Baker Assignment 1 Part 2 Spring 2022
docx
keyboard_arrow_up
School
RMU *
*We aren’t endorsed by this school
Course
3212
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
54
Uploaded by SuperHumanRookPerson1476
ASSIGNMENT 1 PART 2 –
THEORY
SPRING 2022
J. Packy Laverty
laverty@rmu.edu
To better Access and Search the content of this assignment, turn on the Word
Navigation Pane (Windows - Click on View and Check Navigation; MAC – Click on View
and Select Document Map). Students will find that using the document FIND tool or
searching GOOGLE may also be valuable for researching the review question answer.
P a g e
2 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Enter your Name Here
è
Nicholas Baker
Assignment 1 Recommended Due Date is September 26th
While you will not be penalized for being a little late, you will not finish your assignments before the
end of the semester.
If you submit your assignment to Blackboard after Sunday, October 10th
(two weeks late), your assignment grade will be penalized by 20%
NO MATTER WHAT THE
EXCUSE MAY BE.
After October 10th your assignment will penalize by an additional 20% for each
additional week the assignment is submitted late.
Assignment 1 Introduction Part 2
Researching Your Answers
Most requirements of this assignment will require you to research answers from your text book (
you
must read the text book to get some answers
), from the Internet, from a video or any other
reasonable source. Many Internet sources, video links, text book and Blackboard presentations are
provided in this document to help you START your research.
Assignments are always a great place to read and reference your text book. May students assume
that they should start by reading the text book. While this reading the text book is ALWAYS at great
idea, the following assignment questions may help you focus on what is important in this course
. One
strategy is to review an assignment question for important keywords, e.g., multitasking,
Procedure Division, virtualization, etc.
Then look for those key words in either 1) your text
book "detailed" table of contents in the beginning of the book, or 2) in the index at the end of
the book. Some text books have key word glossaries at the end of the chapter or end of the
book. ref 6-6
Every semester the Internet sources, e.g., a Google keyword search, or Internet video, e.g., a
YouTube keyword search may be improved. Better students start with research sources provided in
this assignment, and then search for improved or updated answers.
While your objective may be to
demonstrate your knowledge to EARN an excellent grade on this assignment, better students
are always looking towards the future to impress internship and career recruiters for those
interesting and high entry-level salaries.
Employers don't pay you for a grade in any single class or
assignment.
Employers will pay you BIG MONEY for demonstrated knowledge or skills. Hopefully,
this assignment will prepare you.
A single research source maybe very incomplete or the format or the content may not be appropriate
for some required answers. Some students do not READ the text book or review the Blackboard
presentations provided to you in Blackboard.
Some answers are only available from Blackboard
presentations or update documents. When assignment requirements may be only answered by
viewing a YouTube video, you will be notified.
You may cut-and-paste answers whenever appropriate. You MUST synthesize your answers to
include multiple sources. I would be impressed that you consult a Google image search and paste
and appropriate
image to supplement your answer.
P a g e
3 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
While I permit cut-and-paste, I do expect you use your own words so that you:
1. Organize the answer
2. Demonstrate that you have read what you have cut-and-pasted
3. Use any means that clearly displays that you have gained knowledge.
Enter your Name Here
è
Nicholas Baker
4.0 - Binary Representation and Character Encoding
Review Data Representation Codes and Data Types Document
4.1 Binary Representation (Storage) of Numeric Data
Electronically, a digital computer is only capable of storing, understanding and processing information
as combination of bits. A bit is conceptually similar to a simple light switch. Either the switch is on or it
is off.
Early computer hardware used a variety of different electronic technologies to store a bit.
The
following are some early pictures of storing bit from Pingdom
(
http://royal.pingdom.com/2008/04/08/the-history-of-computer-data-storage-in-pictures/
) and Timeline
of Computer History
http://www.computerhistory.org/timeline/memory-storage/
The 1024-bit Selectron.
The Magnetic Drum
Can you imagine the size of your laptop if we would store a bit using these 1940s and 50s
technologies?
It doesn't matter which electronic storage method is used, a bit is any device that is capable of having
two states. It is either ON or OFF. Most modern computers have electronic components that in theory
works like a light switch it is either ON or OFF. To make life easier, the number 1 is used to represent
ON or True. The number 0 is used to represent the OFF or false.
Binary electronics are reliable and inexpensive to build. Since all digital computer operations are
based on two numeric states. All hardware computer functions are built on a combination of bits or
multiples of twos, i.e., 2, 4, 8, 16, 32, 64, 128, 258, 512 and 1024.
A combination of bits may be
called byte or word.
What is more important to remember is that a Binary Representation Code must
be used by a computer to understand the meaning of those combination of bits. ASCII and ECBDIC
are two examples of binary codes.
P a g e
4 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
While electrical engineers may get excited about the basic bit (or one light switch), a bit does little to
help an average person store or manipulate human data and information inside a computer. A bit can
only represent two states. Symbolically, the ON state can represent a "Passing Grade" and the OFF
state can represent a "Failing Grade"
Paul Revere was his famous for warning that the British were coming used a binary digit, or two
simple values. "One by Land and Two by Sea". As history reports this data representation system was
quite adequate. But, what if the British want to stop at Heinz Field during a Pittsburgh Steeler's game
to eat a Parmenitti Bros Sandwich before the attack? There was no third state that could represent
this change in the battle plan. (A little bit of humor - a real little bit. What can you expect from a Steeler
fan?)
4.2 Questions - Binary Representation (Storage) of Numeric Data
Review Data Representation Codes and Data Types Document
Video - Lesson 1: Bits and Byte
https://www.youtube.com/watch?v=UmSelKbP4sc&list=PLAPTMtRxw27aMpAaIH1ZZU6U1GwkXAJC-
&index=2
Video - Lesson 2: Memory Addresses
https://www.youtube.com/watch?v=yF_txERujps&index=3&list=PLAPTMtRxw27aMpAaIH1ZZU6U1GwkXAJC-
Video - Lesson 3: Integer Types in Memory
https://www.youtube.com/watch?v=TCJ93TZS1xg&index=4&list=PLAPTMtRxw27aMpAaIH1ZZU6U1GwkXAJC-
P a g e
5 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
4.2.1 Windows Programmer Calculator
Video - Programming calculator in windows
https://www.youtube.com/watch?v=95FSD0z74GI
There are many calculators available to convert decimal digits (the digits we use every day) to easily convert
decimal digits to binary, or binary to decimal digits. You may also easily convert decimal or binary data to
hexadecimal codes, or hexadecimal codes to decimal or binary. The importance of hexadecimal codes will be
discussed later.
1. When you first start Windows Calculator, it defaults to a simple calculator. Click on the View drop-down menu
and select the "Programmer" Calculator mode.
The Programmer Calculator will appear as the following
2. Ensure that the Dec and Qword options are selected. Enter the decimal number 1024, which is the number of
bytes in a kilobyte.
P a g e
6 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
2. To convert decimal 1024 to binary, select the Bin option. Decimal 1024 is stored as 10000000000 in binary.
To convert 10000000000 represented in binary to decimal, simply select the Bin option.
You can easily convert Binary or Decimal representation to Hexadecimal or Octal, by also selecting the target
data representation method.
4.2.2 Qword, Dword, Word, or Byte
The Programmer calculator provides options Qword, Dword, Word, or Byte.
These options specify the number
of binary bits can be stored in the binary representation code. The more bits, the larger the number may be
process or the size of a processor register.
For example,
Qword uses 64-bits and can store and process a number up to 16 Exabytes
Dword uses 32-bits and can store and process a number up to 4 Gigabytes
Word uses 16-bits and can store and process a number up to 1 Kilobyte
Byte uses 8 bits and can store and process a number up to 256.
4.2.3 Precision and Accuracy
Precision describes the number of bit used to express a numerical value.
Therefore, 64-bit codes will have
more precision than 32-bit codes.
Accuracy describes how correct an answer is. Since a computer stores number in binary, it cannot represent all
of the numbers that a human mind can process accurately. While the greater number of bits (precision) of a
binary code, e.g., 128-bit and 256-bit processors, will increase accuracy by minimize digital rounding errors, only
a human can eliminate these errors.
4.2.4 The Movie Hidden Figures
You are encouraged to watch the non-fiction movie titled Hidden Figures. Hidden Figures tells the incredible
untold story of Katherine Jonson (Taraji P. Henson), Dorothy Vaughan (Octavia Spencer) and Mary Jackson
(Janelle Monae), three brilliant African-American women working at NASA who served as the brains behind the
launch into orbit of astronaut John Glenn, a stunning achievement that turned around the Space Race.
P a g e
7 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
At the start of the movie Kevin Costner and Jim Parsons (of Big Bang Theory) were NASA mathematicians
responsible for manually calculating the complex and accurate equations, which pioneered space flight.
However, manual calculations were so tedious and slow. Dorothy Vaughan applied first IBM 7090 mainframe
and FORTRAN to calculate landing coordinates for the first orbit space mission for Friendship 7.
The
challenges to prove the accuracy of the new mainframe equations and calculation to manual equations was a
very dramatic life and death moment for Astronaut John Glenn. While these early computer and mathematical
professional pioneered space flight, the challenges that face future Computer Precision and Accuracy
applications will continue as we travel deeper in space, build more complex building structures, or scientifically
analyze medical research data.
1. A Binary Number has two states 1 and 0. Why were multiple digit binary codes, e.g., 8-bit, 16-bit, 32 and 64-
bit codes, created to handle some of the limitations associated with simple binary numbers? Your answer is
Each one was created to deal with more complicated symbols such as 32bit being able to use more english
letters and 64bit being able to use chinese characters.
.
2. Integer, Floating Point, and Fixed Point are alternative binary representation methods to store numeric values
and process mathematical operations on the content. What are the "practical" differences between the use of
Integer and Floating-Point codes? Your answer is
Floating-point code will greatly increase the range of any number that you can store. However, using floating-
point code when it is not needed will increase the processing time to accommodate the floating-point
calculations. Also the practical difference between integer and floating-Point codes are that floating point can
represent much larger numbers in binary then what can be represented by an integer. It is much easier to read
converted floating-point codes while integers are much narrower to represent.
3. DEFINE and EXPLAIN the differences between accuracy and precision when using a floating pointy numeric
code? Your answer is
Bigger codes such as 64 bit will be more precise than 16bit and since binary cannot use numbers other than 0
and 1 there is less accuracy when binary is trying to represent them.
.
