Wednesday, December 8, 2010

Chapter 5: Productivity Applications

What exactly is word processing? When you use a toolbox or a set of tools to help you alter the way you write

Doug Engelbart- had a vision to help and magnify human mental abilities through computer technology
- He was one of the pioneers of the computer hardware and software
-In 1968 he demonstrated the Augment system which included mouse, hypermedia, groupware, outlining and more.
- Many of these inventions can be found in modern times




Wordsmith's Toolbox
- Wordsmith helps people communicate effectively in writing
- Wordprocessors involve several steps:
  • entering text
  • editing text
  • formatting the document
  • proofreading the document
  • saving the document on disk
  • printing the document
Entering, Editing, and Formatting text:
- Entering text is where the text is displayed on the screen and stored in the computer's RAM. It is also where one saves their work periodically because RAM is no permanent memory
-Editing text is where one: navigates to different part of a document, is able to insert, delete, move and copy text (s), and search and replace words or phrases.
-Formatting commands lets you format characters.
-When formating characters, one can measure by point size, i.e. one pts - 1/72 inchs.
-Formatting paragraphs involves margin settings, line spacing, indents, tabs, and justification (alignment of texts)
-Formatting documents involves stylesheets, headers, footers, graphics, conversion to HTML for web publishing and more.

Rules of thumb: word processing is not typing:
- only use 'return' or 'enter' keys when needed
--> word wrap moves texts to the next line
-don't use  the spacebar to align columns, instead use tabs and margin guides
--> What you see is what you get (WYSIWYG) depends on the matter of degree

Things to remember when using word processors and other tools:
- don't underline! Use italics for book and journal titles. Use boldface for emphasis
- use only one space after a period
-take advantage of special characters

Outliners and idea processors  help with arranging info into levels, rearrange ideas and levels, hiding and revealing levels of detail

Digital References
-dictionaries, quotation books, encyclopedia's and more are now avaible in digital form
-the biggest advantage is the electronic form is speed!
-the biggest drawback is that people can plagiarize

Synonym finders are computerized theasaures
Spelling checkers compare words in documents with words in disk-based dictionary
-words may be flagged, but it your choice with what to do with it.

Grammar and style checkers analyze each word in context, checking for errors in content, check spelling, and point out possible errors and suggest ideas.

Form letter generators: mail merge capabilities produce personalized form letters, create a database with names, create form letters. THEN: merge the database with the letter to create a personalized one.
- you can use custom paragraphs based on the recipient's personal data so that every letter looks as if it were individually written.

Collaborative Writing tools
- Groupware is software designed to be used by a workgroup. i.e.
-Providers  for collaborative writing and editing
-tracks and identifies changes by originator
-compares document versions

POSSIBLE WORD TOOLS TO COME:
-handwritten word processors
-human speech processors (Speech recognition software)
-anticipating a writer's needs, acting as an electronic editor

What is desktop publishing technology (DTP)? The process of producing book, magazine, and more that include writing and editing texts.
- Also, produce drawings, photographs to accompany texts
-typesetting/ arranging texts on graphics on pages
-binding pages into a finished publication
- DTP makes the production process affordable and easy, and have a sophisticated  result
-DTP software: image-editing software, page-layout software, i.e. QuarkXPress.

With creating professional-looking documents, one must:
-plan before you publish
-use appropriate fonts
-not go style-crazy
-view documents through the reader's eyes
-learn from the pros
-know the limits

Why DTP? Saves you: money, time, number of errors,. Also, it offers everyone the right to publish.

Going beyond printed paper:
- paperless publishing and the web
-electronic books and digital paper

