Baker Assignment 1 Part 2 Spring 2022

docx

School

RMU *

*We aren’t endorsed by this school

Course

3212

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

54

Uploaded by SuperHumanRookPerson1476

Report
ASSIGNMENT 1 PART 2 – THEORY SPRING 2022 J. Packy Laverty laverty@rmu.edu
To better Access and Search the content of this assignment, turn on the Word Navigation Pane (Windows - Click on View and Check Navigation; MAC – Click on View and Select Document Map). Students will find that using the document FIND tool or searching GOOGLE may also be valuable for researching the review question answer. P a g e 2 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Enter your Name Here è Nicholas Baker Assignment 1 Recommended Due Date is September 26th While you will not be penalized for being a little late, you will not finish your assignments before the end of the semester. If you submit your assignment to Blackboard after Sunday, October 10th (two weeks late), your assignment grade will be penalized by 20% NO MATTER WHAT THE EXCUSE MAY BE. After October 10th your assignment will penalize by an additional 20% for each additional week the assignment is submitted late. Assignment 1 Introduction Part 2 Researching Your Answers Most requirements of this assignment will require you to research answers from your text book ( you must read the text book to get some answers ), from the Internet, from a video or any other reasonable source. Many Internet sources, video links, text book and Blackboard presentations are provided in this document to help you START your research. Assignments are always a great place to read and reference your text book. May students assume that they should start by reading the text book. While this reading the text book is ALWAYS at great idea, the following assignment questions may help you focus on what is important in this course . One strategy is to review an assignment question for important keywords, e.g., multitasking, Procedure Division, virtualization, etc. Then look for those key words in either 1) your text book "detailed" table of contents in the beginning of the book, or 2) in the index at the end of the book. Some text books have key word glossaries at the end of the chapter or end of the book. ref 6-6 Every semester the Internet sources, e.g., a Google keyword search, or Internet video, e.g., a YouTube keyword search may be improved. Better students start with research sources provided in this assignment, and then search for improved or updated answers. While your objective may be to demonstrate your knowledge to EARN an excellent grade on this assignment, better students are always looking towards the future to impress internship and career recruiters for those interesting and high entry-level salaries. Employers don't pay you for a grade in any single class or assignment. Employers will pay you BIG MONEY for demonstrated knowledge or skills. Hopefully, this assignment will prepare you. A single research source maybe very incomplete or the format or the content may not be appropriate for some required answers. Some students do not READ the text book or review the Blackboard presentations provided to you in Blackboard. Some answers are only available from Blackboard presentations or update documents. When assignment requirements may be only answered by viewing a YouTube video, you will be notified. You may cut-and-paste answers whenever appropriate. You MUST synthesize your answers to include multiple sources. I would be impressed that you consult a Google image search and paste and appropriate image to supplement your answer. P a g e 3 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
While I permit cut-and-paste, I do expect you use your own words so that you: 1. Organize the answer 2. Demonstrate that you have read what you have cut-and-pasted 3. Use any means that clearly displays that you have gained knowledge. Enter your Name Here è Nicholas Baker 4.0 - Binary Representation and Character Encoding Review Data Representation Codes and Data Types Document 4.1 Binary Representation (Storage) of Numeric Data Electronically, a digital computer is only capable of storing, understanding and processing information as combination of bits. A bit is conceptually similar to a simple light switch. Either the switch is on or it is off. Early computer hardware used a variety of different electronic technologies to store a bit. The following are some early pictures of storing bit from Pingdom ( http://royal.pingdom.com/2008/04/08/the-history-of-computer-data-storage-in-pictures/ ) and Timeline of Computer History http://www.computerhistory.org/timeline/memory-storage/ The 1024-bit Selectron. The Magnetic Drum Can you imagine the size of your laptop if we would store a bit using these 1940s and 50s technologies? It doesn't matter which electronic storage method is used, a bit is any device that is capable of having two states. It is either ON or OFF. Most modern computers have electronic components that in theory works like a light switch it is either ON or OFF. To make life easier, the number 1 is used to represent ON or True. The number 0 is used to represent the OFF or false. Binary electronics are reliable and inexpensive to build. Since all digital computer operations are based on two numeric states. All hardware computer functions are built on a combination of bits or multiples of twos, i.e., 2, 4, 8, 16, 32, 64, 128, 258, 512 and 1024. A combination of bits may be called byte or word. What is more important to remember is that a Binary Representation Code must be used by a computer to understand the meaning of those combination of bits. ASCII and ECBDIC are two examples of binary codes. P a g e 4 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
While electrical engineers may get excited about the basic bit (or one light switch), a bit does little to help an average person store or manipulate human data and information inside a computer. A bit can only represent two states. Symbolically, the ON state can represent a "Passing Grade" and the OFF state can represent a "Failing Grade" Paul Revere was his famous for warning that the British were coming used a binary digit, or two simple values. "One by Land and Two by Sea". As history reports this data representation system was quite adequate. But, what if the British want to stop at Heinz Field during a Pittsburgh Steeler's game to eat a Parmenitti Bros Sandwich before the attack? There was no third state that could represent this change in the battle plan. (A little bit of humor - a real little bit. What can you expect from a Steeler fan?) 4.2 Questions - Binary Representation (Storage) of Numeric Data Review Data Representation Codes and Data Types Document Video - Lesson 1: Bits and Byte https://www.youtube.com/watch?v=UmSelKbP4sc&list=PLAPTMtRxw27aMpAaIH1ZZU6U1GwkXAJC- &index=2 Video - Lesson 2: Memory Addresses https://www.youtube.com/watch?v=yF_txERujps&index=3&list=PLAPTMtRxw27aMpAaIH1ZZU6U1GwkXAJC- Video - Lesson 3: Integer Types in Memory https://www.youtube.com/watch?v=TCJ93TZS1xg&index=4&list=PLAPTMtRxw27aMpAaIH1ZZU6U1GwkXAJC- P a g e 5 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
4.2.1 Windows Programmer Calculator Video - Programming calculator in windows https://www.youtube.com/watch?v=95FSD0z74GI There are many calculators available to convert decimal digits (the digits we use every day) to easily convert decimal digits to binary, or binary to decimal digits. You may also easily convert decimal or binary data to hexadecimal codes, or hexadecimal codes to decimal or binary. The importance of hexadecimal codes will be discussed later. 1. When you first start Windows Calculator, it defaults to a simple calculator. Click on the View drop-down menu and select the "Programmer" Calculator mode. The Programmer Calculator will appear as the following 2. Ensure that the Dec and Qword options are selected. Enter the decimal number 1024, which is the number of bytes in a kilobyte. P a g e 6 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
2. To convert decimal 1024 to binary, select the Bin option. Decimal 1024 is stored as 10000000000 in binary. To convert 10000000000 represented in binary to decimal, simply select the Bin option. You can easily convert Binary or Decimal representation to Hexadecimal or Octal, by also selecting the target data representation method. 4.2.2 Qword, Dword, Word, or Byte The Programmer calculator provides options Qword, Dword, Word, or Byte. These options specify the number of binary bits can be stored in the binary representation code. The more bits, the larger the number may be process or the size of a processor register. For example, Qword uses 64-bits and can store and process a number up to 16 Exabytes Dword uses 32-bits and can store and process a number up to 4 Gigabytes Word uses 16-bits and can store and process a number up to 1 Kilobyte Byte uses 8 bits and can store and process a number up to 256. 4.2.3 Precision and Accuracy Precision describes the number of bit used to express a numerical value. Therefore, 64-bit codes will have more precision than 32-bit codes. Accuracy describes how correct an answer is. Since a computer stores number in binary, it cannot represent all of the numbers that a human mind can process accurately. While the greater number of bits (precision) of a binary code, e.g., 128-bit and 256-bit processors, will increase accuracy by minimize digital rounding errors, only a human can eliminate these errors. 4.2.4 The Movie Hidden Figures You are encouraged to watch the non-fiction movie titled Hidden Figures. Hidden Figures tells the incredible untold story of Katherine Jonson (Taraji P. Henson), Dorothy Vaughan (Octavia Spencer) and Mary Jackson (Janelle Monae), three brilliant African-American women working at NASA who served as the brains behind the launch into orbit of astronaut John Glenn, a stunning achievement that turned around the Space Race. P a g e 7 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
