Chapter 6-Inside Computers and Mobile Devices

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Step in Machine Cycle

1. Fetching 2. Decoding 3. Executing 4. Storing

eCycling options 2

NOT-FOR-PROFIT ORGANIZATIONS: Civic and community organizations sponsor recycling events and then distribute the devices to people in the military, victims of natural disasters, and less fortunate children

PROCESSOR

aka CENTRAL PROCESSING UNIT (CPU) interprets and carries out the basic instructions that operate a computer

Executing

is the process of carrying out the commands

a CUSTOM-BUILT COMPUTER

often contains components from several manufacturers. For example, you can customize a computer's video and sound capabilities to use a higher-end video card if you play a lot of computer games or frequently work with graphics and media software

Options for Cooling Processor 2

Some computers use LIQUID COOLING TECHNOLOGY to reduce the temperature of a processor. LIQUID COOLING technology uses a continuous flow of fluid(s) such as water and glycol, in a process that transfers the heated fluid away from the processor to a radiator-type grill, which cools the liquid, and then returns the cooled fluid to the processor

How to determine memory requirements

To determine memory requirements, find out the following: -amount of memory currently installed -amount of memory the computer can support -type of memory modules currently installed -whether memory modules must be installed in pairs -the number of available slots for memory modules

eCycling options 3

SECONDARY MARKET: Amazon, eBay, and other websites list thousands of used devices for sale.

Cost Savings

The expense of software and high-end hardware, such as fast processors and high-capacity memory and storage devices, and other hardware shifts away from the user

Why a home or business user might choose CLOUD COMPUTING

Reasons for choosing CLOUD COMPUTING include:

Home and Business users choose CLOUD COMPUTING for:

accessibility, cost savings, space savings, and scalability -the front end includes the hardware and software with which a user interacts to access the cloud (ie, through a browser on a laptop) -the back-end consists of the servers and storage devices that manage and store the resources accessed by users

Most personal computers today have two types of memory cache: -Level 1 (L1) cache -Level 2 (L2) cache -Level 3 (L3) cache

-L1 cache is built directly on the processor chip and has a very small capacity -L2 cache is slightly slower than L1 cache but has a much larger capacity -L3 cache is a cache on the motherboard that is separate from the processor chip

How to maintain HARDWARE on your computer or mobile device

-Use a damp cloth to gently clean the screen. Do not use any special cleaners to clean the display, as they may damage the display -Water is sufficient to remove dust and most dirt. If the computer or mobile device has a keyboard, use a can of compressed air to free the keyboard from any dirt and debris that might interfere with the operation of the keys or pose a risk of getting inside the computer -When using compressed air, hold the can upright -When you insert media such as an optical disc, be sure the media is clean -If you are transporting a laptop, be sure to store it in a case with plenty of padding -If you are using a mobile device, such as a tablet or smartphone, protect it with a case. -If the computer or mobile device has an air vent where a fan removes heat from the computer or mobile device, make sure the vent is free of dust and debris

Methods to CONSERVE BATTERY LIFE:

-When you first purchase a new mobile device or battery, charge the battery completely -Charge the battery only when it is drained completely. When you charge your mobile computer or device, try not to unplug the battery charger until the battery is charged completely -Use the battery charger supplied with the mobile or computer device. If you are using a laptop or tablet, disable Wi-Fi and Bluetooth unless you are using them -Brighter displays consume more battery life, so keep the display as dim as you can without having to strain your eyes -Download and install an app that will inform you which other apps are running and consuming battery life -Avoid turning your mobile computer or device on and off multiple times per day - Turn off automatic app update capabilities on your phone or mobile device

Typical location for laptop, slate tablet, smartphone, portable media player, and game console

-on most LAPTOPS, including ultrathin laptops, the keyboard and pointing device often occupy the area on top of the case, and the display attaches to the case by hinges -with a SLATE TABLET, which typically does not include a physical keyboard, the case is behind the display -on a CONVERTIBLE TABLET, the case is positioned below a keyboard. the case on a smartphone often is behind the display -the case on PORTABLE MEDIA PLAYERS, digital cameras, and handheld game devices typically consumes the entire device and houses the display and input devices -with GAME CONSOLES, the input and output devices, such as controllers and a television, reside outside the case

CMOS technology

-uses battery power to retain information even when the power to the computer is off -Battery-backed CMOS memory chips, for example, can keep the calendar, date, and time current even when the computer is off -The FLASH MEMORY chips that store a computer's start-up information often use CMOS technology

Purpose of the PROCESSOR and how MULTI and SINGLE-CORE PROCESSORS differ

....

