... | |1 |MC9231 |Computer Networks |3 |0 |0 |3 | |2 |MC9232 |Microprocessors and its |3 |0 |0 |3 | | | |Applications | | | | | |3 |MC9233 |Software Engineering |3 |0 |0 |3 | |4 |MC9234 |Computer Graphics |3 |0 |0 |3 | |5 |MC9235 |Web Programming |3 |0 |0 |3 | |PRACTICAL | |6 |MC9237 |Graphics Lab |0 |0 |3 |2 | |7 |MC9238 |Microprocessor Lab |0 |0 |3 |2 | |8 |MC9239 |Web Programming Lab |0 |0 |3 |2 | | TOTAL |15 |0 |9 |21 | MC9231 COMPUTER NETWORKS L T P C 3 0 0 3 UNIT I INTRODUCTION 9 Communication...
Words: 1592 - Pages: 7
...NT-1110 Computer Structure and Logic Unit 4 Research Paper 1 The ENIAC Computer 4/26/13 World War II was knocking on the United States front door when the decision to develop a computer to handle complex mathematical calculations was made. The United States was in a dire need for a machine that could make accurate, precise, and fast calculations. The United States government and military turned to John Mauchly and John Presper Eckert to build the first Electrical Numerical Integrator And Calculator; or for short the ENIAC. The United States was ill prepared and forced into the war which meant that it had few resources to accomplish the task of defeating the enemy. The ENIAC was purposefully designed to calculate all variables such as wind speed, trajectory, and distance so that each shot fired from the military was done with devastating precision and accuracy. The ENIAC enabled the military to do these calculations in a matter of hours and minutes versus days. John Mauchly and John Eckert designed artillery tables using the ENIAC to make these vital calculations that were much faster than manually calculating. Unfortunately the design of the Electrical Numerical Integrator and Calculator was not completed until after the war. Although the ENIAC was designed for World War II, it had other uses for that time period. One of the greatest contributions that ENIAC had was with the development of the Hydrogen bomb. The ENIAC was able to calculate the complex mathematical formulas...
Words: 1347 - Pages: 6
...as machines, computers, and vision. Scientists express their opinion about the future technology, using ethos, pathos, and logos to get their audience attention. Steven B. Harris uses an authority voice and vision when addressing issues in his article. He expresses his tone to make improvement in technology in the world. Harris is a medical Doctor that's interested in medical resources. He's a part of the Biosphere II projects and the best known for discussing artificial intelligence research. He had major discussions thread on the internet. In his article, he explains how several authors express their opinion on a variety of technology. Harris ethos in this report, argues how the technology will change throughout the future. From his writing, he appears to have the knowledge about how a computer will become advance and how it will affect humankind in the future. Harris states how machines are used in moving making. He describes how a movie in 1950’s are made with the Krell machines and ultimate machines. By 1986, they were using microscopic construction-machines. Harris argues that software is now popular and is used in movies, whether than machines. Harris said that certain machine is still being used from time to time, but the computer has full control. In the article, Harris uses pathos and feeling to get the reader emotions. He uses this article to place technology in the hands of the future and cause pressure on humankind. He argues that computer and other technology...
Words: 633 - Pages: 3
...Scheme and Syllabus of B.E. (Computer Science and Engineering) 3 rd th TO 8 Semester 2014-2015 University Institute of Engineering and Technology, Panjab University, Chandigarh DEPARTMENT: COMPUTER SCIENCE AND ENGINEERING VISION: To be recognized as an international leader in Computer Science and Engineering education and research to benefit society globally. MISSION: · · · · To move forward as frontiers of human knowledge to enrich the citizen, the nation, and the world. To excel in research and innovation that discovers new knowledge and enables new technologies and systems. To develop technocrats, entrepreneurs, and business leaders of future who will strive to improve the quality of human life. To create world class computing infrastructure for the enhancement of technical knowledge in field of Computer Science and Engineering. PROGRAMME: B.E. CSE (UG PROGRAMME) PROGRAMME EDUCATIONAL OBJECTIVES: I. Graduates will work as software professional in industry of repute. II. Graduates will pursue higher studies and research in engineering and management disciplines. III. Graduates will work as entrepreneurs by establishing startups to take up projects for societal and environmental cause. PROGRAMME OUTCOMES: A. Ability to effectively apply knowledge of computing, applied sciences and mathematics to computer science & engineering problems. B. Identify, formulate, research literature, and analyze complex computer science & engineering problems reaching substantiated conclusions...
