Presentation is loading. Please wait.

Presentation is loading. Please wait.

Unit 1 Review Project Luke Mitchell Kinsey Lyle Theron Guidry Devon Bryant Keith Walston.

Similar presentations


Presentation on theme: "Unit 1 Review Project Luke Mitchell Kinsey Lyle Theron Guidry Devon Bryant Keith Walston."— Presentation transcript:

1 Unit 1 Review Project Luke Mitchell Kinsey Lyle Theron Guidry Devon Bryant Keith Walston

2 Terms Ada Lovelace- founder of scientific computing Bill Gates- American business magnate, investor, programmer, inventor and philanthropist Computer- is a programmable machine. The two principal characteristics of a computer are: it responds to a specific set of instructions in a well-defined manner and it can execute a prerecorded list of instructions (a program).

3 Terms (cont.) Copyright - The legal right granted to an author, composer, playwright, publisher, or distributor to exclusive publication, production, sale, or distribution of a literary, musical, dramatic, or artistic work. CPU - is the abbreviation for central processing unit. Sometimes referred to simply as the central processor, but more commonly called processor, the CPU is the brains of the computer where most calculations take place. In terms of computing power, the CPU is the most important element of a computer system.

4 Terms (cont.) Douglas C. Engelbart – the inventor of the computer mouse E-commerce - is a type of industry where buying and selling of product or service is conducted over electronic systems Gigabyte (GB) - One gigabyte is equal to 1,024 megabytes. Gigabyte is often abbreviated as G or GB Hardware - Refers to objects that you can actually touch, like disks, disk drives, display screens, keyboards, printers, boards, and chips. In contrast, software is untouchable. Software exists as ideas, concepts, and symbols, but it has no substance.

5 Terms (cont.) Internet - is a global network connecting millions of computers James Gosling- a Canadian computer scientist, best known as the father of the Java programming language Kilobyte (KB) - kilo stands for 1,000, but in binary systems, a kilo is 1,024 (2 to the 10th power). Technically, therefore, a kilobyte is 1,024 bytes, but it is often used loosely as a synonym for 1,000 bytes Megabyte (MB) - is 2 to the 20th power (approximately 1 million) and a gigabyte is 2 to the 30th power (approximately 1 billion).

6 Terms (cont.) Microprocessor- A silicon chip that contains a CPU. In the world of personal computers, the terms microprocessor and CPU are used interchangeably Moore’s Law- The observation made in 1965 by Gordon Moore, co-founder of Intel, that the number of transistors per square inch on integrated circuits had doubled every year since the integrated circuit was invented Network- is a group of two or more computer systems linked together

7 Terms (cont.) Plagiarism- taking someone else's work or ideas and passing them off as one's own RAM- random access memory, a type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes. RAM is the most common type of memory found in computers and other devices, such as printers.

8 Terms (cont.) Software - means computer instructions or data. Anything that can be stored electronically is software, in contrast to storage devices and display devices which are called hardware. Steve Jobs- entrepreneur and inventor, best known as the co-founder, chairman, and CEO of Apple Inc System Unit- The main part of a personal computer. The system unit includes the chassis, microprocessor, main memory, bus, and ports, but does not include the keyboard or monitor, or any peripheral devices

9 Terms (cont.) Tim Berners-Lee - invented the World Wide Web World Wide Web - A system of Internet servers that support specially formatted documents.

10 What were the first computer ? Why not just use humans for computing? Humans were the first computers. Humans are not used for computing because humans make errors, computers do not.

11 What are the characteristics of each of the four generations of computers? 1. Used vacuum tubes, very expensive, not very reliable 2. Used transistors, which were small, reliable, and gave off little heat 3. Used computer chips, and was cheaper 4. Uses microprocessors

12 What was generally regarded to be the first electronic computer? How did you program it? ENIAC (electronic numerical integrator and calculator) Switches and jumper cables

13 What is good and bad about computers? Good- they are there when you need them. They are really smart. They know more than a human. They work and process much quicker than a human. Bad- They will crash. They can be slow at times and get viruses or other software problems.

14 What are the four parts of the Information Processing Cycle? Accept data input. Data is processed. Information is stored. Information is output.

15 What is the difference between data and information? Data- A collection of unprocessed items Information- Facts provided or learned about something or someone

16 List and describe the input, processing/memory, output, and storage devices. Input device is a mouse of a computer. Processing is thinking the computer has to do something. Memory is where all the data is stored. Output is like the speakers on a computer. A storage device is like a jump drive, or memory card.

