| ||
|
Popular Posts
-
Abacus The abacus , also called a counting frame , is a calculating tool used primarily in parts of Asia for performi...
-
I Miss Kabuki Gurlz ! ~ tsk
Tuesday, October 12, 2010
Saturday, October 9, 2010
b a s ! c o n
![]() |
| Abacus The abacus, also called a counting frame, is a calculating tool used primarily in parts of Asia for performing arithmetic processes. Today, abacuses are often constructed as a bamboo frame with beads sliding on wires, but originally they were beans or stones moved in grooves in sand or on tablets of wood, stone, or metal. The abacus was in use centuries before the adoption of the written modern numeral system and is still widely used by merchants, traders and clerks in Asia, Africa, and elsewhere. The user of an abacus is called an abacist. |
* Charles Babage is the father of computing...He invented the Analytical and Difference Engines.
How the computer Begun...
The first computers were people! That is, electronic computers (and the earlier mechanical computers) were given this name because they performed the work that had previously been assigned to people. "Computer" was originally a job title: it was used to describe those human beings (predominantly women) whose job it was to perform the repetitive calculations required to compute such things as navigational tables, tide charts, and planetary positions for astronomical almanacs. Imagine you had a job where hour after hour, day after day, you were to do nothing but compute multiplications. Boredom would quickly set in, leading to carelessness, leading to mistakes. And even on your best days you wouldn't be producing answers very fast. Therefore, inventors have been searching for hundreds of years for a way to mechanize (that is, find a mechanism that can perform) this task.
Computer Generations
The first generation computers were huge, slow, expensive, and often undependable. In 1946
two Americans, Presper Eckert, and John Mauchly built the ENIACMark I. The ENIAC used thousands of vacuum tubes, which took up a lot of space and gave off a great deal of heat just like light bulbs do. The ENIAC led to other vacuum tube type computers like the EDVAC (Electronic Discrete Variable Automatic Computer) and the UNIVAC I (UNIVersal Automatic Computer). electronic computer which used vacuum tubes instead of the mechanical switches of the
These third generation computers could carry out instructions in billionths of a second. The size of these machines dropped to the size of small file cabinets. Yet, the single biggest advancement in the computer era was yet to be discovered.
This generation can be characterized by both the jump to monolithic integrated circuits
(millions of transistors put onto one integrated circuit chip) and the invention of the microprocessor (a single chip that could do all the processing of a full-scale computer). By putting millions of transistors onto one single chip more calculation and faster speeds could be reached by computers. Because electricity travels about a foot in a billionth of a second, the smaller the distance the greater the speed of computers.
Computer Generations
In the beginning ...
A generation refers to the state of improvement in the development of a product. This term is also used in the different advancements of computer technology. With each new generation, the circuitry has gotten smaller and more advanced than the previous generation before it. As a result of the miniaturization, speed, power, and memory of computers has proportionally increased. New discoveries are constantly being developed that affect the way we live, work and play.The First Generation: 1946-1958 (The Vacuum Tube Years)
The first generation computers were huge, slow, expensive, and often undependable. In 1946
two Americans, Presper Eckert, and John Mauchly built the ENIACMark I. The ENIAC used thousands of vacuum tubes, which took up a lot of space and gave off a great deal of heat just like light bulbs do. The ENIAC led to other vacuum tube type computers like the EDVAC (Electronic Discrete Variable Automatic Computer) and the UNIVAC I (UNIVersal Automatic Computer). electronic computer which used vacuum tubes instead of the mechanical switches of the The vacuum tube was an extremely important step in the advancement of computers. Vacuum tubes were invented the same time the light bulb was invented by Thomas Edison and worked very similar to light bulbs. It's purpose was to act like an amplifier and a switch. Without any moving parts, vacuum tubes could take very weak signals and make the signal stronger (amplify it). Vacuum tubes could also stop and start the flow of electricity instantly (switch). These two properties made the ENIAC computer possible.
The ENIAC gave off so much heat that they had to be cooled by gigantic air conditioners. However even with these huge coolers, vacuum tubes still overheated regularly. It was time for something new.
The Second Generation: 1959-1964 (The Era of the Transistor)
The transistor computer did not last as long as the vacuum tube computer lasted, but it was no less important in the advancement of computer technology. In 1947 three scientists, John Bardeen,
William Shockley, and Walter Brattain working at AT&T's Bell Labs invented what would replace the vacuum tube forever. This invention was the transistor which functions like a vacuum tube in that it can be used to relay and switch electronic signals.