The Malleable Matrix: where a spreadsheet consists of cells and addresses
Spreadsheets contain: values (i.e. numbers/dates), labels
<-- Formulas allow you to create instructions using mathematical expressions and commands
Formulas can be : -
  •    Relative, meaning that they refer to different cells when they are copied
    •        Absolute when the formula references never change when they are copied
  •  Spreadsheets offer many automatic features such as replication of data.
  • Automatic Recalculation: in excel, whenever you change anything in the data, it will automatically update itself to those changes. 
  • Functions: automate complex calculations
  • Macros: store keystrokes and commands so the can be played automatically
  • Templates: offer ready to use worksheets with labels and formulas already entered.
  • Linking spreadsheets together:  when changes are made in one spreadsheet, the data is automatically changed and linked to other spreadsheets.
  • A database is able to help you search for info, generate reports, and more!
  • To avoid making big mistakes when using spreadsheets, it's a good idea to plan on what you are going to write before you add any formulas/ values, and when you do add them make sure you have double checked them  so that they are readable. Also predict  possible issues that you may come across. Lastly, it's important to use spreadsheets as a decision-making aid rather than a decision maker.
  • Spreadsheet graphics help one take digits and make them into graphics, like in pie and line charts. Certain data works with certain graphics, like when one uses a scatter chart to compare two variables. 
Statistical software: Scientific Visualization
  • Scientific visualization software uses: shape, location in shapes, color,  brightness, and motion to help us visualize data.
  • It turns numbers into pictures, and makes the unseen, seen.
  • Visualization helps researchers see relationships that are hard or even impossible to see w/ out tools.
Calculated Risks
  • Computer modeling uses computers to create abstract models of objects, organisms, organizations, and processes. For example: games, businesses, and flight simulation
  • Computer simulations are widely used for reasons such as, safety, economy, projection, and more.
  • GIGO (garbage in, garbage out) is the accuracy of a simulation that depends on how accurate its mathematical model corresponds to the system that is being simulated.
  • Some of these models suffer from false and hidden assumptions, go astray b/c of human errors.
  • Making reality fit the machine: some simulations are so complex that researches need to simplify models and streamline calculations so that they can run on the best hardware possible.
  • No matter what, information can be lost, and loss may compromise with the integrity of the simulation and question it.
  • The Illusion of Infallibility
 Truly Intelligent Agents
  • future users interfaces will be based on agents rather than on tools
  • agents are software programs that are designed to be managed, not manipulated
  • Intelligent software agent can ask questions and respond to commands, serve as a guide and coach, take on goals, and more!!
  • They teach you new applications and answer reference questions
  • Help you protest your privacy on and off the net

Wednesday, October 27, 2010

Chapter 1: Our Digital Planet

<----- 1943: mathmetician Alan Turing created the first digital computer called the Collossus
  • 1939: John Atanasoff created Atanasoff-Berry Computer (ABC)
  • 1944:  Howard Aiken developed Mark I, which was a computer machine constructed to calculate trajectory tables for new guns in World War II by John Machly and J. Presper Eckert .
  • ****(come back)-ENIAC (Electronic Numerical Integraator Computer) was the very first computer
  • UNIVAC I was the very first general purpose commercial computer
  • Vacuum tubes- were used in early computers. These were replaced by Transitors in 1956
  • In the mid 1960s transistors were replaced by integrated circuits
  • Integrated circuits brought: increased reliability, smaller size, higher speed, and higher efficiency, lower cost
  • 1971: the first microprocessor was created by Intel
  • Web browsers are programs that help navigate windows into the web.
  • Firmware: program is etched on silicon so it can;t be changed
  • Workstations-high end desktop computers
  • Servers: host, provide software and other resources to other computers over a network
  • Mainframes: communicate with mainframe through terminals, example: Time shares
  • Supercomputers:  help power users acsess powerful computers
  • 1960: internet was developed w/ the help of the U.S. government
  • Over a billion people were able to access the internet by the end of 2005
  • Hypertext links tie together millions of web pages that are created by diverse authors
  • Internet supports varied activities, such as Craiglist, are used to supervise money transactions.
  • Our society's history includes agricultural and industrial ages which became the Information Age
  • Computer literacy is already improving our day-to-day lives and careers
  • Applications allow your computer to do simple purposes
  • Social and ethical issues include : 1- threats to personal privacy through large  databases and computer networks. 2- the hazards of high-tech crime and the lack of data security. 3- issues with defining and protecting intellectual property. 4- dangers of dependence on complex technology. 5- the threat of automation and dehumanization of work.
  • Examples of bio-digital technology: 1- microchipping 2- fusing microchips with the human brain 3- prosthetic legs. 4- virtual surgery. 5- 3D anatomy

Wednesday, October 13, 2010

Chapter 4- Continued


Web application= blogger
domain name= IP address (ex: xxx.xxx.xxx.xxx.)

