Free Essay

Computer Technology

In:

Submitted By keekeehart
Words 2031
Pages 9
_X___REC 303: CLINICAL PRACTICUM IN RECREATIONAL THERAPY I _____REC 304: CLINICAL PRACTICUM IN RECREATIONAL THERAPY II

Verification of Hours Completed

Student: Brittney Wilson_______ Field Study Site: TRC____ _________

|DATE |TIME IN |TIME OUT |TOTAL |DESCRIPTION OF ACTIVITY & OUTCOMES BY NCTRC JOB TASKS |
| |3:00 |4:00 |1 hrs |A.1 Establish/maintain therapeutic relationship |
|9-9-15 | | | |I met with some of participants at the TRC. The participants and I |
| | | | |established a relationship by introduction and simple conversation during |
| | | | |open gym (participants are free to play basketball, walk around the gym or|
| | | | |to play games). For example, one participant introduced herself and began |
| | | | |to walk around the gym with me; as we walked we talked about her day and |
| | | | |how this was my first time at the TRC. Another participant asked me to be |
| | | | |his “Pickle Ball” partner, and the participant explained the game to me |
| | | | |and encouraged me along the way. After establishing the relationship I was|
| | | | |more comfortable in doing my clinical hours. |
| |8:45 |12:30 |3:45 hrs |D.25 Monitor/ address safety |
|9-15-15 | | | |The activity for the group of participants and I was to brush and ride |
| | | | |horses within a small enclosed pen. When it came to safety, I helped the |
| | | | |participants get a helmet and put the helmet on properly. I monitored some|
| | | | |of the participants put the saddle on the horse and made sure the saddle |
| | | | |was securely on the horses before any of the participants got onto the |
| | | | |horses. When the participants were finished riding and had taken the |
| | | | |saddles off the horses, we took all the helmets back to the trailer and |
| | | | |sprayed them with disinfecting spray; therefore, the next group of |
| | | | |participants will be able to use the helmets. |
| | | | | |
| | | | |At the end of everything, I learned the group I was with were a higher |
| | | | |level functioning group of participants and were very capable in doing |
| | | | |majority of the requirements of saddling and riding the horses. |
| |8:45 |10:30 |1:45 hrs |D. 23 Implement individual/group sessions |
|9-22-15 | | | |Today the participants and I went to a room to play a variety of board |
| | | | |games. Each board game worked towards the domains of cognitive and social |
| | | | |behaviors. The cognitive behavior domain was applied in the memory game |
| | | | |(memory) and connect four (attention and concertation, strategy). The |
| | | | |social behavior domain was applied in all board games because the |
| | | | |participants played with another person, but the social behavior domain |
| | | | |was extremely applied during games of “Sorry;” whenever a participant |
| | | | |pulled a sorry card and knocked another participant back to start, the |
| | | | |participants became a little upset, but they were able to get over it and |
| | | | |moved onto the person’s turn. Whenever a participant got upset, gloated, |
| | | | |or encouraged another participant, the various levels of sportsmanship |
| | | | |were shown by each participant. |
| | | | | |
| | | | |I learned that minor modification had to be made, for example with the |
| | | | |memory game the participant and I made the amount of cards in use smaller,|
| | | | |so the odds will be more in her favor and easier for her to remember where|
| | | | |each card was, but participants were able sharpen mental skills while |
| | | | |having fun playing board games with other people. |
|10-2-15 |11:00 |12:30 |1:30 hr |27. Monitor effectiveness of individual/group intervention |
| | | | |I observed an aquatics workout for seniors. During their workout the |
| | | | |participants used water resistance dumbbells. The workout and the physical|
| | | | |effort came when the participants had to move the dumbbells in, out, and |
| | | | |around the water. The participants also worked on swinging their legs in |
| | | | |circles under water, and then pulling their leg up and onto the side of |
| | | | |the pool to stretch. |
| | | | | |
| | | | |I learned that aquatic workouts are beneficial, for they work a lot of |
| | | | |muscles without putting much strain on the body. While working with |
| | | | |seniors, the therapist want to incorporate activities that put less strain|
| | | | |on joints and the body in general. |
|10-6-15 |8:30 |12:15 |3:45 |23. Implement individual/group sessions |
| | | | |I stayed with the horseback riding activity all day, and worked with |
| | | | |different clients with brushing, saddling, and getting up on to the horses|
| | | | |due to balance coordination. |
| | | | | |
| | | | |With brushing the horses some participants would not use enough force to |
| | | | |actually brush the horse, so I would use physical guidance to help them |
| | | | |realize how much pressure should be applied to brush the horses. Also to |
| | | | |saddle the horses I helped by making sure the mat that goes under the |
| | | | |saddle is on correctly and that the saddle is tied properly for riding. |
| | | | |There is one client that has issues with balance and I had helped her get |
| | | | |onto the horse by holding her hand and offering a stable thing for her to |
| | | | |push off of until she got completely onto the horse. |
| | | | | |
| | | | |I learned that some of the participants were timid to get up close with |
| | | | |the horses, but once support and reassurance that they are okay is given |
| | | | |the participants enjoyed themselves more. |
|10-8-15 |9:00 |11:00 |2hrs |H. 41 Plan/coordinate support services |
| | | | |The TRC was putting on a Halloween Dance for all the participants, so in |
| | | | |the morning we all helped to set up the gym with tables, chairs and areas |
| | | | |of where the food, candy and drinks will be at. |
| | | | | |
| | | | |The Halloween dance put the participants in a sociable environment and |
| | | | |worked towards their social behaviors by implanting communication and |
| | | | |social interaction skills. |
|10-13-15 |8:45 |11:00 |2:15hrs |D. 23 Implement individual/group sessions |
| | | | |As a group we played monopoly deal, which is a card game version of |
| | | | |monopoly; the game was rather complicated, but I and the other supervisors|
| | | | |helped the percipients whenever they became confused by using verbal ques |
