# Unit 1 Assignment 1

Submitted By Jared17
Words 272
Pages 2
So after looking I have found out my computer is a Dell Optiplex 780. Its domain name 110LAB2WKS01 in the LAB of the school. After pulling up my system information and this is what I found. I already have Windows 7 Enterprise. It has a Dual-core Pentium 2.60 GHZ E5300. With 8GB of installed RAM. It also has a 64-bit Operating System. But the system rating is unavailable. The computer is already running windows 7 Enterprise and having a 64-bit Operating system it is able for a clean installation to upgrade. And this is the reasons why.

### Similar Documents

Free Essay

#### Unit 1 Assignment 1

...Miosha Vogt ET2560 Unit 1 Assignment 1 Chapter 1: Pg. 43 Quick- Check Exercise 1. Machine language 2. Operating System 3. Translation, Linking, Loading, Execution 4. Source 8. Software, Hardware 9. Variables 10. Secondary storage Pg. 44 Review Questions 3. Two secondary storage devices is a disk drive and flash drive Two input devices is the keyboard and mouse Two output devices is the monitor and printer 5. Syntax error is grammar error of a programming language. 6. The loader copies the executed file into memory and initiates execution of instructions. 7. Memory cells are a grouping of small units called bytes Bytes are the amount of storage required to store a single character, composed of even smaller unit called bits. Bits are binary digits 0-10. 8. Three high languages are Fortran, C, and Java FORTRAN used in scientific programming. C is used in system programming. Java supports web programming and programming Android applications. 9. Ram is volatile and it temporarily stores programs while their being executed, delete when computer is turned off, Rom is not volatile the data stored there will not disappear when the computer is turned off. 2. Write an algorithm in pseudo-code to solve the following problem: Input a temperature in Fahrenheit, and output the temperature in Celsius and Kelvin. Formulas needed are: C = ( 59 ) (F – 32). K= ( 59 ) (F – 32) + 273.15 Algorithm:......

Words: 458 - Pages: 2

#### Unit 1 Assignment 1

...Unit 1 Assignment 1 1. Describe the role of software for computers: Computer software tells the hardware what to do. Without any software, the hardware would be worthless. Think of the software as a subject in school, and the hardware as you or your brain. Without any learning, you can't do anything. One you have learned some math, and then you are able to solve math problems. This learning is usually accomplished through downloads or CD's that are loaded into the computer. At the very basic level, computer software contains specific instructions for how to accomplish a specific task. These instructions tell the hardware exactly what to do, and how to do it 2. Identify the hardware associate with a computer: the physical components that make up a computer system. There are many different kinds of hardware that can be installed inside, and connected to the outside, of a computer. Here are some common individual computer hardware components that you'll often find inside a modern computer case: Motherboard, Central Processing Unit (CPU), Random Access Memory (RAM), Power Supply Video Card, Hard Drive (HDD), Solid-State Drive (SSD), Optical Drive (e.g. BD/DVD/CD drive) Card Reader (SD/SDHC, CF), etc. Here is some common hardware that you might find connected to the outside of a computer: Monitor, Keyboard, and Mouse 3. Describe how computer store data: it converts the request into binary digits and its stores the data in a database. As a table format. The binary data can......

Words: 324 - Pages: 2

Free Essay

#### Unit 1 Assignment 1

...Unit 1 Assignment 1 Integrated Circuit Technology A motherboard is the backbone of the personal computer, it transfers information and power to all the other components. The motherboard is the largest board inside of the computer that contains the basic input and output system that allows every component to communicate with one another. Attached to the motherboard is a chip comprised with dozens of pins called the central processing unit. Along with the CPU attached to the motherboard is the dual-inline memory modules a part of the random access memory. RAM is the most common type of memory used another type is ROM, read only memory, which stores data onto metal disc within the device. The operating system manages the hardware resources and provides a place to run programs. The last components of the personal computer are the tower and the human interface devices. The tower holds all the components that make up the computer except for the HID which are located outside of the computers tower. The main purpose of the HID’s are to help us interact with the computer, a few examples are the keyboard, mouse, monitor, video camera and speakers. You put together the Motherboard, CPU, RAM, ROM, OS, Tower, HID’s add a power supply and you have a basic personal computer. PROCESSOR TRANSISTOR YEAR Intel 4004 | 2,300 | 1971 | Intel 8008 | 3,500 | 1972 | Intel 8080 | 4,500 | 1974 | Intel 8085 | 6,500 | 1976 | ......

