Friday, May 31, 2019

American Constituional Law :: Argumentative Persuasive Papers

American Constituional Law (2) The rights of the individual in the United States have been debated since in the first place this country was formed. Does a woman have the right to do with her body what she sees worthy, or is it the responsibility of the United States government to tell her what and what she can not do with her body? Do women, and doctors, have the right to clone a human fertilized ovum from a single donation of male sperm and to implant the fertilized ovum into the womans body in order to impregnate the woman? The state of Connecticut passed a law that bans the cloning of human cells, including the reproductive zygote cells that can be used for the purpose of impregnating a woman. The holding in this case that I make is that the cloning of human zygotes for the purpose of impregnating a womanish is saved by the constitution and therefore the doctors who violated Connecticuts Frankenstein Act should be freed because of the unconstitutionality of the act. As cited in Roe v. Wade the woman has a right to privacy that the government should not be able to encroach upon. As emphasized in Roe the due process clause protects freedom of choice in decisions respecting marriage, divorce, replication, contraception, and the education and upbringing of children. In Roe v. Wade the due process clause made it possible for a women to obtain an abortion. This resembling theory allows for women to do as they want concerning issues of procreation and contraception. The cloning and subsequential insemination of a woman with a cloned zygote is an issue that clearly falls under the headings of procreation and contraception. Law protects these two aspects of life and therefore the cloning of the zygote for the purpose on contraception is the womans right that is protected by law. Women have the right, protected by law, to do as they see fit with their own body. This instance also pertains to men. If a man wants his zygotes cloned and the woman a grees and wants to be inseminated by the cloned zygotes then they have that right, protected by the law. There is also the principle of privacy and autonomy that allows a woman the right to have a child using a cloned zygote.

Thursday, May 30, 2019

I Will Use My God Given Talents in the Practice of Law Essay -- Law Co

I Will Use My God inclined Talents in the Practice of law Given an understanding of the scarcity and importance of condemnation and the fleeting nature of existence, clipping commitment decisions are among the approximately important choices that an individual has to make. I believe that time is a pass from God and it is up to individuals to make wise decisions regarding how they will invest the time that God has granted them. My perception of time dictates, to a degree, how I chose to apply it. I believe that time is linear - there is a beginning and an end - God, the creator of time. For this reason, I strive to use my time wisely. angiotensin-converting enzyme day I will be unable to live like I do now, so I believe that it is important to make the most of what time I have. However, I also perceive time to be a progression of cycles that God has set in motion. I need unalterable reminders of both my insignificance and my potential for changing the course of time. I believe that my existence is a small part in a much larger stratagem that Ill never comprehend. The fact that I wake up in the morning is mind-boggling when I consider that I am no more merit of life than the Southeast Asian child that dies of hunger or the elderly woman that dies alone in a cold, cavernous rest home. Time continues to preserve itself, but I have yet to be included in the endless cycle of deaths that paves the way for new births. My life is a precious gift from God in many ways, I have no control over my future - a truth that I have accepted and use as a motivation to manage what time I have wisely. Furthermore, despite a fundamental lack of control of the inevitable, I believe that my time commitments do result in meaningful action. Though time may cycle, my actions and their cons... ...riendship showed me the true value of one-hour a week well spent. My part-time work in the UNC Computer Science Department has given me unparalleled first-hand training in the informat ion technology field. I plan to go to law school in order to become and IT lawyer upon graduation my work with computers has given me relevant exposure that will benefit me when I begin to practice law. Like the choices I do in high school and so far in college, my decision to pursue law school is rooted time. I am prepared to feed four years of my life to more studying and exams so t hat I may become an attorney. Law school will in spades be a commitment that affects my fast-approaching future as a lawyer, Ill make numerous more decisions concerning time in an effort to uphold justice, preserve the American ideal, and hopefully make someones life a little better.

Internet Piracy: Theft of Intellectual Property Essay -- Copyright Vio

Piracy is a form of theft. Specifically, it refers to the unauthorized copying or use of gifted property. Intellectual property is knowledge or expression that is owned by someone. There are three major types of intellectual property 1) creative plant, including music, compose material, plastic films, and software, which are protected by copyright law 2) inventions, which are protected by patent law and 3) brand-name products, which are protected by trademarks. Many of the issues contact piracy have to do with the difference between intellectual property and somatogenetic property. A CD, for example, is a piece of physical property, but the songs on the CD are intellectual property. A customer in a record store can purchase a CD, but someone else still owns, or more precisely, has the copyright to the songs on the CD. Piracy is primarily a problem for the entertainment and software industries, and therefore piracy most often involves violations of copyright law. right of first publication is a legal right that protects creative works from being reproduced, performed, or disseminated without permission of the copyright owner. Essentially, a copyright gives its owner the exclusive right to diagnose copies of the material in question. Physical piracy-the copying and illegal sale of hard-copy CDs, videotapes, and DVDs-costs the music industry over $4 billion a year worldwide and the movie industry more than $3.5 billion. These numbers do not factor in the growing (and difficult to measure) problem of Internet piracy, in which music and movies are transferred to digital format and copies are made of the resulting computer file. Journalist Charles C. Mann explains why Internet piracy has the potential to be vastly more damaging to copyright industr... ...ples physical property, there is clearly a social benefit from the wide dissemination of intellectual propertyi.e., ideas and their expressions.In Naughtons view, online file sharing does not qualify as pirac y at all We have to remind legislators that intellectual property rights are a socially-conferred privilege rather than an inalienable right, that copying is not eer evil (and in some cases is actually socially beneficial) and that there is a huge difference between wholesale piracythe mass-production and sale of illegal copies of protected worksand the filesharing that most internet users go in for.Although online file sharing debuted in 1999, lawmakers and copyright industries are just beginning to address the myriad questions the practice has generated. In At Issue Internet Piracy, authors attempt to answer some of those questions.

Wednesday, May 29, 2019

Tupac Shakur - His Impact on American Culture Essay -- Tupac Amaur Sha

Tupac Shakur - His Impact on American CultureTupac Shakur was a very influential soul in the 20th century. He was born on June16, 1971 in Brooklyn New York, and died on September 13, 1996 in Las Vegas Nevada(unknown author, no title, no page, letter code C). tho his family moved around a lotwhile he was a kid (Bastin, J.D.). He eventually ended up in the Bay sector California alone and spent his first two years there homeless (unknown author, no title, n.p., letter code D). He grew up with only his mamma and loved her very much. He even wrote a song called Dear Mama to his mom and thanked her for how she tried her best at raising him. His public public life started when he joined the seminal Bay Area whack ensemble (u.a.,original atomic number 18a, n.p.). He started as a tour dancer but and so started rapping live (u.a.,original area, n.p.). From there he released a couple albums and then was offered to bein some movies. He became friends with a couple of popular rap artists like Snoop DoggyDogg and Dr. Dre (Placid n.p.). He made some songs and unison videos with them thatmade it big on the Billboard charts. This really helped his popularity. He released a ikon CD with the songs on it and a lot of his own songs and sold millions of copies (u.a., n.t., n.p. letter code D) More people were influenced to buy his CD. People listened to the music and did what he state he did. So Tupac was influencing all of these people. Tupac was rich and famous now. He was showing off his own style now and didnt needhis popular friends. This is the time that many people saw the real Tupac and loved him.He was now very influential to fans. They wanted to be just like him. He starred in moremovies and could be who he really was. He did a lot of interviews that showed his beliefs.He said self esteem and self respect was very most-valuable and said I feel as though I am ashining prince just like Malcolm and feel that all of us are shining princes, and if we live like shinin g princes, then whatever we want can be ours. Anything. (Patrick, Tony, n.p.) And when he says all of us, he means all men. He also said he doesnt care if someone is white or black. And no one can be judged by their skin. So just because its nigrify dont mean its cool, and just because its White dont mean its evil.(Patrick, Tony n.p.) If he judged a man, he judged them by what they do ... ...nds for a new beat really separated his music from others. He didnt use traditional beats that people get tired of. He added a twist to rap and hip-hop music all together. And brought a lot of people to like that. Tupac was one of raps most controversial and influential performers (tupac n.p.).Tupac Amaur Shakur left a distinct impact on American culture that is dormant being showntoday (u.a., n.t., n.p. letter code D) He was one of the most influential persons in the 20th century America. And I believe he testament be remembered and loved by a lot for years to come. He has served and will serve as a role model for younger kids ripening up today. BibliographyBastin, J.D. Tupac Interviews & Articleshttp//www.u.arizona.edu/bastin/interview.html 22/10/97Patrick, Tony Shakur, Tupac. Interviewhttp//.stallion.jsums.edu/awil0997/tupac/interview.html 22/10/97Placid, Sylvester. Personal Interview 10/11/97Unknown Author. genuine Area of Tupachttp//www.geocities.com/Heartland/7438/tupac.html 22/10/97Unknown Author. Tupac http//stallion.jsums.edu/awil0997/tupac/theday.html 2/11/97Unknown Author. http//www.duke.edu/de1/2pac2.html 2/11/97

