...Introduction to Computers A World of Computers What is computer literacy? * Knowledge and understanding of computers and their uses * Computers are everywhere What Is a Computer? How is a computer defined? Electronic device operating under the control of instructions stored in its own memory * Accepts data Raw facts, figures, and symbols * Processes data into information Data that is organized, meaningful, and useful * Produces and stores results Advantages and Disadvantages of Using Computers What are the advantages of using computers? * Speed * Reliability * Consistency * Storage * Communications What are the disadvantages of using computers? * Violation of Privacy * Impact on Labor Force * Health Risks * Impact on Environment What Is a Computer? What is the information processing cycle? * Input * Process * Output * Storage * Communication The Components of a Computer What is an input device? * Hardware used to enter data and instructions What is an output device? * Hardware that conveys information to one or more people What is the system unit? * Box-like case containing electronic components used to process data What are two main components on the motherboard? * Central Processing Unit (CPU) Also called a processor The electronic component that interprets and carries out the basic instructions that operate the computer *...
Words: 916 - Pages: 4
...Financial Analysis Phillips 66 Toccara Smalls Atlanta intercontinental university BUSN 125- Business Math September 3, 2015 Abstract This paper is an analysis of the financial statement of Phillips 66. The researcher will present horizontal and vertical analysis of the income statement and balance sheet among other things. Introduction This paper presents an analysis of Phillips 66 financial statement. Specifically discussed in this document will be the following: Preparation of Financial Statement, Business Problem Solving, Recovery Methods, Indebtedness, Horizontal Analysis, Vertical Analysis, and Ratios and Percentages. The document will conclude with a summary of this discussion. Preparation of Financial Statement Financial statements will give you a clear and accurate visual of how your business is currently performing, so you have a means of monitoring its progress and identifying opportunities for growth. The type of financial statement that lays out the basis for a fortune 500 company like Phillips 66 include a thrall preparation of the balance sheet, income statement, statement of retained earnings, and statement of cash flows; which are the most important steps in the accounting cycle because it represents the purpose of financial accounting statement (Brook, 2013). Ideally the financial statements are prepared by transferring the account balances on the adjusted trial balance to a set of financial statement templates in order to establish a logistical...
Words: 1188 - Pages: 5
...CSS150 – Introduction to Information Security Phase 5 Individual Project Kenneth A. Crawford Dr. Shawn P. Murray June 23, 2013 Table of Contents Phase 1 Discussion Board 2 3 Phase 1 Individual Project 5 Phase 2 Discussion Board 8 Richmond Investments: Remote Access Policy 8 Phase 2 Individual Project 11 Richmond Investments: LAN-to-WAN, Internet, and Web Surfing Acceptable Use Policy 11 Phase 3 Discussion Board: Blaster Worm 17 Phase 3 Individual Project 19 Phase 4 Individual Project: 4 Methods to Keeping Systems Secure 22 1. Keep all software up to date: 22 2. Surf the web cautiously: 22 3. Be cautious with e-mail: 22 4. Anti-Virus Software: 23 Phase 5 Individual Project: 4 Methods to Keeping Systems Secure 24 1. Firewalls: 24 2. System Backups: 24 3. Passwords: 25 4. File Sharing: 26 References 27 Phase 1 Discussion Board 2 The “Internal Use Only” (IUO) data classification includes all data and information not intended for public access. The best way to describe this classification is all company and client information that we do not want to see in a newspaper or on the internet. Some examples of this are: Client lists, Client account numbers, Human Resource files, Payroll files, E-Mails, and many others. This data classification affects all seven IT domains. The first and most important IT domain that the IUO affects is the “User Domain”. The users have to be taught general security and proper use of the systems...
Words: 5085 - Pages: 21
...Donald E Martin Ms. Toney Introduction to Computer 25 October 2014 Springfield Illinois Municipal Internet: Internet for ALL Springfield City, Land of Lincoln is the capital of Illinois. Springfield is located 1.5 hours northeast of Saint Louis, Missouri, and 3 hours south of Chicago, Illinois. Springfield is small family city with a population of 116, 000 Midwestern’s. Springfield municipally manage and produce water, and electricity for Springfield’s residential and central Illinoisans. I believe Springfield Municipally is ready to enter the twenty first century as a metropolitan city that offers a Gigabyte Network by direct connect or wireless connect. “Only in Chattanooga, Tennessee is 1 Gigabit-per-second Internet speed available to every home and business - over 150,000 of them - throughout the entire community. Urban or rural, business or residence, Internet speeds that are unsurpassed in the Western Hemisphere – from 50 Megabits-per-second all the way up to one gigabit-per-second are accessible here. “Chattanooga's community-owned electric utility EPB is installing a 100% fiber to the premises network. Built to run America's first true Smart Grid and offer residential high speed Internet, video and telephone services, the network was also built to empower our community in new ways. Because bandwidth is no problem, Chattanooga's Fiber Optic network enables upload and download speeds 200 times faster than the current national average, and 10 times faster than...
