.

Thursday, April 4, 2019

Immediate Access Storage

Immediate Access Storage uncreated shop is likewise known as Immediate Access Storage and is where data is retentiond on the briny computer retrospection. An slip of primary storage is RAM (Random Access Memory otherwise referred to as RWM ( submit Write Memory). RAM is the warehousing chip stored at heart the computers motherboard, where data shadow be read, stored and edited. RAM is extremely fast and is where programs are usually seted, due to its ability to expelling programs quickly and more efficiently than Secondary storage facilities.Secondary storage is where software and some scrolls or spreadsheets are stored onto a hard drive or externally onto a device such as a disk, which is easily accessible when required, via any computer or laptop and easily transpor circumvent. This is a much slower form of storage but popularly used, as the computers mainframe computer (Central Processing Unit) computer depot is limited in size and its storage capacity. The educati on is usually stored on CD read-only memory external hard drives flash memory or USB Pen drives. Secondary storage is perm and only becomes obsolete in time (when it eventually wears out or is replaced by naked and alter technology). Complex functions such as translators for high-level languages and operate agreements are placed on ROM memory. (Comp Wisdom, 2006). The ROM memory chip is a viable permanent storage facility for manufacturers, as users are unable to everyplacewrite the in fix upion stored on this device. Off-site data storage is non-volatile and is where information is stored at another military position a itinerary from the computer, which is accessible from a direct call or via the internet. Off-site data storage is secure as a backup if complications arise with the onsite computer system. (No-Moa Publishers, 2000)Table -Differences between ancient and Secondary Storage. (Integrated Publishing, 2010)PrimarySecondary vapourific TemporaryNon-Volatile Perman entFast memory therefore expensiveSlow memory therefore cheaperSmaller storage capacity (L2 Cache = 2MB)Larger storage capacityCloser to central processor or internal so fasterConnects to the CPU so slower performanceExamplesPROM Programmable Read Only Memory, already programmed by the manufacturer, non-editable. Needs a device to burn to disk and if mistake do cannot be corrected.EPROM Electronically Programmable Read Only Memory. Holds data no agency supply, electrically reprogrammed up to 100 times. Stores Calibration data in real time clocks.Other types DRAM,SRAM, MRAMOther types ROM trounce be read but not overwrittenHard drive, CDs, DVDs, Flash Memory, Magnetic tapes, Offline storage, EEPROM.TE560_21Figure Image of Primary and Secondary Storage.2. Virtualization (or hypervisor) is similar to simulation where an identical copy of an operating system is made.Virtualization can be organise for various systems such as Net swear outs Platforms Applications Desktops servers and storage devices. This means that multiple virtual machines can be make it on a single host (via virtualization),containing its own resources operating systems and hardware, reducing the risk of software diligences from cause complications with each other due to incompatibility errors or conflict.This functionality has also been developed for wireless technology including alert phones. The benefit of mobile phones having this functionality is that the virtualized environmentwould be open to developers or open to the user to add and install applications to customize the phone as they want without disrupting the carrier profit.(Hazelton, Nov 2008)http//t1.gstatic.com/ come acrosss?q=tbnANd9GcTFeUHVc-xcABcxrH8xDl7q3VWyYoBJL2cIMNNFsQtAB8ebnZIsFigure Virtualization Image Blue Whale Web Inc, 20103. The home office Theater receiver, also referred to as an AV receiver or Surround Sound Receiver, is the heart of a home theater system and provides most, if not all, the inputs and outputs that you connect everything, including your television, into. An AV Receiver provides an easy and cost-effective way of centralizing your your home theater system. Part One discusses the audio factors to take into consideration.http//l.thumbs.canstockphoto.com/canstock4372770.jpghttp//www.reevoo.com/decidewhattobuy/wp-content/uploads/2009/03/blu-ray-player.jpghttp//lh5.googleusercontent.com/public/EI_yegmdzg0GsCmGUSyDISl8zD_zZOtAolnYCF6vhX6-kF_MlIBrf8t7XoZLFT3ZJXnx5hIu2mGWXyKVUx1U7xmZEuEXKy2h3atdhqfASFF0xxwpiVuqc_tdn-OUstUeSy_y_MChmYzHM36-XmgODqD1-pTzfQaq8B08http//lh3.googleusercontent.com/public/iz2Chel5cJXmTnGKs05sR57Qwpsu37fLsLQBaDB8ooEaPykOrG5Sa3k8luyBUldEEVxRdqIdM029Z9fmEfA157F7grt0H_Qlb5-EkHi2e8H8N18Dxm1BIF4NOPeKCeoK6K33CMeniNr9aTLn687u_qAhttp//t3.gstatic.com/images?q=tbnANd9GcTy3tuyNo0QIFkj8zWBJ17fRRIKkq2XWIy5sBlZJCucTuTGSMV1http//t0.gstatic.com/images?q=tbnANd9GcQLIct0K0DjK9t8MWv_WXeB45gIxgH5nnUXuRI1LsDwVuvUugx53whttp//t0.gstatic.com/images?q=tbnANd9GcT6ejzL49EUDy6dy ejZ4aLeoV7YWompLO-MEJ-n7ahkXJoIoaFOewhttp//www.4homecontrol.com/clip_image034.jpg4. The mist in network systems is an abstraction of the real system and itscomplex infrastructure. It hides the actual processes and network connections to the user such as servers, routers hubs, shake offes, cabling and storage (the points of entry and exits) that enable data processing.