1/281
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Business-ready
being technically and tactically proficient in the knowledge and skill areas that a person engaged in business is expected to know
What skills do you need to develop to be business ready
non-routine cognitive skills
system thinking
is the ability to model the components of the system to connect the inputs and the outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed
non-routine cognitive skill
is the ability and capacity to carry out cognitivelu challenging processes and be able to use ones knowledge in a responsible way to achieve a goal
non-routine cognitive skills types
systems thinkinh
experimentation
collaboration
social skills
lifelong learning
experimentation
making reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources you have
collaboration
two or more people working together to achieve a goal
critical thinking
the ability to exercise careful evaluation in order to determine the authencity, accuracy, worth, validity, or value of something
social skills
skills needed to successfully interact with those around you, particuarly the ability to persuade and negotiate
life long learning
the willingness to pursue knowledge beyonf formal schooling
Information Technology (IT)
is the study or use of computer and telecommunication systems for storing retrieving and sending information
Information
is knowledge derived from data
What does data need to be good
accurate
timely
relevant
just sufficient
worth its cost
Information Systems (IS)
is an intergrated set of components for collecting storing and processinf data and for providing information knowledge and digital product
what are the 5 components of IS
hardware
software
data
procedure
people
analog computers
operate on a continnum of values
the quantites of interest are represented by physical parameters
designed to solve one problem
digital computers
use discrete values
the quantities of interest are symbols
they can solve a multitude of problems
Binary values
1 and 0
in binary 1 is
TRUE
in binary 2 is
False
Uses Boolean algebra operators
AND, OR, Not to determine the outcome of binary addition and multiplication problems via a truth table
how to decode a byte
128
64
32
16
8
4
2
1
5 basic operations of computers
inputting
outputiing
storing
processing
controlling
inputting
the operation performed by the input unit and involves feeding instructions and data to the computer. Inputs come from varios sources includinf the keyboard mouse, the computers hard drive, memory, and data incoming from a network through (wire or wireless) interface card, and ultimately involves encoding data to a binary format usable by the computer
outputting
sendinf bianry data via the output unit to some component whether its the computers Ram or hard drive, or in some cases decoding it via graphics processing unit (GPU) so that its humman readable on a video screen, through an audio card to make it understandable on speakers or to a printer
storing
a process managed by the storage unit. before data can be processed, it needs to be stored or held in memory
processing
where the so called tinking is done and its performed by the arthmetic and logic unit (ALU) on a computers CPU. The ALU takes in inputs, does all the math, performs all the instructions given to it by the program being executed, and outputs data that is to be used by the program, a component of the computer, the user, or all of the aforementioned all at once.
controlling
done by the Control Unit (CU). If the ALU is the brain, the CU is the rest of the central nervous system, as it directs the operation of the I/O Unit and ALU by providing timing and control signals.
4 steps of the machine cycle
fetch
decode
execute
store(write back)
The 5 basic occur using what
machine cycle
fetch
the first step in the cycle involves the CPU retrieving an instruction from memory
decode
the cpu decodes the instruction and determines what it means then it directs that the pertinent data is moved to the ALU. the
Instruction time (I time)
fetch and decode
Execution time (E-time)
execute and store(write back)
execute
the ALU executes the instructions
store (writeback)
the ALU then stores or writes back the results of the execution step back to memory
I time + E Time =
machine cycle
how many times does a compter execute the machine cycle per second
billions of times per second
hertz
is one cycle per second
What units does computer science use to describe frequencies and capacities
Internation systme of units
International system of units: Kibi
kibi
ki
2^10
1.024×10³
kilo
ISU: mebi
Mi
2^10
1.049×10^8
mega
ISU:gibi
gi
2³0
1.074×10^9
giga
ISU:Tebi
ti
2^40
1.100X10^12
tera
Server types
application
file
database
web
Types of client
thick
thin
application
Runs software applications; CPU & RAM-intensive.
file
Stores files; not CPU & RAM-intensive but uses clustered storage (RAID).
database
store databases & runs database management system software
web
runs websites
thick
full OS and applications are resident on the client
thin
minimal OS and applications are resident on the server: uses virtualization, which the process of running a virtual instance of a computer system in a layer abstracted from the actual hardware; e.g. Citrix.
supercomputer
a computer noted for its high level of performance usually relying on parallel processing
parallel processing
a type of computer architecture in which multiple processors simultaneously execute multiple, smaller calculations broken down from a larger, complex problem.
Basic components of computers?
motherboard
central processing unit (CPU)
random access memory (RAM)
storage
expansion slots
input/output
motherboard
is a printed circuit board (PCB) that contains the principal components of a computer, with connectors into which other circuit boards can be slotted.
