Into Computer and Technology

In: Computers and Technology

Submitted By chrisnasri
Words 9683
Pages 39
Bluetooth
From Wikipedia, the free encyclopedia
This article is about a wireless technology standard. For the medieval King of Denmark, see Harald Bluetooth.
Bluetooth


Developed by Bluetooth Special Interest Group

Industry Mobile personal area networks

Compatible hardware Mobile phones, Personal computers, Laptop computers

Physical range Up to 60 metres[1]

Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz[2]) from fixed and mobile devices, and building personal area networks (PANs). Invented by telecom vendor Ericsson in 1994,[3] it was originally conceived as a wireless alternative to RS-232 data cables. It can connect several devices, overcoming problems of synchronization.
Bluetooth is managed by the Bluetooth Special Interest Group (SIG), which has more than 19,000 member companies in the areas of telecommunication, computing, networking, and consumer electronics.[4] Bluetooth was standardized as IEEE 802.15.1, but the standard is no longer maintained. The SIG oversees the development of the specification, manages the qualification program, and protects the trademarks.[5] To be marketed as a Bluetooth device, it must be qualified to standards defined by the SIG.[6] A network of patents is required to implement the technology, which is licensed only for that qualifying device.
Contents
• 1 Name and logo
• 2 Implementation
o 2.1 Communication and connection
• 3 Uses
o 3.1 Bluetooth profiles
o 3.2 List of applications
o 3.3 Bluetooth vs. Wi-Fi (IEEE 802.11)
o 3.4 Devices
• 4 Computer requirements
o 4.1 Operating system implementation
• 5 Specifications and features
o 5.1 Bluetooth v1.0 and v1.0B
o 5.2 Bluetooth v1.1
o 5.3 Bluetooth v1.2
o 5.4 Bluetooth v2.0 + EDR
o 5.5 Bluetooth v2.1 + EDR
o 5.6 Bluetooth v3.0 + HS…...

Similar Documents

Ethics in Computer Technology

...Mike Young Instructor: James Michael Hughes Ethics 13 December 2011 Ethics and Piracy “Ethics is everything … If you don’t have a strong moral standing, if you don’t have an ethical foundation, you just crumble” (Shays). Computer Information Systems is a job category that is projected to be growing through the next ten years according to the United States Bureau of Labor Statistics. Computer technology gives an IT (Information Technology) Professional access to computer software and other sensitive information and ethics could determine how an individual may deal with these items on a day to day basis. Should businesses and individual be allowed to pirate software? Pirating continues to be a topic of concern for the future of technology. According to dictionary.com ethics is “that branch of philosophy dealing with values relating to human conduct, with respect to the rightness and wrongness of certain actions and to the goodness and badness of the motives and ends of such actions” (Dictionary.com). “The more specific term “computer ethics” has been used to refer to applications by professional philosophers of traditional Western theories like utilitarianism, Kantianism, or virtue ethics, to ethical cases that significantly involve computers and computer networks. “Computer ethics” also has been used to refer to a kind of professional ethics in which computer professionals apply codes of ethics and standards of good practice within their profession” (Bynum...

Words: 1752 - Pages: 8

Computer Technology

... screen * Interlacing: writes to alternating lines to compensate for response rate on a CRT monitor I think that everything on this clip was very informative to monitor information and all the components on them. I learned the 2 types of monitors and how they run and how to configure your monitor to scale your screen to desired picture. I also learned you never take a monitor apart on or off because the stored charge inside the capacitors can kill you. I will use this information when I’m out looking to purchase a screen that will go with my tower by being able to purchase the compatible parts with it and be able to install it myself or on the job. Clip 1.11 Summary: In conclusion the video informs me about the 3 types of printers and some facts about each one. Also how to troubleshoot laser printers and be familiarized with interfaces on how to connect printers to computer by identifying the ports and connectors associated with the corresponding one. How to install a printer was also covered and how to possibly boost performance by knowing that spooling controls the process and performance. * Types Of Printers | * 6-step laser process | * Improving Performance | * Dot Matrix | * Problems with laser printer | * Spooling | * Inkjet | * Printer interfaces | * Queue | * Laser | * Install a printer | | Thermal Queue: Uses heat to force ink through nozzle Piezoelectric Technology: electrical charge that force ink through......

