Free Essay

Chapter 1-3 Computer Structure and Logic Review

In:

Submitted By jsargent124
Words 2681
Pages 11
Chapter 1 review questions 1. Which of the following is an example of a PC? The 8088 processor marked the start of the home and office based PC’s given that it had a 1mb address limit making a more efficient machine. 2. Who is credited with the patent of the first computer? John V. Atanasoff was the first person accredited for the invention of the computer due to his use of modern digital switching techniques. 3. In the Von Neumann architecture, what two make up the CPU? In Von Neumann’s model of the CPU there are three components, only two are listed in this review and they are the control unit and the arithmetic unit. 4. What technology alleviates the problem of the “Von Neumann bottleneck”? in this chapter they explain the issue of bottlenecking like a highway, where the information sent and received traveled through a narrow highway on the original architecture. The solution to the problem was creating what is now referred to as Cache memory. 5. Which of the following are groups within the Von Neumann architecture? There are four groups to the basic architecture Working Storage, Permanent Storage, Output and Input devices. 6. What are the three main connections in a transistor. Transistors are made using the same architecture as a vacuum tube just in a much smaller and safer manner, these connections are called the “Gate” the “Drain” and the “conductor”. 7. MOSSFET is the most common type of what electronic component? MOSSFET (standing for Metal Oxide Semiconductor Field Effect Transistors) is most known for their electric component the transistor. 8. Approximately how many transistors are incorporated in today’s intel processors? The evolution of transistor have made them so small, some measured by the size of atoms, have made it possible to cram millions and in some cases more currently billions of transistors into one CPU. 9. What made the 8088 Intel CPU special compared to its predecessors? The 8088 CPU was made more efficient than its predecessors due to its 1MB address limit, whereas processors before processors only offered only fractions of that for address limits making the 1MB the king of the jungle essentially. 10. What does Moors Law state? Professor Gordon Moor states that the evolution of computer memory grows at an exponential rate doubling the capacity of its predecessors every 18-24 months. 11. Which Two components are most responsible today for the advancement of PC CPU’s? Considering the rate of growth for computer processing and need for computing speed, we are in an endless battle of faster and stronger CPU’s. The two biggest contenders batting for dominance in this industry are Intel and AMD. Intel holding an 80% dominance on chipsets, where AMD comes in quite further down the line, even though there is a large gap in the percentage of market shares AMD is the closest competitor to intel out there today. 12. Which Company did IBM first hire to build their core operating system for their PC’s? IBM had hired Microsoft in their infancy to program an operating system for their first PC’s. This program was known as MS-DOS. IBM in their haste to develop a new cutting edge technology failed to retain an exclusive copyright to the software, inadvertently sealing their demise in the PC industry. 13. Which company dominates the CPU and chipset market? As stated before holding nearly 80% of the market Intel is the largest producer of PC and Mac chipsets on the market. 14. Which of the following components feeds power to the internal components in a PC? It is very simple to answer this question, located on the PC where you power connection is made is a series of transformers and capacitors all tasked with the job of converting your power source into usable energy for your PC this is called the Power Supply. 15. Which of the following are examples of input devices? To answer this question we must first understand what input devices are. An input device is a device used to manually control the input of information for your CPU; to identify and send the information to control aspects of your user interface. Some of these devices are Keyboards, Mice, Joysticks etc..
