Free Essay

Computer and Technology

In:

Submitted By shahirawahab
Words 719
Pages 3
Exercise 2

Question 1 a) To lower the cost of of providing computing capability, time-sharing and multiprogramming made it possible for individuals and organizations to use ocmputer without owning one (such as in Internet Cafes, laborities in school, etc.). It also promotes the interactive sense of using computers. Some computer laboratories in schools as an instance. Because users share the system simultaneously, they have the opportunity to copy other user's file from the system. Once a user saves a file to his/her unit, other users of that group or connected system may also have an access to the file. Other users may change an information inside the file or even steal the file from the owner itself without the owner knowing it. They may also modify the files or programs that was saved or ran by the owner. Furthermore, some of the threats that the owner of a certain file may encounter is the data confidentiality. Without him not being aware of the system used as the time-sharing and multiprogramming, he may insert or have a secret or confidential data that he wants to remain at the file. Another one is the data integrity. Other users may change, add, or even remove some information in the file if he wants to. Internet cafes also have a multiprogramming and time-sharing environment. Some internet cafes have hardwares like printers that is also connected with the system. State that a certain user is asking the attendant to print a certain file form his unit. The file now is being printed. There comes this another user that accidentally hit the print button and clicked OK, so the file is being processed to be printed. The result is, it will interrupt the current printing process . It will cause the printer to mix output in printing the data because the other user is now accidentally printing his own file. Because they also share system resources, it will interrupt other current processing files.

b) A time-share machine is interactive and is used by many users and performs different functions or tasks while a dedicated machine's purpose is to serve one primary function or task. We can not ensure the same degree of security because they are used in different ways and since human's security protection can be also hacked, broked, or damaged by others, it will be more difficult to for users to know the right usage and controls of the machines. For example, an automobile which is a dedicated machine will have its own level of security because it's usage is dedicated solely to the navigation of the car which is not the same with the time-shared machines which can be accessed by others if and only if the authority or the main system implements a certain security for the protection of the files.

Question 2
a. Mainframes : memory and CPU resources, storage, network bandwidth.
b. Workstations : memory and CPU resouces c. Handheld computers : power consumption, memory resources.

Question 3

When there are few other users, the task is large, and the hardware is fast, time-sharing makes sense. The full power of the system can be brought to bear on the user’s problem. The problem can be solved faster than on a personal computer. Another case occurs when lots of other users need resources at the same time.A personal computer is best when the job is small enough to be executed reasonably on it and when performance is sufficient to execute the program to the user’s satisfaction.

Question 4

For real-time systems, the operating system needs to support virtual memory and time sharing in a fair manner.For hand held systems,the operating system needs to provide virtual memory, but does not need to provide time-sharing. Batch programming is not necessary in both settings.

Question 5 Symmetric multiprocessing treats all processors as equals, and I/O can be processed on any CPU. Asymmetric multiprocessing has one master CPU and the remainderCPUs are slaves. The master distributestasks among the slaves, and I/O is usually done by the master only.Multiprocessors can save money by not duplicating powersupplies,housings, and peripherals. They can execute programs more quickly and can have increased reliability. They are also more complex in both hardware and software than uniprocessor systems.

Similar Documents

Premium Essay

Computer Technology

...Final Project: Expository Essay Samantha A. Medina University of Phoenix Final Project: Expository Essay Computer technology has developed tremendously over the decades and centuries to become so modern in every aspect including education and personal leisure. It is breath taking to see how modernized out computer technology is today as opposed to the limited computer technology that was available in history. The changes that have occurred over history to today will be discussed and focused upon in this essay. The Mechanical Era: Early Computing Devices The Abacus The abacus was the first machine to be used computational science. It is considered to be the first computer. This machine was inspired by one of Charles Babbage’s designs. The abacus could process 15 digit numbers and calculate fourth-order differences. In 1885 the machine won gold medal at an exhibition in Paris and also helped calculate the orbit of mars! The abacus is still in use today. Imagine that a computing device from centuries ago still being used to this day! Charles Babbage Charles Babbage was an English mathematician, philosopher, inventor and mechanical engineer ("Charles Babbage", 2012). Babbage is known to have invented the first programmable computer. As stated earlier his design inspired the abacus and other complex designs. He won the Gold Medal of the Royal Astronomical Society for inventing an engine for calculating mathematical and astronomical tables. Babbage was also Lucasian Professor...