4. Using the movie of Hidden Figures explain the difference between quality and speed of Human accuracy and
precision and computer accuracy precision both in the past and in the future. Your answer is
In the past computers were still being developed and were not as accurate as they are today. Therefore, in that
time humans were the computers of choice. However, now a computer can be much faster and more accurate
than a human can.
.
5. If 64-bit floating point or integer codes have greater precision than 16-bit floating point or integer codes, what
are the practical advantages and disadvantages of having greater storage precision? Your answer is
The advantages of having greater storage precision are that more information can be stored in one spot more
precisely. The disadvantage is that 64bit code is greater in bit size is that it will increase the processing
overhead and processing time.
.
6. Covert the decimal number 56092 into binary. Your answer is
1101101100011100
.
P a g e
8 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
7. Covert the binary number 10010010 into decimal. Your answer is
146
.
8. If you using the Windows Programmer calculator in the binary mode, explain the reason why you cannot ent
the number 4 into calculator. Your answer is
Binary can only use 0 and 1 so the number 4 and any other numbers besides 0 and 1 cannot be entered.
.
Review Data Representation Codes and Data Types Document
9. Floating points are stored using the following concepts. Describe each using the following as an example
using the number +32.546
Concept
Purpose and value to be stored
Sign of the Exponent
0
Exponent
10000100
Sign of the Mantissa
0
Mantissa
0000100010111100011011
10. Floating points are stored using the following concepts. Describe each using the following as an example
using the number -0000546
Concept
Purpose and value to be stored
Sign of the Exponent
1
Exponent
10001000
Sign of the Mantissa
0
Mantissa
0010001000000000000000
11. Describe the concept of a Radix Point in relationship to numeric data codes? Your answer is
It separates the exponent from the mantissa and depending on the radix point set bit it determines the
preciseness of the number.
.
12. What is the relationship between IEEE 754 and 854 in relationship to numeric binary codes. Your answer is
They both describe the general format of 32bit and 64bit floating point numbers.
.
P a g e
9 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4.3 Question – 1/3 * 3
Review Data Representation Codes and Data Types Document
1. When numeric data is stored using either the fixed or floating-point code what is the ANSWER of "1 divided 3
times 3, or (1/3 * 3)? Explain your answer. (Hint: review the Data Representation Power Point in Blackboard).
Your answer is
.99999999 because a processor can only process two operands at one time. 1 divided by 3 is .3333333333
stored as a primitive floating-point answer and 3 times ..333333333 is .99999999 not 1.
4.4 Questions - Binary Representation (Storage) of Character Data
Review Data Representation Codes and Data Types Document -
1.4 Character Primitive Data types
Text Link - ASCII
http://en.wikipedia.org/wiki/Ascii
Text Link - Unicode
http://en.wikipedia.org/wiki/Unicode
Text Link – EBCDIC
https://en.wikipedia.org/wiki/EBCDIC
Text link - ASCII Number Values and Binary
http://www.roubaixinteractive.com/PlayGround/Binary_Conversion/The_Characters.asp
1. Explain the function, strengths and weaknesses of the following character codes 7-bit ASCII, 8-bit ASCII, and
16-bit Unicode.
(Hint: many great answers to this question in the Binary Representation Presentation)
Character Code s
Functions, Strengths and Weaknesses
7-bit ASCII
(American Standard
Code for Information
Interchange)
Uppercase and lowercase letters, special characters,
but no special
formatting characters. Used by SMTP, POP3, IMAP4. 128 combinations.
8-Bit Extended ASCII
(ANSI) Code
Uppercase and lowercase letters, special characters, and special formatting
characters. 8bit ANSCI is used by most non IBM legacy applications and
operating systems. Both have 256 combinations.
8-Bit EBCDIC
(Extended Binary
Coded Decimal
Interchange Code)
Uppercase and lowercase letters, special characters, and special formatting
characters. 8bit EBCDIC is used by most IBM mainframes while 8bit ANSCI is
used by most non IBM legacy applications and operating systems. Both have
256 combinations.
UTF-8
Uppercase and lowercase letters, special characters, and special formatting
characters.
16-bit Unicode
65,536 combinations. Includes ASCII codes in English represent international
character sets. Default character code for Microsoft Office and Windows.
P a g e
10 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
4.4.1 Comparing ASCII, EBCDIC, HEX and Binary
Use the following link
ASCII or EBCDIC Translation Tables
http://www.simotime.com/asc2ebc1.htm
Each ASCII or EBCDIC capital-case letter, lower-case letter, digit, space or special character is stored as a with
arbitrary integer number. In the Simotime table the DECimal column displays each character's arbitrary number.
For example, digit "0" is stored as the decimal number 48. Remember, all stored characters, whether or not it
appears stored number can be mathematically processed.
The digit "0" is represented by ASCII number 48.
The upper-case Letter "A" is represented by ASCII number 65.
The lower-case letter "a" is represented by ASCII number 97.
The following table displays the character string "Go Steelers 2019 "
Line 1 displays the arbitrary ASCII character's decimal value from the Simotime table. This ASCII
character number, converted to binary, is what the CPU and the programming language executes.
Line 2 displays the arbitrary EBCDIC character's decimal value from the Simotime table. This EBCDIC
number, converted to binary, is what the CPU and the programming language executes.
Line 3 displays the hexadecimal value for the character encoded in ASCII.
The Hex values will be
different for EBCDIC.)
Programming languages or the CPU does not understand hexadecimal values.
Hexadecimal values is widely used to provide a more user-friendly way to display binary numbers,
which is executed by the CPU.
Text->
G
o
S
t
e
e
l
e
r
s
!
2
0
1
8
1
ASCII
71
11
1
32
53
11
6
10
1
10
1
10
8
10
1
11
11
5
33
32
50
48
49
56
2
EBCDI
C
19
9
15
0
64
22
6
16
2
13
3
13
3
14
7
13
3
15
3
16
2
90
64
24
2
24
0
24
1
24
8
3
HEX of
ASCII
47
6F
20
53
74
65
65
6C
65
72
73
21
20
32
30
31
38
4
Binary
of
ASCII
0100
0111
0110
1111
001
0
000
0
0101
0011
0111
0100
0110
0101
0110
0101
0110
1100
0110
0101
0111
0010
0111
0011
001
0
000
1
001
0
000
0
0011
0010
0011
0000
0011
0001
0011
1000
Line 4 displays the binary character encoded in ASCII using 8 binary bits. Review the column with the character
"8". This is not a numeric number 8.
The 8-bit integer binary number 8 is
0000 1000
.
But the character "8" is
0011 1000
Why? Because ASCII stored the binary number 58, which is binary is
0011 1000
Notice the importance of hexadecimal as being the shorter user-friendly version of binary. Again review the
column with the character "8".
The Hex value would be 38, but the longer 8-bit integer code would be
0011
1000
P a g e
11 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
4.4.2 Questions - Comparing ASCII, EBCDIC, HEX and Binary
Enter your Last name in the top row, starting with a capital-case letter, followed by lower-case letters. Follow
your last name by a space, and then by any three-digit number.
For example the following table should display something similar to "Laverty 498"
1.
Convert the Last Name Line to an ASCII character's decimal value in Line 1 from the Simotime
table, or any other source.
2.
Convert the Last Name Line to an EBCDIC character's decimal value in Line 2 from the Simotime
table, or any other source.
3.
Convert the Last Name Line to a hexadecimal value for the character encoded in ASCII in Line 3
from the Simotime table, or any other source.
4.
Convert the Last Name Line to a 8 bit binary value for the character encoded in ASCII in Line 4
from the Simotime table, or any other source.
Last
Name
B
a
k
e
r
1
2
3
1
ASCII
66
97
10
7
10
1
11
49
50
51
2
EBCDIC
194
129
14
6
13
3
153
241
242
243
3
HEX of
ASCII
42
61
6B
65
72
31
32
33
4
Binary
of ASCII
0100
0010
0110
0001
0110
1011
0110
0101
0111
0010
0011
0001
0011
0010
0011
0011
4.5 Questions - Character Encoding and Character Sets
Review Data Representation Codes and Data Types Document
Video - Characters in a computer - ASCII Tutorial
https://www.youtube.com/watch?v=B1Sf1IhA0j4&list=PLRPSM55Zp3QMWFnyrAR4Loy9w3a9lHWm2
Video - Characters in a computer - Unicode Tutorial (UTF-32 & UTF-16)
https://www.youtube.com/watch?v=-oYfv794R9s&list=PLRPSM55Zp3QMWFnyrAR4Loy9w3a9lHWm2&index=2
Video - Characters in a computer - Unicode Tutorial UTF-8
https://www.youtube.com/watch?v=vLBtrd9Ar28&list=PLRPSM55Zp3QMWFnyrAR4Loy9w3a9lHWm2&index=3
P a g e
12 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
1. What is the function of
Character Encoding
in relationship to the storage of numeric and alphanumeric data
in the system memory, a program, a data file or a database? Your answer is
Character encoding shows the way a coded character set is mapped into bytes to be used by the computer.
Character encoding determines the combination of bits that are stored and processed.
2.
What is the function of
Character Set
in relationship to the storage of numeric and alphanumeric data in the
system memory, a program, a data file or a database?
Your answer is
Character sets determine the visual representation of character displayed on a web page. To display an HTML
page correctly, a web browser must know the character set used in the page. Character sets are also collections
of characters that might be used by multiple languages.
3. Given the Java statements int hours; double pay, rate. Explain whether these Java statements are related to
Character Encoding or Character Sets. Your answer is
These java statements are related because in java “int” tells java to store the number as an integer value and
“double” tells it to store it as a decimal/float value. Java is encoding the way the values are stored similar to how
characters are encoded and stored.
4. Given the following standards: UTF-8, UTF-16, ISO-8859-1, ISO-8859-6, Latin, Extended Latin.
Explain
whether these Java statements are related to Character Encoding or Character Sets. Your answer is
These are related because they are standards that can be represented through character encoding and
character sets.
Collating sequence
https://www.ibm.com/support/knowledgecenter/ssw_ibm_i_61/db2/rbafzsortsequence.htm
Collating Sequence - The EBCDIC & ASCII Environments
http://www.simotime.com/cblclt01.htm
P a g e
13 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
4.6 ASCII and EBCDIC Translation Tables and Collating Sequence
Review Data Representation Codes and Data Types Document
ASCII or EBCDIC Translation Tables
http://www.simotime.com/asc2ebc1.htm
Use the
ASCII or EBCDIC Translation Tables. Under the ASCII column search to the listed character in
the following table, and then provide the decimal value.
Under the EBDIC column search to the listed
character in the following table, and then provide the decimal value.