History of Punishment Essays -- Code of Hummurabi

The history of punishment began around the time of when the Code of Hammurabi was written. The end penalty was awarded for crimes of kidnapping, thievery, selling or taking stolen goods, etc. There are many punishments that were apply in the world which have been abolished. For example, many nations have abolished capital punishment which follows all around anything dealings with the death penalty. Michigan was the first state to abolish the death penalty later followed by Rhode Island and Wisconsin. In the 2nd century during the Qin Dynasty of China rules were changed by enforcing nonindulgent laws. For punishment they used the nine familial extermination as punishment. The nine familial extermination was one of the most brutal and cruelest execution method used in China. It was basically when nine people from the accuseds family were penalise. By the end of the 2nd century tenants of Jewish laws had 3 purposes. One of them was to make accepted the criminal was punished for his actions. Punishments such as banishment, fines and imprisonment were given at this time. In the third century a punishment called Damnatio ad bestias was further introduced. Damnatio bestias was a punishment used for entertainment. In the 5th century the Roman law of the Twelve Tables contained the death penalty. Most people were executed by hanging or beheading for crimes against the church.Crucifixion was a punishment used in 6th century BCE, but was later abolished in the Roman Empire in 337 CE. It was when your accouterments were tied or nailed to a cross while the cross was tied and nailed to a pole. The persons feet were a block of wood so their turn over wouldnt tear. Their feet were nailed to the cross. This is also known as Jesus Christs death. ... ... circumstances in 1998.Moving on to the 21st century, in 2001 there were 3048 prisoners executed in 31 countries. Most of them took place in Iran, Saudi Arabia, U.S. and China. China executes more people than any other country on Earth. In 2004, the death penalty was restored as a punishment. Later in the U.S. the death penalty support which was at 65% used to be at 74%. Also, it is say that 51% believe the death penalty isnt used often enough.The history of punishment has been changed many times throughout the centuries. Capital punishment is laborious to be banished today. Cruel and illegal executions are still going on just to get confessions before sentences were passed.Works Citedhttp//www.wcprg.org/History.pdfhttp//www.clarkprosecutor.org/html/death/timeline.htmhttp//www.smashinglists.com/unusual-methods-of-capital-punishment/2/

Tuesday, May 28, 2019

Between the Borderline of Mexico and The United States Essay -- essays

Image in a self-importance portrait generally communicates to the viewer information nearly the identity, character, environment, feelings and interests of the artist. In the case if Between the boundary line of Mexico and The United States Frida Kahlo expresses her feeling that she holds towards hr alien environment, and her cultural identity. This will now be proven through analyzing the portrait to prove the above quote.Frida Kahlos full name was Magdalena Carmen Frida Kahlo y Caldern de Rivera. She was born in Mexico on July 6, 1907. Kahlos work was mainly centered on creating self portraits, but she did on occasions paint her family and friends. She married world famous Mexican muralist Diego Rivera, he frequently visited the United States and Frida joined him on these trips to America which at the time was experiencing a machine age, so there were many factories and large buildings around. Frida was not accustomed to this and thus she painted Self Portrait between the bord er of Mexico and the United States to show her discomfort when visiting this foreign and unusual land. This conveys a sense of Frida Kahlos environment which she was subject to because of her husband.Self Portrait between the Borderline of Mexico and the United States was painted in 1932. Frida chose to paint the painting on a small piece of tin that was 11 3/4 x 13 , painting on metal is a traditional way of painting in Mexico and this technique is given the name Retablos. The subject matter with...

Between the Borderline of Mexico and The United States Essay -- essays

Image in a self portrait generally communicates to the viewer tuition about the identity, character, environment, feelings and interests of the artist. In the case if Between the Borderline of Mexico and The United States Frida Kahlo expresses her feeling that she holds towards hr alien environment, and her cultural identity. This will now be proven done analyzing the portrait to prove the above quote.Frida Kahlos full name was Magdalena Carmen Frida Kahlo y Caldern de Rivera. She was born in Mexico on July 6, 1907. Kahlos work was mainly centered on creating self portraits, but she did on occasions paint her family and friends. She married world famous Mexican muralist Diego Rivera, he frequently visited the United States and Frida joined him on these trips to the States which at the time was experiencing a machine age, so there were many factories and large buildings around. Frida was not accustomed to this and thus she painted Self Portrait betwixt the Borderline of Mexico and the United States to show her discomfort when visiting this foreign and unusual land. This conveys a sense of Frida Kahlos environment which she was subject to because of her husband.Self Portrait mingled with the Borderline of Mexico and the United States was painted in 1932. Frida chose to paint the painting on a small piece of tin that was 11 3/4 x 13 , painting on metal is a traditional way of painting in Mexico and this technique is given the name Retablos. The subject matter with...