Words: 427 - Pages: 2

#### Unit 1 Assignment 1

...Homework Unit 1 Assignment 1 1. Why is the CPU the most important component in a computer? It’s the part of the computer that runs programs. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? A turned on bit is 1 and a turned off bit is 0. 3. What would you call a device that works with binary data? A digital device 4. What are the words that make up a high-level programming language called? Key words or reserved words 5. What are the short words that are used in assembly language called? Mnemonics 6. What is the difference between a compiler and an interpreter? A compiler translates a high-lever program into a separate machine language program; whereas, an interpreter is a program that both translates AND executes instructions in a high-level program language program. 7. What type of software controls the internal operations of the computer’s hardware? Operating systems which is a type of system software. Unit 2 Assignment 1 Short Answer 1. What does a professional programmer usually do first to gain an understanding of a problem? Works with and interviews the customer to gain an understanding of what the customer wants the program to accomplish. 2. What is a pseudocode? A “fake” code that programmers use to test their programs before executing them. 3. Computer programs typically perform what three steps? A) Input is received B) Some process......

Words: 508 - Pages: 3

Free Essay

#### Unit 1 Assignment 1

...Unit 1 Assignment 1 Scientific inquiry is a process of developing an explanation of a question by testing, investigating and collecting data that will either support the idea of what's going on. A problem in the world can be a scientific inquiry because you might have a question about it, so you are basically digging for information about the problem going on and you try to find results by using the internet, books or any source to get your answers. There will be results maybe through testing or charts will appear from studies to support the answers. A non-scientific inquiry is one that does not use a systematic collection of evidence or one that tries to find answers to questions about things other than the natural world/universe, such as beliefs. An example of everyday assumption is gender or stereotyping of what you see that what you assume this more like expectations. If women are mowing the lawn there is going to be a man that will approach you and tell you how to do things properly or what to wear in order to for you to cut the grass right. The answers will come to you without seeking them, just because she is a women it doesn’t mean that she don’t know what’s she doing it is just an assumption because of her gender. The cutting of a lawn is supposed to be a man’s job so they feel they need to say something about it. But all of this is not...

Words: 256 - Pages: 2

Free Essay

#### Unit 1 Assignment 1

...Unit 1 Assignment 1 Community Groups The definition of Community is a group of people that live in the same place or having a particular characteristic in common. It is also described as having a feeling of fellowship with others, as a result of sharing common attitudes, interests, and goals. Community groups are created for a lot of different reasons some more critical than others. Since communities are so close knit people start groups for several reasons, the most common is just to know one another and be familiar with who you live by. Some people start neighborhood watches, borrow things from one another or just simply look out for each other when the other is not at home. What Makes a Good Community? In my personal opinion a Good Community takes time to form. Just like anything school, work, etc... You’re taking different people from different places, ethnicities, and backgrounds and putting them all together in once specific place. So it takes time for everyone to gel, but in all it takes patience, understanding and just being courteous and respectful. Challenges There are a lot of challenges you face when your living somewhere whether it’s a bigger or smaller community, it may possibly be easier to get know everyone in a smaller community than a bigger one. For instance some communities or neighborhoods are outside the county that means that the city does not fund the neighborhoods street lights, therefore the community......

Words: 290 - Pages: 2

#### Unit 1 Assignment 1

...Daphne Jones AP2530 Unit 1 Assignment 1: Homeostatic Imbalances Hypertension is caused by physical inactivity, a salt-rich diet made by processed and fatty foods, and also alcohol and tobacco use. You can identify hypertension if your blood pressure is higher than 140 over 90 mmHg. While having hypertension you could also develop some other conditions such as kidney disease. Even though hypertension itself does not cause symptoms, it does lead into long-term complications caused by blood vessels becoming narrower. To be able to reduce Hypertension and get better, we would need to cut down, restrictions such as salt restriction; moderation of alcohol and other diet changes that have affect your condition you have now. There are several drugs that may be used for treatment. Hypertension will affect your heart, so your blood pressure should be normal… when you follow the restrictions. Diabetes Is also called diabetes mellitus, what it does is describes a group of metabolic diseases in where you have high blood glucose, which is high blood sugar. You will experience frequent urination called polyuria, and become more thirsty and hungry. There are two types of diabetes, Type 1 and Type 2. With type 1, your body doesn’t make enough insulin, which is a hormone. Type 2 is where your body doesn’t produce enough of the insulin to function properly. There is Gestational Diabetes, but fortunately for you… you are not a female. Most females get this type while they are pregnant....

