Saturday, January 25, 2020

Basic Structure Of A Computer System Computer Science Essay

Basic Structure Of A Computer System Computer Science Essay A computer is an electronic device capable of manipulating number and symbols, first taking input, processing it, storing and giving out output under a control of set instructions which is known as a program. A general purpose computer requires the following hardware components: memory, storage device (hard disk drive), input device (keyboard, mouse etc.), output device (screen, printer etc.) and central processing unit (CPU). Many other components are involved in addition to the listed components to work together efficiently. Computers can be classified by size and power as follows: Personal computer: Personal computers are small computers based on a microprocessor. A personal computer has a keyboard for inputting data, a monitor for output and a storage device for saving data. Workstation: workstations are usually powerful than a personal computer. It has more powerful microprocessor and a higher-quality monitor. Minicomputer: Mini computers are multi-user computer capable of supporting from 10 to hundreds of users simultaneously. Mainframe computer: Mainframe computers are powerful multi-user computer capable of supporting many hundreds or thousands of users simultaneously. Super computer: Super computers are extremely fast computers that can perform hundreds of millions of instructions per second. MAIN REPORT COMPUTER SYSTEM A computer system can be represented using the following block diagram: CPU Bus Interface Timing and Control Address Bus ALU I/O RAM ROM Keyboard Mouse etc. Data Bus Control Bus Clock The CPU is can be expanded into three main parts: The ALU (Arithmetic and Logic Unit), The Bus interface Unit, and The Control Bus. The clock is an electronic circuit that gives regular pulses to the CPU. Faster clock speeds means more pulses to the CPU and the instructions are stepped through faster. The memory chip contains millions of separate memory stores and each of these locations has a unique number. This is known as memory address. The CPU stores data at any of these addresses and fetch the content back when required. RAM stands for Random Access Memory. These chips store the instructions for running the operating system and any computer application. This memory also stores all the data that is being worked on. RAM is a volatile memory which means that it only stores data while the computer remains switched on. When switched off, it loses all the stored data. ROM (Read Only Memory) on the other hand is a chip with program instructions permanently burned into it. The content is not lost even if the machine is switched off. The CPU can either fetch data from or write data when the appropriate memory location is accessed. Such data is transferred from the CPU to the memory location along the Data Bus. The control Bus is a set of tracks on the computers motherboard that run from the CPU to the devices and works under the direction of the CPU. LOGIC GATES Logic gates perform logical operation on one or more logic inputs and produce a single logic output. It processes signals which represent true or false. It is called Boolean logic and is most commonly used in digital circuits. Logic gates are identified by their function: NOT, AND, NAND, OR, NOR, EX-OR and EX-NOR and they are usually represented by capital letters. Logic Gate Symbols There are two series of symbols for logic gates: the traditional symbols which have distinctive shapes making them easy to recognise so they are widely used, and the International Electro technical Commission (IEC) symbols which are rectangles with a symbol inside to show the gate function. Traditional Symbols Source: http://www.kpsec.freeuk.com/gates.htm IEC Source: http://www.kpsec.freeuk.com/gates.htm Inputs and Outputs All Gates except a NOT gate have two or more inputs. A NOT gate has only one input and all gates have only one output. In the following figure, A and B are inputs and Q is the output. Source: http://www.kpsec.freeuk.com/gates.htm Other types of gate used are NOT gate, AND gate, NAND (NOT AND) gate, OR gate and NOR (NOT OR) gate. Truth tables A truth table is a good way to show the function of a logic gate. It shows the output states for every possible combination of input states. The symbols 0 (false) and 1 (true) are usually used in truth tables. The example truth table on the right shows the inputs and output of an AND gate. Input A Input B Output Q 0 0 0 0 1 0 1 0 0 1 1 1 Computer numbering system Humans speak to one another in a particular language and we use different words and letters. Although we type words and letters in the computer, the computer translates those words and letters into numbers. Computers talk and understand in numbers. Those number systems are: Decimal, Hexadecimal, and Binary. The Decimal Number System is the system is most frequently used in arithmetic and in everyday life. The decimal number system is also known as the base 10 number system as the position in the number represents an incremental number with a base of 10. Each position only contains a number between 0 and 9. The Hexadecimal number system is used to represent memory addresses or colours. It is also known as the base 16 number system, because each position in the number represents an incremental number with a base of 16. Since the number system is represented in 16s, there are only 10 numbers and 5 letters (A to F). The Binary number system is used by most machines and electrical devices to communicate. It is also known as the base 2 number system, because each position in the number represents an incremental number with a base of 2. Since it is represented it 2s, there are only 2 numbers that can be a value in each position 0 or 1. CPU COMPONENTS The CPU is the intelligence of the machine but it needs a pre-written program to create, use and modify the data. If the computer needs to compare two numbers, or add two numbers, this is carried out inside the CPU