Chapter 2 review 1. How many combinations are there in a 4 bit binary number? 1 bit is equal to 1/8 of a Byte in terms of storage. These numbers are computed exponentially. When talking binary we are using a language called base 2, this is representing On/Off, and to find the amount of combinations in a 4 bit binary number you can use the exponent of 24 to find your answer. This equates to 16 combinations. 2. 24-bit color is the same as which of the following amounts of color? Again use the base 2 growth to determine the amount of colors so your equation would be 224 24 representing the bits for color and 2 being the base of your equation. The answer you are looking for is 16,777,216 different color combinations. 3. What is the binary equivalent of the decimal number 6? In this equation you can use a line with the growth of 2 exponentially from right to left. 16 8 4 2 1 0| like so, when you are trying to get the binary number subtract the closest number to the number you are defining if the number is subtract-able it gains a numeric weight of 1 if the number is not subtract able it generates a numeric weight of 0. In this case I will subtract 4, gaining a value of 1, next step is to subtract the following integer from my leftover number which is 2, the following integer is also 2 adding a value of 1 to my binary equation, now I have zero left to subtract from leaving me with a 0 to finish the binary value of 6. Following this method I came to the conclusion that the binary value of 6 is 110. 4. What is the binary value of the decimal number 255? Using the same steps as explained above I came to the configuration of 11111111. 5. What is the decimal value of 212? Following the line of exponential growth on the diagram designed for understanding binary value, you can come to the conclusion that 212 is equivalent to 4096. 6. A gigabyte is equal to how many bytes in binary measurement? Considering a byte is 1/1,000,000th of a Megabyte, and a Megabyte is 1/1,000,000th of a Gigabyte one can only express this answer as a Gigabyte being the equivalent of 1,000,000,000 bytes. 7. In the hexadecimal system what is D equal to? Considering computers on equate single place values in consecutive orders, you are unable to put a place value of 10 or 12 or 13 or any numbers following double decimal. This being an issue the developed a language using what is called hexadecimal or base 16, the computer uses a mixture of letters and numbers to assign values. The combinations are based on 0-9 and A-F the weight of A being 10 and the weight of F being 15 so D has the weight of 13. 8. Which of the following operators is represented with the | (pipe) sign? There are 3 signs representing basic Boolean operations and these signs are AND=& OR=| NOT=~. The sign of | pipe equals OR. 9. Using the binary numbering system if A=1 and B=1 what is the solution to the following equation A AND B? Considering they both have the value of one, then the parameter AND would compute this set or equation to the value of 1. 10. You want to search records containing “Music Lessons” and “Computer Music” which of the following expressions would work best? Considering the main component you are searching for is “Music” and the types of parameters you are searching for are “lessons” and “Computer” you could search using the following to show your top results Music AND (lessons OR computer) this would be your most effective. 11. What does the following measurement mean? 266MBps. The types of data recognized by a computer are written in short using Capital letters to represent larger amounts of data whereas lower case letters represent smaller bits of data. Given the capital letters on the measurement above this value represents 266 MegaBytes per second not to be confused with Megabits (notice the lower case b, to represent a smaller fraction of data) 12. Which of the following would be faster at an identical clock speed? Parallel data transfer would trump the other types of data transfer listed. This is because Parallel uses more data lines allowing more data to transfer back and forth across their parallel data lines. 13. What is 1GHz equal to? Very similar to how data is referred to there are different values to the Hz family, such as Mega Hertz and Gigahertz. Using memory as an example it take 1,000,000,000 Megabytes to be equivalent to 1 GB, the same goes for the Hertz family it takes 1,000,000,000 Hertz to equal 1 GHz. 14. Which number system has 16 values? As I stated above this system is called base 16 or hexadecimal, using a combination of numbers and letters to organize the data, 15. What is the decimal equivalent to the binary number 11110000? To gather this answer you should refer back to my binary statements above. To show you how to gather the decimal equivalent to this number we will need a line showing the exponential growth of 28th power
256,128,64,32,16,8,4,2,1,0 under this line we will put the 1’s and 0’s to show us the values of each 0 1 1 1 1 0 0 0 0 now add the values above to give you a decimal number 128+64+32+16 now that the rest are 0’s that equation will give you the decimal value of 240.