| | | | |and breaking down the directions and retelling the directions. For example|
| | | | |whenever a participant was going to make a move that was necessarily |
| | | | |wasn’t the best move or smartest move, we’d make noises like “ahh” or |
| | | | |“ehh” to que them that there is better move. |
|10-20-15 |8:45 |12:30 |3:45hrs |D. 23 Implement individual/group sessions |
| | | | |There was not a full staff; therefore, I was given a part of the rotation |
| | | | |in the morning session. When each group came to my part of the rotation, |
| | | | |we just played open gym where everyone had the opportunity to walk around |
| | | | |the gym, play basketball or just bounce the ball. |
| | | | |In one group we all sat in a big circle and rolled the ball to each other,|
| | | | |but made different patterns with each roll. For example, we made shapes |
| | | | |like squares and stars. That worked on the cognitive domain, for it worked|
| | | | |on attention, concentration, and strategy. |
|10-23-15 |12:00 |5:00 |5hrs |D. 24 Use leadership/facilitation techniques |
| | | | |I helped with the TRC’s basketball team’s practice. I was given the |
| | | | |authority similar to a coach’s; I ran a layup drill for the centers and |
| | | | |the forwards of the team and whenever they cut corners in the drill they |
| | | | |had to run two laps. The punishment worked on their cognitive domain, for |
| | | | |it made them focus more on their attention to detail and concentration. |
| | | | |After the layups the team did free throw drills and worked on their |
| | | | |perceptual motor skills while working on their depth perception. |
|10-27-15 |8:45 |12:30 |3:45hrs |D. 23 Implement individual/group sessions |
| | | | |It was another open gym day due to short staff at the start of the |
| | | | |morning, yet this time I had the participants go through free throw |
| | | | |(basketball) drills to work on depth perception which works on their |
| | | | |perceptual motor skills. |
| | | | | |
| | | | |Then one of the groups that rotated in were a little less high |
| | | | |functioning, so instead we did ring toss at a close distance and bean bag |
| | | | |toss into five buckets from a close distance. |
|11-2-15 |1:00 |5:00 |4hrs |D. 24 Use leadership/facilitation techniques |
| | | | |Again I stayed with the basketball team while they started practice, and |
| | | | |today I was able to work the shooting guards, and we played a game of |
| | | | |around the world. That is where each player takes a shot at the closes |
| | | | |point on the key to the hoop, and when the player makes it, they get to |
| | | | |move to the next point ad this continues until each player makes their way|
| | | | |to the other side of the key. But as punishment for not making the key the|
| | | | |opportunity to be passed up was present and they had to run a lap if they |
| | | | |missed two over all. |
|11-6-15 |1:00 |5:00 |4hrs |D. 23 Implement individual/group sessions |
| | | | |The group that I was with today went to the computer lab to watch a movie.|
| | | | |The movie that was being play was Toy Story. Watching a movie as a group |
| | | | |was working towards their social domain by having the participants make |
| | | | |sure they were quiet and understanding boundaries and personal space of |
| | | | |the other participants. At one point one participant tried to stretch out,|
| | | | |but there wasn’t enough room for him to so; therefore, we I gave nonverbal|
| | | | |ques to him for him to stay seated like everyone else and not to stretch |
| | | | |out. |
|11-10-15 |8:45 |12:30 |3:45hrs |D. 23 Implement individual/group sessions |
| | | | |Today the participants had the option to play Monopoly (board game) or |
| | | | |play Uno. I was in the group that was playing Uno, and when I had the |
| | | | |group of participants that were a level 2 functioning there were some |
| | | | |modifications that were needed to be placed. For example there was one |
| | | | |participant that does not speak and a participant that did not complete |
| | | | |grasp the concept of each card, so we divided up into two teams so it |
| | | | |would be evenly matched with someone who needs modification d someone that|
| | | | |does not. Playing Uno worked on the cognitive domain and social domain, |
| | | | |cognitive for they had to think of which card to play and what are the |
| | | | |effects of each when played and social because we divided up into teams |
| | | | |that worked on teamwork and communication skills. |
|11-12-15 |8:45 |12:30 |3:45hrs |D. 23 Implement individual/group sessions |
| | | | |This morning the whole group of participants had their own gym mat and we |
| | | | |did exercises that ranged from stretching to core work. Some stretching |
| | | | |was like reach down and touch your toes, lay on your stomach and lift your|
| | | | |trunk up as far as you can; and when it came to core work we did “Rocking |
| | | | |Chair,” and that is when the participant sits up and rocks back to their |
| | | | |back and throw their legs in the air and attempt to bring their legs above|
| | | | |their heads. Some participants had slight difficulty with it, but instead |
| | | | |they just rocked from a seated position to laying down. This worked on |
| | | | |their social and physical domains, for they did it in a group setting and |
| | | | |communicated with the group leader and the other participants and it also |
| | | | |worked on the wellness and overall physical health of the participants. |
|11-17-15 |8:45 |12:30 |3:45hrs |D. 26 Observe person serve for response to intervention |
| | | | |I was in the game room with a group, and within that group there were some|
| | | | |social conflicts dealing with someone of the participants not wanting to |
| | | | |talk to another participant for various reasons. The group leader decided |
| | | | |that we were going to work on the affective domain and talk about the |
| | | | |situation and what made the whole group upset with each other. There was a|
| | | | |relief of tension after we surfaced the conflict and everyone expressed |
| | | | |the emotions they were having. The group as a whole addressed everyone’s |
| | | | |frustration levels by going around in a circle and telling everyone what |
| | | | |makes each person personally upset. In the end the two participants that |
| | | | |were mainly having the conflicts resolved it and apologized, but still |
| | | | |wanted some time to themselves to refocus and to relax. |