At the start of the movie Kevin Costner and Jim Parsons (of Big Bang Theory) were NASA mathematicians responsible for manually calculating the complex and accurate equations, which pioneered space flight. However, manual calculations were so tedious and slow. Dorothy Vaughan applied first IBM 7090 mainframe and FORTRAN to calculate landing coordinates for the first orbit space mission for Friendship 7. The challenges to prove the accuracy of the new mainframe equations and calculation to manual equations was a very dramatic life and death moment for Astronaut John Glenn. While these early computer and mathematical professional pioneered space flight, the challenges that face future Computer Precision and Accuracy applications will continue as we travel deeper in space, build more complex building structures, or scientifically analyze medical research data. 1. A Binary Number has two states 1 and 0. Why were multiple digit binary codes, e.g., 8-bit, 16-bit, 32 and 64- bit codes, created to handle some of the limitations associated with simple binary numbers? Your answer is Each one was created to deal with more complicated symbols such as 32bit being able to use more english letters and 64bit being able to use chinese characters. . 2. Integer, Floating Point, and Fixed Point are alternative binary representation methods to store numeric values and process mathematical operations on the content. What are the "practical" differences between the use of Integer and Floating-Point codes? Your answer is Floating-point code will greatly increase the range of any number that you can store. However, using floating- point code when it is not needed will increase the processing time to accommodate the floating-point calculations. Also the practical difference between integer and floating-Point codes are that floating point can represent much larger numbers in binary then what can be represented by an integer. It is much easier to read converted floating-point codes while integers are much narrower to represent. 3. DEFINE and EXPLAIN the differences between accuracy and precision when using a floating pointy numeric code? Your answer is Bigger codes such as 64 bit will be more precise than 16bit and since binary cannot use numbers other than 0 and 1 there is less accuracy when binary is trying to represent them. . 4. Using the movie of Hidden Figures explain the difference between quality and speed of Human accuracy and precision and computer accuracy precision both in the past and in the future. Your answer is In the past computers were still being developed and were not as accurate as they are today. Therefore, in that time humans were the computers of choice. However, now a computer can be much faster and more accurate than a human can. . 5. If 64-bit floating point or integer codes have greater precision than 16-bit floating point or integer codes, what are the practical advantages and disadvantages of having greater storage precision? Your answer is The advantages of having greater storage precision are that more information can be stored in one spot more precisely. The disadvantage is that 64bit code is greater in bit size is that it will increase the processing overhead and processing time. . 6. Covert the decimal number 56092 into binary. Your answer is 1101101100011100 . P a g e 8 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
7. Covert the binary number 10010010 into decimal. Your answer is 146 . 8. If you using the Windows Programmer calculator in the binary mode, explain the reason why you cannot ent the number 4 into calculator. Your answer is Binary can only use 0 and 1 so the number 4 and any other numbers besides 0 and 1 cannot be entered. . Review Data Representation Codes and Data Types Document 9. Floating points are stored using the following concepts. Describe each using the following as an example using the number +32.546 Concept Purpose and value to be stored Sign of the Exponent 0 Exponent 10000100 Sign of the Mantissa 0 Mantissa 0000100010111100011011 10. Floating points are stored using the following concepts. Describe each using the following as an example using the number -0000546 Concept Purpose and value to be stored Sign of the Exponent 1 Exponent 10001000 Sign of the Mantissa 0 Mantissa 0010001000000000000000 11. Describe the concept of a Radix Point in relationship to numeric data codes? Your answer is It separates the exponent from the mantissa and depending on the radix point set bit it determines the preciseness of the number. . 12. What is the relationship between IEEE 754 and 854 in relationship to numeric binary codes. Your answer is They both describe the general format of 32bit and 64bit floating point numbers. . P a g e 9 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4.3 Question – 1/3 * 3 Review Data Representation Codes and Data Types Document 1. When numeric data is stored using either the fixed or floating-point code what is the ANSWER of "1 divided 3 times 3, or (1/3 * 3)? Explain your answer. (Hint: review the Data Representation Power Point in Blackboard). Your answer is .99999999 because a processor can only process two operands at one time. 1 divided by 3 is .3333333333 stored as a primitive floating-point answer and 3 times ..333333333 is .99999999 not 1. 4.4 Questions - Binary Representation (Storage) of Character Data Review Data Representation Codes and Data Types Document - 1.4 Character Primitive Data types Text Link - ASCII http://en.wikipedia.org/wiki/Ascii Text Link - Unicode http://en.wikipedia.org/wiki/Unicode Text Link – EBCDIC https://en.wikipedia.org/wiki/EBCDIC Text link - ASCII Number Values and Binary http://www.roubaixinteractive.com/PlayGround/Binary_Conversion/The_Characters.asp 1. Explain the function, strengths and weaknesses of the following character codes 7-bit ASCII, 8-bit ASCII, and 16-bit Unicode. (Hint: many great answers to this question in the Binary Representation Presentation) Character Code s Functions, Strengths and Weaknesses 7-bit ASCII (American Standard Code for Information Interchange) Uppercase and lowercase letters, special characters, but no special formatting characters. Used by SMTP, POP3, IMAP4. 128 combinations. 8-Bit Extended ASCII (ANSI) Code Uppercase and lowercase letters, special characters, and special formatting characters. 8bit ANSCI is used by most non IBM legacy applications and operating systems. Both have 256 combinations. 8-Bit EBCDIC (Extended Binary Coded Decimal Interchange Code) Uppercase and lowercase letters, special characters, and special formatting characters. 8bit EBCDIC is used by most IBM mainframes while 8bit ANSCI is used by most non IBM legacy applications and operating systems. Both have 256 combinations. UTF-8 Uppercase and lowercase letters, special characters, and special formatting characters. 16-bit Unicode 65,536 combinations. Includes ASCII codes in English represent international character sets. Default character code for Microsoft Office and Windows. P a g e 10 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
4.4.1 Comparing ASCII, EBCDIC, HEX and Binary Use the following link ASCII or EBCDIC Translation Tables http://www.simotime.com/asc2ebc1.htm Each ASCII or EBCDIC capital-case letter, lower-case letter, digit, space or special character is stored as a with arbitrary integer number. In the Simotime table the DECimal column displays each character's arbitrary number. For example, digit "0" is stored as the decimal number 48. Remember, all stored characters, whether or not it appears stored number can be mathematically processed. The digit "0" is represented by ASCII number 48. The upper-case Letter "A" is represented by ASCII number 65. The lower-case letter "a" is represented by ASCII number 97. The following table displays the character string "Go Steelers 2019 " Line 1 displays the arbitrary ASCII character's decimal value from the Simotime table. This ASCII character number, converted to binary, is what the CPU and the programming language executes. Line 2 displays the arbitrary EBCDIC character's decimal value from the Simotime table. This EBCDIC number, converted to binary, is what the CPU and the programming language executes. Line 3 displays the hexadecimal value for the character encoded in ASCII. The Hex values will be different for EBCDIC.) Programming languages or the CPU does not understand hexadecimal values. Hexadecimal values is widely used to provide a more user-friendly way to display binary numbers, which is executed by the CPU. Text-> G o S t e e l e r s ! 2 0 1 8 1 ASCII 71 11 1 32 53 11 6 10 1 10 1 10 8 10 1 11 11 5 33 32 50 48 49 56 2 EBCDI C 19 9 15 0 64 22 6 16 2 13 3 13 3 14 7 13 3 15 3 16 2 90 64 24 2 24 0 24 1 24 8 3 HEX of ASCII 47 6F 20 53 74 65 65 6C 65 72 73 21 20 32 30 31 38 4 Binary of ASCII 0100 0111 0110 1111 001 0 000 0 0101 0011 0111 0100 0110 0101 0110 0101 0110 1100 0110 0101 0111 0010 0111 0011 001 0 000 1 001 0 000 0 0011 0010 0011 0000 0011 0001 0011 1000 Line 4 displays the binary character encoded in ASCII using 8 binary bits. Review the column with the character "8". This is not a numeric number 8. The 8-bit integer binary number 8 is 0000 1000 . But the character "8" is 0011 1000 Why? Because ASCII stored the binary number 58, which is binary is 0011 1000 Notice the importance of hexadecimal as being the shorter user-friendly version of binary. Again review the column with the character "8". The Hex value would be 38, but the longer 8-bit integer code would be 0011 1000 P a g e 11 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
4.4.2 Questions - Comparing ASCII, EBCDIC, HEX and Binary Enter your Last name in the top row, starting with a capital-case letter, followed by lower-case letters. Follow your last name by a space, and then by any three-digit number. For example the following table should display something similar to "Laverty 498" 1. Convert the Last Name Line to an ASCII character's decimal value in Line 1 from the Simotime table, or any other source. 2. Convert the Last Name Line to an EBCDIC character's decimal value in Line 2 from the Simotime table, or any other source. 3. Convert the Last Name Line to a hexadecimal value for the character encoded in ASCII in Line 3 from the Simotime table, or any other source. 4. Convert the Last Name Line to a 8 bit binary value for the character encoded in ASCII in Line 4 from the Simotime table, or any other source. Last Name B a k e r 1 2 3 1 ASCII 66 97 10 7 10 1 11 49 50 51 2 EBCDIC 194 129 14 6 13 3 153 241 242 243 3 HEX of ASCII 42 61 6B 65 72 31 32 33 4 Binary of ASCII 0100 0010 0110 0001 0110 1011 0110 0101 0111 0010 0011 0001 0011 0010 0011 0011 4.5 Questions - Character Encoding and Character Sets Review Data Representation Codes and Data Types Document Video - Characters in a computer - ASCII Tutorial https://www.youtube.com/watch?v=B1Sf1IhA0j4&list=PLRPSM55Zp3QMWFnyrAR4Loy9w3a9lHWm2 Video - Characters in a computer - Unicode Tutorial (UTF-32 & UTF-16) https://www.youtube.com/watch?v=-oYfv794R9s&list=PLRPSM55Zp3QMWFnyrAR4Loy9w3a9lHWm2&index=2 Video - Characters in a computer - Unicode Tutorial UTF-8 https://www.youtube.com/watch?v=vLBtrd9Ar28&list=PLRPSM55Zp3QMWFnyrAR4Loy9w3a9lHWm2&index=3 P a g e 12 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