Words: 810 - Pages: 4

Computer Technology

...Chapter 1 The Problem and its Settings Background of the study As we move into the 21st century, technology has greatly improved and has become better. It is continuously growing and changing in many aspects until now. It makes the people’s life easier than the usual and is greatly helpful and useful especially to the students. Technology invented gadgets like computers and laptops that students can use in their studies. These gadgets changed how students learn, process and obtain new or old information. These can also use when it comes to finishing their task and completing their school works because students can freely visit many educational websites. Students can also play educational games, which can help them improve their critical thinking and problem-solving skills. However, technology has also negative effects like other things. Like computers, instead of using it for research purposes, students tend to use it for playing games like DOTA and Couter Strike. Students also use it for just viewing or signing in their social networking pages. Computer is a factor that distracts or steals away the attention or the focus of the students in their studies. Students abuse the power of technologies. Computer technology has positive and negative effects in the lifestyle of the students. Computer were invented to help students and not the be abused by the students which brings negative effects. But, majority of the results that were gathered presents that most students...

Words: 683 - Pages: 3

Computer Science and Technology

...TMC1254 Communication and Computer Network Semester 2 2013/2014 Switching 1 Learning Unit Objectives • Understand the concept of switching. • Understand and able to differentiate between different types of switching. 2 • How many connection per device? 3 Introduction • A network is a set of connected devices • How to connect them for communication? – Using mesh topology but wasteful – Used switching • Switched network consists of a series of interlinked nodes, called switches (temporary connection btw 2 or > devices) 4 Switched network 3 Simple Switching Network 6 Taxonomy of switched networks 7 Circuit Switched Networks Three Phases Efficiency Delay 8 9 CIRCUIT-SWITCHED NETWORKS • consists of a set of switches connected by physical links. • Connection between two stations is a dedicated path made of one or more links. – However, each connection uses only one dedicated channel on each link. – Each link is normally divided into n channels by using FDM or TDM. 10 How circuit-switched network works? • Consist of three phases: 1. Setup phase: – When end system A needs to communicate with end system M, system A need to request a connection to M that must accepted by all switches as well as by M – Allocation of resources as needed 2. Data transfer: data is transferred from node to node. 3. Teardown: After all data have been transferred, the circuits are torn down. – Circuit is terminated, de...

Words: 1432 - Pages: 6

Computer and Technology

...Exercise 2 Question 1 a) To lower the cost of of providing computing capability, time-sharing and multiprogramming made it possible for individuals and organizations to use ocmputer without owning one (such as in Internet Cafes, laborities in school, etc.). It also promotes the interactive sense of using computers. Some computer laboratories in schools as an instance. Because users share the system simultaneously, they have the opportunity to copy other user's file from the system. Once a user saves a file to his/her unit, other users of that group or connected system may also have an access to the file. Other users may change an information inside the file or even steal the file from the owner itself without the owner knowing it. They may also modify the files or programs that was saved or ran by the owner. Furthermore, some of the threats that the owner of a certain file may encounter is the data confidentiality. Without him not being aware of the system used as the time-sharing and multiprogramming, he may insert or have a secret or confidential data that he wants to remain at the file. Another one is the data integrity. Other users may change, add, or even remove some information in the file if he wants to.       Internet cafes also have a multiprogramming and time-sharing environment. Some internet cafes have hardwares like printers that is also connected with the system. State that a certain user is asking the attendant to...

Words: 719 - Pages: 3

Computer Technology

... stranded on the highway in the middle of nowhere until they can get assistance. Many people would say that this is the result of depending too much on technology. Some even believe that the generation of today would be better off without it. They think that it is a luxury that should be taken away. However, this cannot be true. Technology can cure laziness, is very necessary, and the benefits are much greater than living without it.  Technology is ubiquitous. Nowadays you can go to a Dallas Cowboys football game and watch one of the biggest televisions in the world, download a new song from iTunes instantly on your computer, or Google some trivia on your favorite TV show via your new Smartphone. People like getting things done in the fastest, yet most efficient manner; technology allows everyone to do both at the same time. The world needs to look beyond these tempting, positive attributes of technology and delve into the effects that are not so appealing. Children are being born into a society that relies upon technology for professional and personal reasons and they legitimately do not know a time without it. Technology is causing problems in their social skills and behaviors as well as facilitating a drastic increase in the childhood obesity rate. Are parents and people of the older generation neglecting their ethical duties?  Do you want to update your friends on the movie you just saw? A few strokes on any keyboard or phone and a click of a button can make that happen...