Words: 1624 - Pages: 7

Free Essay

Computer and Technology

...Opportunity[edit] See also: Global digital divide, Digital divide and Global Internet usage Developing countries lag behind other nations in terms of ready access to the internet, though mobile access has started to bridge that gap. Access to computers, or to broadband access, remains rare for half of the world's population. For example, as of 2010, on average of only one in 130 people in Africa had a computer[2] while in North America and Europe one in every two people had access to the Internet.[3] 90% of students in Africa had never touched a computer.[4] Local networks can provide significant access to software and information even without utilizing an internet connection, for example through use of the Wikipedia CD Selection or the eGranary Digital Library. Focusing on Africa[edit] Exploring the Introduction of Computer Technology in Africa[edit] Africa presents a unique cultural climate for the introduction of computer technology not only because of its diverse population, varied geography and multifaceted issues but also because of it singular challenges. Africa is composed of 53 countries many gaining independence since 1950 containing 75 unique ethnic groups and approximately 700 million people. It has been colonized and hence influenced strongly by the European’s from France, Portugal, Britain, Spain, Italy and Belgium except for the countries of Ethiopia and Liberia. Martin & O’Meara [5] describe Africa’s diversity and some of the issues that is...

Words: 967 - Pages: 4

Premium Essay

Computer Technology

...study As we move into the 21st century, technology has greatly improved and has become better. It is continuously growing and changing in many aspects until now. It makes the people’s life easier than the usual and is greatly helpful and useful especially to the students. Technology invented gadgets like computers and laptops that students can use in their studies. These gadgets changed how students learn, process and obtain new or old information. These can also use when it comes to finishing their task and completing their school works because students can freely visit many educational websites. Students can also play educational games, which can help them improve their critical thinking and problem-solving skills. However, technology has also negative effects like other things. Like computers, instead of using it for research purposes, students tend to use it for playing games like DOTA and Couter Strike. Students also use it for just viewing or signing in their social networking pages. Computer is a factor that distracts or steals away the attention or the focus of the students in their studies. Students abuse the power of technologies. Computer technology has positive and negative effects in the lifestyle of the students. Computer were invented to help students and not the be abused by the students which brings negative effects. But, majority of the results that were gathered presents that most students agree that computer technology is a good material that helps in the study...

Words: 683 - Pages: 3

Free Essay

Computer Technology

...Rhubes Severe Computer Technology Have you ever heard of the expression “necessary evil?” If it is evil, how can it be necessary? Well, there are some things that are necessary but not necessarily easy. People sometimes call “evil” the things that they find difficult or complicated. Thus, a “necessary evil” may be a thing that needs to be done for a greater good but that it may not be easy at first. The incursion of technology and computers in our everyday lives seems to be one of those “necessary evils” that we all have to deal with at one time or another. Today, technology is an integral part of schools in America. Teachers need to learn to use technology in the classroom in order to teach. Children become acquainted with technology in a safe learning environment with their teachers at school. Students are also expected to learn to use computers and interact with some educational software. The child’s homework often includes reports, research and or presentations using technology. Since children become some kind of experts with computers and interact with a variety of software at an early age, they see computers a little less challenging than an adult with little experience in computers. Technology has also made its place among the needful things to have at home. Parents often times feel the need to provide the technology that the child requires in order to do homework and to help the child study. That way, parents end up learning the technology first in order to...