1. What is the function of Character Encoding in relationship to the storage of numeric and alphanumeric data in the system memory, a program, a data file or a database? Your answer is Character encoding shows the way a coded character set is mapped into bytes to be used by the computer. Character encoding determines the combination of bits that are stored and processed. 2. What is the function of Character Set in relationship to the storage of numeric and alphanumeric data in the system memory, a program, a data file or a database? Your answer is Character sets determine the visual representation of character displayed on a web page. To display an HTML page correctly, a web browser must know the character set used in the page. Character sets are also collections of characters that might be used by multiple languages. 3. Given the Java statements int hours; double pay, rate. Explain whether these Java statements are related to Character Encoding or Character Sets. Your answer is These java statements are related because in java “int” tells java to store the number as an integer value and “double” tells it to store it as a decimal/float value. Java is encoding the way the values are stored similar to how characters are encoded and stored. 4. Given the following standards: UTF-8, UTF-16, ISO-8859-1, ISO-8859-6, Latin, Extended Latin. Explain whether these Java statements are related to Character Encoding or Character Sets. Your answer is These are related because they are standards that can be represented through character encoding and character sets. Collating sequence https://www.ibm.com/support/knowledgecenter/ssw_ibm_i_61/db2/rbafzsortsequence.htm Collating Sequence - The EBCDIC & ASCII Environments http://www.simotime.com/cblclt01.htm P a g e 13 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
4.6 ASCII and EBCDIC Translation Tables and Collating Sequence Review Data Representation Codes and Data Types Document ASCII or EBCDIC Translation Tables http://www.simotime.com/asc2ebc1.htm Use the ASCII or EBCDIC Translation Tables. Under the ASCII column search to the listed character in the following table, and then provide the decimal value. Under the EBDIC column search to the listed character in the following table, and then provide the decimal value. Be careful to distinguish between upper and lower case letters, numbers, and spaces. Complete the following table ASCII Character ASCII Decimal Value EBCDIC Character EBCDIC Decimal Value A 65 A 193 a 97 A 129 Space Space 1 1 3 3 Z z ASCII and EBCDIC characters are actually stored as binary values, either 7or bits. To better understand the storage of ASCII or EBCDIC, one should review the decimal value or decimal number. While the letter "A" is stored as a number, the processor or operating system does not treat the value as a number that may be added, subtracted, or any other math operation. Programming languages and databases store numeric and character data as string, integer, and floating point data types. Programming languages specify data type rules such as "You cannot perform a mathematical operation on strings, such as adding the letter "A" to the letter "T", i.e.., "A" + "T". While both ASCII and ECBDIC do stores characters as numbers behind the scenes, these character storage numbers are arbitrary and have no mathematical significance. Other programming language data type rules would be that it would illogical to perform math on a character "1", "2", or "3", or to compare ASCII or ECBDIC strings to numeric codes. However, the following questions will ask you to consider another set of data type rules called "collating sequence" which will affect how character codes are compared or sorted. 4.7 Questions - ASCII and EBCDIC Collating Sequences 1. Explain the concept of the Collating Sequence. Your answer is A collating sequence defines how characters in a character set relate to each other when they are compared and ordered. 2. Many systems can store character data in a data file or database as either ASCII, ANSI, ECBDIC, or UNICODE. Why is it important to specify character encoding scheme in relationship to the concept of the Collating Sequence? Your answer is It allows the processes that are done on the data to be easier and more organized. It allows for rational comparisons and sorting. 3. Using the previous link for a table of ASCII decimal values, why won't the capital letter "A" be equal to a lower-case letter "a", i.e. IF "A" = "a" …. Your answer is If the lower case letters and capital letters had the same value the computer would not be able to distinguish between a lower case letter and a capital letter. 4. Using the previous link for a table of ASCII decimal values, if you compare the capital letter "A" to the character numeric digit "1", which will be greater, i.e., IF "A" > "1" Your answer is P a g e 14 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
The capital A would be greater than the number 1 because in the ASCII collating sequence lower case letters>upper case letters>digits>space. 5. Using the previous link for a table of ASCII decimal values, a summary of the "ASCII collating (sorting) sequence" is sorted from lowest decimal value to highest decimal value "space < numeric digits < capital letters < lower case letters". Using the previous link for a table of ECBDIC decimal values, provide a summary of the "ECBDIC collating (sorting) sequence" for a space, numeric digits, capital letters, and lower case letters. Your answer is Digits>upper case letters> lower case letters>space 4.8 Questions - MIME Protocol Review Data Representation Codes and Data Types Document Representation 1. Where is function of the MIME protocol in terms or Internet Email, Web Pages and XML? Your answer is MIME is an internet standard that extends the format of email to support text in character sets other than ASCII, non-text attachments, message bodies with multiple parts, header information in non-ASCII character sets. 2. Where is function of a MIME type or content type in terms or Internet Email, Web Pages and XML? Your answer is MIME is a type of standardized way to indicate the format and nature of a document. Text link - Octal http://en.wikipedia.org/wiki/Octal Text Link- Which is better UTF-8 or ISO-? http://blog.wordtothewise.com/2010/03/which-is-better-utf-8-or-iso/ Text link - Understanding text encoding in Word http://office.microsoft.com/en-us/outlook-help/choose-text-encoding-when-you-open-and-save-files- HA010121249.aspx Text link- Hexadecimal http://en.wikipedia.org/wiki/Hexadecimal 3. What is the purpose and uses of Octal and Hexadecimal Binary Codes? (Hint: they are not used to store data in a binary format.) Your answer is Octal and hex are used primarily to communicate to humans the state of individual bits in a computer system. They help put the human language in a form a computer can understand. They are a numeral system that have different bases for numbers as well. P a g e 15 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4.9 Questions - Hexadecimal Notation Review Data Representation Codes and Data Types Document Representation See 1.5 Hexadecimal Notation Text link- Why are memory addresses are represented using hexadecimal numbers? https://stackoverflow.com/questions/5329916/why-are-memory-addresses-are-represented-using-hexadecimal- numbers Text Link- Colors on web pages http://www.linfo.org/hexadecimal.html Text link - CDMA Hardware Identifiers - ESN, MEID, pESN https://sites.google.com/site/bbayles/index/cdma_hardware_id Text Link- Working with Binary and Hexadecimal Numbers https://www.lifewire.com/working-with-binary-and-hexadecimal-numbers-816247 Video - Hexadecimal Math – CompTIA Network+ N10-006 – 5.2 https://www.professormesser.com/network-plus/n10-006/hexadecimal-math/ 1. Explain the most important reason why computer professional use hexadecimal notation instead of binary. Answer è The most important reason computer professionals use hex notation instead of binary is because it is much easier to represent binary numbers in hex notation than it is in any other binary coding system. 2. List several programming languages or operation systems that use binary, floating-point , ASCII, EBCDIC or Unicode to store and process data. Answer è IBM mainframe, IBM, Apple IOS, Mac OS 3. List several programming languages or operation systems that use hexadecimal to store and process data. Answer è No Computer or Programming Language uses, stores or processes directly using hexadecimal codes. 4. Use the phone number 412-322-5225. Use the Windows Programmer Calculator or any other decimal-to- binary convertor to convert this telephone number to binary. List the original telephone number and the binary conversion. Answer è 412-322-5224 1111 0101 1100 0011 0110 1100 1000 1000 5. Use the Windows Programmer Calculator or any other binary-to-hex convertor to convert this previous binary number to hex. List hexadecimal number. Answer è 0xF5C36C88 6. You see the following value 0xF96C. What does the prefix 0x indicate? Answer è This prefix says that the number is being written in hex. P a g e 16 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
7. Hexadecimal values include 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F. Why does Hexadecimal use the values of A, B, C, D, E, and F? Answer è Since hexadecimal is a 16 base numeral system it uses these letters to take the code up to15. 8. How many binary digits does a single Hexadecimal value represent? Answer è 4 binary digits 9. What decimal value does Hexadecimal value of A represent? Answer è 10 10. What binary digits does Hexadecimal value of A represent? Answer è 1010 Text Link - ASCII or EBCDIC Translation Tables http://www.simotime.com/asc2ebc1.htm Don't get hexadecimal values of A, B, C, D, E, and F confused with characters "A", "B", "C", "D", "E", and "F". They represent two different things. Hexadecimal is a base 16 number system that is used to simplify the understanding of long binary numbers. Binary digits are used to store integers, floating point, and characters. For example, 0xF, or hexadecimal value F represents the four binary digits, i.e., 1111, not the character "F" To represent the character "F" in hexadecimal requires two hexadecimal values, or 0x46, since ASCII is stored in eight binary digits i.e., 0100 0110. 11. How many does hexadecimal values are used to represent the ASCII character capital letter "P" represent? Answer è Two values in the conversion to hexadecimal is 50. 12. List the hexadecimal values that are used to represent the ASCII character capital letter "P" represent? Answer è 50 13. List the hexadecimal values that are used to represent the EBCDIC character capital letter "P" represent? Answer è D7 14. Convert the following decimal number 16480 to hexadecimal. Answer è 4060 P a g e 17 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