Monday, May 27, 2019

Computer Studies

1 GCSE Computing Revision Booklet This booklet has been created to provide an overview of apiece of the topics that you deal to revise. Each section is broken substantiate and direction given on what you thrust to k at star time. Use it in conjunction with your own revision techniques, e. g. mindmaps, to prep argon for the exam. Name .. 2 Fundamentals of Computer SystemsYou hire to be equal to (a) ascertain a computing machine dust (b) get wind the importance of reckoner systems in the modern homo (c) explain the take up for reliability in selective information processor systems (d) explain the need for adherence to suitable professional cadences in the development, drug ab economic consumption and maintenance of ready reckoner systems (e) explain the importance of ethical, environmental and legal considerations when creating computer systems. What is a computer system? At its very basic, a computer system no subject much(prenominal) than an input, a processor and an asideput. InputProcessor return A computer system pull up stakes usu wholey bear some transshipment center capability and more than often now a way of communicating with other devices. Computers are only round us and Im not maskingbreaking talking about your desktop or laptop computer. Your smartphone, your games console, your ipad, even your Sky+ or freeview recorder is a computer system of sorts. 3 Computer systems are integral move of our lives. Think about all the computer systems you or your parents use on a daily or weekly basis Running washing programmes and sensing when clothes are dry.On-board computers to control everything from engine efficiency to voiceactivated MP3/Bluetooth hands-free system. Cashless ply system in school to get and subtract money from your account. Self-service checkouts in supermarkets that s shadower, weigh, take payment and give dislodge. Contactless gondolad payment systems where a footling RFID (radio frequency ID) tag is embedded into the card and read when the card is near. RFID technology often utilize in library books and shops to mark theft, also has future applications in smart clothes and food products.Imagine the RFID tag in your clothes tells the washing machine how to wash them. Or a smart fridge that knows when the milk is other(prenominal) its sell-by assure and adds it to your online shopping list. Since we rely so much on technology there are huge problems when it goes wrong If a supermarket checkout system goes down this could result in lost sales of thousands of pounds. However, if an automated system, comparable those onboard aircraft fails then it could end in disaster 4 wherefore do we need to use the same professional standards when developing and maintaining computer systems?Without standards to adhere to we risk developing systems that are not compatible with each(prenominal) other. Would you be happy if your Nokia unstable could only call other Nokia mobiles? Stand ards also ameliorate the whole step of the computer system and its maintenance by ensuring that best practice is followed and multitude dont cut corners. Considerations when creating computer systems The Data Protection Act 1998 provides protection for all nurture transshipment centerd on a computer system. It requires the person who owns the system to ancestry the information securely and only use it for the purpose it was originally gathered for, e. . the school holds info on you for the purpose of your education it backnot sell this entropy to companies who may hankering to sell you things. The speed of progress doer that many gad matures become old and obsolete quite quickly. This agency there are potentially stockpiles of old technology which could end up in landfill. Many companies now re round of golf these by selling reconditioned devices to other countries or firenibalising the parts to be employ again. Websites like Google use huge server-farms around the wor ld. These buildings are full of computers running 24/7.There is an impact on the environment from the huge amount of electricity needed to run these server-farms. engine room enables us to do many things. But are they always right? Googles Street View caused controversy when it was launched after people said that victorious photos of their houses was an invasion of privacy. Social ne tworking sites, like Facebook, cause made it easier to share information only if have made it difficult to set privacy settings. You so-and-so now be tracked victimisation GPS technology and Facebook places Is this the Big Brother state? 5 Computer computer parcelYou need to be able to (a) explain the need for the adjacent functions of an operating system exploiter interface, shop management, peripheral management, multi-tasking and security (b) describe the purpose and use of common utility programs for computer security (antivirus, spyware protection and firewalls), phonograph recording or ganisation (formatting, file transfer, and defragmentation), and system maintenance (system information and diagnosis, system killing tools, automatic updating) (c) discuss the relative merits of custom written, off the shelf, open source and proprietary software.Operating System functions entrepot management User interface The OS manages the transfer of selective information in the midst of the processor, aim and main storage (e. g. lumbering obtain) The OS provides the drug substance abuser with a way of controlling the functions of the computer without resorting to machine scratch. It do-nothing be graphical (GUI), e. g. Windows or text-based no mouse (CLI Command Line Interface), e. g. MSDOS. The OS manages the input and output devices committed to the computer, including things like seeboard, mice and printer. The OS allows more than one program to be run at once so users can flip out back and forth betwixt applications easily.The OS provides security features to restrict door to the system or particular files. Peripheral management Multi-tasking warrantor When trying to call in the functions of an Operating System intend MUMPS retrospection mgt, User interface, Multi-tasking, Peripheral mgt and Security. 6 Utility programs Type Security Purpose Detects and protects the computer against virus threats. Quarantines infected files. Spyware Detects and removes spyware (small protection programs that quietly varan what you are doing) Firewall Restrict communication in and out of the computer from the applications that are running.Formatting Sets up a hard suit, memory board stick or card into a format that the computer can use to set up/retrieve data. The process of formatting erases any data that was previously on the storage medium. File convey anyows movement of files from one location to another, either locally or via memory stick/FTP to another computer. Defragmentation Re-organises the data on the hard drive to improve read/wri te access times. System info & suffers information about the diagnosis system in order to help with diagnosis of problems. System cleanup Removes temporary files and tools compresses/archives unused files to increase free storage space.Automatic Uses the profit to check the OS updating is up-to-date and applies software patches/fixes as necessary. Program Antivirus Security Security Disk Operations Disk Operations Disk Operations System Maintenance System Maintenance System Maintenance 7 Software development Custom written Developed specifically for a particular organisation. (a. k. a. bespoke/inAdv custom made to meet exact purpose house) Disadv very dear(predicate) and need technical expertise to develop. Off-the-shelf Developed by a software company to be sold to the general public. Adv cheaper than developing it yourself and tech stay open.Disadv inflexible might not do everything you want it to do. Open source Written by general public for everyone else to use. Source code provided so software can be tweaked. Adv allows anyone to use/adapt the software to meet their needs, collaborative approach to development which can lead to better quality software. Disadv by do source code available to all, provide opportunity for people to take advantage of software installed on users computers compromise security. Proprietary Written by developer and allowed to be used by others but with certain restrictions, e. . cant adapt software. Source code is hidden. Adv can allow for divers(prenominal) sports of same software, e. g. educational version with curb functionality or fullfunctionality version costing more. Disadv source code cannot be inspected so may contain spyware or other malicious features inwardly the software. 8 Computer Hardware Definition Computer hardware summonss to the somatogenetic parts of a computer and related devices. knowledgeable hardware devices include motherboards, hard drives, and RAM. out-of-door hardware devices include moni tors, keyboards, mice, printers, and scanners.The internal hardware parts of a computer are often referred to as components, while external hardware devices are usually called peripherals. Source www. techterms. com Inputs and Outputs (Peripherals) You need to be able to understand the need for input and output devices (a) (b) describe suitable input devices for a wide range of computer controlled situations (c) describe suitable output devices for a wide range of computer controlled situations discuss input and output devices for users with specific needs. (d) Inputs and outputs are the computers way of communicating with us the user.Without inputs or outputs our system would be quite limited. Imagine a calculator which didnt allow you to type in verse or display the coiffe on the screen Here are some of the common input devices used Keyboard The keyboard, along with the mouse, is one of the most used input devices. Once you get the hang of where the keys are, it allows people t o enter textbased data quickly into the computer. A numerical keypad (found on most keyboards on the right) provides a fast way for accountants and people who work in finance to enter human bodys. 