Short Answer

.....

Two types of RAM

1. Dynamic RAM (DRAM) chips must be reenergized constantly or they lose their contents 2. Static RAM (SRAM) chips are faster and more reliable than any variation of DRAM chips. These chips do not have to be reenergized as often as DRAM chips; hence, the term, STATIC. SRAM chips, however, are much more expensive than DRAM chips. Special applications such as cache use SRAM chips.

Use the following steps to install memory:

1. Turn off and unplug your computer from the power source. If you are using a laptop, remove its battery 2. Wear an antistatic wristband to protect the computer from static electricity 3. Remove or open the computer case 4. If necessary, remove any existing memory modules you no longer need. 5. Remove the new memory modules from the packaging 6. Slowly and carefully insert the memory modules into the slots on your computer's motherboard 7. Close the computer case or any access panel you have opened 8. Plug in the computer and turn it on 9. Check the system information in the operating system to make sure it is recognizing the new amount of memory installed

Options for Cooling Processor 1

A HEAT SINK is a small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components, such as a PROCESSOR. Many heat sinks have fans to help distribute air dissipated by the heat sink.

Accessibility

Data and/or applications are available worldwide from any computer or device with an Internet connection

Considerations when choosing a processor

Determine your needs. Think about how you will use your computer and the programs and applications you plan to run. Determine your current processor. If you are replacing your existing computer with a new computer, determine the processor in your existing computer so that you can make sure the new processor is better and faster then the one you use currently. Research processor models. While shopping for computers in your price range, pay attention to the types of processors they include.

eCycling options 4

EPA: the EPA's website lists several resources to locate electronics donation and recycling options

Asset tags

Metal security plates affixed to hardware contain unique bar codes that are registered to the owner and stored in a security company's database.

How a computer uses a CACHE

Most of today's computers improve their processing times with CACHE, which is a temporary storage area. Two common types of cache are MEMORY CACHE and DISK CACHE Memory cache helps speed the processes of the computer because it stores frequently used instructions and data

In another example, MINING FOR the RAW MATERIALS needed to manufacture technology components may occur in areas where military conflicts exists. Those involved in the military conflict may use the revenue from mining this material, sometimes called conflict minerals, to fund the soldiers and continue to discard.

Recently, the U.S. passed the Wall Street Reform and Consumer Protection Act. Under this act, manufacturers must review their supply sources and provide disclosure if the materials were mined in areas of conflict. These manufacturers, however, are not punished if they continue to use conflict materials.

Actions you should take when RECYCLING or SELLING a used mobile device

Users must locate their device's settings area on a menu and then look for a reset command. Most electronics manufacturers post instructions for this process on their websites. Mobile phone retailers often can offer help in clearing personal data. If your mobile phone has a SIM or memory card, remove and destroy it if you are not going to transfer it to another phone.

eCycling options 1

WIRELESS CARRIERS AND BIG BOX RETAILERS: Stores that sell electronics often accept donations or offer buy-back programs. Many of these companies participate in the Sustainable Materials Management (SMM) Electronics Challenge, which promotes responsible electronics recycling by using third-party certified recyclers.

Storing

in this context, means writing the result to memory (not to a storage medium)

BINARY SYSTEM

is a number system that has just two digits, 0 and 1, called BITS. A BIT (short for binary digit) is the smallest unit of data the computer can process. When 8 BITS are grouped together as a unit, the form a BYTE. A BYTE provides enough different combinations of 0s and 1s to represent 256 different characters.

MULTI-CORE PROCESSOR

is a single chip with two or more separate processor cores. Each processor core on a multi-core processor generally runs at a slower speed than a single-core processor, but it typically increases overall performance. They are also more energy efficient than separate multiple processors

COMPUTER CHIP

is a small piece of semiconducting material, usually silicon, on which integrated circuits are etched. A chip implanted in an animal, sometimes called a microchip because it is so small-about the size of a grain of rice-has a unique number that is registered to the owner's name and address

Clock Speed

is measured by the number of ticks per second, is the pace of the system clock. -The faster the clock speed, the more instructions the processor can execute per second

CONTROL UNIT

is the component of the processor that directs and coordinates most of the operations in the computer. The control unit has a role much like a traffic officer: it interprets each instruction issued by a program or an application and then initiates the appropriate action to carry out the instruction

WORD SIZE

is the number of bits the processor can interpret and execute at a given time Computers with a larger word size can process more data in the same amount of time than computers with a smaller word size. In most computers, the word size is the same as the bus width

Fetching

is the process of obtaining a program or an application instruction or data item from memory

Decoding

refers to the process of translating the instruction into signals the computer can execute

MOTHERBOARD

sometimes called a SYSTEM BOARD, is the main circuit board of the computer. Many electronic components, such as the processor and memory, attach to the motherboard, others are built into it. On personal computers, the circuitry for the processor, memory, and other components reside on a computer chip(s)

INTEL

that influence includes manufacturing of microprocessors for computers, mobile phones and other mobile devices, production of solid-state drives, and contributions towards the design of the ultra book.

