...the computer – and the hardware or application to perform any function. Whatever the task may be, you just need to enter the instructions for performing a specific task and the computer does it for you. The functions of an Operating System are: • Booting the computer • Managing input and output devices • Providing a GUI (Graphical User Interface) to create a user friendly environment • Managing system resources • Managing data Differences among Windows, Linux, and Mac OS X operating systems are: The Mac OS is the proprietary operating system used by Apple for their Macintosh computers. This operating system has been a favorite of multimedia designers, graphic artists, and musicians since the 1990s. Not more than 10% of the U.S. population uses the Mac OS. Mac OS uses its own web browser named Safari as opposed to Internet Explorer. Linux is an ever-expanding group of operating systems that are similar to Unix in their design. Linux was designed as an alternative operating system to Windows.However Linux has a much larger market share when it comes to servers and other computer devices. The command-line functionality in most Linux distributions is in-depth and well documented, allowing a user to configure, and troubleshoot, just about anything from within the “shell” or command-line. Windows is the most commonly used operating system on client computers. Its is estimated that up to 90% of client computers use...
Words: 333 - Pages: 2
...Computer Structure and Logic Quiz Study Guide UNIT 1 This electronic device was used as a switch to the first digital computer. Vacuum Tubes ENIAC stands for Electrical Numerical Integrator and Calculator. Who is credited with creating the stored program computer model? Eckert Limits to computing power are caused throughput bottlenecks between the CPU and memory. Which device uses a lot of power and gives off a lot of heat? Vacuum Tubes The silicon used to make a MOSFET works as a semiconductor. Which of these companies was not one of the original personal computer makers? AMD Moore's law that states the number of transistors that can fit on a single integrated chip doubles every 18-24 months. The first operating system for the personal computer was DOS. A generic PC is also called a white-box system. UNIT 2 What is 2 raised to the 8th power? 256 What is the 4-bit binary number associated with the hexadecimal symbol C? 1100 What is the binary equivalent of the number 50? 110010 What is the decimal equivalent of the binary number 101011? 43 How many bits are needed to represent the decimal number 200? 9-bits 25MB is approximately bytes? 25,000,000 Which logic function requires both inputs to be 1 in order to output a 1? AND Which logic function requires one or both inputs to be 1 in order to output 1? OR 500 GB is approximately how many bytes? 500,000,000,000 Which term is also known as data transfer rate? Bandwidth UNIT 3 What is the top speed...
Words: 564 - Pages: 3
...Computer Structure and Logic Lab 1 12/17/2015 The computer I am working on right now has Windows 7 Installed on it. Windows 7 is not perfect. Some features are underdeveloped. For example when typing the cursor will move through the document. And some annoyances remain intact. But overall, the final version appears to be a worthy replacement to Windows XP. In window 7 you can take the Screen and split it into two. This is a great feature when you are writing a paper and doing research at the same time. To do this just click on the middle of the tab bar and drag left or right, then take your other screen and go the opposite way. In windows 7 you can now pin Icons to the task bar. For example you can pin chrome to your task bar, to do so open chrome, it will appear in the task bar when it does right click on it. Click on pin to task bar, now you have easy access to chrome. Windows 7 started the “Peak”. You can take your mouse and hover your mouse over an icon on the task bar that is active, when you do this a small screen pops up and you can see what is in that tab. Desktop Gadgets can be added to windows 7. You can add the Weather or even a picture slideshow to the desktop, just right click on your desktop and click on gadgets. Double click on the gadget you want and it will appear on your desktop. The desktop I am using has an Intel Core Processor the CPU is running at 3.30 GHz. It has 8 GB of RAM wish it had at least 16. Service Pack 1 is on this computer. SP1 is...