Be careful to distinguish between
upper and lower case letters, numbers, and spaces. Complete the following table
ASCII Character
ASCII Decimal Value
EBCDIC Character
EBCDIC Decimal Value
A
65
A
193
a
97
A
129
Space
Space
1
1
3
3
Z
z
ASCII and EBCDIC characters are actually stored as binary values, either 7or bits. To better understand the
storage of ASCII or EBCDIC, one should review the decimal value or decimal number. While the letter "A" is
stored as a number, the processor or operating system does not treat the value as a number that may be added,
subtracted, or any other math operation.
Programming languages and databases store numeric and character data as string, integer, and floating point
data types.
Programming languages specify data type rules such as "You cannot perform a mathematical
operation on strings, such as adding the letter "A" to the letter "T", i.e.., "A" + "T". While both ASCII and ECBDIC
do stores characters as numbers behind the scenes, these character storage numbers are arbitrary and have no
mathematical significance. Other programming language data type rules would be that it would illogical to
perform math on a character "1", "2", or "3", or to compare ASCII or ECBDIC strings to numeric codes.
However, the following questions will ask you to consider another set of data type rules called "collating
sequence" which will affect how character codes are compared or sorted.
4.7 Questions - ASCII and EBCDIC Collating Sequences
1. Explain the concept of the Collating Sequence.
Your answer is
A collating sequence defines how characters in a character set relate to each other when they are compared
and ordered.
2. Many systems can store character data in a data file or database as either ASCII, ANSI, ECBDIC, or
UNICODE. Why is it important to specify character encoding scheme in relationship to the concept of the
Collating Sequence?
Your answer is
It allows the processes that are done on the data to be easier and more organized. It allows for rational
comparisons and sorting.
3. Using the previous link for a table of ASCII decimal values, why won't the capital letter "A" be equal to a
lower-case letter "a", i.e. IF "A" = "a" …. Your answer is
If the lower case letters and capital letters had the same value the computer would not be able to distinguish
between a lower case letter and a capital letter.
4. Using the previous link for a table of ASCII decimal values, if you compare the capital letter "A" to the
character numeric digit "1", which will be greater, i.e.,
IF "A" > "1"
Your answer is
P a g e
14 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
The capital A would be greater than the number 1 because in the ASCII collating sequence lower case
letters>upper case letters>digits>space.
5. Using the previous link for a table of ASCII decimal values, a summary of the "ASCII collating (sorting)
sequence" is sorted from lowest decimal value to highest decimal value "space < numeric digits < capital letters
< lower case letters". Using the previous link for a table of ECBDIC decimal values, provide a summary of the
"ECBDIC collating (sorting) sequence" for a space, numeric digits, capital letters, and lower case letters. Your
answer is
Digits>upper case letters> lower case letters>space
4.8 Questions - MIME Protocol
Review Data Representation Codes and Data Types Document Representation
1. Where is function of the MIME protocol in terms or Internet Email, Web Pages and XML?
Your answer is
MIME is an internet standard that extends the format of email to support text in character sets other than ASCII,
non-text attachments, message bodies with multiple parts, header information in non-ASCII character sets.
2. Where is function of a MIME type or content type in terms or Internet Email, Web Pages and XML?
Your
answer is
MIME is a type of standardized way to indicate the format and nature of a document.
Text link - Octal
http://en.wikipedia.org/wiki/Octal
Text Link- Which is better UTF-8 or ISO-?
http://blog.wordtothewise.com/2010/03/which-is-better-utf-8-or-iso/
Text link - Understanding text encoding in Word
http://office.microsoft.com/en-us/outlook-help/choose-text-encoding-when-you-open-and-save-files-
HA010121249.aspx
Text link- Hexadecimal
http://en.wikipedia.org/wiki/Hexadecimal
3. What is the purpose and uses of Octal and Hexadecimal Binary Codes? (Hint: they are not used to store data
in a binary format.) Your answer is
Octal and hex are used primarily to communicate to humans the state of individual bits in a computer system.
They help put the human language in a form a computer can understand. They are a numeral system that have
different bases for numbers as well.
P a g e
15 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4.9 Questions - Hexadecimal Notation
Review Data Representation Codes and Data Types Document Representation
See 1.5 Hexadecimal Notation
Text link- Why are memory addresses are represented using hexadecimal numbers?
https://stackoverflow.com/questions/5329916/why-are-memory-addresses-are-represented-using-hexadecimal-
numbers
Text Link- Colors on web pages
http://www.linfo.org/hexadecimal.html
Text link - CDMA Hardware Identifiers - ESN, MEID, pESN
https://sites.google.com/site/bbayles/index/cdma_hardware_id
Text Link- Working with Binary and Hexadecimal Numbers
https://www.lifewire.com/working-with-binary-and-hexadecimal-numbers-816247
Video - Hexadecimal Math – CompTIA Network+ N10-006 – 5.2
https://www.professormesser.com/network-plus/n10-006/hexadecimal-math/
1. Explain the most important reason why computer professional use hexadecimal notation instead of binary.
Answer
è
The most important reason computer professionals use hex notation instead of binary is because it is much
easier to represent binary numbers in hex notation than it is in any other binary coding system.
2. List several programming languages or operation systems that use binary, floating-point , ASCII, EBCDIC or
Unicode to store and process data. Answer
è
IBM mainframe, IBM, Apple IOS, Mac OS
3. List several programming languages or operation systems that use hexadecimal to store and process data.
Answer
è
No Computer or Programming Language uses, stores or processes directly using
hexadecimal codes.
4. Use the phone number 412-322-5225. Use the Windows Programmer Calculator or any other decimal-to-
binary convertor to convert this telephone number to binary. List the original telephone number and the binary
conversion.
Answer
è
412-322-5224
1111 0101 1100 0011 0110 1100 1000 1000
5.
Use the Windows Programmer Calculator or any other binary-to-hex convertor to convert this previous binary
number to hex. List hexadecimal number.
Answer
è
0xF5C36C88
6. You see the following value 0xF96C. What does the prefix 0x indicate? Answer
è
This prefix says that the number is being written in hex.
P a g e
16 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
7. Hexadecimal values include 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F. Why does Hexadecimal use the
values of A, B, C, D, E, and F? Answer
è
Since hexadecimal is a 16 base numeral system it uses these letters to take the code up to15.
8. How many binary digits does a single Hexadecimal value represent? Answer
è
4 binary digits
9. What decimal value does Hexadecimal value of A represent? Answer
è
10
10. What binary digits does Hexadecimal value of A represent? Answer
è
1010
Text Link - ASCII or EBCDIC Translation Tables
http://www.simotime.com/asc2ebc1.htm
Don't get hexadecimal values of A, B, C, D, E, and F confused with characters "A", "B", "C", "D", "E", and "F".
They represent two different things.
Hexadecimal is a base 16 number system that is used to simplify the
understanding of long binary numbers.
Binary digits are used to store integers, floating point, and characters.
For example, 0xF, or hexadecimal value F represents the four binary digits, i.e., 1111, not the character "F"
To represent the character "F" in hexadecimal requires two hexadecimal values, or 0x46, since ASCII is stored
in eight binary digits i.e., 0100 0110.
11. How many does hexadecimal values are used to represent the ASCII character capital letter "P" represent?
Answer
è
Two values in the conversion to hexadecimal is 50.
12. List the hexadecimal values that are used to represent the ASCII character capital letter "P" represent?
Answer
è
50
13. List the hexadecimal values that are used to represent the EBCDIC character capital letter "P" represent?
Answer
è
D7
14. Convert the following decimal number
16480
to hexadecimal.
Answer
è
4060
P a g e
17 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
15. Convert the following binary numbers
0001 0110 1111 1111 1001 0110 0100 0101 1011
to hexadecimal.
Answer
è
16FF9645N
16. What is wrong with the following hexadecimal value, i.e.,
0x16FF9641GH
.
Answer
è
Hexadecimal does not use the character “G”.
17. What is wrong with the following binary values, i.e.,
2001 0111 1111 1111
Answer
è
Binary cannot use the number 2 and is limited to only 0 and 1.
18. Not all ASCII or EBCDIC characters stored in a text document or program source code may be visible in to
the human eye. Explain how the process how hexadecimal characters may be used to find illegal ASCII or
EBCDIC characters stored in in a text document or program source code. (See 1.5.5)
Answer
è
Some ECBDIC values become so complex where some values were not even displayed so hexadecimal was
used to see something even if the characters were not displayed.
You are provided with the following EBCDIC and hexadecimal display of a customer data file. Answer the
following questions.
19. On line 1 spaces are visible (displayed)
between columns 29 and 38
, or between Washington and George.
Not all ASCII or EBCDIC characters stored in a data file may be visible to the human eye. Explain the process of
hexadecimal values may be used to prove that spaces displayed between columns 29 and 38, or between
Washington and George are valid spaces.
(See 1.5.6 for answer.)
Answer
è
EBCDIC hex values start with F, it is displayed as a numeric digit but it not stored as an integer or floating point
that you perform math. But the HEX ON command must be used first.
20. On line 1 spaces are also visible (displayed) between
columns 9 and 16.
Explain the process how
hexadecimal values may be used to prove that spaces displayed between columns 9 and 16 represent different
data besides spaces. What type of data is actually stored between columns 9 and 16, even though spaces are
displayed? (See 1.5.6 or answer.)
Answer
è
When a programmer views crazy displayed characters in a text editor, the odds are that the columns contain
numeric integer or floating-point data representation codes, which you can be used with math operations. These
columns store the account balance and credit limit. Logical candidate for a numeric integer or floating-point
representation code or data type.
P a g e
18 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
21. On line 1 numbers are visible (displayed) between
columns 1 and 8.
Explain the process how hexadecimal
values may be used to prove that the numbers displayed between columns 1 and 8 represent EBCDIC
characters and not integer or floating-point data and cannot be used for math operations.
(See 1.5.6)
Answer
è
The character that is displayed first is stored as F1 and the second character that is displayed is stored as F7.
Text link- Why are memory addresses are represented using hexadecimal numbers?
https://stackoverflow.com/questions/5329916/why-are-memory-addresses-are-represented-using-hexadecimal-
numbers
Text Link- Colors on web pages
http://www.linfo.org/hexadecimal.html
Text link - CDMA Hardware Identifiers - ESN, MEID, pESN
https://sites.google.com/site/bbayles/index/cdma_hardware_id
Text Link- Working with Binary and Hexadecimal Numbers
https://www.lifewire.com/working-with-binary-and-hexadecimal-numbers-816247
Video - Hexadecimal Math – CompTIA Network+ N10-006 – 5.2
https://www.professormesser.com/network-plus/n10-006/hexadecimal-math/
22. List several examples how hexadecimal values may be used to simplify binary codes in operating system,
hardware devices, and networking.