Words: 23989 - Pages: 96
...used facsimile machines or phones to place orders. In the early 1990’s fax machines were starting to be cost effective. Then in the late 1990s and early 2000s personal computers took food service ordering to a new level. The greatest advancement in technology in the food service industry started in the time period of the 2000s. These were the IT and web based technologies that revolutionized how restaurants do business. These new technologies have given restaurants a competitive edge they need to become more profitable. These technological advances address the five key areas of food service operations management: ordering, receiving, inventory, recipes, menus, and food safety. Food Service Ordering Restaurant managers use different strategies for their purchases. Most food suppliers have interactive web sites where any amount can be ordered and put in when they need their products. This allows the food service managers to practice what is called just-in-time purchasing, which is a finely tuned product forecasting where orders are placed so that the items will arrive just before the inventory runs out, and eliminates the high cost of owning a large storage area such as a freezer. This just-in-time ordering also gives the ability to put in and process orders in a quick turnaround time. Using this computer ordering system provides purchasers with quick feedback and troubleshooting of order...
Words: 2993 - Pages: 12
...Temasek Polytechnic Diploma in ELN/CEN/MIE/BIE/MTN/IBT/MET Microcontroller Technology (EMC2001) | [pic] | | | | |Name: |Class: | |Lecturer’s Comments: |Matric No: | Laboratory 2 : Interfacing to Liquid Crystal Display(LCD) module. Objectives: i) To learn how to initialise the LCD module. ii) To learn how to output messages. Equipment: i) Computer with floppy drive/USB port ii) MPLAB ICD 2 and target board Software: i) MPLAB IDE v8.xx ii) MCC18 ver3.33 References: i) MPLAB-IDE User’s Guide ii) MPLAB C18 C Compiler Getting Started iii) MPLAB C18 C Compiler User’s Guide iv) MPLAB ICD2 In-Circuit Debugger User’s Guide Note: Each student is to bring along the PIC18F4520 Concise Data Book and a storage device that is reserved for this subject for every lab session. In order that you benefit fully from this laboratory exercise, you are strongly encouraged to read the following reading notes before you come for this laboratory session. Reading Notes For microcontroller applications, it may be required to...
Words: 1690 - Pages: 7
...INDUSTRIAL TRAINING FROM TATA CMC, JAMMU ON EMBEDDED SYSTEMS. Submitted in the partial fulfilment of requirement for the award of degree of Bachelor of Engineering In Electronics and Communication Engineering Submitted By Ashish Gupta 258/12 Under the guidance of Ms. Sonika Mahajan IT Guide Department of Electronics & Communication Engineering Mahant Bachittar Singh College of Engineering and Technology, Jammu 2015 CERTIFICATE i DECLARATION I hereby declare that the Seminar Report entitled “EMBEDDED SYSTEMS” is an authentic record of my own work carried out as requirement for the award of degree of B.E. (E&C) of Mahant Bachittar Singh College of Engineering & Technology, Jammu. Date: ................ Ashish Gupta 258/12 Certified that the above statement made by the student is correct to the best of my knowledge and belief. Ms. Sonika Mahajan Ms. Neha Gupta Ms. Shalini Sharma IT Guide ...
Words: 998 - Pages: 4
...Final Time Table - Fall 2014 ( v 20141113-1130 ) CIIT_Lahore FA14-BEC-A (Semester 1) (DDP) 2 10:00 - 11:30 HUM-Huma Ijaz 1 8:30 - 10:00 Phy-Dr. Saif Ur Rehman 3 11:30 - 1:00 4 1:30 - 3:00 5 3:00 - 4:30 HUM-Dr. Musferah Mehfooz 6 4:30 - 6:00 7 6:00 - 7:30 Subjects Count English Physics for Chemical Comprehension and Engineers Composition Islamic Studies N-7 HUM-Huma Ijaz N-1 Math-Imran Zulfiqar Chem-Amjad Riaz Cheema Chemical Process Principles I N-11 Calculus I 2 Chemical Process Principles I 2 English Comprehension and Composition 2 Islamic Studies 2 Lab-Engineering Drawing 2 Lab-Physics for Chemical Engineers 2 Physics for Chemical Engineers 2 Tuesday Monday English Comprehension and Composition Calculus I N-7 N-12 Chem-Amjad Riaz N-11 Wednesday Phy-Dr. Saif Ur Rehman Physics for Chemical Chemical Process Engineers Principles I N-18 HUM-Dr. Musferah Mehfooz N-19 Math-Imran Zulfiqar Cheema Dr. Saif Ur Rehman / Dr. Ishrat Sultana Thursday Islamic Studies Calculus I Lab-Physics for Chemical Engineers N-15 N-3 Applied Physics Lab Chem-Muhammad Imran Rafiq Friday Lab-Engineering Drawing PC Lab-C Lessons/week 14 Timetable generated:11/13/2014 aSc Timetables Final Time Table - Fall 2014 ( v 20141113-1130 ) CIIT_Lahore FA14-BEC-B (Semester 1) (DDP) 2 10:00 - 11:30 Math-Syed Tahir Raza Rizvi 1 8:30 - 10:00 HUM-Huma Ijaz 3 11:30...