Words: 341 - Pages: 2
... Accumulator Arithmetic Logic Unit Arithmetic Logic Unit Control Unit Control Unit Memory Memory Component | Function | Arithmetic Logic Unit | Control operations between all components of the computer. | Accumulator | Store the result of the last calculation.Registers that store temporary numbers,And can be hard-wired to the logic unit.They we developed so that fewer bits couldBe used for instructions and operands. | Control Unit | Controls operations betweenAll components of the computer. | Input | Provides data to the computer from the user. | Memory | Stores program instructions and data. | Output | Displays data to the user. | Task 2: These are the common input, output, and memory components: Component | Function | Input | Keyboard, Mouse, Gaming Controller, Microphone, Camera | Magazines | Video Display, Speaker, Printer, Mouse | Memory | Motherboard RAM, system BIOS ROM, hard disk, CD/DVD disk, speakers | There are some devices that are both input and output devices. These include modems, network adapters, and expansion ports such as USB, FireWire, and PCMCIA slots. Similarities | Differences | Power Saving: Both types of computers can hibernate or sleep when not being used...
Words: 382 - Pages: 2
...processor from the motherboard, what device should you remove first? A: C. Heat sink 5. You have been dispatched to a client’s computer. You have decided that the processor is overheating. Which of the following steps can you take to help with the air flow around the processor? A: E. All of these options are correct 6. Which of the following are causes of overheating? A: A. The power supply fan is too large C. Incorrect processor 7: Which of the following is also known is also known as the FSB? A: B. External clock speed 8. Which of the following is executing of two or more threads within a single processor core? A: B. Hyper threading 9. Which of the following is best described as the practice of running a processor at higher speeds than normal? A: C. Hyper threading 10. Which of the following types of cache memory is built into the processor core? A: A. L1 11. Which of the following allows a processor to access more than 4GB of RAM? A: C. x64 12. Which type of socket allows a processor to simply be dropped in without the need for any pressure? A: A. ZIF 13. What should you do if a processor’s fan fails because it is clogged with dirt? A: A. Blow it out with compressor air D. Reapply Thermal Compound 14. Your computer system overheats. You find that the fan is clogged. What should you do? A: B. Use compressor air 15. If the base speed of...
Words: 345 - Pages: 2
...Shawn Saint-Germain NT1110- Computer Structure and Logic June 29, 2015 Module 2 Short Answer I/O devices are a vital part of any computer system. These devices enable the user to put data into the system (input) and receive a visual representation of what they put in (output). Some of the most vital I/O devices to make a system operable are the most common seen. One such device being the monitor. The monitor is the single most important output device to have on a system. The monitor allows for a visual display of all inputted data on the computer. Paired with the monitor, the keyboard and mouse are 2 input devices which allow the user to directly input data and various other information into the system. However, there are some input devices which are not necessary for normal use of the system. One such example being a webcam. Webcams allow for visual input into the system but is not vital for system functionality or performance. Due to the fact that a visual input device is not a normal form of input for a system. A modem is considered an I/O device for a variety of reasons. A modem allows for data input to the system directly from the internet and other systems, as well as allowing the system to output data to other systems. Another device that follows the dual functionality aspect is a printer. The printer is viewed mainly as an output device, allowing for data to be visually outputted to paper. The printer can also be considered an input device, depending on what type...
Words: 312 - Pages: 2
...Understanding the BIOS and POST Abdus-Salaam Sabir NT1110: Computer Structure and Logic_ Module 5_Short Answer August 22, 2015 Darius Banks Understanding the BIOS and POST Why is it necessary to use ROM for the BIOS and not RAM? The basic input/output system (BIOS) is an essential component of the mother- board. This boot firmware, also known as System BIOS, is the first code run by a computer when it is booted. It prepares the machine by testing it during boot- up and paves the way for the operating system to start. It tests and initializes components such as the processor, RAM, video card, magnetic disks, and optical disks. If any errors occur, the BIOS reports them as part of the testing stage, known as the power-on self-test (POST). The BIOS resides on a ROM chip and stores a setup program that you can access when the computer first boots up. From this program, a user can change settings in the BIOS and upgrade the BIOS as well. It is necessary to use ROM for the BIOS because the data in the RAM is cleared when the computer shuts down, but the data in the ROM is always there for the BIOS to use. The BIOS is typically placed in a ROM (Read-only memory) chip that comes with the computer. This ensures that the BIOS will always be available and will not be damaged by disk failures. It also makes it possible for a computer to boot itself. Read-only memory is computer memory on which data has been prerecorded. Once data has been written onto a ROM chip,...