17 What are the two types of software and what does each do? What’s an example of each type? Operating software allows the user to talk to the computer, and application software allows you to do things that are productive.

18 What is the Internet used for? Informational purposes and for entertainment. Also used for business practices and transactions.

19 What links web pages together? The internet links all web pages together.

20 How does ethics apply to computers? You must use good computer ethics to prevent from having problems.

21 What are examples of violating a copyright? Using something without the owners permission.

22 Unit 2-standards 4-7 hardware,software,storage Eraina Stringer Gary Woodward Matthew Aguiar Alexia Gardner Danniella Vizcaya

23 Terms(Eraina) ASCII-American standard code for information interchange Data Bus-The bus (connections between and within the CPU, memory, and peripherals) used to carry data. Data Compression- use to make picture, sound and video files smaller. Gigahertz-(1,000,000,000)- is commonly used to measure computer processing speeds. Megahertz-(1,000,000)- Speed rating used for processors and computer bus speeds

24 Terms Cont., Motherboard- a rigid, slotted board upon which other boards that contain the basic circuitry of a computer or of a computer component can be mounted. Permanent Storage-Hard Drive-the data stored that you would like to keep Pixel- stands for picture element Temporary Storage-RAM-it is the data hat when you turn the computer off it is gone

25 15-20(Matthew) All computer hardware components require what 3 things? electricity to power it, software to instruct and control it, method for CPU to communicate with it Why are all hardware devices either mounted on or connected to the motherboard? because it is the main source of power and control for all the computer components What must happen to the data stored in permanent storage before it can be processed? Reopened What types of expansion ports are there? PCI, AGP(accelerated graphics port) What might each be used for? A plug accessing additional 1/0 capability on a computer or peripheral device What does BIOS stand for and what does it do? (basic input/output storage)BIOS- computer firmware that directs many basic functions of the operating system, as booting and keyboard control. What is the most important part of the computer’s electrical system? Power Supply What does it do? it gives the computer and all of the components power

26 21-25(Alexia) What three things should you consider when checking out the computer’s processor? brand type and speed If you want to judge the expandability of your computer what should you look for? available ports and slots In digital photography, digital zoom the image and expands it and optical zoom uses lenses to focus When setting up a home network you need to consider the layout of your house. Why two features make laptops a good alternative to desktops? performance and mobility

27 26-30(Danniella) What tools can you use to help you decide on which computer to buy? third parties, comparison charts What is binary? two What digits does it use? 1,0 What do the digits represent? on/off For a computer to execute a command, what has to happen to the command first? translated to the binary code What is the difference between a bit and a byte? bit is the 1 or 0; byte is equal to 8 bits What are the three primary colors used to make all the other colors on your computer screen? red green blue

28 31-35(Gary) Know how to convert binary to decimal and decimal to binary. – Start with leftmost binary position – Decimal number is “number to convert” – Ask “is number to convert> or = binary position value? – If yes, put a one in the binary position & subtract position value from number to convert. – If no, put “O” in binary position – Move to next binary position and repeat #3 until no more positions

29 Cont., What does JPEG, GIF, BMP, and PNG stand for? – JPEG- Joint photographic experts group – GIF- Graphics Interchange Format – BMP- Bitmap (picture format) – PNG- Portable Network Graphics What are these types of files are used for? – They are all files that are created when you are compressing images. Why might you choose one of these instead of the other? – images, some only support limited colors, larger or smaller

30 Cont., Why is a Windows Waveform sound file not so good for Internet sound files? Takes up a lot of space What does MP3 stands for? What is this type of file used for? moving picture experts group audio 3, audio recordings What do the terms ‘lossless’ and ‘lossy’ mean? lossless compress don’t lose original data, lossy original data is lost when compressed

31 Unit 3 Review Michelle Reuben, Khalista bester, Haley Cole, Marsalis Flores, and Joshua Scars

32 Bus topology A cable is used to connect all devices. In order to communicate with other devices, a device must send a broadcast message on to the central wire for all to see. This system works best with just a few computers. Easy to connect but entire system shuts down when there is a break in main cable.

33 Cyclic Redundancy Check Converts a packet’s data to numeric values adding them up. It then compares the results to a stored value to make sure the packet is good.