Words: 1746 - Pages: 7

Computer Technology

...Computer Technology Being a kid sitting around with your friends, there was always that one person this said, do you think this will ever happened? When I grow up all I will have to do will say door open to get in my house, everything else will be done for me. now, much to my surprise this day has now arrived. The arrival and utilization of computers in today's world is absolutely unbelievable. Things can be done with computers that could have never been done in the past. we have security systems that don't need keys, cell phones that could go on line, and receptionists are now virtually unknown due to automated voice systems. the question that everyone wants to know is, our we too dependent on computers, and what will happen when they fail us? this is an idea that nobody really likes to discuss. Going further in-depth with this idea, what have computers done to the business world. many people feel it has enhanced businesses of today's society, others feel it has ruined them. there now companies being run by very few workers due to fully automated systems, systems that need one operator a and it can produce more than that of 15 to 20 a lot of cases. what this does the company's is forces them to put new technological advances in their budget to keep up with competition and be more cost effective. This is exactly why the technology is there, to get one step ahead of the competition, and to produce more product, more often. Integrating computers into assembly...

Words: 1040 - Pages: 5

Evolution of Computer Technology

...Evolution of Computer Technology Catherine L. Dean 2142CMIS3106380 March 9, 2014 Table of Contents I. Introduction 3 II. Reduced Instruction Set Computing (RISC) 3 III. Pipelining 3 IV. Cache Memory 4 V. Virtual Memory 4 VI. Conclusion 5 VII. Works Cited 5 I. Introduction The purpose of this paper is to investigate the evolution of and current trends in improving system performance with respect to RISC, pipelining, cache memory, and virtual memory. II. Reduced Instruction Set Computing (RISC) Reduced Instruction Set Computing also known as RISC is a type of microprocessor architecture. It is a CPU design strategy. The purpose of RISC was for design simplification. It increases the number of executed instructions thus increasing the CPU performance. (Joy) The RISC design was first proposed and implemented in the 1960s and has been constantly evolving. Since the late 1980’s, RISC has been more than doubling its performance every year and half. The RISC industry, which includes IBM and Sun Microsystems, is ever expanding with the focus on the speed of executing instructions per second along with the evolution of the computer industry. (Joy) III. Pipelining One characteristic of RISC processors is pipelining. With pipelining, instructions are able to be executed in a shorter period of time. The first step in pipelining is to find the instructions, then read the registers, decode the instructions, execute the instruction, access the...

Words: 810 - Pages: 4

Computer Technology Essay

.... The windows 7 starter edition is only available in 32-bit version. 10. The maximum amount of system memory supported by windows 7 Enterprise is Maximum RAM (32-bit)- 4 GB Page 61 1. Windows Easy transfer supports two types of migrations, called Side by Side, and Wipe and Load. 2. When a serious problem occurs windows 7, you might be able to repair it by starting the windows PE operating system and running diagnostic tools, In this scenario, windows PE is called by another name, which is Windows RE( WINDOWS RECOVERY ENVIRONMENT), 3. To migrate use profile information from one computer to another, you can use either windows easy transfer- GUI, User State Migration tool (USMT) – Command line interface. 4. A computer running windows PE will automatically reboot after 72 hours. 5. Windows easy transfer supports migration using any removable storage medium common to the two computers except Floppy Disks. 6. The windows 7 component that enables the computer to support more than one language is called the MUI – (Multi-language user Interface) 7. The reason it is possible to remove the windows 7 installation disk to supply the setup program with drivers is that windows PE run on a RAM disk. 8. To upgrade windows xp to windows 7, you must perform a Clean Install. 9. The files and settings that windows easy transfer can migrate to a windows 7 computer and primarily stored in user profile folder. 10. As a preinstallation environment,......

Words: 516 - Pages: 3

Computer Technology

...Rhubes Severe Computer Technology Have you ever heard of the expression “necessary evil?” If it is evil, how can it be necessary? Well, there are some things that are necessary but not necessarily easy. People sometimes call “evil” the things that they find difficult or complicated. Thus, a “necessary evil” may be a thing that needs to be done for a greater good but that it may not be easy at first. The incursion of technology and computers in our everyday lives seems to be one of those “necessary evils” that we all have to deal with at one time or another. Today, technology is an integral part of schools in America. Teachers need to learn to use technology in the classroom in order to teach. Children become acquainted with technology in a safe learning environment with their teachers at school. Students are also expected to learn to use computers and interact with some educational software. The child’s homework often includes reports, research and or presentations using technology. Since children become some kind of experts with computers and interact with a variety of software at an early age, they see computers a little less challenging than an adult with little experience in computers. Technology has also made its place among the needful things to have at home. Parents often times feel the need to provide the technology that the child requires in order to do homework and to help the child study. That way, parents end up learning the technology first in order...