and the numbers have to be fetched into the CPU from the computers memory chip. The three main components of CPU are: Arithmetic logic Unit (ALU), Bus Interface unit, and the Control Bus. Arithmetic Logic Unit (ALU) carries out all the calculations and decision making tasks. The ALU uses devices called gates that receive one or more inputs and based up what function they are designed to perform, outputs a result. The basic operations of an ALU include adding and subtracting binary values as well as performing logical operations such as AND, NOT, OR AND XOR. The Bus Interface Unit takes the data to and from the CPU which is held inside internal registers (small memory stores) along the external Data Bus to read and write memory and devices. The Data Bus carries information in both directions. The Bus Interface Unit also places the required location addresses on the Address Bus, so that the required devices can be accessed for reading or writing. The Control Bus is the physical connection that carries control information between the CPU and other devices within the computer. It decodes all program instructions and dictates all the CPUs control and timing mechanisms. It sends out the read and write signals on the Control Bus. COMPUTER MEMORY The computer has to temporarily store the program and data in an area where it can be used by the computers processor to work. This area is known as the computers memory. It consists of computer chips that are capable of storing information. These information could be: the operating system (e.g. DOS, windows etc.), the instruction of the program to run (e.g. a database or a drawing program), or the data that is used or created (e.g. letters from word-processing or records from a database). There are different types of memory used in a computer system. They are: Cache memory, Random Access Memory (RAM), Read Only Memory (ROM), and Virtual Memory. Cache memory is extremely fast memory that is built into a computers CPU (L1 cache) or in some cases located next to it on a separate chip (L2 cache). L1 cache is faster than L2 cache as it is built into the CPU. These days, newer computer come with L3 cache which is faster than RAM but slower than L1 and l2 cache. Cache memory is used to store instructions that are repeatedly required to run programs and helps to improve overall system speed. The reason it is so fast is that the CPU does not have to use the motherboards system bus for data transfer. Random Access Memory (RAM) is the memory chip that consists of a large number of cells, each cell having a fixed capacity for storing data and unique address. RAM is a volatile memory which means all the programs and data in the memory is lost when the machined is switched off. There are different types of RAM modules available such as SODIMM, SDRAM, DDR, DDR2 and DDR3. SODIMM are used for laptops whereas the rest are used for desktop computers. Read Only Memory (ROM) is a memory chip in which the program instructions are permanently burned into. It is non-volatile which means its content is not lost even when the machined is switched off. It is used to store some of the system programs that keep the computer running smoothly. For example computer BIOS (basic input out system) is stored on the ROM. There are different types of ROM available such as Programmable ROM (PROM), Erasable Programmable ROM (EPROM), and Electrically Erasable Programmable ROM (EEPROM). Virtual Memory is a part of most operating system. It is used when the amount of RAM is not enough to run all the programs. If the operating system, an email program, a web browser, a word processor, a Photoshop application are loaded into the RAM simultaneously, the RAM will not be able to handle all applications and thus the computer looks at RAM for areas that have not been used recently and copies them onto the hard drive. This frees up space in RAM to load new application. But because the read/write speed of a hard drive is much slower than that of RAM, the performance is not satisfactory. It is not recommended to use virtual memory as it is slow. The solution to this problem would be to upgrade the memory. SYSTEM SOFTWARE A computer system is not complete without system software. For a computer to perform any tasks, both software and hardware are equally important. System software gives life to hardware. System softwares are the files and programs that make up a computers operating system. It includes libraries of functions, system services, driver for hardwares, system preferences, and other configuration files. System software comprises of Assembler, Debugger, Compilers, Operating System, File management tools etc. The system software is installed on the computer when the operating system is installed. It can also be updated by running programs such as windows update. The system software is also called low-level software as it runs at the most basic level of the computer. It generates the user interface and allows the operating system to interact with the hardware; however system software is not meant to be run by the end user like application programs. Application programs such as web browser, or Microsoft word is often used by the end user whereas the end user does not use an assembler program unless he/she is a computer programmer. The system software runs in the background and thus the user does not have to worry about what the system software is doing. CONCLUSION In the report, the basic structure of a computer system was described with diagram. Different components such as CPU, memory, BUS, input/output devices that form a computer system were identified and explained. General ideas about Logic gates were given and different number systems used by computers to represent data were also described. As the CPU is the main part of a computer system, it was further looked into and Arithmetic Logic Unit, Control Bus and Bus interface Unit were discussed. Different types of memory and their uses were explained and the importance of the system software was discussed finally.