Chapter 3 Review

1. Which of the following can be used with the SCSI-based technology? SCSI is short for Small Computer Systems Interface, this is a very flexible interface connection used mainly for mass storage devices such as High performance and high capacity hard drives, and removable media drives; and can also be used for other devices like Image scanners and optical drives. On newer systems they use what is called SATA connections which have proven to be more reliable and include faster data transfer rates. 2. What are two ways that USB version 2.0 ports can be added to a computer? Most PC’s have been built around the idea of being able to personally configure you systems hardware. Using PCI slots to plug in additional system support devises. When it comes to USB expansion you can do this in two different ways and that is purchasing a USB hub with support for multiple USB connections or by purchasing a USB expansion card that fits in your PCI bus slot. 3. A serial port can hook up devices such as external modems and label printers. What is this port usually called. This port is used for everyday common external devices. Considering it is found on most external devices (pre 2010) an easy way to remember its name is to think of the word COMMON, due to the fact that they are referred to as COM ports. 4. Which of the following can be used for a printer port, scanner, or removable media? Pre 2005 most printers and external media devices use a parallel port to connect and daisy chain your devices on. Now days the USB port is becoming the most common for such devices. 5. Which device is known as the IEEE 1394? IEEE 1394 is a family of high speed serial transmission using a bidirectional connection. There are two types off IEEE 1394 a&b with a base speed of transmitting up to 400Mbps. Most commonly known as FireWire. 6. Some desktop systems and many of the older laptop systems included a port to connect a mouse or keyboard. What was this port called? Commonly found on PC’s but obsolete on laptops and soon on desktops the port we are defining here is called the PS/2 port consisting of 6 pins, these are commonly color coded purple for keyboards and green for mice. 7. What is the standard size of an audio mini-jack used by sound cards? These jacks are commonly a 1 inch depth jack to match the common headset male connection. Now day’s people are starting to use optical audio ports for a clearer sounding surround sound experience. 8. There are currently 3 standards for USB ports. What are they? USB ports are the most common media connection of now, however I can see HDMI and FireWire becoming the connection of the near future. As of Now there are 3 different USB connections each having a different Bus rate, the below standard 1.1 running at 12 Mbps 2.0 or high speed running a clean 480 Mbps and 3.0 hurdling past the competition at an astounding 4,800 Mbps. 9. If you run out of USB ports and need more, which of the following devices are available? Given the nature of the PC you are encouraged to make expansions to your system. To expand your ever growing need for USB ports there are several options available to you. 1 is to add more connections to your motherboard if you have the talent, 2 is an expansion card that plugs into your PCI bus and 3rd are USB hubs that you can find at almost any tech store, these plug into one of your existing ports and acts like an extension cord with multiple plugs at the end. 10. Which devices remains the primary method used to enter and send commands to your computer? The device that revolutionized computer interface technology is the one we take for granted the most, it’s the one I am using now to type this homework out. The device is a keyboard. 11. Which of the following is used to transfer data into a computer by touching the onscreen icons? This is a revolutionary interface that has changed the way we interact with computers on an everyday level, the touchscreen. 12. Which of the following are considered multimedia devices? All the options listed in the review are correct, there are limitless amounts of multimedia devices, some are webcams, sound cards, microphones etc.. The list is growing every day. 13. You are in the process of installing a new keyboard to a new PC. Which of the following is the most common type of connection? As stated before in this review the PS/2 connection was the most common at the time this book was printed. However the times they are a changing and the most common input now is USB or even Bluetooth. 14. What is the major difference between a laser jet and an LED printer? By definition LED printers us an array of LED’s to perform the transfer of images to paper. While a laser printer uses, you guessed it, a laser to transfer the image to the drum, then drum to paper. 15. Most ink jet, laser, and thermal printers use this interface to connect to the computer? In the past printers were most likely to use a parallel port for data transfer, now most commonly using USB. If we are talking about networking printers you can now access them via RJ-35 and wirelessly. 16. What are three major types of display devices in use in todays industry? Based on the year this book was written CRT monitors were somewhat common, now mostly obsolete, these are now being replaced by DATA projectors, LCD and LED displays. 17. Identify 3 types of Video connectors. Most commonly found on todays computers, these connections are HDMI, VGA, and DMI connections.