(See 1.5.7 for answer.)
Answer
è
Hex:
binary:
F42000
1111 0100 0010 0000 0000 0000
F540
1111 0101 0100 0000
The hexadecimal values are much more compact when compared to binary values that represent the same
data.
P a g e
19 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
5.0 Program Languages, Variables and Data Types
5.1 Questions - Computer Variables and Data Types
Review Data Representation Codes and Data Types Document Representation
1. All program languages support the storage concept of a variable name to store data to be processed. Provide
a practical description of the role of computer variable name. (See 2.2.1 for answer.)
Answer
è
The variable name typically describes the data that it represents and stores. There are variable names that are
not allowed to be used such as “print” which is a reserve word that is the display operation of the python
programming language.
2. Most program languages use the assignment statement or HOURS= 40. In simply terms what function of the
equal sign in an assignment statement (See 2.2.3 for answer.)
Answer
è
It tells the programming language to store that value under the assigned representation/variable name.
3. Program languages assign a data type to a variable name. Why are data types assigned to program variable
names?
Answer
è
Data types are assigned to represent the type of data that is stored and define the limits of the operations that
can be performed with that data. Ex. Word values or strings cannot be divided or multiplied the same way
integers or float values can be.
4. Compare the differences between the Context method and the Declaration Method. Answer
è
Context method is when a program automatically assigns a data type based on the contents to the right of the
equal sign. The Declaration method is used to create variables and assign data types to the contents
immediately.
6. Compare the differences between the Option Explicit and Strongly -type variables. Answer
è
Option Explicit states that a carriable must be assigned before use and it also strongly enforces the data type
rules for content.
When illegal character data is converted to a numeric binary code the contents are changed to
zero. In Option Strongly the options cannot be turned off like they can be in option explicit.
P a g e
20 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
5.2 Questions - How does EXCEL automatically Stores Data using Binary Codes
Review Data Representation Codes and Data Types Document Representation
1. Excel cell B4 is similar to which program language concept. (See 2.5 for answer.)
Answer
è
An Excel cell is very similar to the concept of a variable name where data is stored under a specific
address/name.
2. Explain the process how EXCEL automatically assigns datatypes and data representation codes. (See 2.5 for
answer.)
Answer
è
Excel does not use the term data types because it describes data types as Formatting and the Excel formatting
is a combination of data types and visual display of data.
3.
When data is stored in an Excel, Excel automatically selects the best binary code used to store your Excel
label or numeric value.
List the appropriate Data Type that BEST matches the sample data for the data you
type into an Excel cell, e.g., 7-bit ASCII, 8-bit ASCII, and Unicode, Floating point, Fixed-point, Octal or
Hexadecimal.
(Hint: review the Data Representation Power Point in Blackboard). DO NOT TRANSLATE YOUR
ANSWER TO BINARY.
Applying Binary Representation Codes used by Excel
Type of data
Binary representation codes used to store this data by Excel
When you type test words
(labels), e.g.,
"Go Steelers" into
an Excel Cell
String Unicode
When you type value 16 into an
Excel Cell
Integer data type
When you type value
$5.18 into
an Excel Cell
Floating point
P a g e
21 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
5.3 Questions - Oracle Data Types
Video - Oracle - Intro to Data Types
https://www.youtube.com/watch?v=SCDBqfG3Ay8
Text link - Oracle Built-in Datatypes
http://docs.oracle.com/cd/B19306_01/server.102/b14200/sql_elements001.htm#i54330
Text Link- Oracle Datatypes
http://ss64.com/ora/syntax-datatypes.html
1. When is an Oracle data type assigned to a table column?
Answer
è
When a procedure or instruction is created and a data type for each argument must be specified.
2. When data is stored in an Oracle table column this data is stored as a binary code. Oracle applies binary
code by declaring a column as a "Data Type".
List the appropriate Oracle Data Type that BEST matches the
binary code, e.g., 7-bit ASCII, 8-bit ASCII, Unicode, Floating point, Fixed-point, Octal or Hexadecimal.
There may be more one Oracle data type that matches a category of binary code because of precision,
e.g., an 8-bit integer, 16-bit integer, 32-bit integer, or 64- bit integer.
Not all binary code categories may
be supported by Oracle.
(Hint: review the Data Representation Power Point in Blackboard
Oracle Data Types used to Implement Numeric and Character Binary Codes
Binary Code
Oracle Data Types
Integers
NUMBER
Fixed Floating Point
BINARY FLOAT
Floating Point
BINARY_FLOAT
7-bit ASCII
CHAR
8-bit ASCII
CHAR
Unicode
NCHAR
Hexadecimal
NVARCHAR2
P a g e
22 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
5.4 Questions - Java Data Types
Video - Java - Basic Data Types
https://www.youtube.com/watch?v=0MFC_Vw9NxY
Text Link - Primitive Data Types
https://docs.oracle.com/javase/tutorial/java/nutsandbolts/datatypes.html
Text Link - Java Data Types: Understanding the 8 Primitive Data Types in Java-
https://blog.udemy.com/java-data-types/
Text Link - Java String is Special
https://www.ntu.edu.sg/home/ehchua/programming/java/J3d_String.html
Text Link - Java - Strings Class
http://www.tutorialspoint.com/java/java_strings.htm
1. When is a Java data type assigned to a Java Variable or object? Answer
è
When a variable or object is created or initialized. The initializing statement for a integer would look like:
int number = 2;
2. When data is stored in a Java variable this data is stored as a binary code. Java applies an appropriate binary
code by declaring a variable as a "Data Type".
List the appropriate Java Data Type that BEST matches the
binary code, e.g., 7-bit ASCII, 8-bit ASCII, and Unicode, Floating point, Fixed-point, Octal or
Hexadecimal.
There may be more one Java data type that matches a category of binary code because of precision,
e.g., an 8-bit integer, 16-bit integer, 32-bit integer, or 64- bit integer.
Not all binary code categories may
be supported by Java.
(Hint: review the Data Representation Power Point in Blackboard
Java Data Types used to Implement Numeric and Character Binary Codes
Binary Code
Java Data Types
Integers
int
Fixed Floating Point
Float, double
Floating Point
Float, double
7-bit ASCII
double
8-bit ASCII
double
Unicode
Char, string
Hexadecimal
Char, int
P a g e
23 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
5.5 Questions - COBOL Data Types
Video - COBOL - Data Types
https://www.youtube.com/watch?v=H-xek9caXb0
Text Link - COBOL - Data Types
https://www.tutorialspoint.com/cobol/cobol_data_types.htm
Text Link- COBOL Data Types
http://www.mainframestechhelp.com/tutorials/cobol/cobol-data-types.htm
Text ink - COBOL Usage is DISPLAY
http://www.mainframestechhelp.com/tutorials/cobol/cobol-display-computation.htm
Text Link - COBOL Usage is COMP
http://www.mainframestechhelp.com/tutorials/cobol/cobol-computation.htm
Text Link- COBOL Usage is COMP-1
http://www.mainframestechhelp.com/tutorials/cobol/cobol-comp-1.htm
Text Link - COBOL Usage is COMP-2
http://www.mainframestechhelp.com/tutorials/cobol/cobol-comp-2.htm
Text Link - COBOL Usage is COMP-3
http://www.mainframestechhelp.com/tutorials/cobol/cobol-comp-3.htm
1. When is a COBOL data type assigned to a COBOL Variable (See 2.3 and 2.7 for answer.)
Answer
è
The COBOL Data Division is used to declare variables before the Procedure Division.
2. When data is stored in a Java variable this data is stored as a binary code. Java applies an appropriate binary
code by declaring a variable as a "Data Type".
List the appropriate COBOL Data Type that BEST matches
the binary code, e.g., 7-bit ASCII, 8-bit ASCII, and Unicode, Floating point, Fixed-point, Octal or
Hexadecimal.
There may be more one Java data type that matches a category of binary code because of precision,
e.g., an 8-bit integer, 16-bit integer, 32-bit integer, or 64- bit integer.
Not all binary code categories may
be supported by COBOL.
(Hint: review the Data Representation Power Point in Blackboard
COBOL Data Types used to Implement Numeric and Character Binary Codes
Binary Code
COBOL Data Types
Integers
numeric
Fixed Floating Point
Alpha numeric
Floating Point
Alpha numeric
7-bit ASCII
Alpha numeric
8-bit ASCII
Alpha numeric
Unicode
sign
Hexadecimal
Alpha numeric
P a g e
24 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
5.4 One Last Program Language Question
Reconsider the first statement of following VB.NET program: (See. 2.8 for Answer.)
HOURS = 40
RATE = 8.00
PAY = HOURS*RATE
PRINT PAY
END
Given the statement HOURS=40, how does the programming language or computer know that a person
worked 40 hours
? Answer
è
I told the program that the value 40 was to be stored in the variable name/address HOURS.