Words: 464 - Pages: 2

Premium Essay

Computer Technology

...Computer Technology Since the beginning of time technology has helped us out as a human race. From the invention of the wheel to the Internet, technology has been a great factor on the way our civilization has grown. With more and more technological advances just around the corner, our civilization will continue to grow faster and faster than ever before. Computers make life easier for people every day. They help us to do tasks quicker and communicate with friends and family with the click on a button. Computers play a significant role in the school system as well. They help students to learn more efficiently and help them do their work. Computers offer the Internet which helps students research information for projects they may have. School computers also offer programs which can help anyone learn. An example of this is the program All the Right Type. This program helps students as well as teachers, to learn how to type faster and more efficiently. Also there are other programs which younger students can go on to help them with developing and reinforcing their math skills and reading skills. Programs like Math Circus and matching the word with the picture. Programs like these make it easy to understand and use computers, yet it also makes learning fun. Computers also make writing and doing homework easier to complete. With spell check and other spelling tools, it makes it easier and faster to complete work. This is because you are not spending all your time going through your...

Words: 668 - Pages: 3

Premium Essay

Computer Technology

...Computer technology is advancing at a rapid rate, causing the diversity and availability of assistive technology computer resources to have a tremendous impact for special education students across the United States. Assistive technology provides an opportunity for students with physical, emotional, and mental disabilities to acquire universal access to tools and opportunities for learning. Despite studies showing the benefits of assistive technology, many school districts fail to achieve the fullest potential that assistive technology can offer. This paper will define assistive technology, identify several obstacles of effective implementation, and present various approaches to overcoming those obstacles.  Assistive technology is defined as "any item, piece of equipment, or product system, whether acquired commercially off the shelf, modified, or customized, that issued to increase, maintain, or improve functional capabilities of individuals with disabilities" (Individuals with Disabilities Education Act, 1997). “Is society too dependent on technology?” Tom thought to himself as he drove to Colorado. He was on a family trip to visit his parents. It was a long trip and he had never been there before so he decided to use his navigation system to get there. He typed in his destination and headed to Colorado. On the way, his four-year-old son threw a juice cup, which spilled all over the navigation system. He did not think he would need a map, and now his family and he are stranded...

Words: 1746 - Pages: 7

Premium Essay

Computer Technology

...Computer Technology Being a kid sitting around with your friends, there was always that one person this said, do you think this will ever happened? When I grow up all I will have to do will say door open to get in my house, everything else will be done for me. now, much to my surprise this day has now arrived. The arrival and utilization of computers in today's world is absolutely unbelievable. Things can be done with computers that could have never been done in the past. we have security systems that don't need keys, cell phones that could go on line, and receptionists are now virtually unknown due to automated voice systems. the question that everyone wants to know is, our we too dependent on computers, and what will happen when they fail us? this is an idea that nobody really likes to discuss. Going further in-depth with this idea, what have computers done to the business world. many people feel it has enhanced businesses of today's society, others feel it has ruined them. there now companies being run by very few workers due to fully automated systems, systems that need one operator a and it can produce more than that of 15 to 20 a lot of cases. what this does the company's is forces them to put new technological advances in their budget to keep up with competition and be more cost effective. This is exactly why the technology is there, to get one step ahead of the competition, and to produce more product, more often. Integrating computers into assembly lines...

Words: 1040 - Pages: 5

Free Essay

Computer Technology

...earphones, microphone and speaker jacks which come color coded. * * Serial, Parallel, Game ports | * USB(Universal Serial Bus) | * Mouse and Keyboard | * SCSI | * NIC( Network Interface Card) | * IEEE 1394 | * Modem | * Multimedia | * Video | | * Serial port: a socket that can be used for connecting devices that send data one bit at a time; often used for connecting the mouse or a modem. * Parallel port: a socket that can be used for connecting devices that send and receive data at more than one bit at a time; often used for connecting printers. * USB: an external serial bus interface standard for connecting peripheral devices to a computer. Up to 127 devices simultaneously connected to computer. * SCSI: a standard for computer interface ports featuring faster data transmission and greater flexibility than normal ports. I think that this video clip gave me a better understanding of the ports and connectors and the devices used for those respectfully. Understanding the 3 types of USB devices and IEEE 1394 cable was a little confusing but I grasped it. I will use...

