Thursday, November 21, 2013

Operation System

OS

An operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. Application programs usually require an operating system to function.The operating system acts as an interface between the hardware and the programs requesting I/O. It is the most fundamental of all system software programs.
Responsibilities of the OS include:
  • Hiding the complexities of hardware from the user
  • Managing between the hardware's resources which include the processors, memory, data storage and I/O devices
  • Handling "interrupts" generated by the I/O controllers
  • Sharing of I/O between many programs using the CPU
The most well known Operating Systems include:
  • System Software - programs that manage the operation of a computer
  • Application Software - programs that help the user perform a particular task
User InterfacesThe User Interface is the interaction between the User and the Machine, letting the user send commands with the expected results. Two forms of the Interface User are the Command Line Interface and the Graphical User Interface.


Memory management is the act of managing computer memory. The essential requirement of memory management is to provide ways to dynamically allocate portions of memory to programs at their request, and free it for reuse when no longer needed. This is critical to any advanced computer system where more than a single process might be underway at any time.

Process management is the ensemble of activities of planning and monitoring the performance of a process. The term usually refers to the management of business processes and manufacturing processes. Business process management (BPM) and business process reengineering are interrelated, but not identical.

In computer science, scheduling is the method by which threads, processes or data flows are given access to system resources (e.g. processor time, communications bandwidth). This is usually done to load balance a system effectively or achieve a target quality of service. The need for a scheduling algorithm arises from the requirement for most modern systems to perform multitasking (execute more than one process at a time) and multiplexing (transmit multiple flows simultaneously).
--The scheduler is concerned mainly with:
--Throughput - The total number of processes that complete their execution per time unit.
--Latency, specifically:
--Turnaround time - total time between submission of a process and its completion.--
--Response time - amount of time it takes from when a request was submitted until the first response is produced.

--Fairness / Waiting Time - Equal CPU time to each process (or more generally appropriate times according to each process' priority). It is the time for which the process remains in the ready queue.

An instruction cycle (sometimes called fetch-and-execute cycle, fetch-decode-execute cycle, or FDX) is the basic operation cycle of a computer. It is the process by which a computer retrieves a program instruction from its memory, determines what actions the instruction requires, and carries out those actions. This cycle is repeated continuously by the central processing unit (CPU), from bootup to when the computer is shut down.
Each computer's CPU can have different cycles based on different instruction sets, but will be similar to the following cycle:
1. Fetching the instruction
The next instruction is fetched from the memory address that is currently stored in the program counter (PC), and stored in the instruction register (IR). At the end of the fetch operation, the PC points to the next instruction that will be read at the next cycle.
2. Decode the instruction
The decoder interprets the instruction. During this cycle the instruction inside the IR (instruction register) gets decoded.
3.In case of a memory instruction (direct or indirect) the execution phase will be in the next clock pulse.
If the instruction has an indirect address, the effective address is read from main memory, and any required data is fetched from main memory to be processed and then placed into data registers(Clock Pulse: T3). If the instruction is direct, nothing is done at this clock pulse. If this is an I/O instruction or a Register instruction, the operation is performed (executed) at clock Pulse.
4. Execute the instruction
The control unit of the CPU passes the decoded information as a sequence of control signals to the relevant function units of the CPU to perform the actions required by the instruction such as reading values from registers, passing them to the ALU to perform mathematical or logic functions on them, and writing the result back to a register. If the ALU is involved, it sends a condition signal back to the CU.

Von Neumann Architecture


Computer data storage, often called storage or memory, is a technology consisting of computer components and recording media used to retain digital data. It is a core function and fundamental component of computers. The central processing unit (CPU) of a computer is what manipulates data by performing computations. In practice, almost all computers use a storage hierarchy, which puts fast but expensive and small storage options close to the CPU and slower but larger and cheaper options farther away. Often the fast, volatile technologies (which lose data when powered off) are referred to as "memory", while slower permanent technologies are referred to as "storage", but these terms can also be used interchangeably. In the Von Neumann architecture, the CPU consists of two main parts: control unit and arithmetic logic unit (ALU). The former controls the flow of data between the CPU and memory; the latter performs arithmetic and logical operations on data.
Input is the term denoting either an entrance or changes which are inserted into a system and which activate or modify a process. It is an abstract concept, used in the modeling, system design and system exploitation. It is usually connected with other terms, e.g., input field, input variable, input parameter, input value, input signal, input port, input device and input file.
Output is the term denoting either an exit or changes which exit a system and which activate/modify a process. It is an abstract concept, used in the modeling, system(s) design and system(s) exploitation.
A central processing unit (CPU), also referred to as a central processor unit, is the hardware within a computer that carries out the instructions of a computer program by performing the basic arithmetical, logical, and input/output operations of the system. The term has been in use in the computer industry at least since the early 1960s. The form, design, and implementation of CPUs have changed over the course of their history, but their fundamental operation remains much the same.
An arithmetic and logic unit (ALU) is a digital circuit that performs integer arithmetic and logical operations. The ALU is a fundamental building block of the central processing unit of a computer, and even the simplest microprocessors contain one for purposes such as maintaining timers. The processors found inside modern CPUs and graphics processing units (GPUs) accommodate very powerful and very complex ALUs; a single component may contain a number of ALUs.