Words: 843 - Pages: 4
...to help protect their computers. The four security tips that I have selected to discuss are; update Windows software, use strong passwords, run a virus scan on a schedule, and update virus definitions daily. Describe the goal of each security tip. Windows update should be run to make sure that your computer has the latest patches. These updates are designed to close security holes that have been found in the operating system and hopefully will help guard your computer from getting infected or hacked. Strong passwords can be very helpful in slowing down or even defeating different attack methods of compromising the user`s computer. Users should think of passwords like a lock on their door, a strong password will make a strong lock. A hacker`s software toolkit will most likely include an offline dictionary, this automated program can quickly identify simple and commonly used passwords. Running a scheduled virus scan should be done by anyone who has a computer. If the user is running AVG for their anti-virus it is pretty easy to set up a scheduled scan. The user can just right click the AVG icon in the system tray, select the tools menu > advanced settings > schedules. From here the user can set the day and time for the schedule to run. It can be set to run a scan once a week or each day. This software scans for any viruses or malicious software that could be on the computer. Updating your anti-virus definitions daily will ensure that your computer is protected against...
Words: 803 - Pages: 4
...The History of wool begins long ago, when primitive man for the first time clothed himself in the woolly skins, of the sheep he killed for food. The sheep could be milked (and still is, in many parts of the world).However man soon understood that to kill the sheep for its meat alone was a waste of food and material. Man had realized when the sheep shed its fur the material could be spun and knitted into cloth. Then he became a shepherd with the help of his friend the dog- probably the only animal to be domesticated before the sheep- he soon developed a system for making clothing from the sheep. Man had found a heavy-duty fabric that would offer him protection from heat, cold, wind, and rain. A flexible cloth that could keep him cool in the heat of the day, also warm in the cold of the night. Man had realized that there is no other cloth that could match wool, there was no other material, natural or man-made, has all its potentials. But man learned he can improve wool by selective breeding of sheep and by combining the wool fabrics with such qualities as shrink resistance, mothproofing, shower-proofing and stain-proofing. Science and technology have kept wool in the lead of fabrics, adjusting to modern-day needs without damaging its virtues. Wool is a very big part of Britain's history, more so than any other product ever manufactured in these islands. It was knitted into cloth here in the Bronze Age which began about 1900 BC. Elsewhere in the world, primitive man had domesticated...
Words: 671 - Pages: 3
...Linda Fernandez Chap 2 Review Questions 1. Why is information security a management problem? What can management do that technology cannot? Both management and IT management are responsible for the protection necessary to secure information. They are the ones who make the decisions regarding the appropriate security system and what level of security will work for the system. 2. Why is data the most important asset an organization possesses? What other assets in the organization require protection? Data is important because it keeps a record of all changes and activity. Without data, the company or organization may fail because they have no records, and therefore be of no good use. 3. Which management groups are responsible for implementing information security to protect the organizations’ ability to function? General Management and IT Management are responsible because it has to be set up for that specific system. If one part fails, then they are the ones to fix it and make it usable 4. Has the implementation of networking technology created more or less risk for businesses that use information technology? Why? Networking has caused more risk for businesses using information technology because it made it much easier for attackers to breach the security systems. They are even more of a target with the internet connection. 5. What is information extortion? Describe how such an attack can cause losses, using an example not found in the text. ...
Words: 1293 - Pages: 6
...Home Page » Computers and Technology Pt1420 Unit 1 In: Computers and Technology Pt1420 Unit 1 “Unit 1 Assignment 1” ITT Technical Institute Intro to Programming – PT1420 Unit 1 Assignment 1 Short Answer Questions 1. Why is the CPU the most important component in a computer? The reason the CPU is the most important component in a computer is because without the CPU you can’t run any software. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? The number in a bit that represents a turned on position is 1. The number in a bit that represents a turned off position is 0. 3. What would call a device that works with binary data? A digital device is a device that works with binary data. 4. What are the words that make up a high-level programming language called? Keywords or Reserved Words are words that make up a high-level programming language. 5. What are short words that are used in assembly language called? Mnemonics are short words that are used in assembly language. 6. What is the difference between a compiler and an interpreter? The difference between a compiler and an interpreter is that a compiler translates high-level language into separate machine language program while an interpreter translates AND executes the instructions in a high-level language program. 7. What type of software controls the internal operations of the computer’s hardware? An operating...