Words: 435 - Pages: 2

#### Unit 1 Assignment 1

...Unit 1 Assignment 1 Cell Phones use voice and data communications. It uses the voice at a lot less these days because people rarely call one another anymore. Data is used for the applications which people use more of these days. So they use a mixture of both but mainly data. Also some phone now use Wi-Fi calling so people can use data networks to call people. Landlines use voice communication. Unlike data voice can work during a black-out because it doesn’t get its power from the same and everything in your house. It’s also a cheaper technology which also makes it cheaper. SMS/Text Messaging uses data. It’s part of the reason I said Cell Phones use both. And it can only be sent over 2G and above because 1G is voice only. Fax Machines use voice. It uses the same jack and RJ-11 like landlines do. It can be used on data but traditional fax use the voice network. The fax is sent it immediately gets digitized the put back in analog form once its sent. Pagers use data. It’s almost like SMS in the is send data (words over the networks). It’s an older technology. VOIP phone use data. It’s similar to Wi-Fi calling. It breaks up in to packets and is sent over the air waves. If you used a VOIP phone you could probably hear it sounding choppy that’s because those packets were dropped for some reason or another. Skype and face time also use data. Without internet connection these applications can’t be used. The main reason these applications exist it to provide an......

Words: 330 - Pages: 2

Free Essay

#### Unit 1 Assignment 1

...Unit 1 Assignment 1: Integrated Circuit Technology Year | Transistor Count | Processor Model | 1971 | 2,300 | Intel 4004 | 1972 | 3,500 | Intel 8008 | 1974 | 4,500 | Intel 8080 | 1976 | 6,500 | Intel 8085 | 1978 | 29,000 | Intel 8086 | 1979 | 29,000 | Intel 8088 | 1982 | 55,000 | Intel 80186 | 1982 | 134,000 | Intel 80286 | 1985 | 275,000 | Intel 80386 | 1989 | 1,180,235 | Intel 80486 | 1993 | 3,100,000 | Pentium | 1995 | 5,500,000 | Pentium Pro | 1997 | 7,500,000 | Pentium II | 1999 | 9,500,000 | Pentium III | 2000 | 42,000,000 | Pentium 4 | 2008 | 47,000,000 | Atom | 2002 | 220,000,000 | Itanium 2 McKinley | 2006 | 291,000,000 | Core 2 Duo | 2003 | 410,000,000 | Itanium 2 Madison 6M | 2004 | 592,000,000 | Itanium 2 with 9MB cache | 2008 | 731,000,000 | Core i7 (Quad) | 2011 | 1,160,000,000 | Quad-Core + GPU Core i7 | 2010 | 1,170,000,000 | Six-Core Core i7 (Gulftown) | 2012 | 1,400,000,000 | Quad-Core + GPU Core i7 | 2006 | 1,700,000,000 | Dual-Core Itanium 2 | 2008 | 1,900,000,000 | Six-Core Xeon 7400 | 2010 | 2,000,000,000 | Quad-Core Itanium Tukwila | 2011 | 2,270,000,000 | Six-Core Core i7/8 Core Xeon E5 | 2010 | 2,300,000,000 | 8-Core Xeon Nehalem-EX | 2011 | 2,600,000,000 | 10-Core Xeon Westmere-EX | 2012 | 3,100,000,000 | 8-Core Itanium Poulson | 2012 | 5,000,000,000 | 62-Core Xeon Phi | In 2010, the processor model that was the first to have two billion transistors on its chip was known as the......

Words: 374 - Pages: 2

#### Unit 1 Assignment 1

...Unit 1 Assignment 1 Exploring Programming Languages PT1420 Introduction to Programming Pong Sintaisong ITT-Tech Tempe Campus Instructor: Ms. Kate Eskesen 9/23/2015 5 Programming Languages 1970s-2000 1970s Pascal: Niklaus Wirth was is the invertor and was invented in 1971 Motivation: To provide features that were lacking in other languages at the time. Forth: Forth was created in 1970 by Charles H. Moore Motivation: He wanted to create a language that would allow direct user and machine interactions. C: In 1971-73 Dennis M. Ritchie turned the B language into the C language. Motivation: Lack of features from B language so made C language. Prolog: Alain Colmerauer in 1973. Motivation: Unknown ML: In 1973 ML was invented as part of the University of Edinburgh's LCF project Motivation: Research in constructing automated theorem provers. Eventually saw that the "Meta Language" they used for proving theorems was more generally useful as a programming language. 1980s C++: Bjarne Stroustrup was the inventor. 1979 Motivation: He needed the use of a programming language that was concise and that produced compact and speedy programs. MATLAB: First Fortran MATLAB was portable and could be compiled to run on many of the computers that were available in the late 1970s and early 1980s. Cleve Moler is the inventor. Motivation: This document for engineers developing models and generating code for embedded systems using Model-Based Design with MathWorks......