34 Data Packets Data packets are chunks or electric files transmitted over a network. Frame, block, or cell segment. Used for problem avoidance and load balancing. Packet header has sender and receiver address, packet number and size. Packet payload is the body of the packet. Packet trailer contains error checking which is the last thing in the packet to signify the end.

35 DHCP Dynamic Host Configuration Protocol The ip address changes or is randomly assigned.

36 Parts of a network Clients- computers that request information from a server. Servers- computers that that work to provide resources requested by the clients. Shared Peripherals- devices connected to a network such as printers and scanners. Media- physical pieces used to transport data such as wires and hubs. Data- packets.

37 Network Components A network is connected with wires or is wireless. Wired network- cables are used to connect devices together. One could use fiber optics or coaxial cables. Wireless network-data an be transmitted to different devices. No wire required.

38 Network Protocol Contains rules for communication between network devices. They generally use packet techniques. Mechanisms : – Devices to identify and make connections with each other – formatting rules that specify how data is packaged into messages sent and received – Message acknowledgement – Data compression

39 Router A device that forwards data packets to parts of a computer network

40 Topology Topology is the physical arrangement of devices in a network. The common types are: star, tree, bus, and ring.

41 Star Topology Star Topologies have a central connection point called a “hub”. It may also have a switch or router for its central point. It is often used in home networks Advantages include: Easy to install Cable failure will only take down one computer’s network access and not the entire network Disadvantages include: Requires more cable than linear topology If the hub fails, the entire network fails.

42 WAN WAN stands for Wide Area Network. It covers a large areas such as a city, a country, or multiple countries, like the internet.

43 What does encryption and decryption do? What do you need to do this? Encryption is the transforming of a message so that its contents are hidden from unauthorized readers. It is also known as cipher text. In order to do this you can use the software PGP (Pretty Good Privacy). Decryption is the process of decoding data that has been encrypted. In order to do this you will need a Cryptographic algorithm and key. An alternative to do both however, is the software PKE ( Public Key Inscription) which eliminates key- distribution problem, by using one key to encrypt a message and another key to decrypt the message.

44 How big is a typical packet? What else might a packet be called? A typical packet may be around 1,000- 1,500 bytes. Other names for it are: Frame, Block, Cell, and Segment.

45 List and describe why data packets are used (2 reasons Load balancing Problem avoidance

46 Internet connection: Internet access refers to the means by which users connect to the Internet. IP address: A unique string of numbers separated by periods that identifies each computer attached to the Internet. LAN: local computer network for communication between computers Network: a system of computers, peripherals, terminals, and databases connected by communications lines

47 What are the 6 steps in communication protocol’s transmission process? Divide messages into packets Affix addresses to packets Initiate transmission regulate flow of data Check for transmission errors Acknowledge receipt of transmitted data

48 In general, how might you configure a router? How do you know if you are successful Using modern software or a cd; open the web page with a web browser

49 What are some differences we discussed between DSL and Cable (list at least 2)? With DSL data is transmitted through phone lines, while cable uses existing cable television lines Cable is usually more costly, DSL sometimes allows internet connection free with tele phone subscription

50 Firewall A system designed to prevent unauthorized access to or from a private network. Protects your network from bad things Can also prevent sensitive info from going out Mainly software

51 Ring Topology a computer network configuration where each network computer and device are connected to each other forming a large circle.

52 Packet Header A packet header is the portion of an IP (Internet protocol) packet that precedes its body and contains addressing and other data that is required for it to reach its intended destination.

53 What is the preferred type of Internet connection? What are the 2 main types? Who provides these? The type of connection that you want is Broadban. 2 main types: Cable & DSL A cable provider or phone company provide these.

54 Packet payload - Also called the body or data of a packet. This is the actual data that the packet is delivering to the destination. Trailer- Trailer - The trailer, sometimes called the footer, typically contains a couple of bits that tell the receiving device that it has reached the end of the packet. It may also have some type of error checking. Protocol-Hardware and software standards that govern data transmission between computers. The term "protocol" is very generic and is used for hundreds of different communications methods. PPPOEPPP - is an acronym for Point to Point Protocol. It is a member of the TCP/IP suite of network protocols

55 To lessen the load on the internet connection, and security reasons Hypertext Transfer Protocol over Secure Socket Layer (HTTPS): HTTPS is a combination of normal HTTP interactions but with different default TCP port and an additional encryption/authentication layer between the HTTP and TCP. Widely used for security-sensitive communication such as payment transactions and corporate log-ins. Ensures reasonable security from eavesdroppers Most widely used protocol Uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection) 41.What is the main communication protocol? What does it use to identify devices on the networks? 42.List and describe the 3 internet protocols we covered. 47.According to the video, what are 2 reasons to have a proxy?