15. Convert the following binary numbers 0001 0110 1111 1111 1001 0110 0100 0101 1011 to hexadecimal. Answer è 16FF9645N 16. What is wrong with the following hexadecimal value, i.e., 0x16FF9641GH . Answer è Hexadecimal does not use the character “G”. 17. What is wrong with the following binary values, i.e., 2001 0111 1111 1111 Answer è Binary cannot use the number 2 and is limited to only 0 and 1. 18. Not all ASCII or EBCDIC characters stored in a text document or program source code may be visible in to the human eye. Explain how the process how hexadecimal characters may be used to find illegal ASCII or EBCDIC characters stored in in a text document or program source code. (See 1.5.5) Answer è Some ECBDIC values become so complex where some values were not even displayed so hexadecimal was used to see something even if the characters were not displayed. You are provided with the following EBCDIC and hexadecimal display of a customer data file. Answer the following questions. 19. On line 1 spaces are visible (displayed) between columns 29 and 38 , or between Washington and George. Not all ASCII or EBCDIC characters stored in a data file may be visible to the human eye. Explain the process of hexadecimal values may be used to prove that spaces displayed between columns 29 and 38, or between Washington and George are valid spaces. (See 1.5.6 for answer.) Answer è EBCDIC hex values start with F, it is displayed as a numeric digit but it not stored as an integer or floating point that you perform math. But the HEX ON command must be used first. 20. On line 1 spaces are also visible (displayed) between columns 9 and 16. Explain the process how hexadecimal values may be used to prove that spaces displayed between columns 9 and 16 represent different data besides spaces. What type of data is actually stored between columns 9 and 16, even though spaces are displayed? (See 1.5.6 or answer.) Answer è When a programmer views crazy displayed characters in a text editor, the odds are that the columns contain numeric integer or floating-point data representation codes, which you can be used with math operations. These columns store the account balance and credit limit. Logical candidate for a numeric integer or floating-point representation code or data type. P a g e 18 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
21. On line 1 numbers are visible (displayed) between columns 1 and 8. Explain the process how hexadecimal values may be used to prove that the numbers displayed between columns 1 and 8 represent EBCDIC characters and not integer or floating-point data and cannot be used for math operations. (See 1.5.6) Answer è The character that is displayed first is stored as F1 and the second character that is displayed is stored as F7. Text link- Why are memory addresses are represented using hexadecimal numbers? https://stackoverflow.com/questions/5329916/why-are-memory-addresses-are-represented-using-hexadecimal- numbers Text Link- Colors on web pages http://www.linfo.org/hexadecimal.html Text link - CDMA Hardware Identifiers - ESN, MEID, pESN https://sites.google.com/site/bbayles/index/cdma_hardware_id Text Link- Working with Binary and Hexadecimal Numbers https://www.lifewire.com/working-with-binary-and-hexadecimal-numbers-816247 Video - Hexadecimal Math – CompTIA Network+ N10-006 – 5.2 https://www.professormesser.com/network-plus/n10-006/hexadecimal-math/ 22. List several examples how hexadecimal values may be used to simplify binary codes in operating system, hardware devices, and networking. (See 1.5.7 for answer.) Answer è Hex: binary: F42000 1111 0100 0010 0000 0000 0000 F540 1111 0101 0100 0000 The hexadecimal values are much more compact when compared to binary values that represent the same data. P a g e 19 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
5.0 Program Languages, Variables and Data Types 5.1 Questions - Computer Variables and Data Types Review Data Representation Codes and Data Types Document Representation 1. All program languages support the storage concept of a variable name to store data to be processed. Provide a practical description of the role of computer variable name. (See 2.2.1 for answer.) Answer è The variable name typically describes the data that it represents and stores. There are variable names that are not allowed to be used such as “print” which is a reserve word that is the display operation of the python programming language. 2. Most program languages use the assignment statement or HOURS= 40. In simply terms what function of the equal sign in an assignment statement (See 2.2.3 for answer.) Answer è It tells the programming language to store that value under the assigned representation/variable name. 3. Program languages assign a data type to a variable name. Why are data types assigned to program variable names? Answer è Data types are assigned to represent the type of data that is stored and define the limits of the operations that can be performed with that data. Ex. Word values or strings cannot be divided or multiplied the same way integers or float values can be. 4. Compare the differences between the Context method and the Declaration Method. Answer è Context method is when a program automatically assigns a data type based on the contents to the right of the equal sign. The Declaration method is used to create variables and assign data types to the contents immediately. 6. Compare the differences between the Option Explicit and Strongly -type variables. Answer è Option Explicit states that a carriable must be assigned before use and it also strongly enforces the data type rules for content. When illegal character data is converted to a numeric binary code the contents are changed to zero. In Option Strongly the options cannot be turned off like they can be in option explicit. P a g e 20 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
5.2 Questions - How does EXCEL automatically Stores Data using Binary Codes Review Data Representation Codes and Data Types Document Representation 1. Excel cell B4 is similar to which program language concept. (See 2.5 for answer.) Answer è An Excel cell is very similar to the concept of a variable name where data is stored under a specific address/name. 2. Explain the process how EXCEL automatically assigns datatypes and data representation codes. (See 2.5 for answer.) Answer è Excel does not use the term data types because it describes data types as Formatting and the Excel formatting is a combination of data types and visual display of data. 3. When data is stored in an Excel, Excel automatically selects the best binary code used to store your Excel label or numeric value. List the appropriate Data Type that BEST matches the sample data for the data you type into an Excel cell, e.g., 7-bit ASCII, 8-bit ASCII, and Unicode, Floating point, Fixed-point, Octal or Hexadecimal. (Hint: review the Data Representation Power Point in Blackboard). DO NOT TRANSLATE YOUR ANSWER TO BINARY. Applying Binary Representation Codes used by Excel Type of data Binary representation codes used to store this data by Excel When you type test words (labels), e.g., "Go Steelers" into an Excel Cell String Unicode When you type value 16 into an Excel Cell Integer data type When you type value $5.18 into an Excel Cell Floating point P a g e 21 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
5.3 Questions - Oracle Data Types Video - Oracle - Intro to Data Types https://www.youtube.com/watch?v=SCDBqfG3Ay8 Text link - Oracle Built-in Datatypes http://docs.oracle.com/cd/B19306_01/server.102/b14200/sql_elements001.htm#i54330 Text Link- Oracle Datatypes http://ss64.com/ora/syntax-datatypes.html 1. When is an Oracle data type assigned to a table column? Answer è When a procedure or instruction is created and a data type for each argument must be specified. 2. When data is stored in an Oracle table column this data is stored as a binary code. Oracle applies binary code by declaring a column as a "Data Type". List the appropriate Oracle Data Type that BEST matches the binary code, e.g., 7-bit ASCII, 8-bit ASCII, Unicode, Floating point, Fixed-point, Octal or Hexadecimal. There may be more one Oracle data type that matches a category of binary code because of precision, e.g., an 8-bit integer, 16-bit integer, 32-bit integer, or 64- bit integer. Not all binary code categories may be supported by Oracle. (Hint: review the Data Representation Power Point in Blackboard Oracle Data Types used to Implement Numeric and Character Binary Codes Binary Code Oracle Data Types Integers NUMBER Fixed Floating Point BINARY FLOAT Floating Point BINARY_FLOAT 7-bit ASCII CHAR 8-bit ASCII CHAR Unicode NCHAR Hexadecimal NVARCHAR2 P a g e 22 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
5.4 Questions - Java Data Types Video - Java - Basic Data Types https://www.youtube.com/watch?v=0MFC_Vw9NxY Text Link - Primitive Data Types https://docs.oracle.com/javase/tutorial/java/nutsandbolts/datatypes.html Text Link - Java Data Types: Understanding the 8 Primitive Data Types in Java- https://blog.udemy.com/java-data-types/ Text Link - Java String is Special https://www.ntu.edu.sg/home/ehchua/programming/java/J3d_String.html Text Link - Java - Strings Class http://www.tutorialspoint.com/java/java_strings.htm 1. When is a Java data type assigned to a Java Variable or object? Answer è When a variable or object is created or initialized. The initializing statement for a integer would look like: int number = 2; 2. When data is stored in a Java variable this data is stored as a binary code. Java applies an appropriate binary code by declaring a variable as a "Data Type". List the appropriate Java Data Type that BEST matches the binary code, e.g., 7-bit ASCII, 8-bit ASCII, and Unicode, Floating point, Fixed-point, Octal or Hexadecimal. There may be more one Java data type that matches a category of binary code because of precision, e.g., an 8-bit integer, 16-bit integer, 32-bit integer, or 64- bit integer. Not all binary code categories may be supported by Java. (Hint: review the Data Representation Power Point in Blackboard Java Data Types used to Implement Numeric and Character Binary Codes Binary Code Java Data Types Integers int Fixed Floating Point Float, double Floating Point Float, double 7-bit ASCII double 8-bit ASCII double Unicode Char, string Hexadecimal Char, int P a g e 23 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
5.5 Questions - COBOL Data Types Video - COBOL - Data Types https://www.youtube.com/watch?v=H-xek9caXb0 Text Link - COBOL - Data Types https://www.tutorialspoint.com/cobol/cobol_data_types.htm Text Link- COBOL Data Types http://www.mainframestechhelp.com/tutorials/cobol/cobol-data-types.htm Text ink - COBOL Usage is DISPLAY http://www.mainframestechhelp.com/tutorials/cobol/cobol-display-computation.htm Text Link - COBOL Usage is COMP http://www.mainframestechhelp.com/tutorials/cobol/cobol-computation.htm Text Link- COBOL Usage is COMP-1 http://www.mainframestechhelp.com/tutorials/cobol/cobol-comp-1.htm Text Link - COBOL Usage is COMP-2 http://www.mainframestechhelp.com/tutorials/cobol/cobol-comp-2.htm Text Link - COBOL Usage is COMP-3 http://www.mainframestechhelp.com/tutorials/cobol/cobol-comp-3.htm 1. When is a COBOL data type assigned to a COBOL Variable (See 2.3 and 2.7 for answer.) Answer è The COBOL Data Division is used to declare variables before the Procedure Division. 2. When data is stored in a Java variable this data is stored as a binary code. Java applies an appropriate binary code by declaring a variable as a "Data Type". List the appropriate COBOL Data Type that BEST matches the binary code, e.g., 7-bit ASCII, 8-bit ASCII, and Unicode, Floating point, Fixed-point, Octal or Hexadecimal. There may be more one Java data type that matches a category of binary code because of precision, e.g., an 8-bit integer, 16-bit integer, 32-bit integer, or 64- bit integer. Not all binary code categories may be supported by COBOL. (Hint: review the Data Representation Power Point in Blackboard COBOL Data Types used to Implement Numeric and Character Binary Codes Binary Code COBOL Data Types Integers numeric Fixed Floating Point Alpha numeric Floating Point Alpha numeric 7-bit ASCII Alpha numeric 8-bit ASCII Alpha numeric Unicode sign Hexadecimal Alpha numeric P a g e 24 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