(Wiley Publishing Incoporated, 1998)The cloud represents the communications network such as network cables, which connect to various devices in order to communicate over short distances or over a large geo graphic area, similar to that of a telephone infrastructure.5a. PDF known as Portable schedule Formatis a system by which tears can be displayed on various applications which is indep containent of software, hardware and operating systems which they originated from and the computer or printer from which the output originated.(Adobe Systems Incorporated, 2006, p. 33). PDF files boast a sophisticated imaging model derived from addendum page description language (Adobe Systems Incorporated, 2006)which has been re be to incorporate binary format.PDF files contain universally accepted format of arrays syntaxes prowess imagery and text containing specified instructions objects that allows outputto be consistent across un-similar devices.b. The format for storing, page layout and managing objects is nasty in PDF files via means of fixed, two-dimensional PostScript document.The advantages of using PDF files rather than HTML are-Files can be encrypted and cannot be tampered with can have a digital signature which can be for legal issues images and information can be used as evidence in court, whereas HTML has no security controls.PDF have a low risk of being contaminated by a virus.A PDF file can be password encrypted.PDF reader software which is free of charge whereas HTML requires a Browser window. baptistery is embedded in a PDF file ensuring that layout and port remains intact, whereas HTML font and come forthance is defined by the creator which can appear differently depending on browser functionality used.PDF is designed to take appearance of documentation into consideration, whereas HTML concentrates on structure.PDF files hold large data compared to that of HTML.(Adobe Systems Incorporated, 2006)c. PDF has a font embedded system allowing font programsto travel with the document, which are interpreted at the destination by the data structure, which is built into the application or by means of an external font file. This transfers the information into a character which is a graphical shape known as a glyph. The file compresses information which preserves data and maintains the integrity of the trustworthy document including its fonts and graphics. (Chuck Geschke, 2004, p. 24)d. A PDF contains 5 object types in relation to graphics, which are embedded into the file and transported with the document these being-PathTextInlineShadingThese objects define the position, orientation, size of text, graphics and bitmap imagery that appear on the page by means of appropriate shading, structure, syntax, colour fill and line strokes. The cleverly designed graphical parameters allow conversion and compression files to make certain discreet changes to the graphics without changing the border environment.The filedetermines the imagery and displays it in the exact layout and position. This is known as the Cartesian co-ordinate system. (Adobe Incorporated, 2006)A vector (object) image is handled similarly, as paths are made up of lines called Bezier curves. (Adobe Systems Incorporated, 2006)The path object transfers these into paths that can be stroked and filled. The output format is then transferred with the file to cater for the imagery.e. There are a telephone proceeds of limitations that a PDF has on the end user these being-Graphic recognition is time consuming to process documents containing Vector graphicsDocuments guardianship certain layouts lik e magazines and newspapers cannot be deciphered correctly.The documents are un-editable which could affect documents pertaining to lawyers, that require proofreading and alterations by the client.Due to new versions being released on a regular basis with new functionality, causes incompatibilities with documents created by earlier versions.Converting a PDF file back into a formatted word document asPDF does not recognise paragraphs, formatting, headers, footers, indentations, and line breaks. (PDF Tools, 2005)6. A computer network is divided physically as well as logically. A collision domain (Ethernet segment) is where two or more devices are attempting to transmit packets of data at the same time and are usually contained at bottom a sprinkle domain. Devices that are attached to a hub or a switch are within a collision domain. Collision domains are usually divided by a switch or bridgesand use a collision -sensing protocol called CSMA/CD. The basic strategy for this protocol is it detects imminent collisions by abnormalities in the voltage, which occurs in the computer rejecting the corrupted frame (runt). (CISCO, 2006)A broadcast domain (Ethernet LAN) is a logical disassociate of the network that emits data to another device.