Words: 555 - Pages: 3
...Video 1.07 – Parts and Connectors Serial Ports * Transmits data one bit at a time and are usually male * 9 – 25 pins Parallel Ports * Transmits data 8 bits at a time and are usually female * 25 pins Game Ports * Are usually female * 15 pins in two rows Both parallel and game ports have been replaced by USB Early Mice used a serial connector; Keyboards used 5 pin DIN connector Modern mice and keyboards are either PS/2, USB, or wireless NIC (Network Interface Card) * Converts parallel communication to serial * Uses RJ-45 connector Modem * Slowest possible way to connect to the internet * Connects to phone line * 56 Kbps * V.92 supports faster speeds * Converts analog to digital * Converts digital to analog * Uses RS-11 converter Video VGA * Analog interface * D type, 15 pin/3 rows DVI * Digital Video Interface CS-Video * Round with 4 or 7 pins * Connects to TV USB * Univeral Serial Bus * Hot swappable * USB1 * Transmits at 12 Mbps * 3 meters * USB2 * 480 Mbps * 5 Meters * A-Connector * Larger, plugs into PC * B-Connector * Smaller, plugs into device * Narrow SCSI * 50 pin * Type A * Wide SCSI * 68 pin * Type B * IEEE 1394 – Firewire * Serial * Foot * Hot swappable * Used for streaming media * Expected to replace...
Words: 845 - Pages: 4
...Chapter 1 review questions 1. Which of the following is an example of a PC? The 8088 processor marked the start of the home and office based PC’s given that it had a 1mb address limit making a more efficient machine. 2. Who is credited with the patent of the first computer? John V. Atanasoff was the first person accredited for the invention of the computer due to his use of modern digital switching techniques. 3. In the Von Neumann architecture, what two make up the CPU? In Von Neumann’s model of the CPU there are three components, only two are listed in this review and they are the control unit and the arithmetic unit. 4. What technology alleviates the problem of the “Von Neumann bottleneck”? in this chapter they explain the issue of bottlenecking like a highway, where the information sent and received traveled through a narrow highway on the original architecture. The solution to the problem was creating what is now referred to as Cache memory. 5. Which of the following are groups within the Von Neumann architecture? There are four groups to the basic architecture Working Storage, Permanent Storage, Output and Input devices. 6. What are the three main connections in a transistor. Transistors are made using the same architecture as a vacuum tube just in a much smaller and safer manner, these connections are called the “Gate” the “Drain” and the “conductor”. 7. MOSSFET is the most common type of what electronic component? MOSSFET (standing for Metal...