BUS WIDTH

the size of the bus that determines the number of bits that the computer can transmit at one time. The larger the number of bits handled by the bus, the faster the computer transfers data

ASCII (ask-see)

which stands for American Standard Code for Information Interchange, is the most widely used coding scheme to represent a set of characters.

when you purchase a CUSTOM-BUILT COMPUTER,

you may choose its components from a variety of manufacturers. This means the quality and performance of custom-built computers can vary greatly based on the computer's budget or needs

Clamps, cables, and locks

Lock kits include mounting plates, glue, cables, and padlocks to protect desktops, monitors, laptops, and peripheral devices

advantages of using a UNIVERSAL STANDARD CONNECTOR

-A UNIVERSAL CONNECTOR STANDARD will save customers money because they will not have to purchase a new connector with their new phone, and enable users with different phone models to share connectors -THE ENVIRONMENT will benefit because fewer outdated or incompatible cords will be discarded into landfills. Further, the manufacturing process will generate less waste because fewer cords will be required.

The 2 components contained in the processor are a CONTROL UNIT and an ARITHMETIC LOGIC UNIT.

-Arithmetic operations include basic calculations such as addition, subtraction, multiplication, and division -Comparison operations involve comparing one data item with another to determine whether the first item is greater than, equal to, or less than the other item

Role of a BUS

-Buses are used to transfer bits from input devices to memory, from memory to the processor, from the processor to memory, and from memory to output storage devices/ -Buses consist of a data bus and an address bus

products for SECURING and TRACKING HARDWARE

-Clamps, cables, and locks -Ultrasonic sensors -Tracking software -Asset tags -Personal safes

eCycling options include:

wireless carriers and big box retailers, not-for-profit organizations, secondary market, and the EPA

Steps and precautions to take when REPLACING THE SCREEN ON A MOBILE DEVICE

-Screen replacement should be attempted only by advanced users or a trained professional. The exact steps to replace a broken screen can vary with each device. Back up the data on your mobile device before starting a screen replacement -Turn off the mobile device and disconnect it from all power sources. If the device uses a removable battery, remove it -Protect your hands and eyes before beginning glass replacement. If possible, carefully remove all pieces of broken glass. Consider using compressed air to remove any dust -Remove the display assembly -Unpack the new screen and connect it to the mobile device, connecting any necessary cables, -Reassemble the mobile device, reconnect the power source and/or the battery, and turn on the device

DATA BUS/ADDRESS BUS

-The DATA BUS is used to transfer actual data and the ADDRESS BUS is used to transfer information about where the data should reside in memory

USB ADAPTERS/EXPRESSCARD MODULES

-USB ADAPTER is a dongle that plugs into a USB port, enhances functions of a mobile computer and/or provides connections to peripheral devices -EXPRESSCARD module is a removable device that fits in an ExpressCard slot -USB Adapters and ExpressCard modules can be used to add memory, communications, multimedia, security, and storage capabilities to mobile computers/

How to maintain SOFTWARE on your computer or mobile device

-Uninstall programs and remove apps you no longer need on your computer or mobile device. If you are using a desktop or laptop, defragment the computer's hard disk should you notice a decline in the computer's performance -Install programs and apps only from reputable software manufacturers -In addition, make sure you are installing the program or app from the original installation media, the software manufacturer's website, or from your mobile device's app store or the marketplace -You also should read reviews for programs and apps before you download and/or install them to make sure the program or app will meet your needs

Tracking software

Many smartphones and mobile devices have mapping software that shows the approximate location of devices and computers. The owner can issue commands remotely to have the device play a sound, lock the screen, display a message, or erase all personal information

List SECURITY THREATS IN CLOUD STORAGE

Foremost is the worry about data security. The Cloud Security Alliance (CSA) warns of hackers who register for the service with a credit card or a free trial period and then unleash malware in an attempt to gain access to passwords. Because the registration and validation procedure for accessing the cloud is relatively anonymous, authorities can have difficulty locating the abusers. Another concern arises when transferring data between a network and the cloud. When the data is traveling to or from a computer and the storage service, it is subject to interception.