TOTAL HOURS COMPLETED: _50 hrs.________________ Signature of Site Supervisor: ___________________
Most Recent Revision: December 2015 Date: 12-02-15

Similar Documents

Premium Essay

Computer Technology

...Computer technology is advancing at a rapid rate, causing the diversity and availability of assistive technology computer resources to have a tremendous impact for special education students across the United States. Assistive technology provides an opportunity for students with physical, emotional, and mental disabilities to acquire universal access to tools and opportunities for learning. Despite studies showing the benefits of assistive technology, many school districts fail to achieve the fullest potential that assistive technology can offer. This paper will define assistive technology, identify several obstacles of effective implementation, and present various approaches to overcoming those obstacles.  Assistive technology is defined as "any item, piece of equipment, or product system, whether acquired commercially off the shelf, modified, or customized, that issued to increase, maintain, or improve functional capabilities of individuals with disabilities" (Individuals with Disabilities Education Act, 1997). “Is society too dependent on technology?” Tom thought to himself as he drove to Colorado. He was on a family trip to visit his parents. It was a long trip and he had never been there before so he decided to use his navigation system to get there. He typed in his destination and headed to Colorado. On the way, his four-year-old son threw a juice cup, which spilled all over the navigation system. He did not think he would need a map, and now his family and he are stranded...