Friday, January 17, 2020

Ptlls Assignment Essay

To ensure sessions’ aims and objectives are meaningful and applicable to students the teaching role incorporates ongoing administration and assessment. My role is to create a safe learning environment to establish open and trusting relationships. The main responsibility of the teacher is to continually reassess development and change during the course and create a seamless transition to ensure smooth delivery. Completing attendance record, maintaining records of learner’s progress, attending meeting includes my daily responsibility. It is my responsibility to monitor, evaluate and improve the quality and effectiveness of my delivery by taking into account learners changing needs. Boundaries ground our ethics; they are core to recognizing our limitations and realizing when changes may be needed. Being open to change and incorporating others’ input involves recognizing when boundaries must be revisited. Understanding when a student requires further help beyond your remit is a boundary which should be effectively utilized. Summarise key aspects of relevant current legislative requirements and codes of practice within a specific context: You need to be aware of key aspects of current legislation and codes of practice relevant to your subject and organization â€Å"(Ann gravells, 2008, p19) As an IT teacher in further education sector I have to be aware about â€Å"the Equal Opportunity Act (2006), The Commission for Racial Equality (CRE) and Disability Right Commission (DRC). They aim to eliminate discrimin ation, reduce inequality, protect human rights and to build good relations , ensuring that everyone has a fair chance to participate in the society. Apart from that, I have to be aware about Disability Discrimination Act (2005), Sex Discrimination Act (1975), Race Relation Act (1976), Data Protection Act(1998). As most of my students need a VISA from UKBA, I have to be aware about the UKBA rules and regulations as well. To work as a teacher in UK, I have to follow the code of conduct from LLUK. Review the points of referral available to meets the potential needs of learner: For students to effectively participate in learning any barriers or boundaries must be initially identified and then continuously monitored throughout the course. This promotes a sense of inclusion, equality and diversity at an individual level, which translates to a more beneficial group learning experience during the course. Financial pressures, reluctance to train, learning difficulties, travel issues, access to resources and cultural or peer pressure can all contribute to learners boundaries; however access to the course should be open to all regardless of race, religion, age, disability, gender or special needs. Collecting this data also helps identify areas that may require referral to scribes, counseling, creche facilities, health advice or a basic skills tutor in order to overcome obstacles. Discuss issues of equality and diversity, and ways to promote inclusion All learners are entitled to equal opportunities, and any communication with students should reflect this. Reece and Walker, (2000 p379) Promoting inclusion by identifying variation in needs ensures that learners have equality throughout their learning experience. Data collection through assessment etc is useful when analyzed, acted upon and continuously monitored to ensure consistency in equality. Promoting equality through more effective allocation and targeting of differing resources according to individual need is essential to the learning experience. Implementing different strategies throughout the holistic health and wellbeing course helps learners explore, question and develop an understanding of issues regarding diversity. Recognizing, differences and celebrating them through varying teaching methods responds to pupils’ diverse learning needs and supports learning activities which challenge prejudice and negative attitudes. Promoting diversity encourages widening participation and gives pupils the opportunity to share their own understanding while learning from their peers experiences. Justify the need for record keeping Teachers have to keep the records all the time which includes records of student’s information, improvement, weakness, learning difficulties, lectures etc. I always keep the record to comply with the legislation and code of conduct and practice as well. Without having any records about students, it is difficult to provide the equal opportunity of learning for the students. Understand appropriate teaching and learning in approaches in the specialist area. Identity, adapt and use relevant approaches to teaching and learning in relation to the specialist area When I teach I try to cater for all learning styles by using various teaching methods and strategies. These included PowerPoint slides, talking, Q&A, discussions, practical labs, writing and drawing on worksheets and using a whiteboard to collect and analyze information. Auditory learners’ may benefit from discussion, listening to presentations and questions and answers. Visual learners may benefit from whiteboard drawings, on-screen computer demonstrations, and handouts. Tactile/Kinaesthetic learners benefit more from the practical labs, building networks and producing their wn work. There are unique differences in the way people learn and we must recognise this and not regard individuals as one group or body of students. (Reece & Walker, 2002, p178) When students are reading the online material I try to walk around the class and aid any students who need it, I also try to make the teaching session as differential as possible with the morning covering presentations, discussio ns, Q & A and reading the online material and the afternoon covering mainly practical activities. [pic] The Learning Cycle Evaluate a range of ways to embed elements of functional skills in the specialist area I always embed numeracy, literacy and IT skills in my entire lesson. As I teach IT most of my session has practical session which depends on IT skill only. I always use power point presentation for my lecture as it is a effective way of learning. At the same time I do use white board and pens as well. I try to create some computer games to teach learners. By playing these games learners learner something while they enjoy the game. I use different case study and simulation software to give the understanding to the learners about the real world scenario and the industry standards. Evaluate the teaching and learning approaches for a specific session. Of leadership for an organization, industry or sector I always try to split the teaching sessions fifty fifty, in the morning we do the presentations, questions and answers and in the afternoon we do practical assignments and lab session. When participating in the lab session the students usually work in pairs. When teaching in the practical lab session, I also ensure that I am available for guidance and advice; I also give each student some personal time. When I could manage the time to go to every individual learner to find out the individual needs, I can help them most. Session like this can provide the maximum inclusive learning for the student if the number of learners is reasonable for me to give the personal support to everyone. I like these kind of session most as it can help the learners to learn something very easily. Demonstrate session planning skills Plan a teaching and learning session which meets the needs of individual learners I have found that, planning a session is the most important part for inclusive learning. I always spend reasonable time to plan my lesson properly. I try to make sure, all of my lesson will be the combination of literacy, numeracy and IT skills which will deliver most to a learner. In my lesson plan I describe what are the aims and objective of my lesson and how it will be meet. My lesson plan includes a session, which describes the situation after finishing the lesson. I always make sure there is enough plan to engage the learners with learning process which could be the assessing criteria for their learning as well. I always start my lesson with the review of the last class and I finish the lesson after having a quick review of present lesson. Planning for the resources, what I do use in my lesson, comes under my session planning. Without having enough resources I cannot deliver an inclusive learning session. The common resources I do use are the Power Point presentation, white board, pen and duster, different application software, computer, network etc. I normally do a presentation for the first twenty minutes of my teaching session, these sessions are planned so that the students do not have to use the computer and there is no interaction between computer and presentation, the reason for lack of interaction is that it can be very distracting for the students when they have to look from one to the other. After twenty minute presentation I always engage the students in conversation and ask them what they think of the chapter that they are studying and situations that it might apply to.