Ultrasonic sensors

Hardware manufacturers have developed an alarm system to install in the case. If the computer is moved or the case is opened, an ear-piercing alarm sounds and a security company is alerted

Why a COMPUTER REPAIR TECHNICIAN might be expected to hold a PRIVATE INVESTIGATOR LICENSE

In one state, computer repair technicians are required by law to obtain a private investigator license if they review or analyze data on computers that they repair. The interpretation is that the technician is performing an investigation, in a sense, when business managers and parents hire them to analyze the computer usage habits of employees or children. After technicians filed several lawsuits, the state government amended the law to require licenses only for those investigating data. That is, a technician who performs hardware maintenance and repair does not need a license under the revised law.

Services offered with CLOUD COMPUTING include:

Infrastructure as a service, software as a service, data as a service, and platform as a service

Options for Cooling Processor 3

LAPTOP USERS often use a cooling pad to help further reduce the heat generated by their computer. A cooling pad rests below a laptop and protects the computer from overheating and also the user's lap from excessive heat. Some cooling pads contain a small fan to transfer heat away from the laptop.

Personal safes

Protective cases that are approximately the size of a cereal box can store a smartphone, keys, tablet, and other valuables. The attached security cable can be secured to a stationary object, such as chair or table

Scalability

Provides the flexibility to increase or decrease computing requirements as needed

Volatile memory loses its contents when the computer's power is turned off, thus, it is temporary. Nonvolatile memory, by contrast, does not lose its contents when power is removed from the computer; thus it is permanent.

RAM (RANDOM ACCESS MEMORY) consists of memory chips that can be read from and written to by the processor and other devices; most RAM is volatile. -ROM (READ-ONLY MEMORY) refers to memory chips storing permanent data and instructions; the data on most ROM chips cannot be modified. ROM is nonvolatile

Describe how RAM works

RAM (random access memory) consists of memory chips that can be read from and written to by the processor and other devices. When you turn on power to a computer or mobile device, certain operating system files (such as the files that determine how the desktop or home screen appears) load into RAM from a storage device such as a hard disk. These files remain in RAM as long as the computer or mobile device has continuous power. As additional applications and data are requested, they also load into RAM from storage. The processor interprets and executes a program or application's instructions while the program or application is in RAM. During this time, the contents of RAM may change. RAM can accommodate multiple programs and applications simultaneously.

Describe what is stored in ROM

READ-ONLY memory refers to memory chips storing permanent data and instructions. The data on most ROM chips cannot be modified, ROM is nonvolatile, which means its contents are not lost when power is removed from the computer. In addition to computers and mobile devices, many peripheral devices contain ROM chips. For example, ROM chips in printers contain data for fonts.

Explain if a company is responsible for using computer components manufactured using FAIR TRADE practices

Some technology manufacturers use products or components that are made in areas of extreme poverty. In these cases, factory owners coerce workers, including children, to work long hours in unsafe or unsanitary conditions for little pay.

Manufacturers of ROM chips often record data, instructions, or information on the chips when they manufacture the chips

These ROM chips, called firmware, contain permanently written data, instructions, or information such as a computer or mobile device's start-up instructions

Security efforts of the CSA

To minimize risk, security experts emphasize that a browser's web address must begin with HTTPS, and the data should be encrypted and authenticated. Law enforcement's access to the data raises another security issue. Email messages stored on a private server belong to the company or individual who owns the computer, so law enforcement officials must obtain a search warrant to read a particular user's messages. In contrast, law enforcement officials can access email messages stored on the cloud by requesting the information from the company that owns the cloud service. The Cloud Security Alliance promotes "the use of best practices for providing security assurance within Cloud Computing"

ARITHMETIC LOGIC UNIT (ALU)

another component of the processor, performs arithmetic, comparison and other operations

GORDON MOORE

confounded Intel in 1968. Moore also is known for the 1965 technology prediction known as MOORE'S LAW. Moore's law states that the number of transistors and resistors places on a computer chip would double every year. This doubling would have a proportional increase in computing power and decrease the cost.

ADVANCED MICRO DEVICES (AMD)

creates chips for more than 200 million of these consoles. Its products also power data center servers and simulators, and its technology is found in the world's most powerful supercomputer at the Oak Ridge National Laboratory in Tennessee.

when selecting a PROCESSOR, you should:

determine your needs, determine your current processor, and research processor models


संबंधित स्टडी सेट्स

Biblical foundations of social justice

View Set

Care of patients with musculoskeletal and connective tissues disorders

View Set

Industrialization, Urbanization, and the Rise of American Power

View Set