Similar Documents

Premium Essay

Bull

...Department of Information Technology ENDT200: Introduction to Programming Credit Hours: 3 Length of Course: 8 Weeks Prerequisite(s): None | Table of Contents | Instructor Information | Evaluation Procedures | Course Description | Grading Scale | Course Scope | Course Outline | Course Objectives | Policies | Course Delivery Method | Academic Services | Course Resources | Selected Bibliography | Instructor Information | Instructor: Jason T. Black, PhD (also called “Dr. B”) Email: Use the Messages feature in the classroom to email me. Table of Contents Course Description (Catalog) | This course introduces students to writing computer programs. The class presents the principles of structured programming using the BASIC language, perhaps the most common language for personal computers. Because of its ease of use it is ideal as a first programming language and runs on both the PC and Macintosh platforms. The course is designed for people without previous programming experience who do not necessarily plan on becoming professional programmers. However, the knowledge gained in the class can be applied later to other languages such as C and Java. Participants learn to solve problems logically by breaking them into smaller pieces, which can then be solved. Topics include: introduction to computing - how does a computer work?; input and output - getting information to and from the user; variables and expressions - performing arithmetic; data...

Words: 2708 - Pages: 11

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750...

Words: 4400 - Pages: 18

Premium Essay

Nt 1210

...hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750...

Words: 4400 - Pages: 18

Free Essay

Concepts of Programming Language Solutions

...goals, overall structure, and approach of this tenth edition of Concepts of Programming Languages remain the same as those of the nine earlier editions. The principal goals are to introduce the main constructs of contemporary programming languages and to provide the reader with the tools necessary for the critical evaluation of existing and future programming languages. A secondary goal is to prepare the reader for the study of compiler design, by providing an indepth discussion of programming language structures, presenting a formal method of describing syntax and introducing approaches to lexical and syntatic analysis. The tenth edition evolved from the ninth through several different kinds of changes. To maintain the currency of the material, some of the discussion of older programming languages has been removed. For example, the description of COBOL’s record operations was removed from Chapter 6 and that of Fortran’s Do statement was removed from Chapter 8. Likewise, the description of Ada’s generic subprograms was removed from Chapter 9 and the discussion of Ada’s asynchronous message passing was removed from Chapter 13. On the other hand, a section on closures, a section on calling subprograms indirectly, and a section on generic functions in F# were added to Chapter 9; sections on Objective-C were added to Chapters 11 and 12; a section on concurrency in functional programming languages was added to Chapter 13; a section on C# event handling was added to Chapter 14;. a section...

Words: 7025 - Pages: 29

Premium Essay

Ethics

...[pic] |Leadership and Organizational Behavior – BUS 520 | |Student Course Guide | |Prerequisite: None | |Quarter |Fall 2010 | |Meeting Days/Time |Wednesday 6pm-10pm | |Instructor |Karmetria Burton | |Instructor Phone |678 362 0842 | |Instructor E-mail |Karmetria.burton@strayer.edu | |Instructor Office Hours/Location |5-6 pm Wednesdays or by appointment | |Academic Office Phone Number | | |INSTRUCTIONAL MATERIAL - Required ...

Words: 7940 - Pages: 32

Premium Essay

Exam Review

...Review for Exam 1 Chapters 1-4 Chapter 1 |1. |An information system can be defined as: | |A) |An organized combination of people, hardware, software, communications networks, and database resources. | |B) |As a system that collects, transforms, and disseminates information in an organization. | |C) |Is composed of hardware, software, networks, and data resources. | |D) |All of the above would apply to the definition of an information system. | | |Ans:  D | |2. |In the internetworked E-business enterprise, an extranet refers to: | |A) |A network inside the enterprise. | |B) |A network between an enterprise and its trading partners. | |C) |A local area network within the enterprise. | |D) |A wide area network within the enterprise. ...

Words: 1030 - Pages: 5

Free Essay

Re: Target Jbims.. Dream Team 2012.. Do You Have It in You...