William Shockley, and Walter Brattain working at AT&T's Bell Labs invented what would replace the vacuum tube forever. This invention was the transistor which functions like a vacuum tube in that it can be used to relay and switch electronic signals. There were obvious differences between the transisitor and the vacuum tube. The transistor was faster, more reliable, smaller, and much cheaper to build than a vacuum tube. One transistor replaced the equivalent of 40 vacuum tubes. These transistors were made of solid material, some of which is silicon, an abundant element (second only to oxygen) found in beach sand and glass. Therefore they were very cheap to produce. Transistors were found to conduct electricity faster and better than vacuum tubes. They were also much smaller and gave off virtually no heat compared to vacuum tubes. Their use marked a new beginning for the computer. Without this invention, space travel in the 1960's would not have been possible. However, a new invention would even further advance our ability to use computers.
Transistors were a tremendous breakthrough in advancing the computer. However no one could predict that thousands even now millions of transistors (circuits) could be compacted in such a small space. The integrated circuit, or as it is sometimes referred to as semiconductor chip, packs a huge number of transistors onto a single wafer of silicon. Robert Noyce of Fairchild Corporation and Jack Kilby of Texas Instruments independently discovered the amazing attributes of integrated circuits. Placing such large numbers of transistors on a single chip vastly increased the power of a single computer and lowered its cost considerably.
The Third Generation: 1965-1970 (Integrated Circuits - Miniaturizing the Computer)
Transistors were a tremendous breakthrough in advancing the computer. However no one could predict that thousands even now millions of transistors (circuits) could be compacted in such a small space. The integrated circuit, or as it is sometimes referred to as semiconductor chip, packs a huge number of transistors onto a single wafer of silicon. Robert Noyce of Fairchild Corporation and Jack Kilby of Texas Instruments independently discovered the amazing attributes of integrated circuits. Placing such large numbers of transistors on a single chip vastly increased the power of a single computer and lowered its cost considerably. Since the invention of integrated circuits, the number of transistors that can be placed on a single chip has doubled every two years, shrinking both the size and cost of computers even further and further enhancing its power. Most electronic devices today use some form of integrated circuits placed on printed circuit boards-- thin pieces of bakelite or fiberglass that have electrical connections etched onto them -- sometimes called a mother board.
The Fourth Generation: 1971-Today (The Microprocessor)
This generation can be characterized by both the jump to monolithic integrated circuits
(millions of transistors put onto one integrated circuit chip) and the invention of the microprocessor (a single chip that could do all the processing of a full-scale computer). By putting millions of transistors onto one single chip more calculation and faster speeds could be reached by computers. Because electricity travels about a foot in a billionth of a second, the smaller the distance the greater the speed of computers. However what really triggered the tremendous growth of computers and its significant impact on our lives is the invention of the microprocessor. Ted Hoff, employed by Intel (Robert Noyce's new company) invented a chip the size of a pencil eraser that could do all the computing and logic work of a computer. The microprocessor was made to be used in calculators, not computers. It led, however, to the invention of personal computers, or microcomputers.
It wasn't until the 1970's that people began buying computer for personal use. One of the
earliest personal computers was the Altair 8800 computer kit. In 1975 you could purchase this kit and put it together to make your own personal computer. In 1977 the Apple
II was sold to the public and in 1981 IBM entered the PCpersonal computer) market. (
earliest personal computers was the Altair 8800 computer kit. In 1975 you could purchase this kit and put it together to make your own personal computer. In 1977 the Apple
II was sold to the public and in 1981 IBM entered the PCpersonal computer) market. ( Today we have all heard of Intel and its Pentium®billion calculations in a single second. There is no end in sight for the computer movement. Processors and now we know how it all got started. The computers of the next generation will have millions upon millions of transistors on one chip and will perform over a
What are the computer Aplications???
* Business * Medicine
* Mathematics and science * Education
* Engineering * Entertainment
Computer Definitions
- A device that accepts input, process data, stors data and produce output. All according to a series of store instruction.
0000 0001 0010 0011 0100 0101 0111 1000 1001 1010
Their Trends And Issues
* Web Technology
* Artificial Intelligence
* Commerce
* Education
* Career And Professional Outlook
* Information Ethics
And even Computers have their Ten Commandments of Computer Ethics
- Thou shalt not use a computer to harm others people.
- Thou shalt not interface w/ other peoples computer work.
- Thou shalt not snoop around in others people's file.
- Thou shalt not use a computer to steal.
- Thou shalt not use a computer to bear false witness.
- Thou shalt not use or copy software for w/c you have not paid.
- Thou shalt not use other people's computer resources w/out authorization.