Intergrated Applications and Suites: Software Bundles

Vertical- market and Custom software: usually costs more than mass-market application (ex: iTunes, Microsoft Office)
Job-specific software (ex: medical billings, library catalogs)

Harware-software connection- What does the operating system do?
  • Support multitasking
  • Manages virtual memory
  • Maintains a system's files
  • Authenticates and authorizes
Utility programs and device drivers

Utility programs: help with system maintenance and repairs that handled automatically
Benefit of utility programs: let's you copy files between storage devices, repair damaged data files, guards against virus', and translate files so that other programs can read it.

Where do the operating systems live?
- computers and sometimes parts of computers are stored in ROMs

  • Operating systems usually work behind the scenes
  • Sometimes interacting with an operating system can be a challemge and depends on user interface.
User Interface: defines the "look and feel" of computing system from a human perspective
Desktop Operating Systems: MS-DOS  is a disk operating system where the user interacts with characters

The Human-Machine Connection
Features include command-line interface (whenever you are typing something, you are commanding a certain type or form of information) and menu driven interface (when commans are chose from an on-screen list)
Graphical User Interface (GUI): Mac OS was developed by Macintosh in 1984 using GUI, Microsoft Windows a popular operating system.

Multiple User Operating Systems
UNIX= developed by Bell Labs, dominant operating system for Internet servers. Some forms of UNIX are available for personal computers and more.
Linux= was created by Linus Torvalds and is a work in progress, free for anyone to use (ex: Freespire)

Hardware and Software Platforms:
  • Cross-platform applicators (Microsoft Office, Adobe Photoshop)  are available in similar versions for multiple platforms.
==>What is the difference between authentication and authorization? Give examples.
  •  Authentication is how one identifies themselves to the computer. Authentication system basically verifies that the user is really who they say they are.(For example, when logging onto your computer, you give your (user) information (password))
  • Once the user has gone through authentication, they go through Authorization when the system accepts them as a user and decides what they can and can't do.(For example, when you get into the system)

==> What does an operating system do?
==>What is the difference between utility programs and device drivers? 


Tomorrow's User Interfaces
  • Future user interfaces will built around growing technologies, such as agents and virtual realities.
File management: where is my stuff?!
  • Files can be almost anywhere in the system, which can of course makes data management a challenge.
  • Solution: organize files logically
  • For example: Windows system and Mac organize files with system folders, such as My Documents, My Pictures, and My Music.
  • Tools to help you with file-management properties: view tab, rename, copy, move, and delete files and folders.
  • Hierarchies help with organizing and locating your work. Such as when you have a folder with subfolders within it.
    
    File Management Hierarchy
    
  • Applications that help you manage your files are certain operations like "open"
    "save as", and "save.
  • Defragmentation, "the cure for framented files", is basically the way of the files of the system. (pg 126)
 Software Piracy and Intellectual Property Laws
  • Software piracy which is the illegal duplication of copyrighted software. B/c of piracy, many business' lose billions of dollars every year  to software pirates.

Intellectual Property and Law

  • Intellectual property includes the results of activities such as science and the arts.
  • The laws ensure that mental labor is rewarded and innovation is encourage.  
Inventing the Future Tomorrow’s Evolving Applications and Interfaces 
  •   The WIMP (windows, icons, menus, and pointing devices) interface is a lot easier to learn than earlier character-based interfaces
  • The SILK uses many new interface technologies such as speech, language, image, and knowledge.



Friday, October 1, 2010

Wednesday, September 29, 2010

Chapter 4 -Software Applications: Tools for Users

Consumer Applications
--> Many software companies have replaced their printed documents with:
  • Tutorials (ex: how to make your own blog)
  • Refrence materials
  • Help files
  • On-line help
Users can upgrade a program to the new version by paying an upgrade fee to the software manufacturer.
-->Newer releases often have additional features and fewer faults
Compatibility
  • Let's software function properly with hardware, operating system, and peripherals
  • A program written for one type of computer system may not work with another.
Disclaimers: when software developers limit their liability for software problems by selling the software as it is. (ex: before you install a computer, you must read the disclaimer and then agree to the terms and conditions)
Licensing: Commercial Software is copyrighted so it can't be legally duplicaed for distribution to others (Ex: Software License and olume License)
Distribution: Software is distributed bye  retail stores and email order catalogs. Not all software is copyrighted
Web applications fall into several categories:
  • applications that perform simple data- processing tasks that are also done on stand-alone PCs
  • applications that take advantage of the web's connectivity
  • applications that support online business transactions
  • new- oriented web applications provide up to minute reports on a several subjects
  • applications that support a more traditional form of information broadcast

The Origins of Linux - Linus Torvalds

Friday, September 24, 2010

Chapter 4- Software Basics- The Ghost in the Machine

Keep in mind: Open source means that a source is open to the public. You can also change the code behind this software or system.