Words: 2681 - Pages: 11
...ENTIRE CLASS COMPUTER PROGRAMMING To Purchase this tutorial visit following link http://wiseamerican.us/product/prg-211-entire-class-computer-programming/ Contact us at: SUPPORT@WISEAMERICAN.US PRG 211 ENTIRE CLASS COMPUTER PROGRAMMING PRG 211 Complete Class Algorithms and Logic for Computer Programming WEEK 1 PRG 211 Week 1 Programming Fundamentals -Reusability of Code Discussion Question 1 Discussion Question 2 WEEK 2 PRG 211 Week 2 Program Solution Proposal Discussion Question 1 Discussion Question 2 WEEK 3 PRG 211 Week 3 Selection Structure Visual Logic Flowchart.vls PRG 211 Week 3 Selection Structure paper /800 words Discussion Question 1 Discussion Question 2 WEEK 4 PRG 211 Week 4 Array Structure Proposal Visual Logic Flowchart PRG 211 Week 4 Individual Assignment – Array Structure Proposal Discussion Question 1 Discussion Question 2 WEEK 5 Calorie Management Visual logic Flowchart Final Team Assignment – Calorie Management Paper /1500 Word Final Team Assignment – Calorie Management Presentation Discussion Question 1 Discussion Question 2 PRG 211 ENTIRE CLASS COMPUTER PROGRAMMING PRG 211 Complete Class Algorithms and Logic for Computer Programming WEEK 1 PRG 211 Week 1 Programming Fundamentals -Reusability of Code Discussion Question 1 Discussion Question 2 WEEK 2 PRG 211 Week 2 Program Solution Proposal Discussion Question 1 Discussion Question 2 WEEK 3 PRG 211 Week 3 Selection Structure Visual Logic Flowchart.vls ...
Words: 287 - Pages: 2
...Computer Fundamentals: Pradeep K. Sinha & Priti Sinha Computer Fundamentals: Pradeep K. Sinha & Priti Sinha Ref Page Chapter 11: Planning the Computer Program Slide 1/44 Computer Fundamentals: Pradeep K. Sinha & Priti Sinha Computer Fundamentals: Pradeep K. Sinha & Priti Sinha Learning Objectives In this chapter you will learn about: § Programs must be planned before they are written § Algorithm § Flowchart § Pseudocode § Plan the logic of a computer program § Commonly used tools for program planning and their use Ref Page 183 Chapter 11: Planning the Computer Program Slide 2/44 Computer Fundamentals: Pradeep K. Sinha & Priti Sinha Computer Fundamentals: Pradeep K. Sinha & Priti Sinha Purpose of Program Planning § To write a correct program, a programmer must write each and every instruction in the correct sequence § Logic (instruction sequence) of a program can be very complex § Hence, programs must be planned before they are written to ensure program instructions are: § Appropriate for the problem § In the correct sequence Ref Page 183 Chapter 11: Planning the Computer Program Slide 3/44 Computer Fundamentals: Pradeep K. Sinha & Priti Sinha Computer Fundamentals: Pradeep K. Sinha & Priti Sinha Algorithm § Refers to the logic of a program and a step-by-step description of how to arrive at the solution of a given problem § In order to qualify as an algorithm, a sequence of instructions must have following...
Words: 3284 - Pages: 14
...NT1110 Computer Structure and Logic Week 6 Unit 8 Quiz 1. Which graphical interface is used to explore the file system? a. Windows Explorer b. Internet Explorer c. Control Panel d. Command prompt This type of physical drive partition can only contain one drive letter. a. Primary b. Secondary c. Extended d. Logical Apple computers running Mac OS X can use which processors? a. Intel only b. PowerPC only c. Intel and PowerPC d. AMD only Which of the following is not a Linux distribution? a. PCnix b. Red Hat c. SuSE d. Ubuntu Which operating system has the largest market share? a. DOS b. Linux c. Mac OS X d. Windows Which of the following is not a Windows Vista GUI feature? a. Three-dimensional windows b. Translucent windows c. Self-modifying windows d. Window animations Mini applications that provide a variety of services, such as connecting to the Internet to access weather updates, are called: a. applicons b. gadgets c. sidebars d. windowizers 2. 3. 4. 5. 6. 7. NT1110 Computer Structure and Logic Week 6 Unit 8 Quiz 8. Viewing local and network drives is accomplished with which graphic utility? a. Internet Explorer b. My Computer c. Control Panel d. Command prompt The starting point for adjusting hardware and user interface settings is __________. a. Internet Explorer b. My Computer c. Control Panel d. the command prompt This type of drive partition can contain one or more logical drives. a. Primary b. Secondary c. Extended d. Logical To create a file system, you must____________________...