Words: 393 - Pages: 2
...Intro to CS: stored program concept Panos Hilaris Intro to CS: stored program concept 1 Stored program concept John von Neumann’s idea: Store programs, together with data, in the memory of the computer. Memory contains: (a) instructions, (b) data. Conceptually, programs and data seem very different. In fact the first computers, distinguished between them and stored them in different places. Another point of view: Treat programs as data. Intro to CS: stored program concept 2 Inside hardware The two hardware parts, that are ‘inside’ the computer: Processor or CPU (Central Processing Unit) Main memory (RAM: Random Access Memory) (Remember: the other part is input/ouput devices) Intro to CS: stored program concept 3 Components of CPU/memory arithmetic and logic unit (ALU): circuitry for arithmetic and logic operations (here the ‘real’ work is done) control unit (CU): responsible for running programs (here the ‘book-keeping’ job is done) • Fetch next instruction • Decode instruction • Execute instruction (activate relevant circuitry in ALU) registers (in ALU and CU): hold data for use by arithmetic and logical operations bus: wires connecting CPU and main memory Intro to CS: stored program concept 4 Review question What is the difference between a computer and a calculator? Intro to CS: stored program concept 5 Review question What is the difference between a computer and a calculator? Answer: The computer is programmable, and this is achieved through the control unit...
Words: 694 - Pages: 3
...Chapter 2 OPERATING SYSTEM CONCEPTS SYS-ED/ Computer Education Techniques, Inc. Solaris System Administration: Introduction Operating System Concepts Objectives You will learn: • Operating system components. • Solaris usage of processes. • File management and file systems. • Use of the Solaris Management Console. SYS-ED/COMPUTER EDUCATION TECHNIQUES, INC. (Solaris – System Admin: Intro - 6.5) Ch 2: Page i Solaris System Administration: Introduction 1 Operating System Concepts Operating System: Definition An operating system is the set of programs that controls a computer. The core of the operating system is the kernel. The kernel is a control program that functions in privileged state that allows all hardware instructions to be executed. It reacts to interrupts from external devices and to service requests and traps from processes. The kernel creates and terminates processes and responds to requests for service. Operating systems are resource managers. The main resource is computer hardware in the form of processors, storage, input/output devices, communication devices, and data. Operating system functions include: • Implementing the user interface. • Sharing hardware among users. • Allowing users to share data among themselves. • Preventing users from interfering with one another. • Scheduling resources among users. • Facilitating input/output. • Recovering from errors...
Words: 2421 - Pages: 10
...IS2202 Computer Systems Architecture Lecture review pipeline and memory hierarchy EECS 252 Graduate Computer Architecture Computer Systems Architecture Review of Pipeline and cache memory concepts t Mats Brorsson, professor matsbror@kth.se, tel. 790 4121 Lec 3 – Performance + Pipeline Review Electrical Engineering and Computer Sciences El t i l E i i dC t S i University of California, Berkeley http://www.eecs.berkeley.edu/~pattrsn http://www‐inst.eecs.berkeley.edu/~cs252 David Patterson Review from last lecture • Tracking and extrapolating technology part of architect’s responsibility • Expect Bandwidth in disks DRAM network and Expect Bandwidth in disks, DRAM, network, and processors to improve by at least as much as the square of the improvement in Latency • Quantify Cost (vs. Price) – IC ≈ f(Area2) + Learning curve, volume, commodity, margins Outline • • • • • • • • Review MIPS – An ISA for Pipelining 5 stage pipelining 5 t i li i Structural and Data Hazards Forwarding Branch Schemes Exceptions and Interrupts Conclusion • Quantify dynamic and static power Quantify dynamic and static power – Capacitance x Voltage2 x frequency, Energy vs. power • Quantify dependability – Reliability (MTTF vs. FIT), Availability (MTTF/(MTTF+MTTR) 3/28/2008 CS252-s06, Lec 02-intro 3 3/28/2008 CS252-s06, Lec 02-intro 4 1 IS2202 Computer Systems Architecture Lecture review pipeline and memory hierarchy MIPS ‐‐ A "Typical" RISC ISA • • •...
Words: 635 - Pages: 3
...One more class of choice from list (3 courses) Area E- Humanities and Fine arts Class of your choice from list (3 courses) Area F-Contemporary Global Studies Class of your choice from list (1 course) Total must add to approx. 40 Credits Electives- ANY OF YOUR CHOICE BUT THESE ARE RECOMNEDED FOR BACHELORS Accounting- ACC 153 and ACC 154 Business- BUS 101 and BUS 221 or BUS 225 Computer Science- CIS 101 or another accepted by University Mathematics- MAT 190 Total must add up to approx. 20 Credits Total to graduate min. 60 credits List of classes I still need that I can take from Core List Area C Life Sciences BIO 101 Intro to life Science w/lab, or BIO 104 w/o lab Human genetics Physical Sciences CHM 101 Intro to General Chemistry (preq. MAT 070 OR 114) or CHM 105 Elements of chemistry (same Preq.) PHY 115 w/o lab Descriptive astronomy, PHY 131 college Physics (Preq. MAT 122 or currently enrolled in MAT 122) or PHY 221 General Physics (Preq. MAT 250 with C or better) EAS 100 Intro Earth Science, EAS 101 Physical Geology, EAS 105 w/o lab Intro Weather and Climate or EAS 121 w/o Physical Geography Area E- Classes with bullet points will apply to both area E and F knocking out both areas (so take 1 classes instead of...