Objectives:
  • Three fundamental categories of software and relationships
  • The relationship of algorithm to software
  • Know the factors that make a computer application
  • Know how file systems are organized and etc.
Linus Torvalds and the Software Nobody Owns
  • Linus Torvalds- the Linux creator
  • Linux= open source software
  • Linux powers web servers, handhelds, scientific supercomputers.
*user interface-->application or other program-->operating system

Major categories of software:
  1. compilers and other translator programs- lets programmers create different software (Ex: Intel compilers, Lahey compilers)
  2. software applicators- help computer users solve problems in regards to productivity (Ex: Open Office)
  3. system software-  coordinates hardware operations. Does the "behind-the-scenes" work a user rarely sees. (Ex: Microsoft Windows, Linux)
What are compilers? Computer programs that transform a source code written in a programming language into a computer language.

Processing with Programs
Note: The hardware in a computer system is equipped to produce whatever output a user requests.
For example: recipe = input out put= when u mix it and have your product

A fast, Stupid Machine
  • Programmers begin with algorithms ( step-by-step instructions written in natural language (e.g. English))
  • The steps are often over-achieving
  • The steps are then translated into the vocabulary of a programming language
The Language of Computers
  • Machine Language= numeric codes that represent data (ex.
  • High-level language= a balance btween machine language and natural human language (ex.
  • Natural Languages= resembles languages spoken by humans

Wednesday, September 22, 2010

Project Theory

A project is a temporary endeavor undertaken to create a unique product or service.
Software Development Life Cycle:-
Project Identification & Selection
Project Initiation & Planning
Analysis
Logical Design
Phsyical Design
Implementation
Maintenance

 
A project is also a sequence of unique, complex, and connected activities having one goal or purpose and that must be completed by a specific time, within budget, and according to specifications
SDLC
 
Project Management Criteria:
-Projects are oriented towards a goal.
-There is something unique about every project
-Project have a finite duration
- Projects require coordination of interrelated activities
 
What is project management?
- Project management is a set of principles and tools for :-
- Defining
-Planning
-Executing
-Controlling...and
-Completing a PROJECT
 
Why is PM important?
-ORganize your approach
-Generate a credible schedule
-Track progress and control your project
-Identify where to focus your efforts
-Identify problems early- befor they are crises
-Saves you TIME and MONEY
 
If you fail to plan, PLAN TO FAIL
  1. Assessment- Know your "W"
  2. Planning: define your aims, motivate yourself, what is your analysis??, know who your client is and what they want. Know your resources (human, financial, material, time). Predict possible outcomes, issues --> outline your project. Know who will help you throughout the process (team, partners-->or individual work? ==> Have CONCRETE OBJJECTIVES- SMART (Specific, Measurable, Achievable, Realistic, Timed)

  
 
 
 
 

IT News Project (presentation)

http://www.theaustralian.com.au/business/news/rims-blackpad-to-rival-apple-ipad/story-e6frg90x-1225927779150

Side Notes:
RIM brings about the rival to the iPad- the "BlackPad".
Main issue for RIM's BlackPad: It will  will face tough competition in an increasingly crowded market.
Impact area of study: To possibly bring Blackberry up to the one percentage point to 18 per cent lost from the second quarter of this year.
Social issues:The BlackPad could slowly but surely change how people are entertain, read, or interact.
Ethical:Not much different from the PC, the iPad. Overall, it's an example of information action, sharing, and use issues.

Friday, September 17, 2010

Tomorrows Technology and You 8/e- Chapter 2 (Friday the 17th, 2010 Sept.)