Words: 554 - Pages: 3
...NT1110 Computer Structure and Logic Week 7 Unit 9 Quiz 1. Biometrics is used to authenticate based on: a. something you know. b. something you are. c. something you have. d. something you do. 2. Which of the following is used to encrypt an entire hard disk? a. EFS b. NTFS c. BitLocker d. Local Audit Policy 3. Which file system provides the most features? a. FAT b. FAT16 c. FAT32 d. NTFS 4. An example of something a user knows used for authentication is a: a. retina scan. b. thumbprint. c. PIN. d. signature. 5. A firewall that protects against malicious traffic inbound and outbound is called a/an __________ firewall. a. one-way b. two-way c. pass through d. filtering 6. Files encrypted with EFS cannot be opened by: a. the user who encrypted them. b. EFS key holders. c. administrators. d. guest users. 7. Which is not a good password management technique? a. Changing passwords periodically b. Enforcing a minimum password length c. Telling a friend your password in case you forget it d. Preventing old passwords from being reused NT1110 Computer Structure and Logic Week 7 Unit 9 Quiz 8. Sending an email that tricks a user into providing personal information is a form of: a. baiting. b. phishing. c. pretexting. d. Trojan horsing. 9. Which is not a Windows account level? a. Administrator b. Guest c. Limited d. Supervisor 10. Which permission is needed to access and run programs? a. List b. Modify c. Read and execute d. Write 11. This is a graphical file-management...
Words: 591 - Pages: 3
...Programming paradigm is a fundamental style of computer programming , a way of building the structure and elements of computer programs. There are six main programming paradigms: 1. imperative programming, imperative programming, which is based on procedural languages, literate programming ,which structures programs as a human-centered web, as in a hypertext essay –documentation is integral to the program, and the program is structured following the logic of prose exposition, rather than compiler convenience. 2. declarative programming, declarative programming paradigms were developed. In these languages the computer is told what the problem is, not how to solve the problem – the program is structured as a collection of properties to find in the expected result, not as a procedure to follow. Given a database or a set of rules, the computer tries to find a solution matching all the desired properties. The archetypical example of a declarative language is the fourth generation language SQL, as well as the family of functional languages and logic programming 3. functional programming , Functional programming is a subset of declarative programming. Programs written using this paradigm use functions, blocks of code intended to behave like mathematical functions. Functional languages discourage changes in the value of variables through assignment , making a great deal of use of recursion instead. 4. object-oriented programming , object-oriented languages...
Words: 393 - Pages: 2
...What critical I/O Devices are Necessary to use a personal computer? Which ones are not necessary for normal day-to-day use and why? A: The Critical I/O Devices necessary to use a personal computer are the Mouse, the keyboard, The Monitor, The USB ports and the Internet ports. A2: Serial (COM) ports are not necessary for normal day to day use. The optional features include: External modems ,Serial mouse or pointing devices such as trackballs or touchpads, Plotters, Label printers, Serial printers, PDA docking stations, Digital cameras and PC-to-PC connections used by file transfer programs such as Direct Cable Connection, LapLink, and Interlink Team, Pearson C. Computer Structure and Logic. Pearson Custom Publishing, 2011. VitalBook file. Why a modem is considered an I/O device? A: A Modem is considered an I/O Device because more specifically a Null-Modem cable enables two computers to communicate directly with each other by crossing the receive and transmit wires (meaning that two computers can send and receive data, much like a computer network, though much slower) The Modem is Input and output, allowing two devices to receive and send data to one another. Team, Pearson C. Computer Structure and Logic. Pearson Custom Publishing, 2011. VitalBook file. Why do I think a Printer is classified as an input device? A: The Reason I feel a printer is also in Input device is because printers now a days are Multifunctional. Printers have the capabilities to send fax machines...
Words: 382 - Pages: 2