Words: 715 - Pages: 3

#### Unit 1 Assignment 1

Words: 272 - Pages: 2

#### Unit 1 Assignment 1

...Unit 1 Assignment 1 AP2530 Hypertension Hypertension is just a fancy medical term for high blood pressure or HBP. When your heart beats, it creates pressure that pushes blood through a network of tube-shaped arteries and veins around your body. When we measure this pressure it is referred to as “blood pressure”. This pressure is the result of two forces from the heart. The first force occurs as blood pumps out of the heart and into the arteries. This is the top number in the reading called the systolic pressure. The second force is created as the heart rests and refills with blood between beats, and is called the diastolic pressure. The average person will have a blood pressure reading of about 120/80. Any reading where the numbers are higher than that is considered to be high. The arteries in your body are made of muscle and a semi-flexible tissue that stretches like elastic when the heart pumps blood through them. The more forcefully that blood pumps, the more your arteries have to stretch to allow blood to flow easily, and when the force of the blood flow is to high on a regular basis, the tissue that makes up the walls of your arteries gets stretched out. When left untreated this creates problems and damage over time. The overstretching creates weak places in the blood vessels, making them more likely to rupture or break. Also, the overstretching can cause tiny tears in the blood vessels that leave scar tissue on the walls of arteries and veins. These tears and the...

Words: 364 - Pages: 2

#### Unit 1 Assignment

...Unit 1 Assignment PA205-03 UNIT 1 ASSIGNMENT CASE STUDY QUESTIONS 1. The case study references one state statute. Identify it and explain what it prohibits. My understanding of the case study is that the identifiable state statute is section 42.09(a)(3) of the Texas Penal code, which prohibited the “desecration of a venerable object.” 2. Which branch of government (executive, judicial, or legislative) created the state statute? The legislative branch of government created the state statute. 3. The passage above also discusses one court case. Who were the parties involved in the case? The parties involved in the court case in the above passage are Gregory Lee Johnson and the State of Texas. 4. The case was heard by three lower courts before it reached the United States Supreme Court. List those three courts in order, beginning with the court that has the most authority and ending with the court that has the least amount of authority. Most authority = Texas Court of Criminal Appeals Middle authority = Texas Court of Appeals, Fifth District Least authority = Dallas County Criminal Court 5. Provide the citation for the United States Supreme Court’s decision in this case. After hearing the oral arguments and reading the parties’ appellate briefs, the Supreme Court, in a 5-4 vote, affirmed the decision of the Texas Court of Criminal Appeals. Texas v. Johnson, 491 U.S. 397 (1989). 6. What effect did the United States Supreme Court’s decision have on the......

Words: 308 - Pages: 2

Free Essay

#### Unit 1 Assignment 1

...Developments in Hacking, Cybercrime, and Malware The major threats that were outlined in the Symantec Security Report were mostly occurring in the United States. This was due to a weakness in the Internet Explorer. Attackers used a Web-Based attack exploited in the Internet Explorer 7 uninitialized Memory Code Execution Vulnerability accounting for 6 percent of the total. This vulnerability was published on February 10, 2009. The second most widely exploited attack was the downloading of a suspicious PDF file. Attackers tried to aim this one towards people trying to get information on the H1N1 virus, since this was the latest news that most consumers wanted information about. The attack exploited vulnerabilities in Foxit Reader. These two types of vulnerabilities took up 79% of the threats aimed at financial institutions. Threats are separated into different types of categories for example; Allowing for remote access, exporting email addresses, and exporting system data). Separating the threats into different categories helps with securing against cyber criminals. The importance of identifying these threats is to combat against them. By observing the malicious activity by region helps different companies prepare for what type of threats are most likely to be used against their systems. For example if there are threats about a PDF document that may contain code to execute a bot that will take all of your contacts and forward them to the Malicious user, you would want to......

Words: 469 - Pages: 2