(Symatech, 2010)DOMAINSFigure This diagram shows the 2Broadcast domains in Green and the 5collision domains in Red.Table This table shows the ISO-OSI layers and the domains. storyISO-OSI pointsWhats processedDomainDevices7Application LayerPorts, socketsInteraction6Presentation LayerFormat, encodingTranslation5Session LayerMessages, communicationControls Dialogue4Transport LayerTCP segment entropy transfer3Network LayerIP Packet, IP divvy upBroadcast domains. Layer 3 devices stop the flow of broadcast domainsIP address, Router, level 3 switch2Data Link LayerFrame, Interface cards, adaptersSingle separated Collision, one single broadcast domain also created. Layer two network devices can divide collision domains.Switches, Bridges1 Physical LayerBit StreamSingle Broadcast and CollisionHUB, Repeaters7. Von Neumanns architecture comprises of the four main components,see diagram below. This is used in current computers lay the foundation to what is known as the Little valet de chambre Computer(Englander, 2010)the essential criteria for this architecture is the memory which has a stored program concept (Englander, 2010) which allows the programs to be edited. It stores the address in a sequenced address order which has its own memory slot and traced by unique location number.Memory- consists of RAM to store programs and dataControl unit is used to fetch information from memory and decodes it and performs operations to complete the parturiencyArithmetic unit performs mathematical calculationsInput/output is the interface with the human operatorFigure diagram of Von Neumanns Computer Architecturehttp//computing.llnl.gov/tutorials/parallel_compAn example of entering and adding two numbers is as followsTake premi er(prenominal) number and input (the number is now stored in the calculator)store the number (this is stored in memory slot and number is left on calculator)-Input second number (2nd number replace first base in calculator)Add first number to second (fetch 1st number from stored address location and add to number in calculator) unwrap/output result8. 32 bitswide or 4 Bytes can address 4Gigabytes of memory = 4 (232 = 4,294,967,296). AMD introduced the first 32 bit flash memory device on 5th August 2001 which would allow systems to run 8 x faster than those using standard flash memory. (Advanced Micro Devices Incorporated, 2010).9. Volatile memory is a term derived from the Latin word volatilis which translated means to fly. This terminology is applied to something that is unpredictable subject to change bad or hostile. The RAM (Random Access Memory) in a computer istemporary (volatile storage), as the information stored is obliterated when the power is either switched off or interr upted, as power is required to retain information stored on the machines memory.Non Volatile memory (NVRAM) is not deleted when the connection between the memory and the CPU (Central Processing Unit) is lost. Devices such as memory disksor hard disk drivesstore informationpermanently untilit is no longer required by the user.RAM, DRAM, SRAM are all forms of volatile memory and ROM and Flash memory are non-volatile forms of memory. Flash memory is widely used in the automobile manufacturing industries, for car applications to work efficiently. Some cars contain MCUs chips (Microcontrollers), where program functionality are stored using non-volatile memory on the MCU, allowingcar functionality to work correctly such as Cruise control, air bag safety mechanism, engine controls and temperatures.(International Engineering Consortium, 2006)It could be crucial if this information plus vital safety checks were erased every time avehicle is switched off10. Figure Data Flow Diagram showing Mixed number in a base other than 10 converted to a decimal. (Englander, Number Systems, 2010)Display AnswerDisplay Integer and Decimal parts togetherConvert Fractional Part to base 10Convert Integer part to decimal crosscurrent into Integer number and Fractional partsStart withMixed numberMixed Number = unharmed number + fractionAnother way to convert a mixed number into a decimal is as follows-Answer =2.88Round answer to two decimal places2.87523/8To get Decimal Divide numerator by denominatorRewrite improper fraction with numerator on top8 x 2 x 7Turn mixed number into improper fraction2 7/8Start withMixed numberMixed Number = whole number + fraction

No comments:

Post a Comment