Words: 31997 - Pages: 128
...Law and the Internet: Trespass to Chattels Abstract: This paper focuses on the use of Trespass to Chattels Law by owners as protection against the intentional use of their systems or the resources therein by unauthorized parties. The trespass to chattels law cannot be correctly applied to internet-related property rights because this law is being incorrectly used and does not adequately address the concerns of internet property owners and the rights they seek to protect. The 19th Century trespass to chattels tort is being utilized in cyberspace to protect systems against unauthorized use in the same way it is used to protect tangible/physical property. This law was first used by internet service providers (ISPs) to fight against unsolicited bulk email or spam, which was being sent in excess over their networks and systems. However, it is becoming increasingly clear that the blanket application of this law to the internet has an adverse impact on the key function of the internet. Trespass to chattelslaw is now commonly used to fight against Robots (BOTs), which are automated programs that search the Internet. In many cases such as eBay v. Bidder’s edge, and Ticketmaster Corp. v. Tickets.com, this law was used to fight the ability of users to search the internet and of providers to present data to users. This ability to search and present data is the primary purpose of the internet, and the overbroad application of trespass to chattels law, without any form of modification...
Words: 3579 - Pages: 15
...Chapter 8: Local Area Networks: Software and Support Systems TRUE/FALSE 1. Network operating systems are essential if the network is going to allow multiple users to share resources. ANS: T 2. Users cannot interact directly with the operating system through a shell. ANS: F 3. In reality, a multitasking operating system runs only one program at a time. ANS: T 4. The resources that a network operating system must manage typically include one or more network servers. ANS: T 5. A network operating system does not perform network support functions. ANS: F 6. Microsoft Windows 7 is an example of a desktop operating system. ANS: T 7. NetWare 6 was the last version of Novell’s network operating system. ANS: T 8. A bindery contains the data that pertains only to the server it resides in. ANS: T 9. The design of a tree should ideally be similar to a pyramid. ANS: T 10. NetWare 5 dropped the NDS distributed database of network resources. ANS: F 11. Windows 2008 Server is a network operating system designed to run over a network of microcomputer workstations and provide file sharing and peripheral sharing. ANS: T 12. It is not possible to create a network with multiple domains. ANS: F 13. Unlike NetWare’s NDS, Active Directory creates a hierarchical structure of resources. ANS: F 14. Unix is most often found with a text-based interface, although graphical user interfaces are available...
Words: 3578 - Pages: 15
...z FETAC LEVEL 5 L22142 By Declan Brady Date: 05/02/2013 Tutor: Val Coakley Table of Contents Introduction 3 Methodology 4 History of Computers 5 Computer Hardware and Computer Software 9 The Four Main Components of Computer Systems 10 Types of Computer Systems 12 Examples of Computer Input Devices 14 Examples of Computer Output Devices 15 Printers 17 Equipment of the Modern Office 19 Storage Devices 21 Computer Networks – LAN and WAN 22 Systems Software and Application Software……………………………………………24 Conclusion 24 Bibliography 25 Introduction This project is been carried out for the Business Computing module for the Computer and Network Technician FETAC Level 5 Certificate course. In completing this project I hope to acquire a greater understanding of computers and the technology that is commonly used with them in the modern workplace. The carrying out of this project itself will also hopefully leave me better equipped with the skills to carry out projects in the workplace if I am required to do so in the future. For this project I will use the internet to research for the information that this report requires. Once I feel confident I have enough sources for the topics that need to be covered I will start choosing relevant information from these websites and use them in my report where needed. If needed the information taken from websites will be rephrased so that the content is fully relevant to the project. For this report...
Words: 4963 - Pages: 20
...Programming 8051 Addressing Modes Arithmetic & Logic Instructions And Programs 8051 Programming in C 8051 Hardware Connection and Hex File 8051 Timer/Counter Programming in Assembly and C 8051 Serial Port Programming in Assembly and C Interrupts Programming in Assembly and C 8051 Interfacing to External Memory 8051 Real World Interfacing I: LCD,ADC AND SENSORS LCD and Keyboard Interfacing 8051 Interfacing with 8255 INTRODUCTION TO COMPUTING The 8051 Microcontroller and Embedded Systems: Using Assembly and C Mazidi, Mazidi and McKinlay Chung-Ping Young 楊中平 Home Automation, Networking, and Entertainment Lab Dept. of Computer Science and Information Engineering National Cheng Kung University, TAIWAN OUTLINES Numbering and coding systems Digital primer Inside the computer HANEL Department of Computer Science and Information Engineering National Cheng Kung University, TAIWAN 2 NUMBERING AND CODING SYSTEMS Decimal and Binary Number Systems Human beings use base 10 (decimal) arithmetic There are 10 distinct symbols, 0, 1, 2, …, 9 Computers use base 2 (binary) system There are only 0 and 1 These two binary digits are commonly referred to as bits HANEL Department of Computer Science and Information Engineering National Cheng Kung University, TAIWAN 3 NUMBERING AND CODING SYSTEMS Converting from Decimal to Binary Divide the decimal number by 2 repeatedly Keep track of the remainders Continue this process until the quotient becomes zero...