...CSE- 401 DISTRIBUTED SYSTEMS [3 1 0 4] 1. Distributed System Models: Introduction , Examples , Architecture models , Fundamental models (1.1,1.2,1.4, 2.1-2.3 of Text1 ) ..2hrs 2. Interprocess Communication, Distributed Objects and Remote Invocation: Introduction , External data representation and marshalling, Communication models, Communication between distributed objects , Remote procedure call Case study: Interprocess communication in UNIX, Java RMI . (4.1-4.6, 5.1-5.5 of Text1) ..6hrs 3. Operating System Introduction , Operating system layer, Processes and threads, Communication and invocation, Architecture (6.1-6.6 of Text1) ..4hrs. 4. Distributed File Systems and Name Services: Introduction , File service architecture, Name services, Domain Name System, Directory and directory services. Case study: Sun network file system, Global name service. (8.1-8.3, 9.1-9.4 of Text1) …6hrs 5. Synchronization: Clock Synchronization, Physical clocks, Logical clocks, Global state (5.1-5.3 of Text2) ..5hrs 6. Transactions&...

Words: 5050 - Pages: 21

Premium Essay

Final Exam

...Act 359 final exams Chapter 9 Introduction to internal control systems Internal controls: the controls established to protect the assets of an organization. Internal control: describes the policies, plans, and procedures implemented by the management of an organization to protect its assets, to ensure accuracy and completeness of its financial information, and to meet its business objectives. Four objectives of internal control system: 1. Safeguard assets, 2. Check the accuracy and reliability of accounting data, 3. Promote operational efficiency, 4. Enforce prescribed managerial policies. Sarbanes Oxley Act of 2002 piece of legislation with respect to internal controls Section 404: reaffirms management is responsible for establishing and maintaining an adequate internal control structure. 1992 Coso report: established common definition of internal control for assessing control system, as well as determined how to improve controls. An internal control system should consist of the five components: 1. The control environment 2. Risk assessment 3. Control activities 4. Information and communication 5. Monitoring Control environment: foundation for all other internal control components and provides discipline and structure. Top management oversight, integrity, and ethical principles that guide the organization Risk assessment: identify organizational risks, analyze their potential in terms of costs and likelihood of occurrence, and implement only those...

Words: 1409 - Pages: 6

Premium Essay

Walt Disney

...DESIGN PROJECT 1 : MINOR PROJECT TRS3242 : VISUAL COMMUNICATION PROJECT I TRS3152 : PROJECT I Introduction Project is a compulsory part of the program structure in Bachelor in Information and Communication Technology, Bachelor in Creative Multimedia, Bachelor in Graphic Design, Bachelor in Game Design and Animation, Bachelor in Media Science and Bachelor in Visual Communication. It builds on the skills and knowledge learned in the first two and half years; to enable students to use these to demonstrate competence in the theory and practice based on their respective programs. Aims of Project The main aims of this project are: 1. To provide students with a realistic group experience in designing, implementing and documenting computer, multimedia, and graphics products in the form of applications, systems, design, etc. based on the needs of clients/stakeholders. 2. To let students apply their knowledge and skills in handling tasks with appropriate tools. 3. To provide a learning environment for students to independently manage their projects under supervision. 4. To build students’ ability to present and rationalize their work with confidence and logics. 5. To enable the students to delegate tasks and work as a team, and manage their project time and budget accordingly. General proposal format: 1. Paper Size Type Color 2. Type Face Font Size Title Font Spacing : : : A4 80 gm papers White : : : : Arial, or Times New Roman 12 pt Capital Letter Double spacing 3. Page Numbering...