Thursday, January 9, 2020

Kosinskis Being There and the Existential Anti-Hero...

Kosinskis Being There and the Existential Anti-Hero Critics have referred to Kosinskis Being There as his worst novel. Perhaps, Kosinskis prosaic style is deceptive in its apparent simplicity (especially when contrasted with The Painted Bird). What Kosinski seeks to do, as Welch D. Everman relates, is to stimulate the readers recreative and imaginative task by offering only the essentials...Kosinskis style draws the reader into the incident by refusing to allow him to remain passive (25). This essay will propose that Being There is a major existential work following in the tradition of Sartre and Camus in which Chance, the main protagonist, mirrors Camuss Mersault in A Happy Death and in which Koskinski demonstrates†¦show more content†¦Chance has been given his name because he had been born by chance, yet as Everman shows, this is true of everyone, and so his given name is hardly a name at all....In addition, he loses this rather tenuous name early in the book... and therefore is without a real name (63). Furthermore, no one in the book exists without some type of tangible record proving existence. When Mr. Franklin, the Old Mans executor, interrogates Chance, he seeks commodified proof of Chances existence; he asks for, among other items, a checkbook, drivers license, insurance card, tax forms. Chance, encountering the existential dilemma, the quest for identity, counters: you have me. I am here. What more proof do you need (18)? Of course, mere existence proves useless and Chance is excommunicated from his beloved garden. Why does a writer who displays such brilliant technical skills and prosaic style resort to utilizing such a one dimensional character? Perhaps Koskinski has simply found the next logical step in the chain of psychological evolution. Yet, rather than the natural heir to Benji Compson, Chance is, instead, the natural descendent of Patrice Mersault. After Nietzsche declared God dead, we spent the next half century in an angst ridden frenzy. Sartre, Beckett, and Camus best exemplify this condition in their writings. Camuss Mersualt (perhaps the predecessor to