Words: 1746 - Pages: 7

Premium Essay

Computer Technology

...Computer Technology Since the beginning of time technology has helped us out as a human race. From the invention of the wheel to the Internet, technology has been a great factor on the way our civilization has grown. With more and more technological advances just around the corner, our civilization will continue to grow faster and faster than ever before. Computers make life easier for people every day. They help us to do tasks quicker and communicate with friends and family with the click on a button. Computers play a significant role in the school system as well. They help students to learn more efficiently and help them do their work. Computers offer the Internet which helps students research information for projects they may have. School computers also offer programs which can help anyone learn. An example of this is the program All the Right Type. This program helps students as well as teachers, to learn how to type faster and more efficiently. Also there are other programs which younger students can go on to help them with developing and reinforcing their math skills and reading skills. Programs like Math Circus and matching the word with the picture. Programs like these make it easy to understand and use computers, yet it also makes learning fun. Computers also make writing and doing homework easier to complete. With spell check and other spelling tools, it makes it easier and faster to complete work. This is because you are not spending all your time going through your...

Words: 668 - Pages: 3

Premium Essay

Computer Technology

...Final Project: Expository Essay Samantha A. Medina University of Phoenix Final Project: Expository Essay Computer technology has developed tremendously over the decades and centuries to become so modern in every aspect including education and personal leisure. It is breath taking to see how modernized out computer technology is today as opposed to the limited computer technology that was available in history. The changes that have occurred over history to today will be discussed and focused upon in this essay. The Mechanical Era: Early Computing Devices The Abacus The abacus was the first machine to be used computational science. It is considered to be the first computer. This machine was inspired by one of Charles Babbage’s designs. The abacus could process 15 digit numbers and calculate fourth-order differences. In 1885 the machine won gold medal at an exhibition in Paris and also helped calculate the orbit of mars! The abacus is still in use today. Imagine that a computing device from centuries ago still being used to this day! Charles Babbage Charles Babbage was an English mathematician, philosopher, inventor and mechanical engineer ("Charles Babbage", 2012). Babbage is known to have invented the first programmable computer. As stated earlier his design inspired the abacus and other complex designs. He won the Gold Medal of the Royal Astronomical Society for inventing an engine for calculating mathematical and astronomical tables. Babbage was also Lucasian Professor...

Words: 1624 - Pages: 7

Free Essay

Computer Technology

...JEKIE YEAKPEE 06/24/143 . September, 1987 Any discussion of computer architectures, of how computers and computer systems are organized, designed, and implemented, inevitably makes reference to the "von Neumann architecture" as a basis for comparison. And of course this is so, since virtually every electronic computer ever built has been rooted in this architecture. The name applied to it comes from John von Neumann, who as author of two papers in 1945 [Goldstine and von Neumann 1963, von Neumann 1981] and coauthor of a third paper in 1946 [Burks, et al. 1963] was the first to spell out the requirements for a general purpose electronic computer. The 1946 paper, written with Arthur W. Burks and Hermann H. Goldstine, was titled "Preliminary Discussion of the Logical Design of an Electronic Computing Instrument," and the ideas in it were to have a profound impact on the subsequent development of such machines. Von Neumann's design led eventually to the construction of the EDVAC computer in 1952. However, the first computer of this type to be actually constructed and operated was the Manchester Mark I, designed and built at Manchester University in England [Siewiorek, et al. 1982]. It ran its first program in 1948, executing it out of its 96 word memory. It executed an instruction in 1.2 milliseconds, which must have seemed phenomenal at the time. Using today's popular "MIPS" terminology (millions of instructions per second), it would be rated at .00083 MIPS. By contrast...