5.4 One Last Program Language Question Reconsider the first statement of following VB.NET program: (See. 2.8 for Answer.) HOURS = 40 RATE = 8.00 PAY = HOURS*RATE PRINT PAY END Given the statement HOURS=40, how does the programming language or computer know that a person worked 40 hours ? Answer è I told the program that the value 40 was to be stored in the variable name/address HOURS. P a g e 25 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
6.0 Internal Memory Read the Introduction to Memory and Task Management document Computer Memory Concepts - http://www.computermemoryupgrade.net/index1.html Maximum Memory, Standard Memory and Slots - http://www.computermemoryupgrade.net/maximum-standard- memory-slots.html Memory RAM Speed - Access Time, Megahertz (MHz), Bytes Per Second - http://www.computermemoryupgrade.net/measuring-ram-speed.html System DRAM Technologies - http://www.computermemoryupgrade.net/system-dram-technologies.html DIMM - http://en.wikipedia.org/wiki/DIMM Double Data Rate - http://en.wikipedia.org/wiki/Double_data_rate DDR - http://en.wikipedia.org/wiki/DDR_SDRAM DDR2 - http://en.wikipedia.org/wiki/DDR2_SDRAM DDR3 - http://en.wikipedia.org/wiki/DDR3_SDRAM DDR4 Intel set to bring next-gen DDR4 DRAM memory to computers later this year - http://www.pcworld.com/article/2085880/intel-set-to-bring-ddr4-dram-to-computers-in-third-quarter.html Intel plans to bring speedy DDR4 DRAM to computers in Q3 - http://www.computerworld.com/s/article/9245266/Intel_plans_to_bring_speedy_DDR4_DRAM_to_computers_in _Q3 Everything you want to know about Dual- Triple and Quad Channel Memory Architectures - http://www.hardwaresecrets.com/article/133 Multi-channel memory architectures - http://en.wikipedia.org/wiki/Multi-channel_memory_architecture Dual Chanel Architecture - http://en.wikipedia.org/wiki/Dual-channel_architecture Video - PC Memory Tutorial - http://www.youtube.com/watch?v=wZV7UV31VGg Video - Understanding and upgrading your RAM - http://www.youtube.com/watch?v=e68YyNTeL18 Video - Installing your PC's memory - http://www.youtube.com/watch?v=Hw-zreo1hBE Video - Learning about Memory (RAM) - HP Workbench - http://www.youtube.com/watch? v=WJ5kRofuGLQ Video - How Much Memory (RAM) do I Need? - HP Workbench - http://www.youtube.com/watch? v=QNrzycPDwvk Video - Guide to RAM Memory Channels as Fast As Possible - http://www.youtube.com/watch?v=- D8fhsXqq4o Video - Dual & Triple Channel Memory - http://www.youtube.com/watch?v=ARi52co3ANs Video - Motherboard RAM Slots – A+ 220-901 1.2 (Professor Messer) https://www.youtube.com/watch? v=bDKCSvmlPuc&list=PLJytQuP7cOhcnzWnPAnePNqxrsD9gSId5&index=3 Video - Understanding PC Memory - A+ 220-901 1.2 (Professor Messer) https://www.youtube.com/watch? v=bmRMRlDXph0&index=11&list=PLJytQuP7cOhcnzWnPAnePNqxrsD9gSId5 P a g e 26 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Random Access Memory - http://www.kitchentablecomputers.com/ram1.php Choosing RAM - http://www.kitchentablecomputers.com/ram2.php Pictures of Selected RAM Form Factors - http://www.kitchentablecomputers.com/ram3.php 6.1 Questions - Memory Architectures 1. Provide a detailed description of the following internal (RAM) memory concepts. Us an Snipping tool and paste a Google image that best illustrates the concept Memory Architectures Detailed Description Image DIMM Is a type of module (form factor) that can mount memory chips on both sides. SDRAM Is a type of memory technology (type of chip) that is mounted on DIMM module. Is any dynamic random-access memory where the operation of its external pin interface is coordinated by an externally supplied clock signal. DDR SDRAM Solid state memory that operates at twice the system clock speed by transferring data twice per cycle. DDR2 SDRAM A double data rate synchronous dynamic random access memory interface. Superseded DDR SDRAM. DDR3 SDRAM A type of synchronous dynamic random- access memory with a high bandwidth interface and has been in use since 2007. P a g e 27 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
DDR4 SDRAM A type of synchronous dynamic random- access memory with a high bandwidth interface. Latency The number of clock cycles it takes for it to serve data after a request is made. Can also be seen in networks as the time it takes for a data packet to reach its destination which is usually represented the ping number where the larger the number the greater latency. ECC Used to detect and correct n-bit data corruption which occurs in memory. GDDR3 Type of memory that is used in graphics cards to store graphic and display data. P a g e 28 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Dual Channel DDRs Version of multi-channel memory that increases data transfer speed by adding more channels of communication between the memory and the memory controller. In the picture the orange represents one channel and the yellow represents the other channel. Quad Channel DDRs Has four memory slots and supports four memory cards/sticks. 6.2 Memory Performance Ratings and Form Factors DDR Performance Ratings DDR, DDR2, and DDR3 are rated using by two specifications PC or PC2 and DDR or DDR2. P a g e 29 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
DDR-xxx and DDR2-xxx specifications indicates the chip data rate, which is based on the clock speed of the Front-Side Bus. Using the PC2-3200/DDR2-400B DIMM in the DDR2 Performance Ratings below let us assume the Front-Side Bus speed is 200-Mhtrz. The FSB clock speed is determined by the technology used by the mother board. The FSB speed is always significantly slower that the processor speed. At first glance, one may assume that at 200-Mhrtz we can get 200 million units of work done. But here is the beauty of the DDR (DOUBLE DATE RATE) technology – is double-pumped or double-rated. When the FSB bus operates with double data rate transfers data it performs twice the work of the clock speed, e.g., this occurs once of the rising voltage of the pulse and once on the falling voltage of the clock signal. It kinda like your boss making you work twice as hard during your 8-hour shift. Double-channel technology is NOT double-rated technology . Normally the processor has only one path from the processor to RAM (one FSB). Double-channel means that there are two FSB busses. With double- channel technology two transfers can be made simultaneously. Again, it may be like your boss giving you an extra worker to help you during your 8-hjour shift. The bottom line is a 200-Mhtrz front-side bus gets 400-Mhrtz of work done. Again, the speed of the FSB is determined by your motherboard. PC ratings measure the maximum data transfer rate (not the chip data rate). PC ratings are more likely be used to purchase new RAM. A PC2-3200 indicates that the maximum data transfer rate of the DIMM module is 3,200,000 bytes, not bits. Some of the PC ratings truncate the last two digits. For example, the PC2-4200 DIMM modules actually has a maximum data transfer rate of 4,266,000 bytes. DDR and DDR2 PC ratings, the Chip Data Rate and the Front –Side Bus speed are directly related. Consider the following: PC Rating divided by 8 equals Chip Data Transfer Rate. divided by 2 equals Front-Side Bus Speed PC2-3200 /8 400 /2 200 Mhrtz Ok, Ok. Why do we divide by 8? The Front side but is 64-bits wide. A byte is 8 bits. 64 /8bits = 8 bytes Ok, Ok. Why do we divide by 2? Did you forget double pumping or the meaning of double rated chip already. We can also perform the conversion the other way. Front-side bus speed multiply by 2 equals Chip Data Transfer Rate multiply by 8 equals PC rating. 200 Mhrtz x2 400 8 PC2-3200 DDR2 Performance Ratings DIMM Module Name DIMM Maximum Data Transfer Rate DDR Chip name Chip Data Transfer Rate I/O Clock PC2-3200 3200 DDR2-400B DDR2-400C 400 200 PC2-4200* 4266 DDR2-533B DDR2-533C 533 266 PC2-5300* 5333 DDR2-667C DDR2-667D 667 333 PC2-6400 6400 DDR2-800C DDR2-800D DDR2-800E 800 400 PC2-8500* 8533 DDR2-1066E DDR2-1066F 1066 533 P a g e 30 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
P a g e 31 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Comparing DDR Technologies DDR, DDR2, and DDR3 DIMMS vary physically and architecturally. DDR2 DIMMs are not designed to be backward compatible with DDR DIMMs. DDR DIMMs have 184 pins while DDR2/DDR3 DIMMS have 240 pins. Even though DDR2/DDR3 DIMMS have the same number of pins you cannot mix them do the position of the notch on the DIMM. DDR DIMM Notches The notch on DDR2 DIMMs is in a different position from DDR DIMMs, and the pin density is higher than DDR DIMMs in desktops Within a DDR technology category type you can mix older DDR technology, e.g., PC2-4200 with a newer DDR technology, e.g., PC2-6400. While higher performance DDR2 DIMMs are compatible with lower performance DDR2 DIMMs; however, the higher performance module runs at the lower module's frequency. Comparing DDR RAM DDR Category Type Pins Frequenc y Chip Data Transfer Rate PC Rating Module Size DDR DIMMs (2001) 184 desktop 200 laptop 100-200 200-400 PC-2100 PC-2700 PC-3200 256MB, 512 MB, 1GB, 2GB DDR2 DIMMS (2003) 240 desktop 200 laptop 200-533 400-1066 PC2-3200 PC2-4200 PC2-5300 PC2-6400 PC2-8500 512 MB, 1GB, 2GB, 4GB, 8GB DDR3 DIMMS ( improved power consuption) (2007) 240 desk top 204 laptop 400-800 1066-200 PC3-8500 PC3-1333 PC3-12800 PC3-14400 PC3-1600 512 MB, 1GB, 2GB, 4GB, 8GB DDR4 DIMMS (Expected 2012) DDR Option Codes Explanation P a g e 32 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