- Thou shalt not appropriate others people's intellectual output.
- Thou shalt think about the social consequences of the program you write.
- Thou shalt use a computer in ways the show consideration and respect.
What information ethics are NOT?
- NOT Law
- NOT Security
- NOT Common sense
- NOT Relative
- NOT Conscience
Query languages
are computer languages used to make queries into databases and information systems. Computer crime, or cybercrime
Refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime.Netcrime refers, more precisely, to criminal exploitation of the Internet.Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
Service theft
Is the legal term for a crime which is committed when a person obtains valuable services — as opposed to goods — by deception, force, threat or other unlawful means, i.e., without lawfully compensating the provider of said services.
Data alteration
Is a crime which has been constantly affecting majority of the people today. Apart from data theft and computer hacking, unauthorized access, interruptions and counterfeiting of data is becoming quite common these days. Data may be altered for various reasons -- either for gaining access to confidential information, or for the purpose of forgery. Personal information, especially relating to financial matters such as the credit card code, bank account number, etc can be stolen. The information so obtained can be altered, misused, or conveniently sold for personal gain.
Virus
Is a small infectious agent that can replicate only inside the living cells of organisms. Most viruses are too small to be seen directly with a light microscope. Viruses infect all types of organisms, from animals and plants to bacteria and archaea.
Worm
Is a self-replicating malware computer program. It uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
Malicious Access
Detecting apparatus which is cable of grasping the whole aspect of an attack which can occur, before it actually occurs. A monitoring information-collecting section collects monitoring information including the network events detected by the monitoring devices on networks. A malicious apparatus group-deriving section retrieves a corresponding piece of the event information from an event information storage device, and derives, based on the retrieved piece of the event information, apparatuses that are involved in relevant detected network events which belong to the predetermined type of network events and of which addresses of senders or recipients are same, as a malicious apparatus group involved in the predetermined type of malicious access.
The parts of your computer
Computers are made up of many parts. These different parts perform one or more functions including input, output, processing, or storage.
OUTPUT DEVICES
Output devices send information from your computer to you. This information is usually in the form of sound and sight, but some devices can send information as touch and even as smell! Some common output devices are monitors, printers, and speakers.
INPUT DEVICES
Input devices are the parts that let you enter and manipulate information on a computer. These devices range from the standard keyboard and mouse, to scanners, microphones, joysticks, and light pens. There are some devices that can input and output. Some examples would touch screen monitors (input by touch, output by sight) and force feedback joysticks.
ON THE INSIDE
The inside of your computer has many parts that all work together. These parts are generally found within your computer case - this is usually the big "box" that probably sits under your desk or below your monitor. If you're using an iMac, many of the computer parts are built into the monitor case.
The motherboard [shown at right], or mainboard, is the backbone of the computer. All the individual pieces connect to the motherboard in some way. The motherboard is home the processor chip, pci slots, and memory.
Processor - This is the chip that does the "thinking" of the computer. These are the "Pentium" and "AMD" chips you hear about. Processor speed is measured in MegaHertz(Mhz) and GigaHertz(Ghz). 1 Ghz = 1000 Mhz
Memory - This is where information is temporarily stored for the processor to use and manipulate before storing on the HARD DRIVE. Also known as RAM (Random access memory). Information is stored in memory only when the computer is turned on. Ram is measured in Megabytes(Mb), which is storage capacity, not to be confused with MegaHertz, which is speed. PCI Slot - These are outlets in the motherboard that allow you to install extra components like sound cards, modems, video cards, and other devices. The images below show different PCI card components.
Hard Drive - This is the part of your computer where information is stored for later retrieval. All the information you access on your computer, all your documents, pictures, email messages, and programs are here. Unlike memory, the hard drive stores information even after the power is turned off. The image to the right shows the inside of a hard drive. Floppy Drive - This is the slot in the front of your computer where you insert a disk to store data and move it to another computer. If your computer is an iMac, you will not have a Floppy Drive. Floppy disks are 3¼ inches in size, and hold 1.44Mb of data. The images below show a floppy drive, and some floppy disks.
CD ROM or DVD ROM Drives - This plays your music and data cd's, or if you have a DVD drive, it will also play DVD movies. Data CD's hold up to 700Mb of information. If you have a CD-R or CD-RW drive, you can store your own information on CDs.
Symbols
A typical flowchart from older computer science textbooks may have the following kinds of symbols:
- Start and end symbols
- Represented as circles, ovals or rounded rectangles, usually containing the word "Start" or "End", or another phrase signaling the start or end of a process, such as "submit enquiry" or "receive product".