Words: 1888 - Pages: 8

Premium Essay

Computer Organization and Architecture Designing for Performance 8th Edition

...COMPUTER ORGANIZATION AND ARCHITECTURE DESIGNING FOR PERFORMANCE EIGHTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 Library of Congress Cataloging-in-Publication Data On File Vice President and Editorial Director: Marcia J. Horton Editor-in-Chief: Michael Hirsch Executive Editor: Tracy Dunkelberger Associate Editor: Melinda Haggerty Marketing Manager: Erin Davis Senior Managing Editor: Scott Disanno Production Editor: Rose Kernan Operations Specialist: Lisa McDowell Art Director: Kenny Beck Cover Design: Kristine Carney Director, Image Resource Center: Melinda Patelli Manager, Rights and Permissions: Zina Arabia Manager, Visual Research: Beth Brenzel Manager, Cover Visual Research & Permissions: Karen Sanatar Composition: Rakesh Poddar, Aptara®, Inc. Cover Image: Picturegarden /Image Bank /Getty Images, Inc. Copyright © 2010, 2006 by Pearson Education, Inc., Upper Saddle River, New Jersey, 07458. Pearson Prentice Hall. All rights reserved. Printed in the United States of America. This publication is protected by Copyright and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For information regarding permission(s), write to: Rights and Permissions Department. Pearson Prentice Hall™ is a trademark of Pearson Education, Inc. Pearson® is a registered trademark of...

Words: 239771 - Pages: 960

Free Essay

Prg 210 Week 4 Paper

...Selection and Repetition Control Structures PRG 210 March 30, 2011 John Rogers Selection and Repetition Control Structures Introduction This paper reviews and explains selection control structure and repetition control structure. Selection and repetition control structures increase the ability and power of a computer programs. Selection control structure allows statement execution if a condition is true and another statement execution if a condition is false. Repetition control structure or looping is the process of repeating execution of one or more steps of an algorithm or computer program. Essentially in programming, many performed calculations have repetitious tasks. Examples of both a selection control structure statement and a repetition control structure statement identifies and helps understand the importance of available computer operations to the programmer to compare variables, select one of two actions and repeat tasks as necessary. Selection Control Structure Statement executions in programming are under the control of one statement at a time. When statements execute, control is turned over to the next statement similar to running a relay race; one runner passes the baton to the next runner until the result of the baton across the finish line. When one statement finishes executing, control passes to the next statement until the desired output calculates. Computer programs use selection control structures to choose between alternative actions...

Words: 1277 - Pages: 6

Free Essay

Comp Txt

...1 2 Acknowledgements p.1 tr ©iStockphoto.com/Dennys Bisogno, etc t = top, b = bottom, l = left, r = right, c = centre Computer hardware and software brand names mentioned in this book are protected by their respective trademarks and are acknowledged. Scratch is developed by the Lifelong Kindergarten Group at the MIT Media Lab. See http://scratch.mit.edu Every effort has been made to trace all copyright holders, but if any have been inadvertently overlooked the publishers will be pleased to make the necessary arrangements at the first opportunity. Although every effort has been made to ensure that website addresses are correct at time of going to press, Hodder Education cannot be held responsible for the content of any website mentioned in this book. It is sometimes possible to find a relocated web page by typing in the address of the home page for a website in the URL window of your browser. Photo credits p.1 © peno – Fotolia; p.15 © Dmitrydesigner/Fotolia; p.16 ©iStockphoto.com/Karl Yamashita; p.57 © Romanchuck – Fotolia; p.58 t © C Squared Studios/Photodisc/Getty Images, m ©Dmitriy Melnikov - Fotolia.com, b © Popova Olga/Fotolia; p.59 © picsfive – Fotolia; p.65 © Manfred Schmidt – Fotolia.com; p.67 © dja65 – Fotolia; p.68 © Konstantin Shevtsov – Fotolia; p.69 t © Miguel Navarro/Stone/Getty Images, b © Piero Cruciatti/Alamy; p.73 © Jamdesign/Fotolia; p.78 and 79 © adisa – Fotolia; p.81 © Mykola Mazuryk – Fotolia; p.82 t © Mauro Rodrigues/Fotolia...