P a g e
25 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
6.0 Internal Memory
Read the Introduction to Memory and Task Management document
Computer Memory Concepts -
http://www.computermemoryupgrade.net/index1.html
Maximum Memory, Standard Memory and Slots -
http://www.computermemoryupgrade.net/maximum-standard-
memory-slots.html
Memory RAM Speed - Access Time, Megahertz (MHz), Bytes Per Second -
http://www.computermemoryupgrade.net/measuring-ram-speed.html
System DRAM Technologies -
http://www.computermemoryupgrade.net/system-dram-technologies.html
DIMM
-
http://en.wikipedia.org/wiki/DIMM
Double Data Rate
-
http://en.wikipedia.org/wiki/Double_data_rate
DDR
-
http://en.wikipedia.org/wiki/DDR_SDRAM
DDR2 -
http://en.wikipedia.org/wiki/DDR2_SDRAM
DDR3 -
http://en.wikipedia.org/wiki/DDR3_SDRAM
DDR4 Intel set to bring next-gen DDR4 DRAM memory to computers later this year -
http://www.pcworld.com/article/2085880/intel-set-to-bring-ddr4-dram-to-computers-in-third-quarter.html
Intel plans to bring speedy DDR4 DRAM to computers in Q3 -
http://www.computerworld.com/s/article/9245266/Intel_plans_to_bring_speedy_DDR4_DRAM_to_computers_in
_Q3
Everything you want to know about Dual- Triple and Quad Channel Memory Architectures
-
http://www.hardwaresecrets.com/article/133
Multi-channel memory architectures -
http://en.wikipedia.org/wiki/Multi-channel_memory_architecture
Dual Chanel Architecture -
http://en.wikipedia.org/wiki/Dual-channel_architecture
Video - PC Memory Tutorial - http://www.youtube.com/watch?v=wZV7UV31VGg
Video - Understanding and upgrading your RAM -
http://www.youtube.com/watch?v=e68YyNTeL18
Video - Installing your PC's memory -
http://www.youtube.com/watch?v=Hw-zreo1hBE
Video - Learning about Memory (RAM) - HP Workbench -
http://www.youtube.com/watch?
v=WJ5kRofuGLQ
Video - How Much Memory (RAM) do I Need? - HP Workbench -
http://www.youtube.com/watch?
v=QNrzycPDwvk
Video - Guide to RAM Memory Channels as Fast As Possible -
http://www.youtube.com/watch?v=-
D8fhsXqq4o
Video - Dual & Triple Channel Memory -
http://www.youtube.com/watch?v=ARi52co3ANs
Video - Motherboard RAM Slots – A+ 220-901 1.2 (Professor Messer)
https://www.youtube.com/watch?
v=bDKCSvmlPuc&list=PLJytQuP7cOhcnzWnPAnePNqxrsD9gSId5&index=3
Video - Understanding PC Memory - A+ 220-901 1.2 (Professor Messer)
https://www.youtube.com/watch?
v=bmRMRlDXph0&index=11&list=PLJytQuP7cOhcnzWnPAnePNqxrsD9gSId5
P a g e
26 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Random Access Memory -
http://www.kitchentablecomputers.com/ram1.php
Choosing RAM -
http://www.kitchentablecomputers.com/ram2.php
Pictures of Selected RAM Form Factors -
http://www.kitchentablecomputers.com/ram3.php
6.1 Questions - Memory Architectures
1. Provide a detailed description of the following internal (RAM) memory concepts. Us an Snipping tool and
paste a Google image that best illustrates the concept
Memory
Architectures
Detailed Description
Image
DIMM
Is a type of module (form factor) that can
mount memory chips on both sides.
SDRAM
Is a type of memory technology (type of
chip) that is mounted on DIMM module. Is
any dynamic random-access memory where
the operation of its external pin interface is
coordinated by an externally supplied clock
signal.
DDR SDRAM
Solid state memory that operates at twice
the system clock speed by transferring data
twice per cycle.
DDR2 SDRAM
A double data rate synchronous dynamic
random access memory interface.
Superseded DDR SDRAM.
DDR3 SDRAM
A type of synchronous dynamic random-
access memory with a high bandwidth
interface and has been in use since 2007.
P a g e
27 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
DDR4 SDRAM
A type of synchronous dynamic random-
access memory with a high bandwidth
interface.
Latency
The number of clock cycles it takes for it to
serve data after a request is made. Can also
be seen in networks as the time it takes for a
data packet to reach its destination which is
usually represented the ping number where
the larger the number the greater latency.
ECC
Used to detect and correct n-bit data
corruption which occurs in memory.
GDDR3
Type of memory that is used in graphics
cards to store graphic and display data.
P a g e
28 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Dual Channel
DDRs
Version of multi-channel memory that
increases data transfer speed by adding
more channels of communication between
the memory and the memory controller.
In the picture the orange represents one
channel and the yellow represents the other
channel.
Quad Channel
DDRs
Has four memory slots and supports four
memory cards/sticks.
6.2 Memory Performance Ratings and Form Factors
DDR Performance Ratings
DDR, DDR2, and DDR3 are rated using by two specifications PC or PC2 and DDR or DDR2.
P a g e
29 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
DDR-xxx and DDR2-xxx specifications indicates the chip data rate, which is based on the clock speed of the
Front-Side Bus. Using the PC2-3200/DDR2-400B DIMM in the DDR2
Performance Ratings below let us
assume the Front-Side Bus speed is 200-Mhtrz. The FSB clock speed is determined by the technology used by
the mother board. The FSB speed is always significantly slower that the processor speed.
At first glance, one may assume that at 200-Mhrtz we can get 200 million units of work done.
But here is the
beauty of the DDR (DOUBLE DATE RATE) technology – is
double-pumped or double-rated.
When the FSB
bus operates with double data rate transfers data it performs twice the work of the clock speed, e.g., this occurs
once of the rising voltage of the pulse and
once on the falling voltage
of the clock signal. It kinda like your boss
making you work twice as hard during your 8-hour shift.
Double-channel technology is NOT double-rated technology
. Normally the processor has only one path
from the processor to RAM (one FSB). Double-channel means that there are two FSB busses.
With double-
channel technology two transfers can be made simultaneously. Again, it may be like your boss giving you an
extra worker to help you during your 8-hjour shift.
The bottom line is a 200-Mhtrz front-side bus gets 400-Mhrtz of work done. Again, the speed of the FSB is
determined by your motherboard.
PC ratings measure the maximum data transfer rate (not the chip data rate).
PC ratings are more likely be used
to purchase new RAM.
A PC2-3200 indicates that the maximum data transfer rate of the DIMM module is
3,200,000 bytes, not bits. Some of the PC ratings truncate the last two digits. For example, the PC2-4200 DIMM
modules actually has a maximum data transfer rate of 4,266,000 bytes.
DDR and DDR2 PC ratings, the Chip Data Rate and the Front –Side Bus speed are directly related. Consider
the following:
PC Rating
divided by 8
equals
Chip Data Transfer Rate.
divided by 2
equals
Front-Side Bus
Speed
PC2-3200
/8
400
/2
200 Mhrtz
Ok, Ok. Why do we divide by 8?
The Front side but is 64-bits wide. A byte is 8 bits.
64 /8bits = 8 bytes
Ok, Ok. Why do we divide by 2?
Did you forget double pumping or the meaning of double rated chip already.
We can also perform the conversion the other way.
Front-side bus speed
multiply by 2
equals
Chip Data Transfer Rate
multiply by 8
equals
PC rating.
200 Mhrtz
x2
400
8
PC2-3200
DDR2
Performance Ratings
DIMM
Module
Name
DIMM Maximum
Data
Transfer Rate
DDR Chip name
Chip Data
Transfer Rate
I/O Clock
PC2-3200
3200
DDR2-400B
DDR2-400C
400
200
PC2-4200*
4266
DDR2-533B
DDR2-533C
533
266
PC2-5300*
5333
DDR2-667C
DDR2-667D
667
333
PC2-6400
6400
DDR2-800C
DDR2-800D
DDR2-800E
800
400
PC2-8500*
8533
DDR2-1066E
DDR2-1066F
1066
533
P a g e
30 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
P a g e
31 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Comparing DDR Technologies
DDR, DDR2, and DDR3 DIMMS vary physically and architecturally. DDR2 DIMMs are not designed to be
backward compatible with DDR DIMMs.
DDR DIMMs have 184 pins while DDR2/DDR3 DIMMS have 240 pins.
Even though DDR2/DDR3 DIMMS have the same number of pins you cannot mix them do the position of the
notch on the DIMM.
DDR DIMM Notches
The notch on DDR2 DIMMs is in a different position from DDR DIMMs, and the pin density is higher than DDR
DIMMs in desktops
Within a DDR technology category type you can mix older DDR technology, e.g., PC2-4200 with a newer DDR
technology, e.g., PC2-6400.
While higher performance DDR2 DIMMs are compatible with lower performance
DDR2 DIMMs; however, the higher performance module runs at the lower module's frequency.
Comparing DDR RAM
DDR
Category
Type
Pins
Frequenc
y
Chip Data
Transfer Rate
PC Rating
Module Size
DDR DIMMs
(2001)
184
desktop
200 laptop
100-200
200-400
PC-2100
PC-2700
PC-3200
256MB, 512 MB,
1GB, 2GB
DDR2 DIMMS
(2003)
240
desktop
200 laptop
200-533
400-1066
PC2-3200
PC2-4200
PC2-5300
PC2-6400
PC2-8500
512 MB, 1GB,
2GB, 4GB, 8GB
DDR3 DIMMS
( improved
power
consuption)
(2007)
240 desk
top
204 laptop
400-800
1066-200
PC3-8500
PC3-1333
PC3-12800
PC3-14400
PC3-1600
512 MB, 1GB,
2GB, 4GB, 8GB
DDR4 DIMMS
(Expected
2012)
DDR
Option Codes
Explanation
P a g e
32 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
PC2-4200
ECC
The DDR "ECC" option indicates that an extra data byte lane is used for
correcting minor errors and detecting major errors for better reliability
PC2-4200
R
The DDR "R" option indicates that module is "registered".
A "registered" DIMM
improves signal integrity (and hence potentially clock rates and physical slot
capacity) by electrically buffering the signals at a cost of an extra clock of
increased latency. The highest storage capacity for a DIMM is normally a
registered module
PC2-4200
F
The DDR "F" or "FB" option indicates that module is "fully buffered" and not
have the same notch position as other classes. Fully buffered modules cannot
be used with motherboards that are made for registered modules, and the
different notch position physically prevents their insertion.
GDDR
4-4200
Graphics Double Data Rate, version 4) is a type of graphics card memory.
Unlike standard DDR memory the graphics processor can read and write to the
memory at the same time (dual-ported), has a hardware reset feature and lower
power consumption.
2.
What is the relationship between the concept of a DIMM and a DDR? Answer
è
DDR is a type of DIMM where DIMM is a series of RAM integrated circuits and DDR is memory integrated
circuits and DDR is on the RAM and DIMM is on the motherboard and work together.
3.
What type of memory module(s) use(s) 184 pins? Answer
è
DDR SDRAM
4.
What type of memory module(s) use(s) 240 pins? Answer
è
DDR2 RAM
5.
By looking at the physical appearance of the DDR2 and DDR3 memory module how would one determine
the difference between the two types of memory modules? Answer
è
DDR2 and DDR3 have different speed and storage limitations that can help tell them apart such as DDR3 is
typically faster than DDR2 RAM and can also has greater storage capacity.
6.
You see a memory module that states that it is a PC2-8500 module. What does the number 8500 mean?
Answer
è
8500 is the maximum data transfer rate that the DIMM RAM can operate at.
7.
What is the purpose of a PC rating when discussing internal modules? Answer
è
It allows easy comparison of internal modules in megabytes per second in a computer.
8.
What is the relationship between PC ratings and the Front Side Bus Speed? Use PC2-8500 as an example.
Answer
è
Since the front side bus connects the processor to the RAM and other components it is important that the bus
speed can manage both the speed of the RAM and processor so that a bottleneck is not created when
transferring information.