- Arrows
- Showing what's called "flow of control" in computer science. An arrow coming from one symbol and ending at another symbol represents that control passes to the symbol the arrow points to.
- Processing steps
- Represented as rectangles. Examples: "Add 1 to X"; "replace identified part"; "save changes" or similar.
- Input/Output
- Represented as a parallelogram. Examples: Get X from the user; display X.
- Conditional or decision
- Represented as a diamond (rhombus). These typically contain a Yes/No question or True/False test. This symbol is unique in that it has two arrows coming out of it, usually from the bottom point and right point, one corresponding to Yes or True, and one corresponding to No or False. The arrows should always be labeled.A decision is necessary in a flowchart. More than two arrows can be used, but this is normally a clear indicator that a complex decision is being taken, in which case it may need to be broken-down further, or replaced with the "pre-defined process" symbol.
A number of other symbols that have less universal currency, such as:
- A Document represented as a rectangle with a wavy base;
- A Manual input represented by parallelogram, with the top irregularly sloping up from left to right. An example would be to signify data-entry from a form;
- A Manual operation represented by a trapezoid with the longest parallel side at the top, to represent an operation or adjustment to process that can only be made manually.
- A Data File represented by a cylinder.
Flowcharts may contain other symbols, such as connectors, usually represented as circles, to represent converging paths in the flowchart. Circles will have more than one arrow coming into them but only one going out. Some flowcharts may just have an arrow point to another arrow instead. These are useful to represent an iterative process (what in Computer Science is called a loop). A loop may, for example, consist of a connector where control first enters, processing steps, a conditional with one arrow exiting the loop, and one going back to the connector. Off-page connectors are often used to signify a connection to a (part of another) process held on another sheet or screen. It is important to remember to keep these connections logical in order. All processes should flow from top to bottom and left to right.
A computer network, often simply referred to as a network, is a group of computers and devices interconnected by communications channels that facilitate communications among users and allows users to share resources. Networks may be classified according to a wide variety of characteristics.A network consists of multiple computers connected using some type of interface, each having one or more interface devices such as a Network Interface Card (NIC) and/or a serial device for PPP networking. Each computer is supported by network software that provides the server or client functionality. The hardware used to transmit data across the network is called the media. It may include copper cable, fiber optic, or wireless transmission. The standard cabling used for the purposes of this document is 10Base-T category 5 ethernet cable. This is twisted copper cabling which appears at the surface to look similar to TV coaxial cable. It is terminated on each end by a connector that looks much like a phone connector. Its maximum segment length is 100 meters.
The study of network topology recognizes seven basic topologies:- Single Node Topology
- Bus topology
BUS TOPOLOGY
A bus network uses a multi-drop transmission medium, all node on the network share a common bus and thus share communication. This allows only one device to transmit at a time. A distributed access protocol determines which station is to transmit. Data frames contain source and destination addresses, where each station monitors the bus and copies frames addressed to itself.

( a typical bus topology)
A bus topology connects each computer (nodes) to a single segment trunk (a communication line, typically coax cable, that is referred to as the 'bus'. The signal travels from one end of the bus to the other. A terminator is required at each to absorb the signal so as it does not reflect back across the bus. A media access method called CSMA/MA is used to handle the collision that occur when two signals placed on the wire at the same time. The bus topology is passive. In other words, the computers on the bus simply 'listen' for a signal; they are not responsible for moving the signal along.
Advantages: Failure of one of the station does not affect others.
Good compromise over the other two topologies as it allows relatively high rate of data tansmittion.
Well suited for temporary networks that must be set up in a hurry.
Easy to implement and extend.
Disadvantage: Require a network to detect when two nodes are transmitting at the same time.
Does not cope well with heavy traffic rates
Difficult to administer/troubleshoot.
Limited cable length and number of stations.
A cable brake can disable the entire network; no redundancy.
Maintenance cost may be higher in the long run.
Performance degrade as additional computers are added.
- Star topology

- Ring topology
-
Ring topology
Also known as a ring network, the ring topology is a computer network configuration where each network computer and device are connected to each other forming a large circle (or similar shape). Each packet is sent around the ring until it reaches its final destination. Today, the ring topology is seldom used. Below is a visual example of a simple computer setup on a network using a ring topology.
- Tree topology
-
Tree topology
Also known as a star bus topology, tree topology is one of the most common types of networkbus topology and a star topology. A tree topology connects multiple star networks to other star networks. Below is a visual example of a simple computer setup on a network using the star topology. setups that is similar to aIn the above example picture if the main cable or trunk between each of the two star topology networks failed, those networks would be unable to communicate with each other. However, computers on the same star topology would still be able to communicate with each other.