56 Unit 4 Standards 12-15: internet, World Wide Web, and HTML Eric Kimbrough, Aaron Crowe, Sanclara Daigle, Keyona Samuels

57 Adware A type of spyware that gathers information and exploits advertisements. They’re generally not harmful but too much can turn into spam and “clog” your computer’s system.

58 Spyware Software that secretly watches was your computer actions and collects them for a remote user

59 CSS CSS (Cascading Style Sheet) is a code used in Dreamweaver, it organizes the HTML rule

60 CSS Rule A rule that is set in place to create a specific CSS on a section or page. It can be used multiple times on multiple pages

61 HTML Hyper Text Markup Language (HTML) is a language used to describe the contents of web documents. It wraps the text with tags that tells the browser to do with the text. HTML does not have to be formatted, but it makes it easier to read.

62 Property Inspector(Dreamweaver) The Property Inspector lets you examine and edit the most common properties for the currently selected page element, such as text or an inserted object. The contents of the inspector vary depending on the element(s) selected.

63 Search Engine A program for the retrieval of data, files, or documents from a database or network, esp. the Internet. Search engines are programs that search documents for specified keywords and returns a list of the documents where the keywords were found.

64 Tags Symbols used to wrap the text in and make it readable within HTML format. With out tags, HTML would not work. You have to use the brackets <> for when you are making tags.

65 View buttons Easily transfer through the code and design parts in dreamweaver.

66 Web design the skill of creating presentations of content (usually hypertext or hypermedia) that are delivered to an end-user through the World Wide Web, using a Web browser or other Web-enabled software.

67 WYSIWYG WYSIWYG, is an acronym for What You See Is What You Get. The term is used in computing to describe a system in which content displayed during editing appears very similar to the final output, which might be a printed document, web page, or slide presentation.

68 What are the four components of search engines? #1- Title tag – should describe the main theme, intention, or content of what the site is all about. What you put here is what will show in the top bar of the window when the site is displayed. It is also the 'title' that appears when it is displayed in any search engine results.

69 Keyword use is important so that the search engines can easily locate your site. These keywords will act as 'guiding lights' for search engine spiders when seeking particular content. If your keywords are not relevant to the site content you again risk a lower search ranking or not one at all.

70 Keyword density The amount of keywords that you use in a search engine. Example, you wouldn’t put and, or, is, or if into a search engine as a key word. Too many keywords will get you into trouble because of “keyword stuffing”.

71 Inbound Links referred to as link popularity reflects links that come from other websites. This generally is an indication of the relevancy and quality your site content may have to the other websites. Think of this as your online list of references that will vouch for your websites legitimacy.

72 Crawler-based search engines Crawler-based search engines, such as Google, create their listings automatically. They "crawl" or "spider" the web, then people search through what they have found. If web pages are changed, crawler-based search engines eventually find these changes, and that can affect how those pages are listed. Page titles, body copy and other elements all play a role.

73 Human-powered directories A human-powered directory, such as the Open Directory Project, depends on humans for its listings. A directory gets its information from submissions, which include a short description to the directory for the entire site, or from editors who write one for sites they review. A search looks for matches only in the descriptions submitted. Changing web pages, therefore, has no effect on how they are listed.

74 Hybrid search engines crawler-type and human-powered results to be combined when conducting a search. Usually, a hybrid search engine will favor one type of listings over another.

75 What does it mean, case does not matter? The case of the letters (uppercase or lowercase) don’t matter because all the results will come up the same.

76 How does an asterisk (*), double quotes (“”), AND, OR, and NOT affect searching and search results? “” means to search for the specific phrase. * is a wild card character(any variation of the word/phrase) And-searches two different things (___and____) or- searches one thing or the other (____or____) Not-searches one thing not the other (____ not ____)

77 What four things should you consider when evaluating a website as a resource? How do you evaluate or judge each of these? The author and publisher of the website, the date it was last updated, the domain type

78 What two things does a firewall help ‘balance’? What is coming and leave through the computer

79 How do you know you have spyware/adware on your computer? How can you get rid of it? How can you prevent getting it in the first place? When you start getting specific ads related to things you like. Anit-spyware software, anti- malware software. Don’t get on the internet.