Wednesday, November 20, 2013

ICT LOGIC GATES

logic gate is an idealized or physical device implementing a Boolean function, that is, it performs a logical operation on one or more logical inputs, and produces a single logical output. Depending on the context, the term may refer to an ideal logic gate, one that has for instance zero rise time and unlimited fan-out, or it may refer to a non-ideal physical device[1] (see Ideal and real op-amps for comparison).
Logic gates are primarily implemented using diodes or transistors acting as electronic switches, but can also be constructed using electromagnetic relays (relay logic), fluidic logicpneumatic logicopticsmolecules, or even mechanical elements. With amplification, logic gates can be cascaded in the same way that Boolean functions can be composed, allowing the construction of a physical model of all of Boolean logic, and therefore, all of the algorithms and mathematics that can be described with Boolean logic.
Logic circuits include such devices as multiplexersregistersarithmetic logic units (ALUs), and computer memory, all the way up through complete microprocessors, which may contain more than 100 million gates. In practice, the gates are made from field-effect transistors (FETs), particularly MOSFETs (metal–oxide–semiconductor field-effect transistors).
Compound logic gates AND-OR-Invert (AOI) and OR-AND-Invert (OAI) are often employed in circuit design because their construction using MOSFETs is simpler and more efficient than the sum of the individual gates.[2]

Friday, November 1, 2013

Google Car

(Google Self-Driving Car image by Steve JurvetsonCC BY 2.0)

After several years of testing autonomous car, Google has revealed something to show for its work. It’s been proven before that Google’s autonomous vehicles are actually safer than car driven by an actual person. and now, the proof has been furthered, after a few test in California and Nevada.

Major Concepts

  • The new car runs on battery and can be charged
  • It has it's own brain that can control all of it's surroundings
  • It is able to navigate through tight traffic using radar system
Advantage
  • It is far more safer than human driven cars because it uses technology.
  • it can reduce risk of accidents/ drunk driving  because it goes in a steady pace.
  • good for people who aren't able to drive because it it an automatic car.
Disadvantage
  • This car is really slow because it doesn't have a huge engine
  • This car is highly expensive and can be bought only by rich people because it is new and it's it at the moment limited.
  • it doesn't have the capability to pick up speed to over take because it is slow.
Discussion Questions
Why do you think people will use this car?
Can this reduce the number of accidents in this world ?

Starr, Michelle. “Google: Self-driving Cars Safer than Professional Drivers.” - Cars. Cnet, 28 Oct. 2013. Web. 31 Oct. 2013.

Saturday, October 12, 2013

First Generation Of Computers

This presentation is about where the computer or phone had first come from.
               


Sunday, September 29, 2013

Understanding Search and Ethics

This Power point is about understanding the basics of Search Ethics. Out group found information online by using the proper form of searching. We gathered all this information into a document. We then assigned each person to s specific task and gave that person a task. My task was finding what ethics is and what it means. I found information from Google and i also found additional information using videos from YouTube. We then came together after school and worked collaboratively to form a good and solid presentation and we also went through it a few times so we are familiar with the content in it. After all the hard work this is the final product :))

Samsung eye movement


Summary: Recently, smartphones like the Samsung Galaxy S4 have come equipped with optical sensors that track users' eye movements, and scroll or pause text and images accordingly. Now, a similar approach is being employed on tablet-based training software. Theoretically, if users look away from the training program to check their e-mail or phone messages (or watch a cat video on YouTube), the session will stop and wait until they return. The ability to hold off on running the firehose of information if a user gets distracted is an interesting concept.
Major Concepts
·         But learning is not always an intensively focused process -- some people need to pause regularly to reflect on the information they have just learned.
·         For some, having a machine nag them to get back to the course of study may be more of a concentration killer than an enabler.
·         it could even evoke flashbacks of that mean elementary school teacher who snapped at you every time you lifted your head up from your books.


Potential Strengths

·         Mindflash, which is marketing the online training solution, calls the new capability the "look-away feature."
·         As the company puts it: FocusAssist monitors trainee attention and pauses a training course in the Mindflash application when trainees look away.
·         "Organizations concerned about trainee distraction and compliance during self-paced remote training can now have greater confidence that critical information is being reviewed and understood," Mindflash says.