9 There are some interesting variations on the keyboardRoll-up keyboard (portable can be rolled up and stuffed in laptop bag) Wireless keyboard (no need for messy wires, frees up user needing to be near computer) Laser Projection (projects a keyboard layout on to any surface sensors detect which keys have been pressed) Mouse The computer mouse is another common input device. It allows the user to interact with the software on screen. The mouse is quite versatile, with at to the lowest degree two buttons and the ability to move in any direction. However, it can be difficult to be precise e. g. drawing using the mouse is quite hard Mice have also undergone a few changes over the years as wellLaptop touchpad (touch-sensitive pads that allow the mouse to be controlled by just a finger) Tra ckball (the user moves the pointer on-screen by moving rolling the ball the unit doesnt move around like the mouse) Optical Mouse (old mice used balls which used to get clogged with dirt and grease new mice use small cameras to detect movement instead). 10 Other Input Devices Scanner Scanners convert physical documents and photos into digital format. They can be used in conjunction with finical software to automatically read handwriting and convert it into computer text. This is called Optical portion Recognition.Some tickbox forms are scanned in, like the Census form or your multiple choice Science exams this is called Optical Mark Recognition. Touchscreen Touchscreens have been around for years in one form or another. The latest versions, like the Apple ipad interface use multi-touch technology to allow greater control. Microphone Microphones convert analogue headphones into a digital format that the computer can understand and playback. Sounds are usually recorded as . wav or . mp3 files (the latter uses compression to base the file coat little and is more likely to be used to store music tracks).Digital Camera Digital cameras convert live images into digital format. Photos are usually stored as JPEG files. The quality and size of the picture is determined by the be of megapixels the camera is capable of detecting, e. g. photos taken with an 8 megapixel camera are made up of 8 one thousand million pixels. 11 Webcam Webcams capture live video feeds and using appropriate software can then transmit those across a intercommunicate. Sensors Sensors measure the physical world and translate that into a digital format that a computer can understand. There are various sensors that detect ll manner of things movement, light, heat, moisture, gases (e. g. carbon monoxide levels), location (GPS), and so forth For example, the iPhone has an accelerometer so it knows which way round it is to ensure the screen is rotated the correct way. Output Devices Printer P rinters produce physical documents and photos from digital files. Most photo impression is done by inkjet printers which can be expensive to run. Laser printers use toner cartridges which are more expensive initially but can print more foliates before being replaced. 12 Monitor/screen Monitors/screens provide the visual output from the computer system.Most computer monitors and mobile phones use colour LCD (liquid vitreous silica display). Speakers Working the opposite way to the microphone input, the speaker converts digital sound into analogue waves. 3D Printer A 3D printer uses lasers and a special kind of plastic to build physical 3D shapes from drawings made using CAD software (computer aided design). The object is built up layer by layer. The whole process can take many hours before the final product is finished. They are often used for creating prototypes in manufacturing, e. g. Dyson uses them to create prototype parts for their products.They are button up very expensive but the price is coming down. Motor A motor can be driven with precision by a computer system. Often used in manufacturing, e. g. building cars, motors are used to control robotic arms. 13 Input and output devices for specific needs Keyboards have been adapted for users with limited movement in their arms/hands. A keyboard knowing to minimise the movement of your hands. Trackballs have also been used where users only have limited motor ability. They can be used by hands or feet, like the one below A foot-operated mouse, ideal for people with limited/no mobility in their arms.For quadriplegic users, there are two alternatives to using the mouse or keyboard. The first is voice-recognition this involves the user reading a passage of text from the screen so the computer learns their voice pattern. They can then use special software to control the computer using voice commands. The technology is acquire better but can still execute mistakes. The twinkling is eye-tracking which uses s mall cameras mounted on the monitor to detect eye movement and move the cursor to the point where the user is gazing. A mouse click is made by blinking slowly.Stephen Hawking uses a special device to allow him to communicate. An infra-red sensor detects twitches in the cheek ponderousness below his eyes in order to enter words and then his device generates a computer synthesised voice to read them out loud. 14 Internal Hardware Devices (Components) Central Processing Unit (central processing unit) You need to be able to (a) state the purpose of the central processor (b) describe the function of the CPU as channel and executing instructions stored in memory (c) explain how common reference workistics of CPUs much(prenominal) as clock speed, amass size and play of cores affect their performance.The purpose of the CPU is to Fetch and Execute instructions stored in memory. It acts as the mentality of the computer and controls the rest of the system. INPUTS and OUTPUTS CPU RAM 15 Fetch Execute Cycle (using lower-ranking Man Computer) Download the software http//www. cs. ru. nl/erikpoll/III/lmc. Allows you to quit out of the current program and go back to the Start This displays which phase of the fetch/execute cycle we are currently in. The program that is currently being carried out. The current instruction is the one in line with the phase display. Provides the have of the current instruction, along with its op code and operand.This explains what the little man is doing at each stage as he follows the program. Fetch phase Before the little man can contract out an instruction, he needs to find out which instruction he has to carry out. He does this by first getting the order from the program counter (The thing that looks like a green mushroom in a block of wood), and then fetching the respect from the corresponding orchestrate in memory. The Program rejoinder The little man uses the value in the program counter to decide which address in memory he s hould get the undermentioned instruction from.After getting the value, but before going and getting that instruction, he increments the program counter, so that it has the correct value in it when he visits it next time. Memory Memory can be used to store programs, and data. In the fetch phase of the fetch execute cycle we are only interested in the fact that we can get instructions from the memory. 16 Execute phase Once the little man knows which instruction he is going to perform, he has to set about real doing it. This is the Execute phase of the fetch execute cycle. For each instruction the little man will perform a series of tasks.For instance, for an input instruction, the little man will go to the input tray, take the value he finds there, and go and put it into the calculator. For an add instruction, he will take a value from memory, and add it to the value pre displacely in the calculator. Once the execute phase is complete, the little man will decease the cycle again, a nd head to the program counter to get the value of the next instruction he has to fetch. The Input and Output trays These are what we (the user) use to communicate with the little man. We provide him with data via the input tray, and when hes ready, he provides us with data via the output tray.Calculator (Arithmetic Logic Unit ALU) On a real computer, this would be the Arithmetic Logic Unit (ALU). Its basically a calculator that will carry out arithmetic operations. Memory Memory is accessed during the execute phase when we need to store or access data. It is possible to overwrite your programs when putting data into memory though, so be careful where you put it. Following a program (Decoding instructions) The program is a series of instructions made up of an op code and operand (either data or the address where data is stored).For example Op code Operand 1 2 3 4 5 6 7 800 801 802 9 Load bloodline Add Subtract Input Output Halt Skip If Negative Skip If Zero Skip If Positive Jump 2 sum instal 2 99 99 refers to the memory address where little man should store the data. These can be stored as double star puss patterns, e. g. 10 could refer to the op code (2) to a higher place and 11000011 could refer to the memory address (99). Remember 2 in binary is 10 and 99 is 11000011. This would give the bit pattern for the preceding(prenominal) instruction as 1011000011 Q. How does little man (CPU) know the difference between data or an instruction?It all depends on which phase of the cycle the CPU is in, e. g. in the Fetch phase the CPU knows it is an instruction. In the Execute phase the CPU knows it is data. Op codes understood by LMC 17 Characteristics which affect performance Clock fixture This is the material body of cycles that the CPU can complete in one second (measured in Hertz or Hz) A faster clock speed means the CPU can process more instructions per second. For example a 1MHz processor can process 1 million instructions a second whereas a 1GHz proces sor can do 1000 million instructions in the same time.This is the A larger cache size means attribute scene of action for more data can be held and data from the its less likely that any cycles are wasted. A RAM. It ensures the CPU small cache size and is always busy fast clock speed may with data. result in a bottleneck between the RAM and CPU. A dual-core processor or This is the quad-core processor is 2 number of processing cores to 4 times faster than a conventional chip as they the CPU has. A can process simultaneous dual-core has instructions. two and is able to process two instructions simultaneously in the same cycle. Cache sizeNumber of Cores It is important to balance all of the above to avoid over-speccing one area and creating bottlenecks elsewhere. 