80 3 challenges of web design -linking websites: learning to use the anchor tag correctly can be challenging. If it is not correct other links will not be connected. -displaying images on the site requires images to be saved in a folder before using the image tag: -heading, style, and format can all be challenges of web design. They constitute as ways of making a page unique to the public eye.

81 What is the first thing you should do when designing a website? First thing to do: Open a notepad and create a brand new html file. Display it in Internet Explorer.

82 List the 3 parts of web design and the 4 things you should also consider when designing a website. 3 parts of web design HTML section, HEAD section, BODY section 4 things to consider -What is the purpose of this website? - Is the information accurate? -Who is your audience? -What is going to lure people into viewing your website (images, color, font)?

83 List and describe at least 4 guidelines, recommendations, or rules related to web design and pages. 4 guidelines to web design HTML is best create with plain text editors Tags are important and tells the computer what to do Formatting makes it easier to read Tag attributes change the way the tags behave

84 63.For HTML, present how to use the basic tags we used – 3 sections of an HTML doc, horizontal rule (HR), line break (BR), bold/underline/italics (B, U, I), paragraph (P), images (IMG, SRC), hyperlinks/anchors (A, HREF).

85 Three Sections of HTML Doc. 1. HTML Section – Encloses all the HTML – Tells browser that everything in it should be treated as a web page – Very first tag is – Very last tag is 2. HEAD Section – Immediately follows – Provides general info about the page and the page’s title – Not displayed in the page’s body – Contained within and 3. BODY Section – Immediately follows the HEAD section – Contains all the page’s content – Contained within and

86 Format Tags Horizontal rule(HR)- draws a horizontal line – Looks like= Line break(BR)-forces following text to the next line (like a hard return) – Looks like = Paragraphs(P)- treats text between the start/ end tags as a paragraph and forces 2 line breaks – Looks like =

87 Style Tags Bold- bolds text – Underline- underlines text – Italicize- italicizes text –

88 Example {Eric}'s Web Page Web Design is a wonderful thing. Look- a little line break. This is a paragraph. It's a great thing. Oh joy! Woop-de do!

89 Images Displayed using the IMG tag – The IMG tag uses the SRC (source) attribute to tell it the name (always) and location (if necessary) of the image file – Looks like –

90 Links Main way web pages are connected Called Anchor Links Uses the Anchor tag Whatever is between the two tags becomes the link on your page – You can link to virtually any file – For external Links you must provide the full link including

91 Example Click here for the Footlocker

92 64. How does WYSIWYG apply or not apply to HTML and web design software like Dreamweaver? How does WYSIWYG apply or not apply to HTML and web design software like Dreamweaver? You create plain text code What you create looks very little like the end product The browser interprets the code and displays what the code tells it to

93 65. Why do you need to know HTML even though Dreamweaver creates it for you? You need to know HTML even though Dreamweaver creates it for you because formatting is good practice.

94 66.In general, describe how to use Dreamweaver to create a website and web pages, including site setup, adding images, inserting links, and formatting using HTML and CSS rules.

95 First, you must create a separate folder for saving your files. – Should be something that you will remember or know of Dreamweaver website folder

96 Usage The way you use Dreamweaver to create a website and web pages is simple. This is a tool used to create the HTML for you. All you have to do is type in what you want to be on your website. Constantly save your work. And pay attention to the necessary steps used to create what you want. On Dreamweaver WYSIWYG applies.

97 Adding Images Click Insert. Click Image – Or type Ctrl+Alt+I Select the file with your image or the name of the image file. – Should look like scooby.jpg Click OK.

98 Links Click Insert Click Hyperlink Type in the text that you want your link to be – i.e. Type in the full link address – Click OK. – Save. – Test it out.

99 Formatting: HTML and CSS rules HTML- has where you can change you r formatting of your text, insert links, and even change your backgrounds. CSS- has where your can change your fonts colors, the font size as well as the text colors.

100 Unit 5 Review

101 Java Programming Definitions Random- JavaScript has a command called "random" for making random numbers While- You make an infinite loop with the "while(true)" instruction. First, you type while(true). After that, you should put an opening curly brace Show-Remember that you can use the "show" command to show a number on the screen. If-With the "if" instruction, a computer can compare two things and make a decision. One way it can compare things is to check if two things are the same.