RAM (random access memory)
>Used to store program insturctions and data temporarily
> Unique addresses and dazta can be stored in any location
> Can quickly retrieve  information
> Will not remain if power goes off (volatile)
--> ROM (read-only memory)
> Information stored permanently on a chip
>Contains startup instructions and other permanent data
--> CMOS (complementary metal oxide semiconductor)
>Special low-energy kind of RAM
--> Flash Memory
>Used for phones, pagers, portable computers, handheld computers, and PDAs

---> Information travels between components on the motherboard through groups of wires called system


Buses
> typically have 32 or 64 wires
> connect to storage devices in bays
> connect to expansion slots
> connect to external buses amd [prts

Slots and ports
>Make it easy to add exteranal devoces called peripherals


==> New laser etching technology called extreme ultraviolet lithoghraphy (EUVL) could reduce chip size and increase performance radically
==> Superconductors that transmit electricity without heat could increase computer speed a hundredfold.
==>The optical computer transmits information in light waves rather than electrical pulses.

==> Lister several examples of input devices and explain how they can make it


Buses, Ports, and Peripherals
Information travels between components on the motherboard through groups of wires called system buses, or just buses.

Buses
Ø      Typically have 32 or 64 wires
Ø      Connect to storage devices in bays
Ø      Connect to expansion slots
Ø      Connect to external buses and ports
Slots and ports
Ø      Make it easy to add external devices, called peripherals.        

-New laser etching technology called extreme ultraviolet lithography (EUVL) could reduce chip size and increase performance radically.
-Superconductors that transmit electricity without heat could increase computer speed a hundredfold.
-The optical computer transmits information in light waves rather than electrical pulses.
-A computer manipulates patterns of bits—binary digits of information.
-The CPU follows software instructions, reduced to strings of bits, to perform the calculations and logical manipulations that transform input data into output.
-Not all CPUs are compatible with each other.

-The CPU uses:
Ø      RAM (random access memory) as a temporary storage area—a scratch pad—for instructions and data
Ø      ROM (read-only memory), which contains unchangeable information that serves as reference material for the CPU as it executes program instructions
-The CPU and main memory are housed in silicon chips on the motherboard.

Tuesday, September 14, 2010

What's the big deal? About Net Neutrality!!!


I am totally for net neutrality. Because, first it means that the internet is controlled by no one. Second, you get to choose where you can buy service for your internet from. Also, because it brings about competition, and personally i like it that way. With competition there is always going to be one who has succeeded and one who has lost. That's why companies like Google are very fortunate because they are able to buy certain web properties like You tube. Also by providing a search engine, Google has created very high standards that leaves other service providers envious!! For example, small companies that are not as big as Google are not at advantage, because they lack popularity, publicity, networking and association with other big companies. Which totally makes sense, because if you want to make it big, your going to want to connect, network, and market your company with other big or well-known companies!! And, of course this could lead to competition and paranoia among certain ISPs and internet companies!! Which, lastly, I believe will gradually develop better services and device use and ,in the end, for the consumer is never bad thing- as long as it is cheap right??



ISPs: Internet Service Provider; Comcast, AT&T, Verizon, etc...


Read the article: http://www.fiercecontentmanagement.com/story/whats-all-fuss-about-net-neutrality/2010-09-13
Watch Barack Obama talk about Net Neutrality: http://www.youtube.com/watch?v=g-mW1qccn8k

Friday, September 3, 2010

Homework for ITGS

  1. Research the topic of Net Neutrality. Just google it,  in the News, not general, tab. What is all the hype about it? Why are there fights, paranoia among companies like Google, Yahoo, At&t and more? (write an opinion response on your blog)
  2. Pick complex and interesting words, and bring them to the basic by using google.
DUE?

Chapter 2 Performance

CPU- Central Processing Unit
The CPU: The Real Computer

 
Microprocessors

 
  • interprets and executes the instructions in each program  
  • supervises arithmetic and logical data manipulations  
  • communicates with all the other parts of the computer system indirectly through memory  
  • an extraordinary complex collection of electronic circuits  
  • housed along with other chips and electronic components on the motherboard
  • All software is not necessarily compatible with every CPU 
  • software written for the Power PC family of processors used in Macintosh computers wont run on Intel processors 
  • Both programs written for Linux cant run on Windows 
  • Both systems run on PCs powered by Intel's microprocessor
  • CPUs in the same family are generally designed to be backward compatible 
  • Newer processors can process all the instructions handled by earlier models
  • Applications require faster machines to produce satisfactory results 
  • A computer's overall performance is determined by: its microprocessor's internal clock speed, measured in units called gigahertz (GHz) fir billions of clock cycles per second
  • the architecture and word size of the processor 
  • High-end workstations and servers use a 64-bit processor 
  • most PCs and Macs use 32-bit processors 
  • some embedded and special-purpose computers still use 8 and 16 bit processors
  • Techniques for speeding up a computer's performance: parallel processing, server clusters
  • Application require faster machines to produce satisfactory results
  • A computer's overall performance is determined by: Its microprocessor's imternal clock speed 
  • measured in units called gighertz (GHz) for billions of clock-cycles per second
  • The architecute and word size of the processor
  • High-end workstations and servers use 64-bit processors