18 Memory You need to be able to (a) describe the difference between RAM and ROM (b) explain the need for ROM in a computer system (c) describe the purpose of RAM in a computer system (d) explain how the amount of RAM in a personal computer affects the performance of the computer (e) explain the need for realistic memory (f) describe cache memory (g) describe jiffy memory (h) discuss how changes in memory technologies are leading to innovative computer designs.RAM and ROM Both are needed in a computer system but for polar reasons. In a computer computer, ROM (Read all told Memory) is used to store all the instructions (the BIOS Basic Input/Output System) to get the computer up and running. It sympathiseks out the amount of memory, input and outputs available to it and then loads up the operating system. In some computer systems, like your washing machine, the ROM stores the software to control the hardware, as well as data much(prenominal) as cooking/washing times etc.RAM (Random Access Memory) is used as temporary storage for instructions and data between the inputs, outputs, secondary storage (e. g. hard drive) and CPU. The larger the RAM, the more instructions/data can be held in quick acc ess memory without needing to use Virtual memory this can improve performance. Random Access Memory Read Only Memory Volatile (forgets everything when power switched off) Non-volatile (remembers content even if power switched off) Can be written to and read from Can only be read from (not written to) ordinarily measured in Gigabytes (Gb) For the BIOS, usually measured in Kilobytes (Kb) 9 Virtual Memory Depending on the size of the RAM, it is not always possible to store all the running programs in the RAM at once and the computer will start running low on memory and slow down. This is where virtual memory comes in. It stores the data that the RAM isnt actively using on the hard drive to free up the RAM. Then, when the CPU needs the data it pulls it back from the virtual memory on the hard drive. As far as the CPU is concerned, all the programs are running from the RAM. The operating system sets up a page file on the hard drive to be used for virtual memory.This is usually set at tw ice the size of the amount of RAM, e. g. 1GB of RAM should have a 2GB page file. Cache Memory This has been explained in the CPU section on page 17. pall Memory Flash Memory is often referred to as solid-state storage, which means that there are no moving parts. Its similar to RAM but is non-volatile which means when the power is cut off, it still remembers the content). Flash memory is used in USB memory sticks and memory cards for digital cameras and some games consoles, e. g. Sony PSP.Future developments in Memory technologies Physical Size & Capacity Costs focal ratio Power Memory chips have become more compact (storing more bits per chip) which has lead to smaller computing devices and larger capacities. The cost of memory has fallen which means it is now affordable to have large amounts of RAM available. Read/write times are improving which mean faster access and better performance. Memory chips are more power-efficient meaning portable devices work for longer between charge s and batteries can be smaller and lighter. 20 Secondary warehousingYou need to be able to (a) explain the need for secondary storage (b) describe common storage technologies such as optical, magnetic and solid state (c) select suitable storage devices and storage media for a given application and justify their choice using characteristics such as capacity, speed, portability, durability and reliability. Secondary storage is needed for when we want to store files permanently or semi-permanently. We might want to transfer files between computers by using portable secondary storage media. Storage TechnologiesCodes data using microscopical dips on the surface of the disc. Units Optical Codes data using small changes in magnetic fields. Magnetic Uses non-volatile memory chips to store bits of data Solid State Candidates should be able to (a) define the terms bit, nibble, byte, kilobyte, megabyte, gigabyte, terabyte Bit 1 Nibble 4 bits Byte 8 bits Kilobyte (Kb) 1,024 bytes Megabyte (Mb) 1,024 kilobytes Gigabyte (Gb) 1,024 megabytes Terabyte (Tb) 1,024 gigabytes 21 Storage Media Comparison Storage Medium CD Method Optical Capacity Medium 650-700Mb Small 1. 4Mb large-mouthed 1Gb to 2+ Tb Speed Fast access Portability Lightweight and flat Lightweight and flat Heavy and not designed to be carried around. Requires integrating into computer system. Medium-weight. Plugs into computer USB or Firewire port. Lightweight and small. Durability and dependability Easily scratched and will then not work. Can only be written to once. Can be snapped. Can be damaged by inexpugnable magnets or heat. Quite reliable but can crash when the read/write head crashes into the platter. Sometimes happens on laptops when dropped. Can be damaged by magnets.Same concerns as internal hard drive. Floppy Disk Magnetic Slow access Internal Hard Disk Magnetic Fast access (dependent on speed of motor RPM rotations per minute) Portable Hard Disk Magnetic Large 40Gb to 640Gb Medium-fast access (de pendent on connective method, e. g. USB cable) Flash drive (USB stick or memory card) Blu-ray disc DVD (Digital Versatile Disc) Solidstate Optical Optical Medium/Larg Medium-fast access e (dependent on connection 1Gb to 64Gb method, e. g. USB cable or card reader) Large Fast access 50Gb Large Fast access 4. 7Gb Not affected by magnets.Quite hardy. Can be dropped without damaging contents. Easily scratched and will then not work. Easily scratched and will then not work. Lightweight and flat. Lightweight and flat. 22 binary star Logic You need to be able to (a) explain why data is incorporateed in computer systems in binary form (b) understand and produce simple logic diagrams using the operations NOT, AND and OR (c) produce a truth table from a given logic diagram. Computers use binary as its a lot simpler. Each CPU is made up of millions of transistors which can only have two states (ON/OFF).Anything can be converted into a binary number so a computer can understand, process and store it. NOT admission NOT Truth Table Input Output 0 1 1 0 Flips the input, e. g. 0 becomes 1 and 1 becomes 0. AND Gate a b Waits for 1 on both inputs before outputting a 1. AND Truth Table Input Input Output a b 0 0 0 0 1 0 1 0 0 1 1 1 OR Gate a b Wait for 1 on either input before outputting a 1. OR Truth Table Input Input Output a b 0 0 0 0 1 1 1 0 1 1 1 1 You can practice with NOT, AND and OR gates using the following website http//logic. ly/demo/ 23 Represendation of data in computer systemsNumbers You need to be able to (a) convert positive decimal whole numbers (0-255) into 8-bit binary numbers and vice versa (b) add two 8-bit binary integers and explain overflow errors which may occur (c) convert positive decimal whole numbers (0-255) into 2-digit hexadecimal numbers and vice versa (d) convert between binary and hexadecimal equivalents of the same number (e) explain the use of hexadecimal numbers to represent binary numbers. ten-fold and Binary conversions Numbers great er than 1 can be represented in binary by using more bits. e. g. 129 can be represented in 8 bit (byte) binary as 10000001.Denary Binary 128 1 64 0 32 0 16 0 8 0 4 0 2 0 1 1 This means that if you put a 1 on each increased by double bit (i. e. 11111111) the highest denary for each new bit added to the leave. number 8 bits (a byte) can store is 255 128+64+32+16+8+4+2+1 = 255. Notice how the number To convert binary into denary, just add unneurotic the denary numbers above each bit that has 1 in it, e. g. 10000001 = 128 + 1 = 129. To convert a denary number into binary, find the highest value that will go into it and then continue down the number of bits with the remnant until there is nothing remaining. 4 For example, to convert 44 into binary 8-bit format 44 is smaller than 128 and 64 so we place 0s in those bits Denary Binary 128 0 64 0 32 does go into 44 with remainder of 12, so we place a 1 in that bit Denary Binary 128 0 64 0 32 1 The remainder of 12 is smaller than 16 so we place a 0 in that bit Denary Binary 128 0 64 0 32 1 16 0 8 does go into 12 with remainder of 4, so we place a 1 in that bit Denary Binary 128 0 64 0 32 1 16 0 8 1 4 does go into 4 with with nothing remaining, so we place a 1 in that bit Denary Binary 128 0 64 0 32 1 16 0 8 1 4 1 nd 0s in all the remaining bits Denary Binary 128 0 64 0 32 1 16 0 8 1 4 1 2 0 1 0 Therefore 44 as an 8-bit binary number is 00101100. 25 Adding two binary numbers together Adding two binary numbers together is not as scary as it sounds or looks. It uses the same principles at the denary number system (Hundreds, Tens, Units). For example Work from right to left, like you do when adding denary numbers using HTUs. 00010010 + 00010100 0+0=0 0+0=0 0+0+1 1+1=0 0+0=0 0 0 11 0 0 1 1 0 0+0=0 1+0=1 0+1=1 (carried over) = 1 (carry 1)Lets convert it back into denary to check it is correct Denary 128 Binary 0 16 + 2 = 18 Denary 128 Binary 0 16 + 4 = 20 Denary 128 Binary 0 32 + 4 + 2 = 38 64 0 32 0 16 1 8 0 4 0 2 1 1 0 6 4 0 32 0 16 1 8 0 4 1 2 0 1 0 64 0 32 1 16 0 8 0 4 1 2 1 1 0 So as 18 + 20 are 38. Then we know the binary calculation is correct 26 becharmadecimal Numbers Programmers started to use hexadecimal to reduce mistakes and make it easier for them to understand than using lots of 0s and 1s. Denary and hexadecimal conversions Hexadecimal uses a base 16 system = 0-9 and then A-F.That means that the denary number 15 is equal to F in hexadecimal. The denary number 16 is equal to 10 in hexadecimal (which means 1 lot of 16) The highest denary number represented in 8-bit (byte) binary is 255 and was represented by 11111111. In hexadecimal this would be represented as FF (15 lots of 16 + 15). Confused? Remember, F in hexadecimal represents 15. Therefore F0 would be 15*15=240. The second F is 15, hence FF = 240+15 = 255. To convert denary to hexadecimal you can divide the number by 16. For example, to convert 141 into hexadecimal do the following 141 / 16 = 8 remainder 13. /16 = 0 remainder 8. Therefore, working from right to left, the hexadecimal number is 8 13 (and 13 is represented as D in hex) so it would be 8D. Alternatively, convert the denary number into binary and then binary to hexadecimal. 