102 Flowchart and diagram definitions Flowchart-diagram of the sequence of movements or actions of people or things involved in a complex system or activity. Ishikawa or Fishbone diagram- A fishbone diagram, which is also called a Ishikawa diagram, is a diagram used in quality control and product design. Pseudocode- a program code unrelated to the hardware of a particular computer and requiring conversion to the code used by the computer before the program can be used. Why/Why or Tree diagram- a diagram in which lines branch out from a central point or stem without forming any closed loops. Brainstorming- Produce an idea or way of solving a problem by yourself or holding a spontaneous group discussion:

103 Programming Definitions Algorithm- A process or set of rules to be followed in calculations or other problem-solving operations Array- Display or arrange (things) in a particular way Brainwriting- BrainWriting is a technique similar to Brainstorming and Trigger Sessions. There are many varieties, but the general process is that all ideas are recorded by the individual who thought of them. Computer program- program: a sequence of instructions that a computer can interpret and execute. String- a data type used in programming, such as an integer and floating point unit, but is used to represent text rather than numbers. Variable- Not consistent or having a fixed pattern, liable to change

104 Algorithms Algorithms are logical, step-by-step, precise instructions They are used in computer programming because computers need exact instructions to process data Good algorithms are precise, clear, step-by-step, produce correct outputs for any set of expected inputs, execute efficiently with fewest number of steps possible, and should be designed to be modified by others.

105 Flowcharts Flowcharts are graphical representations of an algorithm They are used as a guide to a code to make the coding easier They also use a standardized set of symbols to denote different functions

106 Flowchart Symbols

107 Pseudocode Pseudocode is essentially what it says on the tin – “sort of – code” It’s used as a code in-between that can be converted into nearly any kind of coding language It is a halfway point between normal English speaking and computer code

108 Pseudocode Rules & Keywords WHILE – loops a step or series of steps while something is true or until broken IF and THEN – a choice; IF color == blue, THEN do this ELSE – used as an alternative if the IF statement is not true Normal actions are usually stated plainly without any extra formatting

109 Flowcharts First widely used design tool Flowcharts aren’t best for structured programming

110 Pseudocode Newer and better suited for structured programming But, it’s not as easy to understand; whereas flowcharts are.

111 Problem Solving Process Recognize that something is wrong – Checklists – Observe and listen for comments, complaints, etc. – Comparison against others

112 ID the actual problem (Root Cause) Ask: – Who? – cause, affect, actions – What? – events, symptoms, consequences – When? – timing (now, others), # times – Where? – impact area(s) – Why? – reasons for problem and fixes – How? – how will you know it is solved – Data? – what will you need to find out to answer these questions?

113 Implement the chosen solution First, you must consider: – Resources needed – Approvals – Prerequisite steps – Steps required to implement – Involvement and allocation of people – Schedule

114 Implement the chosen solution Then, decide what needs to be done – Create an action plan like an algorithm containing the tasks to be done and resources needed Finally, complete the tasks – Do the tasks on the action plan

115 Using groups to solve problems.. Advantages Greater shared knowledge and experience will lead to more alternative solutions Better understanding of how and why a decision was made Greater acceptance of ideas Fewer extremes of ideas, especially those involved in taking/avoiding risks Collective judgment is usually better than that of an individual

116 Using groups to solve problems.. Disadvantages Peer pressure may influence decision-making One person may dominate the group A group requires more time to reach a decision Groups generally don’t make better decisions than an expert or someone with special knowledge and skills.

117 Symbols used in Java Programming = - Set to == - Equal to {} – Functions (contain commands) + - Addition ; - Ends command (function)

118 What makes computers so good at processing data? A computers CPU usually contains a execution core with two or more instruction pipelines, a data and address bus, arithmetic logic unit (ALU, also called the math co- processor), and in some cases high- speed memory for caching program instructions from RAM

119 What are some tasks and areas where computers and algorithms are limited? Creativity, determination, patterns, emotion

120 Why will Moore’s Law eventually stop being true? You cant go smaller then an atom

121 What ‘tools’ are used to create the layers and connections in a computer chip? An etching device is needed to create the pattern, and an ion implantation machine is needed to dope the different areas. A sputtering machine is needed to deposit the metal.

122 Who Did What Avery Snyder – Caleb Jones – Jonas Allen – Logan Driver – Mason Sheffield - Definitions


Download ppt "Unit 1 Review Project Luke Mitchell Kinsey Lyle Theron Guidry Devon Bryant Keith Walston."

Similar presentations


Ads by Google