- Mesh topology
-
Mesh topology
A network setup where each of the computers and network devices are interconnected with one another, allowing for most transmissions to be distributed, even if one of the connections go down. This type of topology is not commonly used for most computer networks as it is difficult and expensive to have redundant connection to every computer. However, this type of topology is commonly used for wireless networks. Below is a visual example of a simple computer setup on a network using a mesh topology.
- Hybrid topology
Database

(1) Often abbreviated DB. A collection of information organized in such a way that a computer program can quickly select desired pieces of data. You can think of a database as an electronic filing system.
Traditional databases are organized by fields, records, and files. A field is a single piece of information; a record is one complete set of fields; and a file is a collection of records. For example, a telephone book is analogous to a file. It contains a list of records, each of which consists of three fields: name, address, and telephone number.
An alternative concept in database design is known as Hypertext. In a Hypertext database, any object, whether it be a piece of text, a picture, or a film, can be linked to any other object. Hypertext databases are particularly useful for organizing large amounts of disparate information, but they are not designed for numerical analysis.
To access information from a database, you need a database management system (DBMS). This is a collection of programs that enables you to enter, organize, and select data in a database.
(2) Increasingly, the term database is used as shorthand for database management system.
Characteristics
The characteristics of UTP are very good and make it easy to work with, install, expand and troubleshoot and we are going to look at the different wiring schemes available for UTP, how to create a straight through UTP cable, rules for safe operation and a lot of other cool stuff !
So let's have a quick look at each of the UTP categories available today:

Category 1/2/3/4/5/6 – a specification for the type of copper wire (most telephone and network wire is copper) and jacks. The number (1, 3, 5, etc) refers to the revision of the specification and in practical terms refers to the number of twists inside the wire (or the quality of connection in a jack).
CAT1 is typically telephone wire. This type of wire is not capable of supporting computer network traffic and is not twisted. It is also used by phone companies who provide ISDN, where the wiring between the customer's site and the phone company's network uses CAT 1 cable.
CAT2, CAT3, CAT4, CAT5 and CAT6 are network wire specifications. This type of wire can support computer network and telephone traffic. CAT2 is used mostly for token ring networks, supporting speeds up to 4 Mbps. For higher network speeds (100Mbps plus) you must use CAT5 wire, but for 10Mbps CAT3 will suffice. CAT3, CAT4 and CAT5 cable are actually 4 pairs of twisted copper wires and CAT5 has more twists per inch than CAT3 therefore can run at higher speeds and greater lengths. The "twist" effect of each pair in the cables will cause any interference presented/picked up on one cable to be cancelled out by the cable's partner which twists around the initial cable. CAT3 and CAT4 are both used for Token Ring and have a maximum length of 100 meters.
CAT6 wire was originally designed to support gigabit Ethernet (although there are standards that will allow gigabit transmission over CAT5 wire, that's CAT 5e). It is similar to CAT5 wire, but contains a physical separator between the 4 pairs to further reduce electromagnetic interference.
The next pages (check menu) show you how UTP cable is wired and the different wiring schemes. It's well worth visiting and reading about.
Conclusion
What I've Learned???
I've learned a lot in this subject'...first on how the way he teach us,in every period' :]
Computers, huh? I've heard it all boils down to just a bunch of ones and zeroes....
Computer Science is no more about computers than astronomy is about telescopes.
Favorite topic. . .
.
.
.
...My favorite topic is when I know how remote admin.works,..there disadvantages and advantages
not all the time it's good for us..based on the computer commandments it goes like this..
And even Computers have their Ten Commandments of Computer Ethics
- Thou shalt not use a computer to harm others people.
- Thou shalt not interface w/ other peoples computer work.
- Thou shalt not snoop around in others people's file.
- Thou shalt not use a computer to steal.
- Thou shalt not use a computer to bear false witness.
- Thou shalt not use or copy software for w/c you have not paid.
- Thou shalt not use other people's computer resources w/out authorization.
- Thou shalt not appropriate others people's intellectual output.
- Thou shalt think about the social consequences of the program you write.
- Thou shalt use a computer in ways the show consideration and respect.
Is the legal term for a crime which is committed when a person obtains valuable services — as opposed to goods — by deception, force, threat or other unlawful means, i.e., without lawfully compensating the provider of said services.. .
Thank yOu :]
And I hOpe yOu Like it ! ! !
Thursday, October 7, 2010
Subscribe to:
Comments (Atom)