Wednesday, September 1, 2010

Tomorrow's Technology and You 8/e Chapter 2

SIDE NOTES
Bit-
Byte-8 Bits
KB- Kibbyte 1024
MB- Megabyte 1024 to the power of 2
TB- Terabyte 1024 to the power of 3
PB- Pebibyte 1024 to the power of 4
EB- Exbibyte 1024 to the power of 5
ZB- Zebibyte 1024 to the power of 6
YB- Yottabyte 1024 to the power of 7

 
The Computer's Core the CPU and Memory

The  CPU: The Real Computer
 CPU (micro processor)
  • Interprets and executes the instructions in each program
  • Supervises arithmetic and logical data manipulations
  • Communications with all the other parts of the computer system indirectly through memory
  • An extrodinary complex collection of electronic circuits
  • Housed along with other chips and electronic components on the motherboard

All software is not necessarily compatioble with every CPU.
  • Software written for the Power PC family of processors used in Macintosh computers wont run on Intel processors
  • Programs written from Linux cant run on Windows. ----> Both systems run on PCs powered by Intel's microprocessor
  • CPUs in the same family are generally designed to be backward compatible. ---> Newer processors can process all of the instructions handled by earlier models.

  • Applications requre faster machines to produce satisfactory results.
  • A computer's overall perfomance is determine by:
  • Its microprocessor's internal clock speed ---> measured in units called gigahertz (GHz) for billions of clock cycles per seccond.
  • The architecture and word size of the processor
--High-end workstations and servers use 64-bit processor
--Most PCs and Macintoches use 32-bit processors
--Some embedded and special-purpose computers still use 8- and 16- bit processors

Techniques for speeding up a computer's performance:
  • Parallel processing
  • Server clusters
Total Point: 2

Friday, August 27, 2010

Social and Ethical Issues

Reliability
Reliability refers to the operation of hardware, the design of the software. the accuracy of data or the correspondence of data awith the real worlds. Data may be unrealiable if it is entered incorrectly or if it becomes outdated.

  • For example, a medical record that becomes dissociated from the patient it refers to becomes unreliable.
Integrity

Integrity refers to the correspondence of data with itself, as its creation. Data lacks integrity when it has been changed accidentally or had been tempered with.

  • For example,a hacker might change his drivers liscence data, resulting in arrests of innocent people.
Education and Training
Use of IT in teaching and learning: Educational software, online research and forms, virtual learning, ernvironments (VLE), e-books, Web 2.0 educational networks, use of mobile devices, game-based learning, fully immersive environments, filtering and monitoring of students' interent use, 1-to-1, m-learning
.
Hardware and network technologies in the classroom: Laptop computers, handheld devices, intereactive whiteboards.

Explaining Green Computing Video Notes

The Impact:
  • Energy costs already excceed hardware costs 
  • One pc  1.8 TONS of chemicals to buid a desktop computer

Energy Reduction
  • Turni off idle PCs
  • Lower power hardware--
  • Server virtuallizatio
  • Hardware as service
  • Energy efficient coding- saves power by writing software

===>US and UK 20bn kWh wasted due to PCs being on overnight

IBM Project big green
2900 servers
30 mainframes
80% saving

Computers can
  • increase business efficiciency
  • enable dematerealization
  • reduce the need for people to travel

Computing has already saved more resources that it has consumed

The Green Machine
New kid on the IT block.

Purchasing Strategy
  • laptops instead of PCs
  • If PCs, then make them thin clients
  • dont over -specify
  • high efficiency power supply unites
  • only green rated equiptment 
Maintenence
  • set monitors to "low power
  • mode after inactivity
  • switch off computers and other equipment after hours
Data Centres
  • highly efficient servers purchase
  • virtual servers if possinlble
  • review cooling



Explaining Green Computing

Dark Ages or Golden Ages You Decide Part 1

Thursday, August 26, 2010

How a Binary Works

How Binary works
0 1 2 3 4 5 6 7 8 9
 
10 11 12 13 14 15 16 17 18 19 20
21 22 23 24 25 26 27 28 29 20
 
Binary uses two digits, each column is worth the twice the one before.
 