6.3 Question - Crucial.com
What type of memory does your computer use Performance Ratings and Form
Factors?
P a g e
33 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
9.
Go to crucial.com or any other online supplier of computer memory.
Enter the
model and type of your computer. Find the type of computer memory that is most
appropriate for your computer.
Use a Snipping Tool to document your findings below.
P a g e
34 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
In my desktop I have 4 sticks of RAM that are 8gb each that run at 3200ghz which means I end up with 32gb of
Ram running at 3200 but my processor has a RAM speed limit of 3000ghz so my ram only runs at 3000ghz
instead of 3200ghz.
10.
What is maximum amount supported by your motherboard? Answer
è
64gb
11.
What is recommended type of memory to be used by your computer? Answer
è
288 pin ddr4 ram
http://windows.microsoft.com/en-US/windows7/Find-out-how-much-RAM-your-computer-has
http://www.online-tech-tips.com/computer-tips/how-to-determine-the-amount-of-ram-installed-on-your-computer/
http://windows.microsoft.com/en-US/windows-vista/How-do-I-know-if-my-computer-has-a-memory-problem
http://windows.microsoft.com/en-US/windows7/Diagnosing-memory-problems-on-your-computer
http://www.computerworld.com/s/article/9158258/Most_Windows_7_PCs_max_out_memory
P a g e
35 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
6.4 Questions - Memory Failures
12. What are the three major causes of computer memory failures? Your answer is
Power surges, improper installation, defective hardware, and malicious software.
13. What is the name of the new tool provided by Windows Vista and 7 that may be used to diagnose memory
problems? Your answer is
The Windows Memory Diagnostic tool. I have actually been forced to use it a couple times when I was trying to
use memory from a prebuilt computer in the ASUS motherboard that I have now. Turns out HP put a marking
code in their RAM that is used in any other computer it would make windows throw a memory management Blue
screen of death.
6.6 Questions - Difference between Notebook and Desktop Memory
The Difference Between Notebook and Desktop Memory -
http://www.webopedia.com/DidYouKnow/Computer_Science/2008/laptop_desktop_memory.asp
Can Laptop Memory Be Used in Desktop and the Other Way Around?
-
http://www.popularmemory.org/can-
laptop-memory-be-used-in-desktop/
14.
What are the differences between laptop memory and desktop memory? Your answer is
Desktop ram is larger when compared to laptop memory and changing the ram in a desktop is worlds easier
than changing the ram in a laptop.
15. What factors affect the maximum amount of RAM that can be installed into your computer?
Your answer is
The maximum amount of ram is dependent on the CPU, motherboard, and the operating system.
P a g e
36 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7.0 Functions of an Operating System
Operating System Functions -
http://computer.howstuffworks.com/operating-system2.htm
The main functions of an operating system -
http://www.ukessays.com/essays/information-technology/the-main-
functions.php
Operating Systems -
https://www.cs.umd.edu/users/oleary/c662/opsys.pdf
How Operating Systems Work - http://computer.howstuffworks.com/operating-system.htm
Process (computing) -
http://en.wikipedia.org/wiki/Process_(computing)
What is a computer process? -
http://whatis.techtarget.com/definition/process
Video - Computer Tour -
http://computer.howstuffworks.com/23-computer-tour-video.htm
Video - Introduction to Operating Systems -
https://www.youtube.com/watch?v=MzVGL44eq9w
Video - Operating Systems - Lecture 1 -
https://www.youtube.com/watch?v=55FeqGGzE5Q
Video - Processes & Threads in Operating Systems -
https://www.youtube.com/watch?v=gif8znTA1Jw
P a g e
37 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7.1 Functions of an Operating System
P a g e
38 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7.2 Questions - Functions of an Operating System
1. An Operating System provides many Services.
Use the following table and provide a description for each of
the following operating system function or service.
DO NOT COPY-AND-PASTE images only text.
Operating System
Function/Service
Description
Process (Task) Management
The OS must allocate resources to processes, enable processes to share
and exchange information, protect resources of each process and enable
synchronization amount process.
Memory Management
Is the process of controlling and coordinating computer memory, assigning
portions called blocks to various running programs to optimize overall
system performance
Time Management
Program that allocates how OS processor time to execute system,
application, middleware programs.
Device Management
(I/O control and Device
Drivers)
Software modules that can be plugged into an operating system to utilize a
certain device.
File System
It is a method and data structure that the operating system uses to control
how data is stored and retrieved.
Security
Used as protection for the information of the operating system and the
information on the computer that the user has. It is designed to provide a
centralized platform for security teams to manage network security.
User Interfaces
The interface of which the user is able to interact with the software and
hardware of the computer.
2 What is meant by the concept of
concurrency
?
Answer:
It means executing two or more tasks at the same time or in parallel with each other.
P a g e
39 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7.3 Questions – Interrupt Processing
Read the Introduction to Memory and Task Management document
Processor Management
http://computer.howstuffworks.com/operating-system5.htm
What is Interrupt Processing?
Chapter 3.7.1: Overview of z/OS: Introduction to the Mainframe: z/OS basics
3. What is Interrupt Processing?
When an interrupt occurs what happens next in the processing cycle?
Answer:
An interrupt is an event that alters the sequence in which the processor executes instructions. What happens
next in the processing cycle depends upon the form of interruption that took place.
7. What is the difference between an I/O Interrupt and an External Interrupt? Answer:
An I/O interrupts occur when the channel subsystem signals a change of status, such as an input/output
operation completing, an error occurring, or an I/O device such as a printer has become ready to work. An
External interrupt indicate any of the several events, such as time interval expiring, the operator pressing the
interrupt key on the console or the processor receiving a signal from another processor.
Process Control Block -
http://computer.howstuffworks.com/operating-system6.htm
8. What is the role of a Process Control Block in relationships to Processes and Interrupts?
Answer:
It helps the operating system support multiple processes and provides for multiprocessing. It contains
information such that if an interrupt occurs then the process can begin form where it left off.
9. List the type of information stored in a Process Control Block.
Answer:
Each block memory contains information about the process stat, program counter, stack pointer, status of
opened files, scheduling algorithms and more.
Computer Processes - http://en.wikipedia.org/wiki/Process_(computing)
Threads -
http://en.wikipedia.org/wiki/Thread_(computer_science)
Difference between a process and a thread
http://wiki.answers.com/Q/What_is_the_difference_between_a_computer_process_and_thread
Shell (computing) -
http://en.wikipedia.org/wiki/Shell_%28computing%29
Command-line interface -
http://en.wikipedia.org/wiki/Command-line_interface
Command Line Interfaces (Advantages and Disadvantages)
-
http://www.teach-ict.com/gcse_new/computer
%20systems/user_interface/miniweb/pg3.htm
Graphical User Interfaces (Advantages and Disadvantages)
-
http://www.teach-ict.com/gcse_new/computer
%20systems/user_interface/miniweb/pg7.htm
Touch Sensitive Interfaces (Advantages and Disadvantages)
-
http://www.teach-ict.com/gcse_new/computer
%20systems/user_interface/miniweb/pg11.htm
Sound and Speech Interfaces (Advantages and Disadvantages)
-
http://www.teach-
ict.com/gcse_new/computer%20systems/user_interface/miniweb/pg9.htm
Command line vs. GUI -
http://www.computerhope.com/issues/ch000619.htm
Command line -
http://www.computerhope.com/jargon/c/commandi.htm
GUI -
http://www.computerhope.com/jargon/g/gui.htm
P a g e
40 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7.4 Question - Command Shells
10. What is the function of a shell in computing and operating systems? Answer:
It manages the interaction between you and the operating system by asking you for input, interpreting that input
for the operating system, and then dealing with any output from the operating system.
11. What is a command line interface? Answer:
It uses a command-line interpreter and processes commands to a program in the form of a line of text.
12. How does one know that the operating system is ready to process the next command when using a
command line interface? Answer:
It says READY to show that the operating system is ready and waiting.
7.5 Questions - Comparison of Command Line interfaces and Graphical User
Interfaces
13. Use the following table and compare each topic citing advantages or disadvantages of using command line
interfaces (CLI) as compared to graphical user interfaces (GUI).
Comparison of Command Line and Graphical User Interfaces
Topic
Command Line Interfaces
Graphical User Interfaces
Ease of Use and Effort
to Learn
No immediate visual feedback. May need a
higher degree of familiarity and
memorization.
Easier to learn and use with a very
user-friendly interface.
Degree of Control of
the Operating System
Allows interaction with the operating system
by commands typed in by the user.
Interactions with the operating
system are done using windows
icons and menus as well as other
graphical elements.
Multitasking
Has the ability to see multiple things on one
screen
Has windows that enable a user to
view, control, manipulate, and
toggle through multiple programs
and folders at the same time.
Speed of Use
Faster than a graphical user interface
because the keyboard is used to input
commands.
Much slower than command line
interfaces because of the inability
to use the keyboard
Resource Utilization,
e.g., Memory,
Processor Time
Uses smaller sized text inputs to create
operating system instructions/functions.
Depends on the complexity and
size of the graphical elements and
are larger to store compared to
command line
Scripting
Uses a lot less resources than a GUI does
Needs more resources because of
the loading and storage of
graphical elements such as icons
Remote Access
Gives you remote access to commands for
you to configure and gather the runtime
system information
Allows for the modification of
settings such as printing options
ie. Color/black and white, and
paper size through online
connection
Flexibility to transfer
knowledge to other
user interfaces
The same in both ease and difficulty
The same in both ease and
difficulty
Ergonomics
and
More control over system and requires more
Easier to use but requires more
P a g e
41 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Strain
thought
resources and has fewer
restrictions when accessing files.
P a g e
42 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Five benefits of command line tools in security -
http://www.techrepublic.com/blog/linux-and-open-source/five-
benefits-of-command-line-tools/
Seven Free Security Tools for Linux -
http://www.pcworld.com/article/224955/7_free_security_tools_for_linux.html
List of Linux Security Audit and Hacker Software Tools -
http://www.yolinux.com/TUTORIALS/LinuxSecurityTools.html
Advantages of command line over GUI -
http://www.aswedeingermany.de/50SoftwareDevelopment/50ShellVsGUI.html
Why Command Line still important? -
http://answers.yahoo.com/question/index?qid=20110202071442AAGs5Bc
The Importance of Command Line Literacy -
http://www.linux-mag.com/id/7096/
7.6 Command Line interfaces and Security
14. Many security tools have a GUI interface.
Using the following table list and explain five reasons why one's
ability to use the CLI is very important to their careers?