PC2-4200 ECC The DDR "ECC" option indicates that an extra data byte lane is used for correcting minor errors and detecting major errors for better reliability PC2-4200 R The DDR "R" option indicates that module is "registered". A "registered" DIMM improves signal integrity (and hence potentially clock rates and physical slot capacity) by electrically buffering the signals at a cost of an extra clock of increased latency. The highest storage capacity for a DIMM is normally a registered module PC2-4200 F The DDR "F" or "FB" option indicates that module is "fully buffered" and not have the same notch position as other classes. Fully buffered modules cannot be used with motherboards that are made for registered modules, and the different notch position physically prevents their insertion. GDDR 4-4200 Graphics Double Data Rate, version 4) is a type of graphics card memory. Unlike standard DDR memory the graphics processor can read and write to the memory at the same time (dual-ported), has a hardware reset feature and lower power consumption. 2. What is the relationship between the concept of a DIMM and a DDR? Answer è DDR is a type of DIMM where DIMM is a series of RAM integrated circuits and DDR is memory integrated circuits and DDR is on the RAM and DIMM is on the motherboard and work together. 3. What type of memory module(s) use(s) 184 pins? Answer è DDR SDRAM 4. What type of memory module(s) use(s) 240 pins? Answer è DDR2 RAM 5. By looking at the physical appearance of the DDR2 and DDR3 memory module how would one determine the difference between the two types of memory modules? Answer è DDR2 and DDR3 have different speed and storage limitations that can help tell them apart such as DDR3 is typically faster than DDR2 RAM and can also has greater storage capacity. 6. You see a memory module that states that it is a PC2-8500 module. What does the number 8500 mean? Answer è 8500 is the maximum data transfer rate that the DIMM RAM can operate at. 7. What is the purpose of a PC rating when discussing internal modules? Answer è It allows easy comparison of internal modules in megabytes per second in a computer. 8. What is the relationship between PC ratings and the Front Side Bus Speed? Use PC2-8500 as an example. Answer è Since the front side bus connects the processor to the RAM and other components it is important that the bus speed can manage both the speed of the RAM and processor so that a bottleneck is not created when transferring information. 6.3 Question - Crucial.com What type of memory does your computer use Performance Ratings and Form Factors? P a g e 33 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
9. Go to crucial.com or any other online supplier of computer memory. Enter the model and type of your computer. Find the type of computer memory that is most appropriate for your computer. Use a Snipping Tool to document your findings below. P a g e 34 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
In my desktop I have 4 sticks of RAM that are 8gb each that run at 3200ghz which means I end up with 32gb of Ram running at 3200 but my processor has a RAM speed limit of 3000ghz so my ram only runs at 3000ghz instead of 3200ghz. 10. What is maximum amount supported by your motherboard? Answer è 64gb 11. What is recommended type of memory to be used by your computer? Answer è 288 pin ddr4 ram http://windows.microsoft.com/en-US/windows7/Find-out-how-much-RAM-your-computer-has http://www.online-tech-tips.com/computer-tips/how-to-determine-the-amount-of-ram-installed-on-your-computer/ http://windows.microsoft.com/en-US/windows-vista/How-do-I-know-if-my-computer-has-a-memory-problem http://windows.microsoft.com/en-US/windows7/Diagnosing-memory-problems-on-your-computer http://www.computerworld.com/s/article/9158258/Most_Windows_7_PCs_max_out_memory P a g e 35 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
6.4 Questions - Memory Failures 12. What are the three major causes of computer memory failures? Your answer is Power surges, improper installation, defective hardware, and malicious software. 13. What is the name of the new tool provided by Windows Vista and 7 that may be used to diagnose memory problems? Your answer is The Windows Memory Diagnostic tool. I have actually been forced to use it a couple times when I was trying to use memory from a prebuilt computer in the ASUS motherboard that I have now. Turns out HP put a marking code in their RAM that is used in any other computer it would make windows throw a memory management Blue screen of death. 6.6 Questions - Difference between Notebook and Desktop Memory The Difference Between Notebook and Desktop Memory - http://www.webopedia.com/DidYouKnow/Computer_Science/2008/laptop_desktop_memory.asp Can Laptop Memory Be Used in Desktop and the Other Way Around? - http://www.popularmemory.org/can- laptop-memory-be-used-in-desktop/ 14. What are the differences between laptop memory and desktop memory? Your answer is Desktop ram is larger when compared to laptop memory and changing the ram in a desktop is worlds easier than changing the ram in a laptop. 15. What factors affect the maximum amount of RAM that can be installed into your computer? Your answer is The maximum amount of ram is dependent on the CPU, motherboard, and the operating system. P a g e 36 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7.0 Functions of an Operating System Operating System Functions - http://computer.howstuffworks.com/operating-system2.htm The main functions of an operating system - http://www.ukessays.com/essays/information-technology/the-main- functions.php Operating Systems - https://www.cs.umd.edu/users/oleary/c662/opsys.pdf How Operating Systems Work - http://computer.howstuffworks.com/operating-system.htm Process (computing) - http://en.wikipedia.org/wiki/Process_(computing) What is a computer process? - http://whatis.techtarget.com/definition/process Video - Computer Tour - http://computer.howstuffworks.com/23-computer-tour-video.htm Video - Introduction to Operating Systems - https://www.youtube.com/watch?v=MzVGL44eq9w Video - Operating Systems - Lecture 1 - https://www.youtube.com/watch?v=55FeqGGzE5Q Video - Processes & Threads in Operating Systems - https://www.youtube.com/watch?v=gif8znTA1Jw P a g e 37 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7.1 Functions of an Operating System P a g e 38 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7.2 Questions - Functions of an Operating System 1. An Operating System provides many Services. Use the following table and provide a description for each of the following operating system function or service. DO NOT COPY-AND-PASTE images only text. Operating System Function/Service Description Process (Task) Management The OS must allocate resources to processes, enable processes to share and exchange information, protect resources of each process and enable synchronization amount process. Memory Management Is the process of controlling and coordinating computer memory, assigning portions called blocks to various running programs to optimize overall system performance Time Management Program that allocates how OS processor time to execute system, application, middleware programs. Device Management (I/O control and Device Drivers) Software modules that can be plugged into an operating system to utilize a certain device. File System It is a method and data structure that the operating system uses to control how data is stored and retrieved. Security Used as protection for the information of the operating system and the information on the computer that the user has. It is designed to provide a centralized platform for security teams to manage network security. User Interfaces The interface of which the user is able to interact with the software and hardware of the computer. 2 What is meant by the concept of concurrency ? Answer: It means executing two or more tasks at the same time or in parallel with each other. P a g e 39 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7.3 Questions – Interrupt Processing Read the Introduction to Memory and Task Management document Processor Management http://computer.howstuffworks.com/operating-system5.htm What is Interrupt Processing? Chapter 3.7.1: Overview of z/OS: Introduction to the Mainframe: z/OS basics 3. What is Interrupt Processing? When an interrupt occurs what happens next in the processing cycle? Answer: An interrupt is an event that alters the sequence in which the processor executes instructions. What happens next in the processing cycle depends upon the form of interruption that took place. 7. What is the difference between an I/O Interrupt and an External Interrupt? Answer: An I/O interrupts occur when the channel subsystem signals a change of status, such as an input/output operation completing, an error occurring, or an I/O device such as a printer has become ready to work. An External interrupt indicate any of the several events, such as time interval expiring, the operator pressing the interrupt key on the console or the processor receiving a signal from another processor. Process Control Block - http://computer.howstuffworks.com/operating-system6.htm 8. What is the role of a Process Control Block in relationships to Processes and Interrupts? Answer: It helps the operating system support multiple processes and provides for multiprocessing. It contains information such that if an interrupt occurs then the process can begin form where it left off. 9. List the type of information stored in a Process Control Block. Answer: Each block memory contains information about the process stat, program counter, stack pointer, status of opened files, scheduling algorithms and more. Computer Processes - http://en.wikipedia.org/wiki/Process_(computing) Threads - http://en.wikipedia.org/wiki/Thread_(computer_science) Difference between a process and a thread http://wiki.answers.com/Q/What_is_the_difference_between_a_computer_process_and_thread Shell (computing) - http://en.wikipedia.org/wiki/Shell_%28computing%29 Command-line interface - http://en.wikipedia.org/wiki/Command-line_interface Command Line Interfaces (Advantages and Disadvantages) - http://www.teach-ict.com/gcse_new/computer %20systems/user_interface/miniweb/pg3.htm Graphical User Interfaces (Advantages and Disadvantages) - http://www.teach-ict.com/gcse_new/computer %20systems/user_interface/miniweb/pg7.htm Touch Sensitive Interfaces (Advantages and Disadvantages) - http://www.teach-ict.com/gcse_new/computer %20systems/user_interface/miniweb/pg11.htm Sound and Speech Interfaces (Advantages and Disadvantages) - http://www.teach- ict.com/gcse_new/computer%20systems/user_interface/miniweb/pg9.htm Command line vs. GUI - http://www.computerhope.com/issues/ch000619.htm Command line - http://www.computerhope.com/jargon/c/commandi.htm GUI - http://www.computerhope.com/jargon/g/gui.htm P a g e 40 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7.4 Question - Command Shells 10. What is the function of a shell in computing and operating systems? Answer: It manages the interaction between you and the operating system by asking you for input, interpreting that input for the operating system, and then dealing with any output from the operating system. 11. What is a command line interface? Answer: It uses a command-line interpreter and processes commands to a program in the form of a line of text. 12. How does one know that the operating system is ready to process the next command when using a command line interface? Answer: It says READY to show that the operating system is ready and waiting. 