Words: 810 - Pages: 4

Free Essay

Computer Technology

...JEKIE YEAKPEE 06/24/143 . September, 1987 Any discussion of computer architectures, of how computers and computer systems are organized, designed, and implemented, inevitably makes reference to the "von Neumann architecture" as a basis for comparison. And of course this is so, since virtually every electronic computer ever built has been rooted in this architecture. The name applied to it comes from John von Neumann, who as author of two papers in 1945 [Goldstine and von Neumann 1963, von Neumann 1981] and coauthor of a third paper in 1946 [Burks, et al. 1963] was the first to spell out the requirements for a general purpose electronic computer. The 1946 paper, written with Arthur W. Burks and Hermann H. Goldstine, was titled "Preliminary Discussion of the Logical Design of an Electronic Computing Instrument," and the ideas in it were to have a profound impact on the subsequent development of such machines. Von Neumann's design led eventually to the construction of the EDVAC computer in 1952. However, the first computer of this type to be actually constructed and operated was the Manchester Mark I, designed and built at Manchester University in England [Siewiorek, et al. 1982]. It ran its first program in 1948, executing it out of its 96 word memory. It executed an instruction in 1.2 milliseconds, which must have seemed phenomenal at the time. Using today's popular "MIPS" terminology (millions of instructions per second), it would be rated at .00083 MIPS. By contrast...

Words: 1246 - Pages: 5

Premium Essay

Technology and Computers

...INFORMATION TECHNOLOGY FOUNDATION 1 Compiled By: RONKY F. DOH (aka: ronky biggy diggy daddy igp) FU DAME TALS OF COMPUTERS We are living in an information age dependent upon digital information. Digital information is electronic information, the result of computer processing. Every type of job relies upon getting information, using it, managing it, and relaying information to others. Computers enable the efficient processing and storage of information. Do not think of a computer merely as the machine with the keyboard and the mouse, although that might be true for some types of computers. Embedded computers may be inside your household appliances, the video cassette recorder, the automobile, planes, trains, power plants, water purification plants, calculators, and even inside a few toys. These embedded computers are very small. They affect our lives each day. Why, even modern traffic lights operate with computers. They are all around us. Think of additional ways in which computers affect our lives each day. Every organization somehow use(s) a computer to run the organization. Some of the places are hospitals, schools, fire department, banks, stores or supermarkets, stock exchange, police department, insurance companies, transport companies, and government agencies etc. What is a computer? A computer is many things to many people, depending on what it is being used for. At one time the computer can be a machine which processes the payroll, then it can be a machine which tabulates...

Words: 67033 - Pages: 269

Premium Essay

Into Computer and Technology

...Bluetooth From Wikipedia, the free encyclopedia This article is about a wireless technology standard. For the medieval King of Denmark, see Harald Bluetooth. Bluetooth Developed by Bluetooth Special Interest Group Industry Mobile personal area networks Compatible hardware Mobile phones, Personal computers, Laptop computers Physical range Up to 60 metres[1] Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz[2]) from fixed and mobile devices, and building personal area networks (PANs). Invented by telecom vendor Ericsson in 1994,[3] it was originally conceived as a wireless alternative to RS-232 data cables. It can connect several devices, overcoming problems of synchronization. Bluetooth is managed by the Bluetooth Special Interest Group (SIG), which has more than 19,000 member companies in the areas of telecommunication, computing, networking, and consumer electronics.[4] Bluetooth was standardized as IEEE 802.15.1, but the standard is no longer maintained. The SIG oversees the development of the specification, manages the qualification program, and protects the trademarks.[5] To be marketed as a Bluetooth device, it must be qualified to standards defined by the SIG.[6] A network of patents is required to implement the technology, which is licensed only for that qualifying device. Contents • 1 Name and logo • 2 Implementation o 2.1 Communication...