27 Binary to hexadecimal conversions To convert binary to hexadecimal you need to break it down into nibbles (blocks of 4 bits). For example, 141 as a binary number is 10001101. The two nibbles are 1000 and 1101. Converting each nibble into denary we can see that 1000 = 8 and 1101 = 13.Remembering that 13 = D in hexadecimal then 141 would be represented as 8D. To convert hexadecimal to binary you just reverse the process. Convert each part of the hexadecimal number into nibbles of binary numbers. For example Hex Denary Binary 8 8 1 4 0 nibble D 2 0 1 0 8 1 4 1 nibble 2 0 1 1 HELP This conversion chart below may help to make sense of it all Denary 0 1 2 3 4 5 6 7 Binary 0000 0001 0010 0011 0100 0101 0110 0111 Hexadecimal 0 1 2 3 4 5 6 7 Denary 8 9 10 11 12 13 14 15 Binary 1000 1001 1010 1011 1100 1101 1110 1111 Hexadecimal 8 9 A B C D E F 8 Using binary to represent characters You need to be able to (a) explain the use of binary codes to represent characters (b) explain the term character set (c) describe with examples (for example ASCII and Unicode) the relationship between the number of bits per character in a character set and the number of characters which can be represented. Computers use the ASCII (American Standard Code for Information supercede) format to use binary codes to represent numbers, letters and special characters. It uses 8-bits (byte) to represent each character, so every character has its own bizarre 8-bit ASCII code.Using the ASCII character set on the next page we can convert characters into binary numbers. For example, Isambard would be represented in binary as I s a m b a r d = = = = = = = = 73 115 97 109 98 97 114 100 = = = = = = = = 0100 1001 0111 0011 0110 0001 0110 1101 0110 0010 0110 0001 0111 0010 0110 0100 Notice how the capital I is different from the lowercase i in the ASCII format. An upper and lower case version of each letter is present in the chart to enable the computer to tell the difference between them. If you remember what we said about binary numbers back on page 23 then you know that 8-bits (a byte) can store up to 255 in denary.This means that the ASCII format can have up to 255 characters represented in a character set. 29 American Standard Code for Information Interchange character set Note You dont need to remember these codes for your exam but just be aware of how it works. 30 Using binary to represent images You need to be able to (a) explain the representation of an image as a series of pixels represented in binary (b) explain the need for metadata to be included in the file such as height, width and colour information (c) discuss the effect of colour depth and resolution n the size of an image file. Images on the computer are made up of lots of individual pixels (small square s of colour). If you zoom into any image enough times you will see these little blocks of colour. We can use binary numbers to represent each pixel. In a simple image, where there are only two colour (colour depth of 1) then we can simply use a 1 for one colour, and 0 for another. For example, look at this small 3 x 3 pixel image below. The 1s represent the black colour and the 0s represent the white. 0 0 0 1 0 0 0 1 31 That is the principle behind storing images as binary. However, we also need to know a few other things about the image in order to display it correctly, i. e. its height, width and colour depth. Image Metadata Height Width Colour depth Resolution The height of the image in pixels The width of the image in pixels The number of bits available to represent each pixel The pixels per inch (PPI) if the pixels per inch is high, then the resolution and image quality is also high.Without this metadata the computer would not be able to suppose the image properly. Colour De pth In a simple 1-bit colour depth image, we can only display two colours. However, in an 8-bit colour depth image (like the gif format), we can display 256 colours (one for each binary number from 00000000 to 11111111). In a 24-bit colour depth image (like the jpeg format), we can display just over 16 million colours If we use more bits to store each pixel, then the file size will be larger. That is why . gif images are often smaller in file size than . peg images. Resolution If the image has a higher resolution, it has more pixels to store data about and is therefore larger in size. If the image is lower resolution, this means that there are less pixels per inch, which means less pixels to store data about and is therefore smaller in size. 32 Using binary to represent sound You need to be able to (a) explain how sound can be sampled and stored in digital form (b) explain how sampling intervals and other considerations affect the size of a sound file and the quality of its playback .Sound is stored in the computer by taking samples of the sound wave at regular intervals and converting those into binary numbers (using an analogue-to-digital convertor). The computer can then re-create the sound by reversing the process. The file size and quality of the sound recording is affected by the sample rate and bit rate. The sample rate refers to the number of samples taken each second. It is measured in Hertz (like the CPU clock speed). If the sound wave is not sampled at a higher enough rate, this can lower the quality of the sound recording, but the file size would be smaller.If the sound wave is sampled at a higher sampling rate, this will increase the quality of the recording, but the file size will be much larger. The bit rate refers to the amount of bits used to store the different levels of sound at each sampling interval. The more bits, the greater range of levels that can be distinguished. This also has the affect of increasing the file size if the bit rate is high (e,g. 16-bit instead of 8-bit). 33 Computer Communications and intercommunicates interlockings You need to be able to (a) explain the advantages of networking stand-alone computers into a local area network (b) describe the hardware needed to connect stand-alone computers into a local area network, including hub/switches, wireless access points (c) explain the different roles of computers in a client-server and a peer-to-peer network (d) describe, using diagrams or otherwise, the ring, bus and star network topologies (e) describe the differences between a local area network and a wide area network such as the Internet explain the terms IP addressing, macintosh addressing, packet and (f) protocols (g) explain the need for security measures in networks, such as user access levels, suitable passwords and encryption techniques (h) describe and justify network policies such as acceptable use, disaster recovery, failover, back up, archiving. Why network? Allows computers to communi cate with each other and share resources, e. g. peripherals (printers, scanners), storage, internet access. Data Packets Information is sent around a network in data packets. Data is broken down into packets to be sent over the network and often may take different routes to get there. It contains info on where it needs to go (the address) and the packet number and an error-checking facility to ensure the packet arrives intact and can be put back together in the right order. 34Basic components of a local area network (LAN) Client/ Computer Hub, Switch or Router See next page for translation of each. Server In a Client-Server network, the server handles the logins, applications and file storage. Modem Interfaces between the Internet and the network. Shared Peripherals Networks allow peripherals like this printer to be shared by all the computers on the network. Internet 35 Hub, Switch or Router? These are not the same. You need to know the difference between them. Hub A hub receives all data sent over the network and sends it to all the other devices on the network. Only the device who the data packet is for will acknowledge it the other devices will ignore it.A switch is bit more intelligent than a hub and it learns which devices are on the network (and their port number/address) and only sends the data packet to the computer who is the intended recipient. This is more efficient than a hub as it doesnt result in lots of unnecessary network craft. A router is cleverer still than both hubs and switches. It can re-direct network traffic and deal with different packets in different ways. It can protect the computers on the network by hiding them from the outside world (i. e. a firewall). Some routers have a modem built-in and wireless capabilities. Most homes have a 4-port wireless broadband router to access the Internet. This combines the router and modem functions. Switch RouterWireless access points dont require a physical connection and therefore are suited f or a variety of different devices and provide access to network over an area, e. g. iPad or smartphone. IP address The IP address (Internet Protocol) is a computers unique address on the network, e. g. 192. 168. 0. 1 is usually your home routers address. On the Internet, each website has its own or several IP addresses. 36 macintosh address The MAC address (Media Access Control) is a hexadecimal number that is unique to that particular device. Hey Did you know that there are 281,474,976,710,656 possible MAC addresses in the world? Thats a lot of MACs baby huh huh Network Protocols Protocols are a set of standards and guidelines that tell computers how they should handle the sending and receiving of data over the network.TCP/IP (Transmission Control Protocol and Internet Protocol) employ to exchanged data between computers on a network and route packets between networks and over the Internet. Used on WWW to transfer webpages and web content from the website host server to the compu ter requesting the page. Used to transfer files between computers over a network. Used to transport emails. HTTP (HyperText transfer Protocol) FTP (File Transfer protocol) SMTP (Simple Mail Transport Protocol) LAN or WAN? A LAN is a Local Area Network which is usually set-up within a certain area, e. g. a building or group of buildings hence the term local. A WAN is a Wide Area Network which is usually on a nationwide or worldwide scale. The Internet is an example of a WAN a series of interconnected LANs. 7 Network Topologies A network can be set up in three main ways Ring 4 3 5 1 2 All the computers are coupled together in a ring and data packets are sent one way round. For example in the diagram above to get from PC 1 to PC 5 the data needs to go through PCs 2, 3 and 4. It cant go anti-clockwise back to PC 5. Drawbacks If there is one break in the ring then the network breaks down. Also not very efficient as a lot of network traffic doesnt take the most direct route. Bus All th e computers are connected to a central bus. You can add and take away computers easily in a bus network as the computers are connected to the central bus, rather than between one another.Drawbacks Only one computer can use the bus at once which means only one computer can communicate at a time the others have to wait until the bus is free before sending their data this makes it slow. If a computer connected to the bus breaks down, then the network still runs but if the central bus breaks down then so does the whole network. 