7.5 Questions - Comparison of Command Line interfaces and Graphical User Interfaces 13. Use the following table and compare each topic citing advantages or disadvantages of using command line interfaces (CLI) as compared to graphical user interfaces (GUI). Comparison of Command Line and Graphical User Interfaces Topic Command Line Interfaces Graphical User Interfaces Ease of Use and Effort to Learn No immediate visual feedback. May need a higher degree of familiarity and memorization. Easier to learn and use with a very user-friendly interface. Degree of Control of the Operating System Allows interaction with the operating system by commands typed in by the user. Interactions with the operating system are done using windows icons and menus as well as other graphical elements. Multitasking Has the ability to see multiple things on one screen Has windows that enable a user to view, control, manipulate, and toggle through multiple programs and folders at the same time. Speed of Use Faster than a graphical user interface because the keyboard is used to input commands. Much slower than command line interfaces because of the inability to use the keyboard Resource Utilization, e.g., Memory, Processor Time Uses smaller sized text inputs to create operating system instructions/functions. Depends on the complexity and size of the graphical elements and are larger to store compared to command line Scripting Uses a lot less resources than a GUI does Needs more resources because of the loading and storage of graphical elements such as icons Remote Access Gives you remote access to commands for you to configure and gather the runtime system information Allows for the modification of settings such as printing options ie. Color/black and white, and paper size through online connection Flexibility to transfer knowledge to other user interfaces The same in both ease and difficulty The same in both ease and difficulty Ergonomics and More control over system and requires more Easier to use but requires more P a g e 41 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Strain thought resources and has fewer restrictions when accessing files. P a g e 42 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Five benefits of command line tools in security - http://www.techrepublic.com/blog/linux-and-open-source/five- benefits-of-command-line-tools/ Seven Free Security Tools for Linux - http://www.pcworld.com/article/224955/7_free_security_tools_for_linux.html List of Linux Security Audit and Hacker Software Tools - http://www.yolinux.com/TUTORIALS/LinuxSecurityTools.html Advantages of command line over GUI - http://www.aswedeingermany.de/50SoftwareDevelopment/50ShellVsGUI.html Why Command Line still important? - http://answers.yahoo.com/question/index?qid=20110202071442AAGs5Bc The Importance of Command Line Literacy - http://www.linux-mag.com/id/7096/ 7.6 Command Line interfaces and Security 14. Many security tools have a GUI interface. Using the following table list and explain five reasons why one's ability to use the CLI is very important to their careers? Importance of a Professional's Knowledge of Command Line Tools in Security Topic Discussion 1. Scalability Allows for problems to be handled quicker and easier and allows for a single action to achieve greater results. 2. Scripting ability Is a macro system for every command line utility available. 3. Simple Design Simple design can allow for increased efficiency and improved speed 4. Simple Interface Gives users without professional knowledge to use an interface without taking the utilities that those with professional knowledge would like to use. 5. Stable Design Designs that are simple are easier to process and encounter less problems when compared to GUI. 8.0 Computer Buses, Storage Devices and SANS 8.1 Introduction to Computer Busses A bus is simply a wire located on the motherboard. Buses are the highway that connect all the PC internal components and external devices and peripherals to its CPU and main memory (RAM). These embedded wires carry four types of cargo: Electrical Power Control Signals to coordinate activity (How) Memory Addresses, which informs the where to access data and instructions (Where) Data which presents the flow of instructions or data between components 8.1.1 The Front-side System Bus The fastest bus of all is the connection between the processor and its primary cache, and this is kept within the CPU chip. The next level down is the system bus, which links the processor with memory, both the small amount of Static RAM (SRAM) secondary cache and the far larger main banks of Dynamic RAM (DRAM). 8.1.2 The Back side Bus P a g e 43 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
The back-side bus (BSB), or backside bus, was a computer bus used to connect the CPU to CPU cache memory, usually L2. 8.1.3 AMD Hyper Transport and Intel QuickPath Interconnect (QPI) Bus technologies Both Front Side and Backsides buses were replaced by the AMD Hyper Transport and Intel QuickPath Interconnect (QPI) Bus technologies. Though the concept is conceptually provided function similar to previuos bus architectures these technologies substantially increased bandwidth and reduced latency. 8.1.4 Input/Output Busses The input/output bus or IO bus is the pathway used for input and output devices to communicate with the computer processor. 8.2 Input/Output Busses, Expansion Busses and Adaptors Video - Motherboard Expansion Slots and Bus Speeds – A+ 220-901 1.2 (Professor Messer) https://www.youtube.com/watch?v=- R6gsPo6LEQ&index=6&list=PLJytQuP7cOhcnzWnPAnePNqxrsD9gSId5 Video - PCI EXPRESS® 3.0 Introduction and Overview https://www.youtube.com/watch?v=Qe74ChDTx50 Video - Motherboard Expansion Slots and Bus Speeds - CompTIA A+ 220-901 - 1.2 (Professor Messer) https://www.youtube.com/watch?v=-R6gsPo6LEQ Video- Device Connectors and Cables - CompTIA A+ 220-901 - 1.11 https://www.youtube.com/watch?v=Jetc8EfkbGA&t=115s 8.2.1 USB A USB system has an asymmetric design, consisting of a host, a multitude of downstream USB ports, and multiple peripheral devices connected in a tiered-star topology. Additional USB hubs may be included in the tiers, allowing branching into a tree structure with up to five tier levels. A USB host may have multiple host controllers and each host controller may provide one or more USB ports. Up to 127 devices, including hub devices if present, may be connected to a single host controller. USB Standard Data Transfer Rate USB 1.0/1.1 (1998) 12 mbps USB 2.0 (2000) 128 mbps USB 3.0 (2009) 5 Gbits Reduce power consumption; backward compatible ; Has a different connector with more wires USB 3.1 (2013) 3.0 to 10 Gbit/s Backward compatible P a g e 44 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
8.2.2 Firewire The IEEE 1394 interface is a serial bus interface standard for high-speed communications and isochronous real-time data transfer, frequently used by personal computers, as well as in digital audio, digital video, automotive, and aeronautics applications. FireWire Standard Data Transfer Rate FireWire 400 FireWire 800 800 Mbits Full duplex FireWire S1600 1.6 Gbits Backward compatible 100 meters FireWire S3200 3.2 Gbits Backward compatible 8.2.3 Thunderbolt (2011) A hardware interface that allows the connection of external peripherals to a compute using the same connector as Mini DisplayPort (MDP). Combines PCI Express (PCIe) and DisplayPort (DP) into one serial signal alongside a DC connection for electric power, transmitted over one cable. Up to six peripherals may be supported by one connector through various topologies. The current Thunderbolt 2 operates at 20 Gbit/s speed Intel's new Thunderbolt 3 (late 2015) controller will double the bandwidth to 40 Gbit/s (5 GB/s), reduce power consumption by 50%, also offering support for PCIe 3.0, along with compatibility with other protocols, including HDMI 2.0 (allowing for 4K resolutions at 60 Hz), and DisplayPort 1.2 or 1.3 P a g e 45 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
PCI Express (PCIe) Video - PCI Express (PCIe) 3.0 - Everything you need to Know as fast as Possible http://www.youtube.com/watch?v=LSSHuMHbCWo The PCI Express Architecture defines a flexible, scalable, high-speed, serial, point-to-point, hot pluggable/hot swappable interconnect that is software-compatible with PCI. Unlike its predecessor, PCI Express is a serial point-to-point interconnect system, similar to AMD Hyper Transport and Intel QuickPath Interconnect (QPI) Bus technologies. Serial bus architectures deliver more bandwidth per pin than parallel bus architectures and scale more easily to higher bandwidths. PCIe allows for a network of dedicated point-to-point links between devices rather than the multi-drop scheme used by parallel bus architectures. This eliminates the need for bus arbitration, provides deterministic low latency and greatly simplifies hot plug/hot swap system implementations. PCIe x1, x4, x8 and x6 Slots. PCIe supports four different slot types that have different sizes and data transfer rates. The PCIe x16 slot is used to connect video cards PCIe Standards PCI Express 4.0 providing a 16 GT/s bit rate that doubles the bandwidth provided by PCI Express 3.0. PCI Express 5.0 specification.[52] Bandwidth is expected to increase to 32 GT/s, yielding 128 GB/s in full duplex networking configurations. It is expected to be standardized in 2019. 8.2.4 PATA (IDE) P a g e 46 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
PATA (IDE) is a 16-bit parallel interface standard for the connection of storage devices such as hard disks, solid-state drives, floppy drives, and optical disc drives in computers. PATA remains widely used in industrial and embedded applications that use CompactFlash storage, though even here, the next CFast storage standard will be based on SATA. 8.2.5 SATA Video – Introduction to Storage Devices 2013 - Part 1 of 3 - CompTIA A+ 220-701 (Professor Messer) https://www.youtube.com/watch?v=ZDITqacAkFQ&feature=channel Video - Introduction to SATA Storage Devices 2013 - Part 2 of 3 - CompTIA A+ 220-701(Professor Messer) https://www.youtube.com/watch?v=G2EfxglM_mQ Video - Introduction to Removable Storage Devices 2013 - Part 3 of 3 - CompTIA A+ 220-701 (Professor Messer) https://www.youtube.com/watch?v=SipFUeFdQOE Do Solid State Drives Fail More Often Than Hard Disks? (2017) https://www.contegix.com/solid-state-disks-fail-often-hard-disks/ Debunking SSD Myths (2015) https://www.networkworld.com/article/2873551/data-center/debunking-ssd-myths.html 5 Warning Signs That Your SSD Is About to Break Down & Fail (2016) http://www.makeuseof.com/tag/5-warning-signs-ssd-break-fail/ P a g e 47 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
