Thursday, 23 October 2014

Purpose and function of the CPU

1. In electronic systems, a heat sink is a passive heat exchanger that cools a device by dissipating heat into the surrounding medium. In computers, heat sinks are used to cool central processing units or graphics processors. A heat sink is what covers the microprocessor. It is needed because as the microprocessor does millions of calculations per second it gets very hot. The heat sink is used to cool down your computer by passing on the heat from a conductive gel to a piece of metal. 

2. The initials CPU stand for central processing unit.

The control unit is a component of a computer's CPU that directs operation of the processor. It tells the computer's memory, arithmetic/logic unit and input and output devices how to respond to a program's instructions. It is the main core of a computer where every command runs through and is routed to its appropriate location.

The ALU (Arithmetic and Logic unit) carries out mathematical and logical computations.

For example:
• Addition and subtraction
• Multiplication and division
• Logical tests
• Comparisons

Registers are memory locations within the CPU itself for storing data and instructions.
They are designed to be quickly accessed for fast data retrieval.

3. The fetch-decode-execute cycle.

Fetch:
      the first step the CPU carries out is to fetch some data and instructions from the main memory and then store them in it's own internal temporary memory areas. These memory areas are called registers.
Decode:
      the next step is for the CPU to register what it has just fetched. The CPU is designed to understand a specific set of commands. These are called 'instruction set' of CPU. Each CPU has a different instruction set. The CPU decodes the instruction and prepares various areas of the chip in readiness of the next step.
Execute:
      This is when data processing actually takes place. The instruction is carried out upon the data. Once it has been carried out, it is stored in another register. Once the execute stage is complete, the CPU sets itself up to repeat the cycle.





4.  List three common household devices, other than computers, which contain microprocessors:


  •       Mobile phones
  •       Calculators
  •       Watches

5. 

The control unit:

       It controls and monitors the hardware attached to the system to make sure that the command given to it by the application software are used. It controls the input and output of data so that the signals go to the right place at the right time. It controls the flow of data within the CPU (The fetch-decode-execute cycle)





Arithmetic Logic Unit:

      The ALU performs mathematical, logical, and decision operations in a computer and is the final processing performed by the processor. After the information has been processed by the ALU, it is sent to the computer memory. In some computer processors, the ALU is divided into an AU and LU. The AU performs the arithmetic operations and the LU performs the logical operations.


Machine cycle



Friday, 17 October 2014

Ethics


Ethics


  • WikiLeaks is an international online non-profit journalistic organisation which publishes private information, news leaks, and classified media.
  • Julian Assange is an Australian publisher journalist; he is the editor and chief of WikiLeaks. He had an early career in hacking from 2006. I do not agree that he should be sharing private information, however i agree that if the celebrity or other person that has the information has agreed to letting WikiLeaks have it then there's not much to stop it. 
  • Chelsea Elizabeth Manning is a United States Army soldier who was convicted in July 2013 of violations of the Espionage Act and other offences, after releasing the largest set of classified documents ever leaked to the public. She gave information to the enemies, so i don’t agree with her actions. 
  • Edward Joseph "Ed" Snowden is an American computer professional who leaked classified information from the National Security Agency, starting in June 2013. I don’t agree with anyone leaking information that is private and hacking National Security is a big offence so i do not agree with his actions.


Computing and the environment

Computing and the environment


•Computers benefit the environment because they don’t use paper from trees and you learn more complex study systems.

•To make computers more environmentally friendly we can extend their useful lifetimes and recycle old computers to make new parts for new computers. 

Freedom of Information Act

Freedom of Information Act 
  • The Freedom of Information Act gives you the right to access recorded information held by public sector organisations.
  • however, in some countries they don't use this
  • The Freedom of Information Act 2000 is an Act of Parliament of the Parliament of the United Kingdom that creates a public "right of access" to information held by public authorities.
  • It protects people’s information and prevents other people or hackers from taking it.
  • If you break the law then you could be in risk of a jail sentence.

Phishing and Spam

Phishing and Spam


  • Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details. 
  • Spam is the electronic equivalent of junk mail. 
  • Phishing and Spamming isnt ethical as it is scamming, usually spam (bad email) is cause of viruses on computers that hackers use to get information. Phishing is definatly not ethical as passwords, credit card details and usernames are your own private information. 
  • There are currently a few laws going through congress that deal with internet crimes. Phishing is one the crimes that are being discussed.

Online Privacy

Online Privacy


Maintaining privacy whilst online is essential in avoiding identity theft and fraud. Apart from these risks, however, there is personal information about you which you undoubtedly do not want to reveal to certain other people. 


The Risks

  • Identity theft
  • Blackmail/extortion
  • Defamation of character
  • Unsolicited selling and marketing
  • People using awareness of your activities and movements to act against you
  • Employers using the information to exploit you
You are legally entitled to request a copy of all the personal data that an organisation holds on you, known as a subject access request. The organisation is obliged to deliver the data within 40 calendar days, and may charge a fee of up to £10 to do so.

Monday, 13 October 2014

Freedom of Speech

Freedom of Speech

Freedom of speech is the political right to communicate one's opinions and ideas using one's body and property to anyone.

Every government restricts speech to some degree. Common limitations on speech relate to: libel, slander, obscenity, pornography, sedition, hate speech, classified information, copyright violation, trade secrets, non-disclosure agreements, right to privacy, right to be forgotten, and campaign finance reform.

Whether these limitations can be justified under the harm principle depends upon whether influencing a third party's opinions or actions adversely to the second party constitutes such harm or not.

Freedom of information is an extension of freedom of speech where the expression is the Internet. Freedom of information may also refer to the right to privacy in the context of the Internet. As with the right to freedom of expression, the right to privacy is a recognised as a human right. Freedom of information may also concern censorship in an information technology context, i.e. the ability to access Web content, without restrictions. 

Twitter


Private information: You may not publish or post other people's private and confidential information, such as credit card numbers, street address or Social Security/National Identity numbers, without their express authorization and permission.

Reliability

Reliability

Reliability is very important for owners of computer systems. For example; reliability is very important for banks because if the computers are not reliable they could break down, resulting in data being lost. With lost data money can be lost and records could be ruined. Also, reliability is very important for hospitals. Without reliability their computer systems can break or shut down. This means they will need to have a back up power system to keep their patients alive and healthy. If they do not have a back up then lives could be lost.

Friday, 10 October 2014

Netiquette

Netiquette

What is it?

The word netiquette is a combination of ’net’ (from internet) and ’etiquette’. It means respecting other users’ views and displaying common courtesy when posting your views to online discussion groups.

Basic Rules:


  • Refrain from personal abuse. 
  • Don't spam. 
  • Write clearly and succinctly.
  • Remember that your posts are public.
  • Stay on-topic
  • Don't expect other people to do your homework for you. If you're looking for technical help, for example, don't ask questions you could easily answer yourself by reading the manual or online help provided with the product. 
  • Do not post copyrighted material to which you do not own the rights. 
  • The site's owner has the final say in enforcing the rules.