38 Star 4 3 5 1 2 All the computers are connected to central server. The server can handle multiple communications at once and re-directs traffic over the network. More computers can be added or taken away without affecting the network. Drawbacks If the main server fails then the network goes down. Client-server and peer-to-peer networks In a Client-server network, the server acts as the main computer intervention login requests, user storage, etc.The client co uld be any computer. The user can log on to any client and still access their stuff on the server. In a Peer-to-peer network, each computer shares information equally and plays an equal role in the network. Network Security Part of Data Protection Act 1998 requires companies who store data electronically to keep it safe and secure. Without security then anyone could hack into the network and intercept data packets. Confidential data packets should be encrypted so if they are intercepted they are unreadable. There may be a need to prevent unauthorised access to particular areas of the system this could be controlled by passwords and different user levels, e. g. n the school a student can only access the student shared drive, whereas teachers can access both the student shared drive and the staff shared drive. 39 Network Management Policies Disaster recovery In the event of the system failing there needs to be plans in place to get the network up and running again as quickly as possib le. Many organisations, such as banks, have a disaster recovery plan which may mean relocating to a different location (if the building is no longer accessible). Failover and moderations If there is a power cut, many networks have UPS (uninterrupted power supplies) which are large batteries with enough charge to keep the network going long enough to shut it down correctly. If a hard drive fails, there is usually a backup which can take the strain.Networks are often backed up at least daily and these backups are stored off-site or in a fire-proof safe so in the event of a disaster in the building, the data is still intact. Maintenance Sometimes data needs to be kept but is not accessed regularly. This data can be archived off onto tape to help free up space on the network. Acceptable Use It is important for the network to have an acceptable usage policy to provide users with guidelines about what they can and cant do using it. For example, it would use up vital network bandwidth if some users decided to play a network game or download the latest torrent from the Internet. If users start file sharing copyrighted materials, like music, using the network then there is a legal issue to consider as well. 40 The InternetYou need to be able to (a) describe the nature of the Internet as a worldwide collection of computer networks (b) describe the hardware needed to connect to the Internet including modems, routers etc (c) explain the need for IP addressing of resources on the Internet and how this can be facilitated by the role of DNS servers (d) explain the importance of HTML and its derivatives as a standard for the creation of web pages (e) describe common file standards associated with the Internet such as JPG, GIF, PDF, MP3, MPEG (f) explain the importance of compressing files that are transmitted via the Internet (g) describe the differences between lossy and lossless compression. What happens when you type in a web address in your browser? When you enter a web address in your browser, it heads off via your modem to your ISPs (Internet Service Provider) domain name servers (DNS).These computers store the IP address(es) for each website and directs your request to the relevant server hosting the webpage you want to view. The information is then sent back to your ISP and then back to your computer. Why HTML? HTML (HyperText Markup Language) provides a standard format which any computer with web browser can infer and display the pages. It allowed the World Wide Web to get going as there was a universal standard that everyone could now use to share information. 41 Common file formats used on the Internet . html . jpg HTML Web page JPEG image Used to store webpages Used to store photos as can show up to 16. 7 million colours. Used for simple graphics and short animations can show up to 256 colours.Used to store noneditable documents for viewing on the Internet using the free Adobe viewer software. Used to store music tracks. Compressed to mak e downloading faster. Used to store videos. Compressed to make downloading faster. Used for Adobe Flash files to add interaction and/or animations to websites. Used to store video files playable using free Apple viewer software. .gif Graphic Interchange format image .pdf Adobe Portable Document format .mp3 MP3 Music format .mpg MPEG video format .swf Shockwave Flash format .mov Apple Quicktime format Why compress on the Internet? The Internet can be slow at times, especially in its wee days relying on early 56Kbps modems as opposed to the 3-4 Mbps average.Therefore if you could compress the files that were being sent on the Internet, then you sent smaller files, and smaller file sizes meant faster downloads. It also frees up the network and avoids clogging up the bandwidth. 42 Lossless versus Lossy contraction Lossless compression Compression used means the original file stays completely intact and unchanged. Used for text documents, data files and executable programs where it wou ld not be desirable for parts to be lost. Used for multimedia files, i. e. sound, images, video. Lossy compression Compression which involves discarding parts of the file which wont be noticed if they are not present.For example, it is possible to remove some data within an image and your brain fills in the gaps. Take a look at the images of the dog below Source wikipedia. org The image has more compression applied to it as you go from left to right. Even though the image on the right in heavily compressed, we can still see it is a dog. Our brain fills in the gaps. 43 Databases What is a database? A database is a persistent organised store of data which can be easily and quickly searched. They are most commonly used for Marketing, e. g. faithfulness cards. Huge databases are searched for patterns in customers buying habits and then targeted coupons are mail shot to customers.The school has several databases to store everything from your behaviour logs and Brunels, to your address, date of birth and even how much money you have on your lunch card Data handling software, such as Microsoft Access, allow users to add tables, define fields and validation (create) add/edit/delete data (maintain) run queries to extract information from the database (interrogate) DBMS (Database Management System) Many large databases use a database management system (DBMS). This system separates the data stored from the data handling applications used to maintain and interrogate the database. Feature Concurrent usage Security Recovery & replacement Data integrity Why is this good? Allows multiple users to use the database at the same time Provides bility to allow/restrict data access to individuals or applications Provides backup solution and recovery tools to ensure data is not lost in event of failure Enforcing data integrity by ensuring data is consistent and adheres to the rules comparative databases A flat-file database is when all of the data and fields are stored in one tabl e, e. g. an excel spreadsheet full of names and addresses see below 44 A relative database is when that data is separated into individual tables (entities) that are linked by a primary key (which appears in each table). Student Student ID First name Surname Class Class ID Student ID Teacher ID Teacher Teacher ID Name SubjectIn the example above, the STUDENT, CLASS and TEACHER are all tables (entities) in the database. The id is the unique piece of information (the primary key) that identifies each instance of a student, class or teacher. We couldnt use First Name as the primary key in STUDENT as many people share the same first name it isnt unique enough The advantage of separating the data into different entities is to avoid data redundancy when the same data is stored in several places in the database. Lets imagine if we stored the information above in a flat-file database (all in one table) it would look something like this Duplicated data Can you see the duplicated informat ion?Not only does this use up space but it is easier to make a mistake (and lose data integrity) if we only update one of the records. E. g. if Miss Parsons gets married and her name changes to Mrs Smith then we need to make this change for every record in the database. If are using a relational database, because the Teachers name is stored in a separate table and linked to the rest of the entities, we only need to update it in the TEACHER table once. In the CLASS entity, both Teacher ID and Student ID are foreign keys (primary keys that when linked to another table become foreign keys in that table). Components of a relational database Tables Represents the entity in the database. Fields and primary keys are defined and data stored in the table. Create) Forms Provide a customisable user interface to add/edit and delete data (Maintain) Queries Allow data that meets specific criteria to be extracted and displayed (Interrogate) Reports Displays the results of queries in a customised f ormat designed to be printed Querying a database 45 When interrogating a database, you need to specify the fields you wish to display and the criterion you will use to search. E. g. if you were searching for a car on a car supermarket website you might search using the make of the car you wanted Make = Ford You could also use logical operators such as (NOT equal to), (less than), (greater than), = (greater than or equal to). E. g. Mileage