Words: 49691 - Pages: 199

Premium Essay

Schematic Evaluation of Internal Accounting Control System

...RESEARCH INSTITUTE FOR DECISION AND INFORMATION SYSTEMS Schematic Evaluation of Internal Accounting Control Systems by Kuo-Tay Chen and Ronald M. Lee Monograph No. RM-1992-08-1 (August 11, 1992) EURIDIS Research Monograph Erasmus University Rotterdam, The Netherlands © Kuo-Tay Chen and Ronald M. Lee Permission to copy this monograph without fee is granted provided that (1) the copies are not distributed for the direct commercial purpose and (2) this copyright page including the copyright notice, the EURIDIS monograph number, and date appear. TABLE OF CONTENTS CHAPTER 1. INTRODUCTION ...................................... 1 1.1 BACKGROUND .......................................... 1 1.2 MOTIVATION ............................................. 3 1.3 OBJECTIVE OF THE STUDY .......................... 4 1.4 ISSUES OF INTEREST .................................. 6 1.5 SCOPE OF THE STUDY................................. 7 1.6 CONTRIBUTIONS OF THE STUDY .................. 8 CHAPTER 2. DECISION AIDS RESEARCH FOR INTERNAL CONTROL EVALUATION ............................................ 9 2.1 A REVIEW OF PAST APPROACHES................. 9 2.1.1 MATHEMATICAL MODELING ............ 9 2.1.2 SIMULATION ................................. 12 2.1.3 EXPERT SYSTEMS .......................... 14 2.1.4 OTHER COMPUTER DECISION AIDS . . . 15 2.2 SCHEMATIC EVALUATION - THE PROPOSED APPROACH .................................................... 16 2.2.1 SCHEMA-BASED REASONING .......... 16...

Words: 32893 - Pages: 132

Premium Essay

Hhello

...STARTING OUT WITH Python ® Second Edition This page intentionally left blank STARTING OUT WITH Python ® Second Edition Tony Gaddis Haywood Community College Addison-Wesley Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Vice President and Editorial Director, ECS: Editor-in-Chief: Editorial Assistant: Vice President, Marketing: Marketing Manager: Marketing Coordinator: Vice President, Production: Managing Editor: Production Project Manager: Manufacturing Buyer: Art Director: Cover Designer: Cover Image: Media Editor: Project Management: Composition and Illustration: Printer/Binder: Cover Printer: Marcia Horton Michael Hirsch Stephanie Sellinger Patrice Jones Yezan Alayan Kathryn Ferranti Vince O’Brien Jeff Holcomb Kayla Smith-Tarbox Lisa McDowell Linda Knowles Joyce Cosentino Wells/JWells Design © Digital Vision Dan Sandin/Wanda Rockwell Sherill Redd, Aptara®, Inc. Aptara®, Inc. Edwards Brothers LeHigh-Phoenix Color/Hagerstown Credits and acknowledgments borrowed from other sources and reproduced, with permission, appear on the Credits page in the endmatter of this textbook. Copyright © 2012, 2009 Pearson Education, Inc., publishing as Addison-Wesley. All rights reserved. Manufactured in the United States of America. This publication...

Words: 76897 - Pages: 308

Free Essay

Systems Analysis

...Chapter 10 Review Questions 1. System architecture is the conceptual model that defines the structure and/or behavior of a system. It translates the logical design of an information system into a physical structure that includes hardware, software, network support, processing methods, and security. Scalability is a system’s ability to expand, change, or downsize easily to meet the changing needs of a business enterprise. Scalability is especially important in implementing systems that are volume-related, such as transaction processing systems. 2. Before selecting the system architecture, the analyst must consider the following issues: Enterprise resource planning (ERP) Initial cost and (TCO) Scalability Web integration Legacy system interface requirements Processing options Security issues 3. Enterprise resource planning (ERP) defines a specific architecture, including standards for data, processing, network, and user interface design. It is important because it describes a specific hardware and software environment that ensures hardware connectivity and easy integration of future applications, including in-house software and commercial packages. ERP also can extend to suppliers and customers in a process called supply chain management. In a totally integrated supply chain, a customer order could cause a production planning system to schedule a work order, which in turn triggers a call for certain parts from one or more suppliers. 4. A server is a computer...

Words: 644 - Pages: 3