This is a video that a farmer had posted for people to check out their cattle for sale.
Sunday, December 15, 2013
Chapter 6 Output
Output is data that has been processed into a useful form. That is, computers process data to information. The form of output varies, depending on the hardware and software being used and the requirements of the user. While working with a computer, a user encounters four basic types of output: text, graphics, audio, and video. Examples of output that contain text are memos, letters, press releases, and reports. Many forms of output include graphics to enhance visual appeal and convey information. For audio, users download their favorite songs from iTunes to listen to music while on the computer. For example, I will download new music from iTunes to put on my iPhone and while I work on homework I like to turn on iTunes because it relaxes me. For video, websites will sometimes include a video for better understanding. Since I show cattle and every year we look online to for auctions, some of the websites allow for a user to watch a video of the calf.
Chapter 5 Input
Input is any data and instructions entered into the memory of a computer. An input device is any hardware component that allows users to enter data and instructions into a computer. There are numerous input devices but to name a few they are a keyboard, mouse, touch screen, game controller, microphone, and a scanner. The input device that I use most frequently is a game controller. Game controllers include gamepads, joysticks and wheels, light guns, dance pads, and a variety of motion-sensing controllers. I like to take a break from homework and play my best friend in Mario Kart Wii. It is nice to take a break and play a few games and get back to homework. We also will play PlayStation 2 Hockey because that is my best friends favorite sport to play. She might be able to beat me in that but I can beat any one in Mario Kart Wii. :)
Chapter 4 The Components of the System Unit
The system unit is a case that contains electronic components of the computer used to process data.
This is a labeled system unit. In class we also had to draw and label the components of the system unit ourselves. For every instruction, a processor repeats a step of four basic operations, which comprise a machine cycle. The steps are fetching, decoding, executing, and if necessary storing. In this chapter there is a question from Ethics and Issues that ask if computers and devices should be banned from the classroom. I do think that computers and devices should be banned from the classroom. They should be banned because students these days are using devices to cheat, and text which are a distraction from the teacher. A computer should only be allowed if it is for note taking, but there should be a computer lab in each school which students can go to instead of using them in the classroom.
This is a labeled system unit. In class we also had to draw and label the components of the system unit ourselves. For every instruction, a processor repeats a step of four basic operations, which comprise a machine cycle. The steps are fetching, decoding, executing, and if necessary storing. In this chapter there is a question from Ethics and Issues that ask if computers and devices should be banned from the classroom. I do think that computers and devices should be banned from the classroom. They should be banned because students these days are using devices to cheat, and text which are a distraction from the teacher. A computer should only be allowed if it is for note taking, but there should be a computer lab in each school which students can go to instead of using them in the classroom.
Chapter 8 Operating Systems and Utility Programs
System Software consists of the programs that control or maintain the operations of the computer and the devices. System software serves as the interface between the user, the application software, and the computer's hardware The two types of system software are operating systems and utility programs. An operating system is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources. Most operating systems perform similar functions that include starting and shutting down a computer, providing a user interface, managing programs, managing memory, and many others. This chapter also discusses a virus. A virus is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way a computer works without the users knowledge. While enrolled in this class, my home laptop got injected with a virus. The virus made my computer extremely slow, caused a lot of pop ups, and got to the point where I could not even connect to the Internet. I took my computer to Best Buy and had them download the best virus protection one could buy, and since then I have not had a problem with my computer.
Chapter 3 Application Software
Application software consists of programs designed to make users more productive and/or assist them with personal tasks. The four categories of application software are graphics and multimedia, business, home/personal/educational, and communications. I use almost every category of applications software every day. For the business software I use word processors to complete assignments. For the communications software I use email and instant messaging to talk to my professors about assignments and instant messaging for quicker conversation.
Chapter 2 The Internet and WWW
One of the major reasons home, business, and other users purchase computers is for Internet use. The book says that today more than one billion home and business users around the world access a variety of services on the Internet. The Internet has its roots in a networking project started by The Pentagon's Advanced Research Projects Agency, an agency of the US Department of Defense. Chapter 2 also covers searching the Web, major search engines, and browsing the Web.
This graph shoes the most common search engines and the ones that are used most frequently. A term that I found most important out of this chapter is netiquette. It is short for Internet etiquette and is the code for acceptable behaviors users should follow while using the Internet.
This graph shoes the most common search engines and the ones that are used most frequently. A term that I found most important out of this chapter is netiquette. It is short for Internet etiquette and is the code for acceptable behaviors users should follow while using the Internet.
Thursday, December 12, 2013
Chapter 1 Intro to Computers
Computers are everywhere: at work, at school, and used at home. Whiles some computers sit on top of a desk or on the floor, mobile computers and mobile devices are small enough to carry. Mobile devices, such as cellphones, often are classified as computers. For example, instead of getting on my computer to check grades it is more convenient to load them on my phone and check them. I work at Steak N' Shake and I use a computer there to ring in orders, and pay for orders. Without the computers it would be extremely difficult to add up the prices and taxes for the order and give people the correct change. I use the Internet to communicate with people, shop, bank, download music, and share photos. The mobile computers and devices I use are notebook computers, smartphones, media players, and digital cameras. I also use a lot of game consoles such as Nintendo Wii, PlayStation, and a Gameboy Advance. A graph on page 29 shows how many households do not use the Internet or related technologies. 30% of households have never used a computer to create a document and 20 % of people have never sent or received an email. This statistic surprises me because that is a large number who have a lack of experience with technology. I checked out an article that was listed under chapter 1 titled "6 Things You Should Never Reveal on Facebook." The one I found most interesting was that you should not reveal birth date and place. The article said one should not do that because if you provide the year and where you were born, you've just given identity thieves a key to stealing your financial life. study done by Carnegie Mellon showed that a date and place of birth could be used to predict most, and sometimes all, of the numbers in your Social Security number.
Subscribe to:
Posts (Atom)