Words: 1246 - Pages: 5

Premium Essay

Technology and Computers

...INFORMATION TECHNOLOGY FOUNDATION 1 Compiled By: RONKY F. DOH (aka: ronky biggy diggy daddy igp) FU DAME TALS OF COMPUTERS We are living in an information age dependent upon digital information. Digital information is electronic information, the result of computer processing. Every type of job relies upon getting information, using it, managing it, and relaying information to others. Computers enable the efficient processing and storage of information. Do not think of a computer merely as the machine with the keyboard and the mouse, although that might be true for some types of computers. Embedded computers may be inside your household appliances, the video cassette recorder, the automobile, planes, trains, power plants, water purification plants, calculators, and even inside a few toys. These embedded computers are very small. They affect our lives each day. Why, even modern traffic lights operate with computers. They are all around us. Think of additional ways in which computers affect our lives each day. Every organization somehow use(s) a computer to run the organization. Some of the places are hospitals, schools, fire department, banks, stores or supermarkets, stock exchange, police department, insurance companies, transport companies, and government agencies etc. What is a computer? A computer is many things to many people, depending on what it is being used for. At one time the computer can be a machine which processes the payroll, then it can be a machine which tabulates...

Words: 67033 - Pages: 269

Free Essay

Computer Technology

...Rhubes Severe Computer Technology Have you ever heard of the expression “necessary evil?” If it is evil, how can it be necessary? Well, there are some things that are necessary but not necessarily easy. People sometimes call “evil” the things that they find difficult or complicated. Thus, a “necessary evil” may be a thing that needs to be done for a greater good but that it may not be easy at first. The incursion of technology and computers in our everyday lives seems to be one of those “necessary evils” that we all have to deal with at one time or another. Today, technology is an integral part of schools in America. Teachers need to learn to use technology in the classroom in order to teach. Children become acquainted with technology in a safe learning environment with their teachers at school. Students are also expected to learn to use computers and interact with some educational software. The child’s homework often includes reports, research and or presentations using technology. Since children become some kind of experts with computers and interact with a variety of software at an early age, they see computers a little less challenging than an adult with little experience in computers. Technology has also made its place among the needful things to have at home. Parents often times feel the need to provide the technology that the child requires in order to do homework and to help the child study. That way, parents end up learning the technology first in order to...

Words: 464 - Pages: 2

Premium Essay

Computer Technology

...Computer Technology Being a kid sitting around with your friends, there was always that one person this said, do you think this will ever happened? When I grow up all I will have to do will say door open to get in my house, everything else will be done for me. now, much to my surprise this day has now arrived. The arrival and utilization of computers in today's world is absolutely unbelievable. Things can be done with computers that could have never been done in the past. we have security systems that don't need keys, cell phones that could go on line, and receptionists are now virtually unknown due to automated voice systems. the question that everyone wants to know is, our we too dependent on computers, and what will happen when they fail us? this is an idea that nobody really likes to discuss. Going further in-depth with this idea, what have computers done to the business world. many people feel it has enhanced businesses of today's society, others feel it has ruined them. there now companies being run by very few workers due to fully automated systems, systems that need one operator a and it can produce more than that of 15 to 20 a lot of cases. what this does the company's is forces them to put new technological advances in their budget to keep up with competition and be more cost effective. This is exactly why the technology is there, to get one step ahead of the competition, and to produce more product, more often. Integrating computers into assembly lines...

Words: 1040 - Pages: 5

Premium Essay

Computer Technology

...study As we move into the 21st century, technology has greatly improved and has become better. It is continuously growing and changing in many aspects until now. It makes the people’s life easier than the usual and is greatly helpful and useful especially to the students. Technology invented gadgets like computers and laptops that students can use in their studies. These gadgets changed how students learn, process and obtain new or old information. These can also use when it comes to finishing their task and completing their school works because students can freely visit many educational websites. Students can also play educational games, which can help them improve their critical thinking and problem-solving skills. However, technology has also negative effects like other things. Like computers, instead of using it for research purposes, students tend to use it for playing games like DOTA and Couter Strike. Students also use it for just viewing or signing in their social networking pages. Computer is a factor that distracts or steals away the attention or the focus of the students in their studies. Students abuse the power of technologies. Computer technology has positive and negative effects in the lifestyle of the students. Computer were invented to help students and not the be abused by the students which brings negative effects. But, majority of the results that were gathered presents that most students agree that computer technology is a good material that helps in the study...