SATA is a serial interface standard reduced cable size and cost (7 conductors instead of 40), native hot swapping (hot plugging), faster data transfer through higher signaling rates, and more efficient transfer through an (optional) I/O queuing protocol. SATA uses a point-to-point architecture. The physical connection between a controller and a storage device is not shared among other controllers and storage devices. SATA defines multipliers, which allows a single SATA controller to drive multiple storage devices. The multiplier performs the function of a hub; the controller and each storage device is connected to the hub. Modern PC systems have SATA controllers built into the motherboard, typically featuring 2 to 6 ports. Additional ports can be installed through add-in SATA host adapters (available in variety of bus-interfaces: USB, PCI, PCI-e.) PATA/SATA Standard Data Transfer Rate/ Capacity ATA/ATAPI-5 66 mbps/137 GB storage 80-wire connector ATA/ATAPI-6 100 mbps/140 PB ATA/ATAPI-7 133 mbps PATA/150mbps SATA 1.5 Gbits ( called SATA 1.0) ATA/ATAPI-8 SATA 1.0 1.5 Gbits SATA 2.0 (2010) 3.0 Gbits/300 Mbps per device – slightly slower than SCSI 320Mbps (Ultra 320); no shared channel SATA 3.0 6.0 Gbits/600 Mbps per device – slightly slower than SCSI 6400Mbps (Ultra 640); no shared channel Improved video streaming; new, smaller LIF connectors SATA 3.1/3.2 Express 16.0 Gbits/1.961 Gbps per device Solid state drives in mobile devices eSATAp Compete with USB and Firewaire P a g e 48 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
8.3 Optical Storage Video - An Overview of Storage Devices - A+ 220-901 1.5 (Professor Messer) https://www.youtube.com/watch?v=NgVm2kUmrYo&index=13&list=PLJytQuP7cOhcnzWnPAnePNqxrsD9gSId5 7.3.1 CD (Compact Disk) CD Data transfer rate - Speed x means 150 KBs so 48x 150KB = 7.2 MB, IDE speed is 100MBs Capacity: up to 700MB, typical 650 MB Recording technology: CD-R and CD-RW Connectors: 4-pin Power Molex, 40–pin IDE data connector. Need to connect to sound card 8.3.2 DVD (Digital Versatile Disk) Capacity: determined by double-sided and Multiple Layers. Capacity: DVD-5 4.7GBs (most popular); DVD-9 (8.5 GBs); up to 17G for DVD-18 Alternative Recording technologies; + (Sony) and – (Pioneer) - not compatible , but newer (since 2008) can handle both. DVD Data Transfer rate – Speed x means 1.32 MBs (9 times CD) so 16 x 132.MBs =21 MBs; Multiple side layers are always slower. RW is always slower that R Recording technology: DVD-R SL and DVD-R SL (single layer); DVD+R SL and DVD+R SL (single layer); and DVD-RW ( SL or DL) or DVD+RW ( SL or DL). Most drives are combo drives CDs and all DVDS Uses SATA more than IDE. 8.3.3. Blue- Ray Blu-ray Disc (BD) is a digital optical disc data storage format designed to supersede the DVD format, in that it is capable of storing high-definition video resolution (1080p) Capacity: Two physical sizes. Standard CD/DVD size up to 50 GB; Mini disc (12 cm) – 15.6 GB Use: HD movies, Play Station 3 Blue-Ray Data Transfer Rate: measured in bits rather than bytes because of SATA. x means 36 Mbps (not MBs) so 8x would be 36MBps x 8 or 280MBps or 36MBs Blu-ray Disc specifies the use of Universal Disk Format (UDF) - an open file system. 8.4 Solid State Storage No moving parts; based on semiconductor technology; nonvolatile; uses the FAT/FAT32 file system by default, but can be formatted with NTFS 8.4.1 USB Flash Drives Highly recommended to us "Safely Remove Hardware" or the file system may be destroyed. Data Transfer Rate: Dependent of USB 1.1, USB 2.0 and USB 3.0/3.1 ( Chipset determinant) Can be used to boot operating systems – change boot order in the BIOS NAND Flash memory is the core. Up to 1 million read/write cycles or 10 years of average use (really varies); Uses "Bad Block Management" to extended the life, e.g., don't write here P a g e 49 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Video - How To Resolve USB Device not Recognized Errors In Windows 10 https://www.youtube.com/watch?v=IEDec4IViqs Video - How to fix USB drive not recognized or not working https://www.youtube.com/watch?v=FBNQ6rm2wbE 8.4.2 Secure Digital (SD) Cards Uses NAND Flash memory like USB devices. Sizes: Standard (cameras and most cell phones), miniSD, microSD (PDAs). Many SD readers can read smaller, but not larger Capacity: Standard SD cards (not size) up to 4GB; High Capacity (SDHC) cards up to 32 GB; eXtended Capacity (SDXC) cards up to 2 TB SD Card Data Transfer Rate – measured by classes, e.g., SD Class 2, 4, or 6. SD Class 6 = 45 MBS 8.4.3 Secure Digital Input Output (SDIO) Cards Merges Flash Storage with an I/O device. PDS use this technology to integrate GPS, WLAN and Bluetooth Cannot work in SD slot – needs a special slot SDIO slots can read SD Cards Not the same a SIM cards used by cell phones. 8.4.4 CompactFlash (CF) Cards Are used to add solid-state storage to laptops, hand-held computer, high-end cameras using the Type-I interface and for Microdrives (ATA controller) using the Type II interface. Can be NOR or NAND (more popular) memory Similar characteristics for SD cards CF Data Transfer Rates: measured as CF, CF High Speed, CF 3.0 and CF 4.0 (45 MBs). 8.5 Questions - Solid State Drives versus Hard Disk Drives Text Link - SSD vs. HDD: What's the Difference? https://www.pcmag.com/article2/0,2817,2404258,00.asp Text link - What is a Solid State Drive (SSD)? https://www.lifewire.com/solid-state-drive-833448 Text Link- The battle between SSD and HDD is over, and the winner is clear https://www.digitaltrends.com/computing/solid-state-drives-vs-hard-disk-drives/ There are three issues that are important to consider to connect disk drives to a processor: 1) the type on bus interface and adaptor, 2) the type of the connector cable, and 3) the storage architecture used to store data. Historically, the traditional type of disk storage architecture used a magnetic storage technology. While optical storage technologies provided an alternative, this technology had poor storage access time. With the introduction of solid state storage devices, a new class of disk storage devices was introduced – solid state drive.s 1. Compare how traditional hard disk drives (HDD) compares to Solid State Drives (SDD) be the methods each technology uses to store data. Answer: P a g e 50 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Traditional hdd use spinning disks and magnets to store information while the ssd’s do not have any moving parts which allows for much faster data storage and retrieval. 2. Compare how traditional hard disk drives (HDD) compares to Solid State Drives (SDD) by durability, i.e., less prone to failures. Answer: Since hdds have moving parts, moving the enclosure of the hdd can cause the magnets to collide with the disks which would cause a failure. Ssds do not have any moving parts so shaking or moving them while they are operating would not cause any failures and generally have less failures due to their solid state. 3. Compare how traditional hard disk drives (HDD) compares to Solid State Drives (SDD) by cost of storage. Answer: Hdd are typically less expensive when compared to ssds. 4. Compare how traditional hard disk drives (HDD) compares to Solid State Drives (SDD) by performance. Answer: Ssds are much faster compared to hdds when it comes to performance as a whole 5. What is a Hybrid disk drive? Answer: A hybrid disk drive has both ssd and hdd traits 8.6 Questions – Directed Access Storage versus Storage Area Network (SAN) 8.6.1 Direct Attached Storage (DAS) Direct Attached Storage (DAS) is a dedicated digital storage device attached directly to a server or PC via a cable. Advanced Technology Attachment (ATA), Serial Advanced Technology Attachment (SATA), eSATA, Small Computer System Interface (SCSI), Serial Attached SCSI (SAS), and Fibre Channel are the main protocols used for DAS connections. The DAS principle is fundamentally straightforward. DAS systems have become more prevalent due to increasing requirements for efficient IT storage solutions. The difference between DAS and Network Attached Storage (NAS) is that a DAS device connects directly to a server without a network connection. DAS advantages include: High availability. High access rate due to Storage Area Network (SAN) absence. Elimination of network setup complications. P a g e 51 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Storage capacity expansion. Data security and fault tolerance. DAS drawbacks include: Data not accessible by diverse user groups. Allows only one user at a time. High administrative costs. 8.6.2 Storage Area Networks Most modern large scale architectures are based on SAN architectures or Storage Virtualization. SAN devices are no longer directly attached to the server, and can be shared by multiple servers using a variety or operating systems over long distances. Without SAN technologies, load balancing, fail over, data sharing, cloud computing technologies would not be possible Video - Network Storage - CompTIA Network+ N10-007 - 2.4 (Professor Messer) https://www.youtube.com/watch?v=41OgCdAjLI4 Video - Storage Area Networks - CompTIA Network+ N10-006 - 1.11 (Professor Messer) https://www.youtube.com/watch?v=PfgzE9lEpTg Video - NAS and SAN Introduction (Eli the Computer Guy) https://www.youtube.com/watch?v=csdJFazj3h0&t=2s Video - SCSI SAN Storage Overview Tutorial https://www.youtube.com/watch?v=2ra0Xxi-mOg Video - Video- SAN online Training https://www.youtube.com/watch?v=D_XwsemiKQY Video - FCoE SAN Storage Overview Tutorial https://www.youtube.com/watch?v=NmXR_3cuEXI Video - Storage Virtualization https://www.youtube.com/watch?v=-NeMJFT55YU Video - What is iSCSI and how to use it https://www.youtube.com/watch?v=pG2H-WatFbo Video - Introduction to Storage Area Networks (SAN) https://www.youtube.com/watch?v=teEsgqI49Dk SAN Explained - Storage (or System) Area Networks https://www.lifewire.com/definition-of-san-818007 10 Advantages of SAN vs. DAS http://www.serverwatch.com/trends/article.php/3925351/10-Advantages-of-SAN-vs-DAS.htm Advantages of using a Storage Area Network http://blog.dnfcorp.com/?p=2063 Video - Introduction to Storage Area Networks (SAN) https://www.youtube.com/watch?v=teEsgqI49Dk P a g e 52 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
1. What is a Storage Area Network (SAN)? Answer: It is a computer network that provides access to consolidated block-level storage and is primarily used to access data storage devices such as disk arrays and tape libraries form servers. 2. What are the components of a SAN network? Answer: The three main components are servers, network infrastructure, and storage. 3. List 5 or more reasons why SAN architectures are important with mainframes, virtualization and data center? Answer: Automatic data backup, storage monitoring, eliminates traditional dedicated connection between network file server and storage, eliminates single points of failure to enhance storage reliability and availability, and it allows a server to access a large data storage capacity. 4. What is the function of Fibre Channel? Answer: It is a high-speed data transfer channel that provides delivery of raw block data that is designed to connect general purpose computers, mainframes and super computers. 5. What is function of iSCSI Answer: It is a block protocol for storage networking and runs the SCSI storage protocol usually using an ethernet network connection. P a g e 53 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
6. If you were going to connect a server to a SAN using iSCSI, explain which type of PCIe adaptor should be used. Answer: A PCIe adaptor from a ISCSI adapter card should be used to connect a server to a SAN. P a g e 54 | 54 ASSIGNMENT 1 PART 2 – THEORY SPRING 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help