Importance of a
Professional's Knowledge of Command Line Tools in Security
Topic
Discussion
1.
Scalability
Allows for problems to be handled quicker and easier and allows for a single action
to achieve greater results.
2.
Scripting ability
Is a macro system for every command line utility available.
3.
Simple Design
Simple design can allow for increased efficiency and improved speed
4.
Simple
Interface
Gives users without professional knowledge to use an interface without taking the
utilities that those with professional knowledge would like to use.
5.
Stable Design
Designs that are simple are easier to process and encounter less problems when
compared to GUI.
8.0 Computer Buses, Storage Devices and SANS
8.1 Introduction to Computer Busses
A bus is simply a wire located on the motherboard. Buses are the highway that connect all the PC internal
components and external devices and peripherals to its CPU and main memory (RAM). These embedded wires
carry four types of cargo:
Electrical Power
Control Signals to coordinate activity (How)
Memory Addresses, which informs the where to access data and instructions (Where)
Data which presents the flow of instructions or data between components
8.1.1 The Front-side System Bus
The fastest bus of all is the connection between the processor and its primary cache, and this is kept within the
CPU chip. The next level down is the system bus, which links the processor with memory, both the small amount
of Static RAM (SRAM) secondary cache and the far larger main banks of Dynamic RAM (DRAM).
8.1.2 The Back side Bus
P a g e
43 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
The back-side bus (BSB), or backside bus, was a computer bus used to connect the CPU to CPU cache
memory, usually L2.
8.1.3 AMD Hyper Transport and Intel QuickPath Interconnect (QPI) Bus technologies
Both Front Side and Backsides buses were replaced by the AMD Hyper Transport and Intel QuickPath
Interconnect (QPI) Bus technologies. Though the concept is conceptually provided function similar to previuos
bus architectures these technologies substantially increased bandwidth and reduced latency.
8.1.4 Input/Output Busses
The input/output bus or IO bus is the pathway used for input and output devices to communicate with
the computer processor.
8.2 Input/Output Busses, Expansion Busses and Adaptors
Video - Motherboard Expansion Slots and Bus Speeds – A+ 220-901 1.2 (Professor Messer)
https://www.youtube.com/watch?v=-
R6gsPo6LEQ&index=6&list=PLJytQuP7cOhcnzWnPAnePNqxrsD9gSId5
Video - PCI EXPRESS® 3.0 Introduction and Overview
https://www.youtube.com/watch?v=Qe74ChDTx50
Video - Motherboard Expansion Slots and Bus Speeds - CompTIA A+ 220-901 - 1.2 (Professor Messer)
https://www.youtube.com/watch?v=-R6gsPo6LEQ
Video- Device Connectors and Cables - CompTIA A+ 220-901 - 1.11
https://www.youtube.com/watch?v=Jetc8EfkbGA&t=115s
8.2.1 USB
A USB system has an asymmetric design, consisting of a host, a multitude of downstream USB ports,
and multiple peripheral devices connected in a tiered-star topology. Additional USB hubs may be
included in the tiers, allowing branching into a tree structure with up to five tier levels. A USB host may
have multiple host controllers and each host controller may provide one or more USB ports. Up to 127
devices, including hub devices if present, may be connected to a single host controller.
USB Standard
Data Transfer Rate
USB 1.0/1.1 (1998)
12 mbps
USB 2.0 (2000)
128 mbps
USB 3.0 (2009)
5 Gbits
Reduce power consumption; backward
compatible ; Has a different connector with more
wires
USB 3.1 (2013)
3.0 to 10 Gbit/s
Backward compatible
P a g e
44 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
8.2.2 Firewire
The IEEE 1394 interface is a serial bus interface standard for high-speed communications and
isochronous real-time data transfer, frequently used by personal computers, as well as in digital audio,
digital video, automotive, and aeronautics applications.
FireWire
Standard
Data Transfer Rate
FireWire 400
FireWire
800
800 Mbits Full duplex
FireWire S1600
1.6 Gbits
Backward compatible
100 meters
FireWire S3200
3.2 Gbits
Backward compatible
8.2.3 Thunderbolt (2011)
A hardware interface that allows the connection of external peripherals to a compute using the same
connector as Mini DisplayPort (MDP). Combines PCI Express (PCIe) and DisplayPort (DP) into one
serial signal alongside a DC connection for electric power, transmitted over one cable. Up to six
peripherals may be supported by one connector through various topologies. The current Thunderbolt
2 operates at 20 Gbit/s speed
Intel's new Thunderbolt 3 (late 2015) controller will double the bandwidth to 40 Gbit/s (5 GB/s), reduce
power consumption by 50%, also offering support for PCIe 3.0, along with compatibility with other
protocols, including HDMI 2.0 (allowing for 4K resolutions at 60 Hz), and DisplayPort 1.2 or 1.3
P a g e
45 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
PCI Express (PCIe)
Video - PCI Express (PCIe) 3.0 - Everything you need to Know as fast as Possible
http://www.youtube.com/watch?v=LSSHuMHbCWo
The PCI Express Architecture defines a flexible, scalable, high-speed, serial, point-to-point, hot
pluggable/hot swappable interconnect that is software-compatible with PCI. Unlike its predecessor,
PCI Express is a serial point-to-point interconnect system, similar to AMD Hyper Transport and Intel
QuickPath Interconnect (QPI) Bus technologies.
Serial bus architectures deliver more bandwidth per pin than parallel bus architectures and scale more
easily to higher bandwidths.
PCIe allows for a network of dedicated point-to-point links between devices rather than the multi-drop
scheme used by parallel bus architectures. This eliminates the need for bus arbitration, provides
deterministic low latency and greatly simplifies hot plug/hot swap system implementations.
PCIe x1, x4, x8 and x6 Slots.
PCIe supports four different slot types that have different sizes and data transfer rates. The PCIe x16
slot is used to connect video cards
PCIe Standards
PCI Express 4.0 providing a 16 GT/s bit rate that doubles the bandwidth provided by PCI Express 3.0.
PCI Express 5.0 specification.[52] Bandwidth is expected to increase to 32 GT/s, yielding 128 GB/s in
full duplex networking configurations. It is expected to be standardized in 2019.
8.2.4 PATA (IDE)
P a g e
46 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
PATA (IDE)
is a 16-bit parallel interface standard for the connection of storage devices such as hard
disks, solid-state drives, floppy drives, and optical disc drives in computers. PATA remains widely used
in industrial and embedded applications that use CompactFlash storage, though even here, the next
CFast storage standard will be based on SATA.
8.2.5 SATA
Video – Introduction to Storage Devices 2013 - Part 1 of 3 - CompTIA A+ 220-701 (Professor Messer)
https://www.youtube.com/watch?v=ZDITqacAkFQ&feature=channel
Video - Introduction to SATA Storage Devices 2013 - Part 2 of 3 - CompTIA A+ 220-701(Professor Messer)
https://www.youtube.com/watch?v=G2EfxglM_mQ
Video - Introduction to Removable Storage Devices 2013 - Part 3 of 3 - CompTIA A+ 220-701 (Professor
Messer)
https://www.youtube.com/watch?v=SipFUeFdQOE
Do Solid State Drives Fail More Often Than Hard Disks? (2017)
https://www.contegix.com/solid-state-disks-fail-often-hard-disks/
Debunking SSD Myths (2015)
https://www.networkworld.com/article/2873551/data-center/debunking-ssd-myths.html
5 Warning Signs That Your SSD Is About to Break Down & Fail (2016)
http://www.makeuseof.com/tag/5-warning-signs-ssd-break-fail/
P a g e
47 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
SATA
is a serial interface standard reduced cable size and cost (7 conductors instead of 40), native
hot swapping (hot plugging), faster data transfer through higher signaling rates, and more efficient
transfer through an (optional) I/O queuing protocol. SATA uses a point-to-point architecture. The
physical connection between a controller and a storage device is not shared among other controllers
and storage devices. SATA defines multipliers, which allows a single SATA controller to drive multiple
storage devices. The multiplier performs the function of a hub; the controller and each storage device
is connected to the hub. Modern PC systems have SATA controllers built into the motherboard,
typically featuring 2 to 6 ports. Additional ports can be installed through add-in SATA host adapters
(available in variety of bus-interfaces: USB, PCI, PCI-e.)
PATA/SATA Standard
Data Transfer Rate/ Capacity
ATA/ATAPI-5
66 mbps/137 GB storage
80-wire connector
ATA/ATAPI-6
100 mbps/140 PB
ATA/ATAPI-7
133 mbps PATA/150mbps SATA
1.5 Gbits
( called SATA 1.0)
ATA/ATAPI-8
SATA 1.0
1.5 Gbits
SATA 2.0 (2010)
3.0 Gbits/300 Mbps per device – slightly
slower than SCSI 320Mbps (Ultra 320); no
shared channel
SATA 3.0
6.0 Gbits/600 Mbps per device – slightly
slower than SCSI 6400Mbps (Ultra 640); no
shared channel
Improved video
streaming; new, smaller
LIF connectors
SATA 3.1/3.2 Express
16.0 Gbits/1.961 Gbps per device
Solid state drives in
mobile devices
eSATAp
Compete with USB and
Firewaire
P a g e
48 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
8.3 Optical Storage
Video - An Overview of Storage Devices - A+ 220-901 1.5 (Professor Messer)
https://www.youtube.com/watch?v=NgVm2kUmrYo&index=13&list=PLJytQuP7cOhcnzWnPAnePNqxrsD9gSId5
7.3.1 CD (Compact Disk)
CD Data transfer rate - Speed
x means 150 KBs
so
48x 150KB = 7.2 MB, IDE speed is
100MBs
Capacity:
up to 700MB, typical 650 MB
Recording technology:
CD-R and CD-RW
Connectors: 4-pin Power Molex, 40–pin IDE data connector.
Need to connect to sound card
8.3.2 DVD (Digital Versatile Disk)
Capacity:
determined by double-sided and Multiple Layers. Capacity: DVD-5
4.7GBs
(most
popular); DVD-9 (8.5 GBs); up to 17G for DVD-18
Alternative Recording technologies; + (Sony) and – (Pioneer)
- not compatible , but newer
(since 2008) can handle both.
DVD Data Transfer rate – Speed x means 1.32 MBs (9 times CD)
so 16 x 132.MBs =21 MBs;
Multiple side layers are always slower. RW is always slower that R
Recording technology:
DVD-R SL and DVD-R
SL
(single layer);
DVD+R SL and DVD+R
SL
(single layer); and DVD-RW ( SL or DL) or
DVD+RW ( SL or DL).