Sunday, May 26, 2019

Written Analysis and Communication: Report on Homesafe Limited

Homesafe Ltd. Written Analysis and Communication Instructor Dr. Seema Khanvilkar Submitted By Apurv Jain, D023 Shreyansh Jain, D027 Mohit Sejwal, D055 Vinay Pal, D045 Sahil Bhavnani, D006 Aman Jakhar, D030 Letter of transmission To, Dr. Seema Khanvilkar, Business Communication Faculty, SBM, NMIMS Mumbai Date 4th March 2013 From, Div D, MBA I Subject Report on Homesafe Ltd. Respected Maam, With reference to the meeting held on twentieth Feb, 13 regarding the recomm culminationation required on Homesafe Ltd. case, I am enclosing the complete report with our recommendations.We recommend that Holmes should help capital of Mississippi recollect a fraction time job in an impertinent unrelated business. This allow be a win-win position for both the fateies. Sincerely, Div D Executive Summary This is report nearly a challenging situation faced by George Holmes, the founder of Homesafe Ltd. an emerging start-? up. Homesafe was doing very well with business prospering and expanding de mand. Holmes found himself in a cute situation when capital of Mississippi, the purchase manager of his largest client, Dwasons, subtly suggested that he needed an alternate source of income and if Holmes did not help, Homesafe might lose business with Dwasons. Holmes as several options want offering capital of Mississippi direct help, help him amaze employment elsewhere or to let go of business with Dwasons. We recommended that Holmes leverages his personal network to find capital of Mississippi a part time job in an external unrelated business. This will conserve the dealinghip between Holmes and Jackson and will be in the best interest of both. Report SITUATION ANALYSIS Homesafe Ltd is an emerging start-? up in the security space. It was a started as a single product guild by an engineer, George Holmes in his personal workshop. Over the year this fellowship has grown signifi screwingtly and added an advisory services vertical oo. There is probative demand for the companys products and the business has been profitable in both the years. Things are looking good with business prospering, Homes has had some of his old friends join him in his business which they make part time. Holmesafe overly recently recruited fulltime employees and shifted to new premises. Holmes has invested significantly in networking and has maintained personal relationship with his clients and till a certain extend relies on these relations to push his sales too. Most prominent of these, is his relationship with Jackson, who is a procurement manager at Dwasons Ltd, Homesafes argest client. During the course of these years Jackson was overly offered a job at Homesafe but refused to take it up as there was a engagement of interest. One day, Holmes finds himself in a tricky situation when Jackson calls him and hints at his bleak cash situation and how a little more cash will help him. Jackson also subtly threatens Homes that Dawsons might start buying from Browns instead of Home safe. Although there is enough demand in the market and the security segment is growing Homes still has to think tolerate he can afford to lose the contract with Dwasons. Homes has to evaluate this situation carefully and weigh his ptions of how to deal with Jackson. PROBLEM STATEMENT Should Holmes help Jackson to find him a part time job? OPTIONS 1. Holmes hires Frank Jackson as a part time employee at Homesafe 2. Offer Jackson a part time consultant role in Advisory Services 3. Help Jackson find a part time job in an external unrelated business 4. not providing Jackson any assistance CRITERIA FOR EVALUATION 1. Holmes Ltd. s revenues 2. Holmes Ltd. s relationship with Dawsons Ltd. 3. Frank Jacksons conflict of interest 4. Legal implications EVALUATION OF OPTIONS George Holmes hires Frank Jackson as a part time employee for the position of a buyer IfGeorge Holmes hires Frank Jackson as an employee in his company then they might lose their partnership with the Dawsons Ltd. since ear lier on Thomas, Jacksons boss had not approved of Jackson working with a supplier. There would be a significant conflict of interest which might pose a legal problems for both Dwasons and capital of Mississippis too. Since major part of the revenues comes from there, the next years revenues would come down steeply. Their relationship with Dawson limited would also be strained hence we can rule this option out. Offer Jackson a part time consultant role in Advisory Services By choosing this option Holmesafe ould be able to mitigate direct legal implications and also the conflict of interest can be reduced. However this is also not ideal as Jackson still would be associated with Homesafe. From Homesafes point of view this arrangement will work because Jackson will get a job and their relationship with Dwasons will persist. Help Jackson find a part time job in an external unrelated business In this option there would be minimal conflict of interest and virtually no legal implications. T his will be a win-? win situation for both as Jackson will find an alternate stream of income and his relationship with Holmes will continue to be ordial. This way Homesafe will be able to continue their sales to Dwasons. Not provide assistance for his personal problem at all Choosing this option would result in a priority clash between Holmes & Jackson and hence would prune the revenues of Holmesafe in coming years as Jackson would convince his superiors to end contract with Holmesafe & hire Browns instead. The relationship between Jackson & Holmes would thus end on a bitter note, thus bringing an end to symbiotic relationship. We can rule this option out too. RECOMMENDATION We recommend that Holmes helps Jackson find a part time job in an external unrelated business. This ill benefit everyone involved and will be the most ethical select too. Holmes helped Jackson in the capacity of a friend. PLAN OF ACTION Holmes should explain Jackson how a Job at Homesafe would be counterprodu ctive for everyone and how he will help find him a job at an external business. Holmes by nature maintains good personal relationships with people around him. He would have significant personal contacts that he can leverage and recommend Jackson to them for a Job. Also he is joined by several of his friends at Homesafe that can also help Jackson find a job. Together they can find Jackson a job in their personal network only.

Friday, May 24, 2019

Chinese architecture

Ancient Chinese architecture is an important component of the world architectural system. Through the years it formed into a style that combine stone carving, rammed earth construction, bucket arch buildings and many other techniques. Chinese laboring people created many architectural miracles like the Great Wall, the Forbidden urban center and the mausoleum of the First Kin Emperor. The most significant characteristic Is the use of timber framework. Painting and carving were added to make the work more beautiful and attractive.The ancient buildings piss a long history that can be tracked back all the way to the Shank Dynasty. The houses are built in a in truth nice way with the roofs colored, windows with exquisite applique design and beautiful flower patterns. The layout of a courtyard is unique to China. The main structure is on the central bloc of a court while less important structures are to the left and right. Houses of China were similar, the way of laying out a house was similar among liberal and poor. Chinese people build one floor of a building everyday.Some examples of beautiful buildings are the Lieu Pagoda of Hangout, (it was build during the Song Dynasty) the Giant Wild twinge Pagoda, (it was build during the Tang Dynasty) the Hall of Supreme Harmony within the Palace museum, (it was built during the Mining Dynasty). The Coughing Garden in Ouzos, its one of the most finest gardens in China. Now the architecture in China became modern, there are still ancient architectural building and houses, but lots of buildings and houses have been taking plenty to put the new modern buildings.

Thursday, May 23, 2019

“300” Compare/Contrast Essay Essay

In this essay, I am going to study and personal credit line three significant events in the film of 300. First, I will discuss the events leading up to the historic battle at Thermopylae. Then, I will compare the plastic film version battles at Thermopylae with historical accounts. Finally, I will contrast events after Thermopylae between the motion picture and actual history.As I recall, when I saw the movie several months ago (its non available for reviewing again from Blockbuster until July 31, 2007), the most significant event before the abundant battle was the visit of the Persian diplomats to King Leonidas offering him and his family great wealth and position with no one getting killed in a needless war, if he would unaccompanied submit to Xerxes as ruler of a new Persian-Grecian Empire. When Leonidas and his outspoken wife asked them about the preservation of the Hellenic focusing of life, that is, freedom and democracy, the offer promptly turned into a threat, the t hreat of total destruction for Grecian culture and a life of slavery for any classical survivors. When the diplomats scolded the wife of Leonidas for interrupting their man-to-man utter with her criticisms, Leonidas became so furious that these strangers came into a kings home, insulted his queen, that he threw them down to their death in a large, very, very deep well.There is no historical account that this is the way it really happened. But I think is was probably a good guess by Hollywood how negotiations may have gone(p) except for the killings. I believe that was Hollywood overkill. It is historical fact that the Spartan woman was the most highly respected, independent woman in all the Greek city-states, but diplomats do not usually get murdered over verbal disagreements. After all, they precisely carry the message. They do not make policy. If these messengers take for grantedt come back alive, they wont be sent. They were a very important means of communication between a rmies in those days. In most cases, just the presence of the Persian million-man regular army scared the invaded city or country into surrendering or face certain defeat from so many soldiers.The underlying movie is about two opposing armies, the Persians against the Greeks (led by 300 Spartans), meeting at the pass at Thermopylae to determine whether Greece would survive as the only democracy on earth or be conquered by the great Persian Empire expanding into Europe. On the Persian side,their army had hundreds of thousands of soldiers ready to fight. On the Greek side, they only had approximately 1500 to defend the pass but, only when Leonidas knew for sure that he would be surrounded and that defeat was likely, he sent them all back to pencil eraser except for himself and 300 of his best Spartan warriors to defend the pass and slow down the Persian invasion while other Greek armies were be organized. I believe that this movie is quite accurate according to the historical events that took place during the time of 480 B.C. However, I think some events in the movie are not accurate such(prenominal) as all of those mystical-looking creatures that supposedly existed back then and used in times of war.This was bordering more on fantasy to make the movie more appealing to a younger audience instead of just those who follow history. The part of the movie which I think is accurate is Spartas army being very strong and disciplined. The Spartans had a good strong leader in Leonidas, constant combat training since they were children, and had superior weapons that were a part of them. The Persians, on the other hand, had many soldiers but there weapons and lack of armor were lighter because of the long distances the Persians had to travel to get to Greece.The movie showed the Spartans to have superior weaponry such as longer spears to resist charges, shorter swords for quick strokes during close-in combat to cut through Persian wicker-type shields, larger metal shield s to deflect sword and arrow attacks. This is very accurate, historically. The movie also showed the Spartans to be very muscular and in top physical shape. Again, this is true because the Spartan child (if he was not abandoned in the hillside for being physically defective at birth) would be taken from his home at the age of seven to lead a very hard, military lifestyle until he was tweny-one years old, at which time he would go into the army as a fully trained soldier ready to do battle for the idealisation of Sparta.I think the movie was pretty much basically over after the battle of Thermopylae was done but, historically, this battle, even though it was a loss, was only the beginning of the Greek victory over Persia. Once word got back to other Greek city-states, it so inspired them to unite as one Greek nation to defend their freedom and culture as the Spartans had defended it, to the death. The Athenian navy finished off the Persian navy at the of Salamis and destroyed the on ly way the Persians could have supplied their army if Persia was to hold conquered territory.Sourceshttp//en.wikipedia.org/wiki/300_the_movie300 The movie, by Warner Bros.