Words: 464 - Pages: 2

Computer Technology

... on their | | | | | |perceptual motor skills while working on their depth perception. | |10-27-15 |8:45 |12:30 |3:45hrs |D. 23 Implement individual/group sessions | | | | | |It was another open gym day due to short staff at the start of the | | | | | |morning, yet this time I had the participants go through free throw | | | | | |(basketball) drills to work on depth perception which works on their | | | | | |perceptual motor skills. | | | | | | | | | | | |Then one of the groups that rotated in were a little less high | | | | | |functioning, so instead we did ring toss at a close distance and bean bag | | | | | |toss......

Words: 2031 - Pages: 9

Computer Technology

...Computer  Networks   Applica3on  Layer   1   Examples  of  network  applica3ons   •  •  •  •  •  •  •  e-­‐mail   web   instant  messaging   remote  login   P2P  file  sharing   mul3-­‐user  network  games   streaming  stored  video  clips   •  social  networks   •  voice  over  IP   •  real-­‐3me  video   conferencing   •  grid  compu3ng   2   1 Crea3ng  a  network  app   write  programs  that   application transport network data link physical –  run  on  (different)  end  systems   –  communicate  over  network   –  e.g.,  web  server  soJware   communicates  with  browser   soJware   No  need  to  write  soJware  for   network-­‐core  devices   –  Network-­‐core  devices  do  not   run  user  applica3ons     –  applica3ons  on  end  systems     allows  for  rapid  app   development,  propaga3on   application transport network data link physical application transport network data link physical 3   Applica3on  architectures   •  Client-­‐server   –  Including  data  centers  /  cloud  compu3ng   •  Peer-­‐to-­‐peer  (P2P)   •  Hybrid  of  client-­‐server  and  P2P   4   2 Client-­‐server  architecture   server:     –  always-­‐on  host   –  permanent  IP  address   –  server  farms  for  scaling   clients:   client...

Words: 855 - Pages: 4

Computer Technology

... children with special needs in the school system. Computers have proven extremely beneficial to students with certain speech, audio, and motor limitations. Students with special needs can use alternative input and output devices to interact with computers and do things that they normally could not accomplish independently. What they can do through using a computer boosts their self-esteem and provides them with a greater sense of control with the world around them and their own individual lives. The Internet– or the information highway — provides them with the best of knowledge for their treatments and they can keep in touch with doctors or friends throughout the world with the Internet. Computer technology will continue to assist special needs students far into the future. In conclusion, technology only benefits those who can afford it, and not those who can’t. What are poor people or third world countries supposed to do when it comes to technological advances and they have no money? Does it really seem fair that poor people or third world countries get left behind, while other countries move forward in the technology world?...

Words: 668 - Pages: 3

Computer and Technology

...Chapter 1 HW Name: DADHICHI PATEL MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) ________ analyzes the business situation and identify the need for information and information services to meet the problems or opportunities of the business. 1)_____C________ A) Database analysts B) Users C) Systems analysts D) Programmers TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 2) Database development projects are never done in a bottom-up fashion. 2) ____F___ 3) A well-structured database establishes the entities between relationships in order to derive the desired information. 3) ___F____ ESSAY. Write your answer in the space provided or on a separate sheet of paper. 4) Provide a brief overview of the various components of the database environment. TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 5) Database processing programs are coded and tested during the design stage of the systems development life cycle. 5) ____F___ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 6) Organizing the database in computer disk storage is done in the ________ phase. 6) ____C___ A) analysis B) design C) implementation D) maintenance 7) A workgroup database is stored on a central device called a(n): 7) ____C___ A) client. B) network. C) server. D) remote PC...

Words: 582 - Pages: 3

Computer Technology

... prime numbers. The computer’s memory consisted of 1024 locations, though only 512 locations were initially implemented. The initial orders were hard-wired on a set of uniselector switches and loaded into the low words of memory at startup (“Electronic Delay Storage Automatic Calculator”, 2012). Programmability Very few early computers had the capability within hardware and software to change. What this means is programmability and not many computers made in the 19th century had this capability. Programmability generally refers to program logic (business rules), but it also refers to designing the user interface which includes the choices of menus, buttons and dialogs (“Programmability- Technical Definition of Programmability”, 1996-2012). Colossus was the world's first electronic, digital, programmable computer. Colossus and its successors were used by British code breakers to help read encrypted German messages during World War II. They used thermionic valves (vacuum tubes) to perform the calculations (“Colossus computer – Wikipedia, the free encyclopedia”, 2012). History of Computer Technology: Stored Program Architecture Manchester Small-Scale Experimental Machine The Manchester Small-Scale Experimental Machine (SSEM), nicknamed Baby, was the world's first stored-program computer. This machine was actually not intended to be a practical computer but instead a test bed for Williams Tube, an early form of computer memory. It was built at the Victoria University of...

Words: 1624 - Pages: 7