Most drives are combo drives CDs and all DVDS
Uses SATA more than IDE.
8.3.3. Blue- Ray
Blu-ray Disc (BD) is a digital optical disc data storage format designed to supersede the DVD
format, in that it is capable of storing high-definition video resolution (1080p)
Capacity:
Two physical sizes. Standard CD/DVD size up to 50 GB; Mini disc (12 cm) – 15.6
GB
Use: HD movies, Play Station 3
Blue-Ray Data Transfer Rate:
measured in bits rather than bytes because of SATA. x means
36 Mbps
(not MBs)
so 8x would be 36MBps x 8
or 280MBps or 36MBs
Blu-ray Disc specifies the use of Universal Disk Format (UDF) - an open file system.
8.4 Solid State Storage
No moving parts; based on semiconductor technology; nonvolatile; uses the FAT/FAT32 file system by
default, but can be formatted with NTFS
8.4.1 USB Flash Drives
Highly recommended to us "Safely Remove Hardware" or the file system may be destroyed.
Data Transfer Rate: Dependent of USB 1.1, USB 2.0 and USB 3.0/3.1 ( Chipset determinant)
Can be used to boot operating systems – change boot order in the BIOS
NAND Flash memory is the core.
Up to 1 million read/write cycles or 10 years of average use (really varies);
Uses "Bad Block
Management" to extended the life, e.g., don't write here
P a g e
49 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Video - How To Resolve USB Device not Recognized Errors In Windows 10
https://www.youtube.com/watch?v=IEDec4IViqs
Video -
How to fix USB drive not recognized or not working
https://www.youtube.com/watch?v=FBNQ6rm2wbE
8.4.2 Secure Digital (SD) Cards
Uses NAND Flash memory like USB devices.
Sizes: Standard (cameras and most cell phones), miniSD, microSD (PDAs). Many SD readers can read
smaller, but not larger
Capacity: Standard SD cards (not size) up to 4GB; High Capacity (SDHC) cards up to 32 GB; eXtended
Capacity (SDXC) cards up to 2 TB
SD Card Data Transfer Rate – measured by classes, e.g., SD Class 2, 4, or 6. SD Class 6 = 45 MBS
8.4.3 Secure Digital Input Output (SDIO) Cards
Merges Flash Storage with an I/O device.
PDS use this technology
to integrate GPS, WLAN and Bluetooth
Cannot work in SD slot – needs a special slot
SDIO slots can read SD Cards
Not the same a SIM cards used by cell phones.
8.4.4 CompactFlash (CF) Cards
Are used to add solid-state storage to laptops, hand-held computer, high-end cameras using
the Type-I interface and for Microdrives (ATA controller) using the Type II interface.
Can be NOR or NAND (more popular)
memory
Similar characteristics for SD cards
CF Data Transfer Rates:
measured as CF, CF High Speed, CF 3.0 and CF 4.0 (45 MBs).
8.5 Questions - Solid State Drives versus Hard Disk Drives
Text Link - SSD vs. HDD: What's the Difference?
https://www.pcmag.com/article2/0,2817,2404258,00.asp
Text link - What is a Solid State Drive (SSD)?
https://www.lifewire.com/solid-state-drive-833448
Text Link- The battle between SSD and HDD is over, and the winner is clear
https://www.digitaltrends.com/computing/solid-state-drives-vs-hard-disk-drives/
There are three issues that are important to consider to connect disk drives to a processor: 1)
the type on bus interface and adaptor, 2) the type of the connector cable, and 3) the storage
architecture used to store data. Historically, the traditional type of disk storage architecture
used a magnetic storage technology. While optical storage technologies provided an
alternative, this technology had poor storage access time.
With the introduction of solid state
storage devices, a new class of disk storage devices was introduced – solid state drive.s
1. Compare how traditional hard disk drives (HDD) compares to Solid State Drives (SDD) be the
methods each technology uses to store data. Answer:
P a g e
50 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Traditional hdd use spinning disks and magnets to store information while the ssd’s do not have any
moving parts which allows for much faster data storage and retrieval.
2. Compare how traditional hard disk drives (HDD) compares to Solid State Drives (SDD) by
durability, i.e., less prone to failures. Answer:
Since hdds have moving parts, moving the enclosure of the hdd can cause the magnets to collide with
the disks which would cause a failure. Ssds do not have any moving parts so shaking or moving them
while they are operating would not cause any failures and generally have less failures due to their
solid state.
3. Compare how traditional hard disk drives (HDD) compares to Solid State Drives (SDD) by cost of
storage.
Answer:
Hdd are typically less expensive when compared to ssds.
4. Compare how traditional hard disk drives (HDD) compares to Solid State Drives (SDD) by
performance.
Answer:
Ssds are much faster compared to hdds when it comes to performance as a whole
5.
What is a Hybrid disk drive? Answer:
A hybrid disk drive has both ssd and hdd traits
8.6 Questions – Directed Access Storage versus Storage Area Network (SAN)
8.6.1 Direct Attached Storage (DAS)
Direct Attached Storage (DAS) is a dedicated digital storage device attached directly to a server or PC
via a cable. Advanced Technology Attachment (ATA), Serial Advanced Technology Attachment (SATA),
eSATA, Small Computer System Interface (SCSI), Serial Attached SCSI (SAS), and Fibre Channel are
the main protocols used for DAS connections.
The DAS principle is fundamentally straightforward. DAS systems have become more prevalent due
to increasing requirements for efficient IT storage solutions. The difference between DAS and Network
Attached Storage (NAS) is that a DAS device connects directly to a server without a network
connection.
DAS advantages include:
High availability.
High access rate due to Storage Area Network (SAN) absence.
Elimination of network setup complications.
P a g e
51 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Storage capacity expansion.
Data security and fault tolerance.
DAS drawbacks include:
Data not accessible by diverse user groups.
Allows only one user at a time.
High administrative costs.
8.6.2 Storage Area Networks
Most modern large scale architectures are based on SAN architectures or Storage Virtualization. SAN
devices are no longer directly attached to the server, and can be shared by multiple servers using a
variety or operating systems over long distances. Without SAN technologies, load balancing, fail over,
data sharing, cloud computing technologies would not be possible
Video - Network Storage - CompTIA Network+ N10-007 - 2.4 (Professor Messer)
https://www.youtube.com/watch?v=41OgCdAjLI4
Video - Storage Area Networks - CompTIA Network+ N10-006 - 1.11 (Professor Messer)
https://www.youtube.com/watch?v=PfgzE9lEpTg
Video - NAS and SAN Introduction (Eli the Computer Guy)
https://www.youtube.com/watch?v=csdJFazj3h0&t=2s
Video - SCSI SAN Storage Overview Tutorial
https://www.youtube.com/watch?v=2ra0Xxi-mOg
Video - Video- SAN online Training
https://www.youtube.com/watch?v=D_XwsemiKQY
Video - FCoE SAN Storage Overview Tutorial
https://www.youtube.com/watch?v=NmXR_3cuEXI
Video - Storage Virtualization
https://www.youtube.com/watch?v=-NeMJFT55YU
Video - What is iSCSI and how to use it
https://www.youtube.com/watch?v=pG2H-WatFbo
Video - Introduction to Storage Area Networks (SAN)
https://www.youtube.com/watch?v=teEsgqI49Dk
SAN Explained - Storage (or System) Area Networks
https://www.lifewire.com/definition-of-san-818007
10 Advantages of SAN vs. DAS
http://www.serverwatch.com/trends/article.php/3925351/10-Advantages-of-SAN-vs-DAS.htm
Advantages of using a Storage Area Network
http://blog.dnfcorp.com/?p=2063
Video - Introduction to Storage Area Networks (SAN)
https://www.youtube.com/watch?v=teEsgqI49Dk
P a g e
52 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
1. What is a Storage Area Network (SAN)?
Answer:
It is a computer network that provides access to consolidated block-level storage and is primarily used
to access data storage devices such as disk arrays and tape libraries form servers.
2. What are the components of a SAN network? Answer:
The three main components are servers, network infrastructure, and storage.
3. List 5 or more reasons why SAN architectures are important with mainframes, virtualization and
data center?
Answer:
Automatic data backup, storage monitoring, eliminates traditional dedicated connection between
network file server and storage, eliminates single points of failure to enhance storage reliability and
availability, and it allows a server to access a large data storage capacity.
4. What is the function of Fibre Channel?
Answer:
It is a high-speed data transfer channel that provides delivery of raw block data that is designed to
connect general purpose computers, mainframes and super computers.
5. What is function of iSCSI
Answer:
It is a block protocol for storage networking and runs the SCSI storage protocol usually using an
ethernet network connection.
P a g e
53 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
6. If you were going to connect a server to a SAN using iSCSI, explain which type of PCIe adaptor
should be used.
Answer:
A PCIe adaptor from a ISCSI adapter card should be used to connect a server to a SAN.
P a g e
54 | 54
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Documents
Recommended textbooks for you

Programming with Microsoft Visual Basic 2017
Computer Science
ISBN:9781337102124
Author:Diane Zak
Publisher:Cengage Learning
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage

New Perspectives on HTML5, CSS3, and JavaScript
Computer Science
ISBN:9781305503922
Author:Patrick M. Carey
Publisher:Cengage Learning
Microsoft Windows 10 Comprehensive 2019
Computer Science
ISBN:9780357392607
Author:FREUND
Publisher:Cengage
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Recommended textbooks for you
- Programming with Microsoft Visual Basic 2017Computer ScienceISBN:9781337102124Author:Diane ZakPublisher:Cengage LearningNp Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:CengageNew Perspectives on HTML5, CSS3, and JavaScriptComputer ScienceISBN:9781305503922Author:Patrick M. CareyPublisher:Cengage Learning
- Microsoft Windows 10 Comprehensive 2019Computer ScienceISBN:9780357392607Author:FREUNDPublisher:CengageCOMPREHENSIVE MICROSOFT OFFICE 365 EXCEComputer ScienceISBN:9780357392676Author:FREUND, StevenPublisher:CENGAGE L

Programming with Microsoft Visual Basic 2017
Computer Science
ISBN:9781337102124
Author:Diane Zak
Publisher:Cengage Learning
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage

New Perspectives on HTML5, CSS3, and JavaScript
Computer Science
ISBN:9781305503922
Author:Patrick M. Carey
Publisher:Cengage Learning
Microsoft Windows 10 Comprehensive 2019
Computer Science
ISBN:9780357392607
Author:FREUND
Publisher:Cengage
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L