Words: 683 - Pages: 3

Free Essay

Computer Technology

...earphones, microphone and speaker jacks which come color coded. * * Serial, Parallel, Game ports | * USB(Universal Serial Bus) | * Mouse and Keyboard | * SCSI | * NIC( Network Interface Card) | * IEEE 1394 | * Modem | * Multimedia | * Video | | * Serial port: a socket that can be used for connecting devices that send data one bit at a time; often used for connecting the mouse or a modem. * Parallel port: a socket that can be used for connecting devices that send and receive data at more than one bit at a time; often used for connecting printers. * USB: an external serial bus interface standard for connecting peripheral devices to a computer. Up to 127 devices simultaneously connected to computer. * SCSI: a standard for computer interface ports featuring faster data transmission and greater flexibility than normal ports. I think that this video clip gave me a better understanding of the ports and connectors and the devices used for those respectfully. Understanding the 3 types of USB devices and IEEE 1394 cable was a little confusing but I grasped it. I will use...

Words: 810 - Pages: 4

Premium Essay

Computer and Technology

...completed in a number of different ways. As such a Security Taxonomy helps us to understand these different approaches and meanings by providing a base level to work from. Confidentiality A security measure which protects against the disclosure of information to parties other than the intended recipient is by no means the only way of ensuring the security. Integrity A measure intended to allow the receiver to determine that the information provided by a system is correct. Integrity schemes often use some of the same underlying technologies as confidentiality schemes, but they usually involve adding information to a communication, to form the basis of an algorithmic check, rather than the encoding all of the communication. Authentication This might involve confirming the identity of a person, tracing the origins of an artifact, ensuring that a product is what its packaging and labeling claims to be, or assuring that a computer program is a trusted one. Authorization The process of determining that a requester is allowed to receive a service or perform an operation. Access control is an example of authorization. Availability Assuring...

Words: 844 - Pages: 4

Free Essay

Computer and Technology

...Exercise 2 Question 1 a) To lower the cost of of providing computing capability, time-sharing and multiprogramming made it possible for individuals and organizations to use ocmputer without owning one (such as in Internet Cafes, laborities in school, etc.). It also promotes the interactive sense of using computers. Some computer laboratories in schools as an instance. Because users share the system simultaneously, they have the opportunity to copy other user's file from the system. Once a user saves a file to his/her unit, other users of that group or connected system may also have an access to the file. Other users may change an information inside the file or even steal the file from the owner itself without the owner knowing it. They may also modify the files or programs that was saved or ran by the owner. Furthermore, some of the threats that the owner of a certain file may encounter is the data confidentiality. Without him not being aware of the system used as the time-sharing and multiprogramming, he may insert or have a secret or confidential data that he wants to remain at the file. Another one is the data integrity. Other users may change, add, or even remove some information in the file if he wants to.       Internet cafes also have a multiprogramming and time-sharing environment. Some internet cafes have hardwares like printers that is also connected with the system. State that a certain user is asking the attendant to print...

Words: 719 - Pages: 3

Free Essay

Evolution of Computer Technology

...Evolution of Computer Technology Catherine L. Dean 2142CMIS3106380 March 9, 2014 Table of Contents I. Introduction 3 II. Reduced Instruction Set Computing (RISC) 3 III. Pipelining 3 IV. Cache Memory 4 V. Virtual Memory 4 VI. Conclusion 5 VII. Works Cited 5 I. Introduction The purpose of this paper is to investigate the evolution of and current trends in improving system performance with respect to RISC, pipelining, cache memory, and virtual memory. II. Reduced Instruction Set Computing (RISC) Reduced Instruction Set Computing also known as RISC is a type of microprocessor architecture. It is a CPU design strategy. The purpose of RISC was for design simplification. It increases the number of executed instructions thus increasing the CPU performance. (Joy) The RISC design was first proposed and implemented in the 1960s and has been constantly evolving. Since the late 1980’s, RISC has been more than doubling its performance every year and half. The RISC industry, which includes IBM and Sun Microsystems, is ever expanding with the focus on the speed of executing instructions per second along with the evolution of the computer industry. (Joy) III. Pipelining One characteristic of RISC processors is pipelining. With pipelining, instructions are able to be executed in a shorter period of time. The first step in pipelining is to find the instructions, then read the registers, decode the instructions, execute the instruction, access the data...