Words: 26702 - Pages: 107
...SCHEME OF EXAMINATION FOR MASTER OF COMPUTER APPLICATIONS (MCA) (SIX-SEMESTER Programme) |Semester – I | |Paper |Title of the Paper |Duration |Maximum Marks |Total | |No. | |Of Exam | | | | | | |Theory |Sessional* | | |MCA-101 |Computer Fundamentals and Problem Solving Using C |3 Hours |80 |20 |100 | |MCA-102 |Computer Organisation |3 Hours |80 |20 |100 | |MCA-103 |Discrete Mathematical Structures |3 Hours |80 |20 |100 | |MCA-104 |Software Engineering |3 Hours |80 |20 |100 | |MCA-105 |Computer Oriented Numerical and Statistical Methods |3 Hours |80 |20 |100 | |MCA-106 |Software Laboratory - I |3 Hours | | |100 | | |C (Based on MCA-101) |...
Words: 13848 - Pages: 56
...Scheme and Syllabus of B.E. (Computer Science and Engineering) 3rd TO 8th Semester 2013-2014 University Institute of Engineering and Technology, Panjab University, Chandigarh Scheme of Examination of B.E. in Computer Science & Engineering Second Year - Third Semester Subject Title Scheme of Teaching Univesity Sr.No Paper Code External L T P Hour Credits Marks s 1. CSE311 Data Structures 3 1 0 4 4 50 2. 3. 4. 5. 6. 7. 8. 9. Total Second Year -Fourth Semester Sr.No Paper Code 1. 2. 3. 4. 5. 6. CSE411 CSE461 CSE412 CSE462 CSE414 CSE464 Subject Title Scheme of Teaching L 3 0 3 0 3 0 T 1 0 1 0 1 0 P 0 3 0 3 0 3 Hours 4 3 4 3 4 3 Credit 4 2 4 2 4 2 University External Marks 50 50 50 CSE361 CSE313 CSE363 AS301 EC316 EC366 EC317 EC367 Data Structures (Practical) Peripheral Devices & Interfaces Hardware Lab (Practical) Engineering Mathematics – III Digital Electronics Digital Electronics (Practical) Microprocessors Microprocessors (Practical) 0 3 0 3 3 0 3 0 15 0 1 0 1 1 0 1 0 5 3 0 2 0 0 2 0 2 09 3 4 2 4 4 2 4 2 29 2 4 1 4 4 1 4 1 25 50 50 50 50 250 Internal Total Sessional Marks 50 50 50 50 50 50 50 50 50 450 100 50 100 50 100 100 50 100 50 700 7. 8. Total ASC405 CSE 415 Analysis & Design of Algorithms Analysis & Design of Algorithms (Practical) Database Management System Database Management System (Practical) Object Oriented Programming Object Oriented Programming (Practical) Cyber Law & IPR Computer Architecture & Organization Internal Total Sessional Marks 50...
Words: 14784 - Pages: 60
...INTRODUCTION. Adoption of emerging technologies prior to their proven value is both acceptable and normal in today’s globalized economy. In current global environment, organizations all around the world have to constantly facing challenges to hold the competitive advantage. Firms that refuse to change their approach face declining sales, obsolescence, and potential bankruptcy. The global world is characterized by more competition, diverse work force, continuously changing customers’ needs, and new technological changes, etc. The adoption of emerging technology in business is broadly studied but the resulting research has produced inconsistent results (Brandyberry, 2003). An organization is define as a group of persons that team up together to work to achieve the organization strategy. Organizational strategy can be defined as a plan for interacting with the competitive environments to achieve organizational goals. According to Charlesmore Partners International (2008), organizational strategy is a clear definition of how the organization needs to change – over time - in order to be able to deliver the strategy of the enterprise and an actionable plan of how to make the transformation. This requires both the thinking and analysis to compare current state to desired state and define the gap, and the execution capabilities to make the requisite changes happen. Other definition of organizational strategy is a plan for interacting with the competitive environments to achieve organizational...
Words: 11702 - Pages: 47