Words: 9683 - Pages: 39

Free Essay

Computers and Technology

...world.” 1 It is very much like reality. Technology, medicine, business are all science-related courses that are essential in our daily lives in the future. Humanities, on the other hand, are more about “content with not knowing, but rather, practice questioning and questioning, never settling on one single answer, because the truth is just based on different perceptions.” 2 Humanities facilitate critical thinking and perspectives, and such subjects include literature, history, social sciences and the cultural identity of each country. Both the humanities and the science are correlated and work hand in hand. “Both the sciences and the humanities seek understanding; both offer explanations of various bits of the world.” 3 The Ministry of Education (MOE) too agrees that students should be exposed to both the humanities and the sciences. MOE has changed the Advanced-level syllabus on 2006. Each junior college student is required to take a minor in either the arts or the science combination. According to MOE, “Most people will change jobs at least a few times in their careers, sometimes switching to jobs in entirely new fields. What will give advantage is being able to adapt to new situations, to draw on insights from different fields, and to think on your feet.”4 Students are able to better adapt to their surroundings, consider more options and choices in their future, and ensure a holistic curriculum and environment for them to be in. Technology is a science-related subject. Our world...

Words: 1010 - Pages: 5

Free Essay

Computer and Technology

...Prologue 1 Year One: Downfall 5 Year Two: Inception 21 Year Three: Relapse 33 Intermission 45 Year Four: Reboot 53 Year Five: Production 69 Year Six: Endgame 85 Epilogue 99 Preface This book chronicles my six years of working towards a Ph.D. in com- These margin notes are puter science at Stanford University from 2006 to 2012. A diverse years after The Ph.D. variety of people can benefit from reading it, including: At this time, I have just written in mid-2015, three Grind was published. finished my first year as an assistant professor • undergraduates who might be interested in pursuing a Ph.D., • current Ph.D. students who are seeking guidance or inspiration, of computer science, so these notes reflect my current opinions as a new faculty member. To download a version without these notes, visit • professors who want to better understand Ph.D. students, • employers who hire and manage people with Ph.D. degrees, • professionals working in any creative or competitive field where self-driven initiative is crucial, • and educated adults (or precocious kids) who are curious about how academic research is produced. The Ph.D. Grind differs from existing Ph.D.-related writings due to its unique format, timeliness, and tone: Format – The Ph.D. Grind is a memoir for a general educated audience, not a “how-to guide” for current Ph.D. students. Although Ph.D. students...

Words: 37567 - Pages: 151

Premium Essay

Computer and Technology

...completed in a number of different ways. As such a Security Taxonomy helps us to understand these different approaches and meanings by providing a base level to work from. Confidentiality A security measure which protects against the disclosure of information to parties other than the intended recipient is by no means the only way of ensuring the security. Integrity A measure intended to allow the receiver to determine that the information provided by a system is correct. Integrity schemes often use some of the same underlying technologies as confidentiality schemes, but they usually involve adding information to a communication, to form the basis of an algorithmic check, rather than the encoding all of the communication. Authentication This might involve confirming the identity of a person, tracing the origins of an artifact, ensuring that a product is what its packaging and labeling claims to be, or assuring that a computer program is a trusted one. Authorization The process of determining that a requester is allowed to receive a service or perform an operation. Access control is an example of authorization. Availability Assuring...

Words: 844 - Pages: 4

Premium Essay

Computers and Technology

...NAME : ADMIN NO : DIT-035-0181/ UNIT : SOFTWRE ENGINEERING TOPIC : CONTINOUS PROCESS CONTROL Continuous Process Improvement Quality is a never ending quest and Continuous Process Improvement (CPI) is a never ending effort to discover and eliminate the main causes of problems. It accomplishes this by using small-steps improvements, rather than implementing one huge improvement. The Japanese have a term for this called kaizen which involves everyone, from the hourly workers to top-management. CPI means making things better. It is NOT fighting fires. Its goal is NOT to blame people for problems or failures. . . it is simply a way of looking at how we can do our work better. When we take a problem solving approach, we often never get to the root causes because our main goal is to put out the fire. But when we engage in process improvement, we seek to learn what causes things to happen and then use this knowledge to: * Reduce variation. * Remove activities that have no value to the organization. * Improve customer satisfaction. Process improvement is important as Rummler & Brache's research (1995) showed that process account for about 80% of all problems while people account for the remaining 20%. Steering Committee and CPI Teams One way to get CPI started is to set up a Steering Committee (SC). Although everyone in the organization is responsible for CPI, the SC follows all ideas from conception to completion. Some...

Words: 4060 - Pages: 17