical achievement has made the use of computer easier. More and more application have been developed and almost all the areas of the professions have been computerized. Computerization is continuously becoming an important part of many organizations. Computer have proved almost all the fields whether related to numeric processing or non numeric processing or document processing in the developed countries and all the walks of life. Computers have become the part of every organization.  Beneficial or Positive Impact of Computer in our Society * Any professional individual like doctors, engineers, businessmen etc. undergo a change in their style or working pattern after they get the knowledge of computer. * An individual becomes more competent to take a decisions due to the computer because all the information required to take the decision is provided by the computer on time. As a result, any individuals or institutions get success very fast.  * The person working at the managerial level becomes less dependent on low level staff like clerks and accountants. Their accessibility to the information increases tremendously. This improves their working patters and efficiency, which benefit the organization and ultimately affects the...

Words: 2409 - Pages: 10