To convert binary to decmimal WRITE IN EXPANDED NOTATION
 
Binary to Decimal SOLUTION; use Microsoft Windows Calculator
 

ITGS Entry 2 -Chapter 2 (Tomorrow's Technology and You 8/e)

Bits as Numbers
    Binary number system   
  • binary denotes all the numbers with combination of two digits
  • decimal numbers are automatically converted into binary numbers and vice versa
  • binary number processing is completely hidden from the user

decimal representation- binary representation
0-0
1-1
2-10
3-11
4-100
5-101
6-110
7-111
8-1000
9-1001
10-1010
11-1011
12-1100
13-1101
14-1110
15-1111

Bits as Codes

ASCII
the most wideley used code
an abbreviation of American Standard code for Information Interchange

Unicode
A coding scheme that supports 65,000 unique characters

Bits as Instructions in Programs
-->Programs are stored as collections of bits
Program instructions are represented in binary notation through the use of codes

Bits, Bytes, and Buyzzwords
byte=8 bits
kilobyte= 1 thousand bytes
megabytes= 1 million bytes
gigabytes= 1 billion bytes
terabytes= 1 trillion bytes

Green Computing
The manufacture of hardware and software can have an impact on the environment.
-- buy green equipment (energy star)
--Use a network and solar battery
-- turn off the computer when you're away
--screen savers don't save energy
--print only once
 --recycle waste products



Chapter 2 Objectives

*basic structure
*organization of comp

What Computers Do
*Receive input - accept information outside world
*Process information - decision making
* Store information: move/store info.

Input Devices - keyboards
Output devices - printer, speakers
Central processing Unit (CPU) - processes input

Memory and Storage Devices
*Primary storage RAM (Random Access Memory)
*Secondary storage: storage devices that serve as long-term repositories for
data
**hard disk devices
**CD/DVD
**tape drivers

Info
*communication that has value b/c it informs
**anything that can be communicated whether it is valuable or not
**words, numbers, pictures
**sound, movies

Computer info is digital
**Byte = 8 bits

Steps in the Scientific Method
*Multitasking
*Science Project, regular project
You go through the following steps:
  1. problem
  2. hypothesize data
  3. analyze
  4. scientific
  5. conclusion
Question is identified
--hypo
--data sought/gathered
--hypo tested/evaluated
--reliable conclusion

Critical Thinking
-correct thinking in the pursuit of revelant/reliable knowledge about the world
(think critic-does what)
- ask appropriate?
- gather info
- efficiently/creatively sort info
- reason info
- come to conclusion
      
                                                                                                                          
Bits as Numbers
    Binary number system   
How Binary works
0 1 2 3 4 5 6 7 8 9
 
10 11 12 13 14 15 16 17 18 19 20
21 22 23 24 25 26 27 28 29 20
 
Binary uses two digits, each column is worth the twice the one before.
 
To convert binary to decmimal WRITE IN EXPANDED NOTATION
 
Binary to Decimal SOLUTION; use Microsoft Windows Calculator
  • binary denotes all the numbers with combination of two digits
  • decimal numbers are automatically converted into binary numbers and vice versa
  • binary number processing is completely hidden from the user

decimal representation- binary representation
0-0
1-1
2-10
3-11
4-100
5-101
6-110
7-111
8-1000
9-1001
10-1010
11-1011
12-1100
13-1101
14-1110
15-1111

Bits as Codes

ASCII
the most wideley used code
an abbreviation of American Standard code for Information Interchange

Unicode
A coding scheme that supports 65,000 unique characters

Bits as Instructions in Programs
-->Programs are stored as collections of bits
Program instructions are represented in binary notation through the use of codes

Bits, Bytes, and Buyzzwords
byte=8 bits
kilobyte= 1 thousand bytes
megabytes= 1 million bytes
gigabytes= 1 billion bytes
terabytes= 1 trillion bytes

Green Computing
The manufacture of hardware and software can have an impact on the environment.
-- buy green equipment (energy star)
--Use a network and solar battery
-- turn off the computer when you're away
--screen savers don't save energy
--print only once
 --recycle waste products