Words: 810 - Pages: 4

Premium Essay

Computer Technology Is Limited???

...Computer Technology Limited or CTL, was a British computer company founded slightly later than Digital Equipment Corporation (DEC) in the United States. Founder Iann Barron had worked for Elliott Computing but left to form CTL when he couldn't persuade Elliott to incorporate his ideas in their next generation of computers. He left in 1978, going on to form Inmos and develop the transputer. The first CTL computer (the Modular One) appeared for sale in 1969. Contents   [hide]  * 1 The Modular One * 2 Operating system * 3 Later history * 4 References ------------------------------------------------- The Modular One[edit] This was a 16-bit computer built with Emitter Coupled Logic (ECL) and was competitive with other first generation minicomputers. A key feature, from which it derived its name, was that it was composed of separate processor, memory and peripheral modules sharing a common interface and physical form factor, so allowing them to be put together in any combination, housed one or two high in modular racking. Standard modules were roughly 50cm wide and deep, 70cm tall, and complete with power supply, typically weighed in excess of 25kg. Modules were interconnected using a single type of interface, comprising two identical cards to be plugged into two modules to be connected, these cards themselves linked by a flat ribbon cable either one or two metres long. Thus, memory was just another peripheral (such as a printer) but was both input and output...

Words: 1231 - Pages: 5

Premium Essay

Son of Computer and Technology

...Crash failures: Crash failures are caused across the server of a typical distributed system and if these failures are occurred operations of the server are halt for some time. Operating system failures are the best examples for this case and the corresponding fault tolerant systems are developed with respect to these affects. Timing failures: Timing failures are caused across the server of a distributed system. The usual behavior of these timing failures would be like that the server response time towards the client requests would be more than the expected range. Control flow out of the responses may be caused due to these timing failures and the corresponding clients may give up as they can’t wait for the required response from the server and thus the server operations are failed due to this. Omission failures: Omission failures are caused across the server due to lack or reply or response from the server across the distributed systems. There are different issues raised due to these omission failures and the key among them are server not listening or a typical buffer overflow errors across the servers of the distributed systems. Byzantine failures: Byzantine failures are also know as arbitrary failures and these failures are caused across the server of the distributed systems. These failures cause the server to behave arbitrary in nature and the server responds in an arbitrary passion at arbitrary times across the distributed systems. Output from the server would...

Words: 284 - Pages: 2

Free Essay

Ethics in Computer Technology

...crumble” (Shays). Computer Information Systems is a job category that is projected to be growing through the next ten years according to the United States Bureau of Labor Statistics. Computer technology gives an IT (Information Technology) Professional access to computer software and other sensitive information and ethics could determine how an individual may deal with these items on a day to day basis. Should businesses and individual be allowed to pirate software? Pirating continues to be a topic of concern for the future of technology. According to dictionary.com ethics is “that branch of philosophy dealing with values relating to human conduct, with respect to the rightness and wrongness of certain actions and to the goodness and badness of the motives and ends of such actions” (Dictionary.com). “The more specific term “computer ethics” has been used to refer to applications by professional philosophers of traditional Western theories like utilitarianism, Kantianism, or virtue ethics, to ethical cases that significantly involve computers and computer networks. “Computer ethics” also has been used to refer to a kind of professional ethics in which computer professionals apply codes of ethics and standards of good practice within their profession” (Bynum). Pirating computer software is a major ethical issue in computer technology. Pirating is the copying of computer software without permission. Typically whenever a person buys a program it is licensed for one computer to use it...

Words: 1752 - Pages: 8