Words: 305 - Pages: 2
...1.1 (Intro.) CS-M74 Software Product Development (2003-4) 1.2 (Intro.) Roger D Stein BSc PhD MBCS CEng CITP R.D.Stein@swansea.ac.uk Room 302, Faraday Tower 1.3 (Intro.) CS-M74 Pre-requisites • CS-M01 Distributed Programming in Java 1.4 (Intro.) Assessment Report 10% Linux / C 10% Group Project 20% Project Specification 30% Written Examination (May/June) 30% Lectures approx. 20 in total ((plus tutorials)) TB1 Tues. 9.00 Far-L ? Andy Gimblett (3 Linux + 6 C) [with CS-244] Wed. 11.00 Glyn-A ? Roger Stein (start on 5 November) TB2 Lectures Linux /C 9 Introduction 1 Ethics 1 Legal Issues 1 Project Management 2 (Group Project 2) Software Engineering 4 1.4 (Intro.) Books B. Ayres, The Essence of Professional Issues in Computing, Prentice-Hall, 1999 S Baase, A Gift of Fire, 2nd ed., Prentice-Hall, 2003 B. Hughes and M. Cotterell, Software Project Management, 3rd ed., McGraw-Hill, 2002 R. Pressman, Software Engineering: A Practitioner’s Approach, 5th ed., McGraw-Hill, 2000 I. Summerville, Software Engineering, 6th ed., Addison-Wesley, 2001 1.5 (Intro.) Why Software Engineering? “Engineering … to define rudely but not inaptly, is the art of doing that well with one dollar, which any bungler can do with two after a fashion” - Arthur Mellen Wellington, The Economic Theory...
Words: 3498 - Pages: 14
...Writing Research Papers Aaron Hertzmann Why should you care about writing? • You must communicate your work to the world – If people don’t know about it, they won’t use it – Increase probability of adoption • Clear writing requires clear thinking; muddled writing is a sign of muddled thought • Be kind to your readers – good writing can be a joy; bad writing is agony • These skills transfer to other endeavors Goals for your paper 1. 2. 3. 4. Communicate ideas and experiments Persuade people of the approach Describe experiments and results Allow others to reproduce your results precisely 5. Be honest Know Your Audience • Potential audience includes: – – – – Experts in your area; people outside your area Expert professors; advanced undergrads Industry practitioners Researchers now; researchers 10 years from now • Title/abstract often used to decide whether to read the paper (and when searching) • Audience knows a lot less about this than you • The clearer and more self-contained the paper, the wider the audience Editing • • • • • • 90% of writing is editing Delete every unnecessary word Break down complex sentences Refactor sentences for clarity and flow Convert passive into active voice “Vermont is a state that attracts visitors because of its winter sports.” The Importance of Editing I'm not a very good writer, but I'm an excellent rewriter. ~James Michener The beautiful part of writing is that you don't have to get it right the first time...
Words: 1533 - Pages: 7
...Erin Jordan Mahler’s Symphony No. 5 The Pittsburgh Symphony Orchestra September 12, 2011 Berlin Philharmonie The Pittsburgh Symphony Orchestral performed Mahler’s Symphony No. 5 while touring in Europe and was conducted by Manfred Honeck. The program is Mahler: Symphony No. 5 in c-sharp minor with encores by Josef Strauss and Richard Strauss. I obtained the program from http://www.youtube.com. Watching and listening to a concert on a small computer screen with poor sound quality isn’t ideal but the feelings and emotions were still present. Prior to watching the concert I researched the composer Gustav Mahler. One important piece of musicians is their life history. I learned Gustav had a near death experience prior to composing Symphony No. 5. I believe his struggle with life and death was told in his work. Mahler’s Symphony No. 5 begins with a trumpet solo intro and is quickly joined by the bass drums portraying a sense of fear and suspense. The trumpet intro is by far the most memorable feature. The musical theme is a sense of darkness to light, sadness and despair to joyful and hopeful. Many parts also sound as if there is sorrow turned into violence. It is as if Mahler is fighting for something or someone. Quite possibly his own life or even the love of a female. There are frequent changes in tempo and dynamic with crescendo and decrescendo. The cadence of the orchestra allows for more suspense and the need to see what comes next in the story. Many chords...
Words: 318 - Pages: 2