Potential Problems

·         The computer-vision solution was developed by Stanford University Ph.D.s and founders ofSension, maker of computer vision technologies.
·         Mindflash for iPad is the first implementation of this technology for corporate e-learning.

Discussion Questions
·         Will this improve employee training?
·         Is this too aggressive?

Thursday, September 26, 2013

India Video

Hi, this is my video about india. My partner and I worked on this project not only by finding information off the net, we also talked and interviewed other people. We searched for people who strongly follow Indian culture and asked them questions and their opinion about indian culture. After collecting information from people we then searched for information off the net. We made this power point to show the class about indian culture. To make the video i just added a song called "tuje mein rub dika ta hain" in the beginning then added a YouTube video in it. Then i posted it on YouTube so everyone can see.


Tuesday, September 10, 2013

India

This is all you need to know about india. My partner and I worked on this project not only by finding information off the net, we also talked and interviewed other people. We searched for people who strongly follow Indian culture and asked them questions and their opinion about indian culture. After collecting information from people we then searched for information off the net. We made this power point to show the class about indian culture. We also used a few examples we found from movies. we had 2 videos showcasing traditional Bollywood dance and one showcasing Indian rap. We took almost 3 days of hard work to finish this. I hope you like it :)))

Monday, September 9, 2013

DNP Nissan Nismo smartwatch

DNP Nissan Nismo smartwatch


DNP Nissan Nismo smartwatch
Nissan's new watch called the "Nissan Nismo" became a huge hit after it released. Nissan nismo, is a watch that can be compatable with a car, You can use the watch as a smart phone. It allows you to use applications such as facebook, twitter, instagram. It also has the bassic functions of a watch. This 

Major concepts 
- The watch uses bluetooth,It connects the watch and the phone to the car. This allows the car to send data to the watch
-you are aware of the surroundings while driving, it becomes easier for you to know or be warned on the upcoming terrain 
- You can share your speed or heart rate in correlation to the cars speed on Facebook, twitter, or instagram.

Potential strength
-The watch can alert you about any dangers that lie ahead 
-the battery life can last over a week which makes it convinient for the drivers
-it lets the driver better understand how he reacts with the car

Potential Weaknesses
-this feature is only avalaible for one car in nissan and it's really expesive
-some functions of the watch aren't necessary like twitter, who would actually tweet the speed or your car?
- this is a product mostly for men, but it looks like a female accessory  

Why do you think Nissan took this big leap
Do you think people will use all of it's functions?

Wednesday, August 28, 2013

Classroom Rules

ICT Classroom Rules Poster
By: Nitin




Listed above are the 12 most important things to follow in Mr. Pete's ICT class. We, in partners, made rules to follow, out of all the rules that we made we voted on the two best. The class of  10-A got more votes. With that set of rules we had to customize it using text boxes and different fonts and texts. Then after editing the rules, we then added pictures to each rule so it becomes more visible and not too boring. This is how we got from 12 sets of rules to individually designed posters












Thursday, August 15, 2013

INTERNET SECURITY

INTERNET SECURITY

Facebook, Skype, twitter, these are only few the most popular socializing websites. More than 1 billion people using these sites. Little do they know how dangerous it can be. But why, you might ask? Many reasons for sure, but the most important reason can lead to death. To most people it may sound stupid and unrealistic, but putting all your personal information on Facebook or Skype or any other chatting site. There are creepy people out there, people like pedophiles, rapists, kidnappers. Do you have any idea how easy it is for them to find out about you? They make fake accounts and add you. And with experience comes the knowledge of how to convince you. They can find you in no time, and with no other way to say this, you’ll basically die. Now what if you go around posting pictures of you half naked, wont people find out how you really are. Think about your reputation. Sure it might seem “cool” now but 10 years from now what will people think about you. Colleges, jobs they all look at your background before they take you, and if they find your profile all full of junk, do you have any chance of getting in? NO! Boom there, future ruined.  Now I’m sure you guys have been using Facebook or whatever for long enough to figure that there is a little button below the name which says “report”. Oh yeah now you remember. It’s there for a reason, and it’s practically self-explanatory. You report if people are being creepy, that’s one way to be safe. Another way is, just don’t put all your info on Facebook. The truth is, no one cares if you’re going to a mall, no one cares if you’re eating at the most expensive restaurant, and the only good thing that might come out from that is self-confidence. But if you do, it won’t be hard for people to track you down. My advice stay safe before you’re sorry. It’s not hard. Stay safe from internet before it catches you. J

These two videos explain a lot about the effects of internet security"