CPU
, aka Processor or CPU, is the component of a computer system that performs the basic operations (such as processing data) of the system, that exchanges data with the system's memory or peripherals, and that manages the system's other components
how many cores does a cpu have
16
CPUS are either
Risc: reduced instruction set computer
CISC: complex instruction set computer
RISC
processors are designed to reduce the complexity of hardware by using a few basic instructions. Thus:
Instruction size is limited to one word or less.
Instructions take one clock cycle to execute.
CISC
processors are designed to reduce the complexity of hardware by using a few basic instructions. Thus:
Instruction size is limited to one word or less.
Instructions take one clock cycle to execute.
DDR SDRAM
Double Data Rate SDRAM; RAM that doubles the bandwidth of single data rate SDRAM by transferring data on both the rising and falling edges of the clock signal without any increase in clock frequency.
DIMM
Dual in-Line Memory Module; 64-bit data bus using 168-pin connectors. Current DIMMs are double data rate (DDR4) SDRAM that have 288-pin connectors.
Storage types
non-volatile
volatile
Non-volatile
They retain their contents regardless of power state; examples include:
firmware
magnetic disc
solid state storage
thumb drives
optical disks
Volatile
They empty when you turn the power off; examples include cache (L1, L2, L3) and main memory (RAM).
Hardware development
analysis
proof of concept
design
manufacturing
testing
support
computer architecture
instruction set architecture
microarchitecture
analysis
Requirements are collected; these may come from product management when proactively developing hardware, or customers when responding to a specific customer request. Requirements are analyzed to determine if the hardware can be made using off-the-shelf (OTS) components or require the development of specialized components. Project planning occurs to determine estimated time, cost, quality, and resources needed.
proof of concept
A model with some or complete functionality may be built to determine the feasibility of developing the product per the requirements. There may be individual POCs to address specific feature functionality. Lessons learned from the POC build(s) are rolled into the next step, which is:
design
The components are design by first committing to an architecture that enables the desired functionality, ideally while using the most cost-effective materials and manufacturing techniques. The functional block design derived from the architecture is translated into detailed component designs. Modeling may me used to verify design assumptions.
manufacturing
OTS components are acquired. Specialized components are manufactured. Components are then assembled into the final product.
testing
During and after the manufacturing process, components will be inspected and tested. After manufacturing, the final product undergoes integrated testing to ensure all components work together to produce the desired results according to the design parameters.
support
Documentation is created to describe the product, capabilities, and use.
computer architecture
describe the functionality, organization, and implementation of computer systems, and is really made up of two separate architectures (so much architecture!):
instruction set architecture
The architecture related to the computer’s programming, i.e. it’s the method by which a program’s compiled code is executed by the processor. Common instruction set architectures are x86, x86-64, and x64.
microarchitecture
o The hardware implementation of the instruction set architecture, i.e. it’s the combination of components and circuitry that make up the processor.
Personal Area Networks (PAN)
are networks that, in essence, surround the individual (hence personal), usually involving devices connected to a person’s smartphone.
Local Area Networks (LAN)
are networks that cover a house or a building, typically employing the Internet Protocol (IP) using IP private addresses to communicate with other devices on the same local network using wired and/or wireless connections.
Wide Area Networks (WAN)
are networks that extend beyond a single building or site. They can include campus area networks and metropolitan area networks.
internet
network of networks
tier 1
A network owner that doesn’t need to lease any of its network infrastructure.
tier 2
A provider that peers with other providers and owns some of their own backbone network infrastructure, but still needs to purchase IP transit facilities to reach some portion of the internet.
Tier 3
A provider that doesn’t own any of its own backbone; it purchases IP transit from tier 1 and 2 providers. Tier 3 providers are internet servicer providers (ISP) that typically provide consumer and small & medium sized business customers within a given domestic region access to the internet.
Network Providers
interexchange carriers(IXC)
local Exchange Carrier (LEC)
Competitive Local Exchange Carrier (CLEC)
IXC
An interexchange carrier is essentially a telecommunications company that provides connections between local exchange carriers. Examples include AT&T, Verizon, T-Mobile, and Lumen.
LEC
A company that provides local telephone service, which includes data network service, or one of the nine original Regional Bell Operating Companies (RBOC), or “baby Bells.” Examples include SBC and Bell Atlantic.
CLEC
A company other than RBOCs, that provides local telephone service in a given area. Examples include Frontier and Windstream.
OSI Model: Layer 7
application
services affecting end user applications
OSI Model: Layer 6
presentation
data representation & Encryption
OSI Model: Layer 5
Session
Interhost Communication
OSI Model: Layer 4
transport
end to end connections & reliability
OSI Model Layer 3
network
path determination and IP (Logical Addressing)
OSI model layer 2
Data Link
MAC & LLC (physical address)
OSI Model Layer 1
physical
media, signaling & Binary Transmisson
TCP or IP Model: application
encompasses the session, presentation & application layers
TCP MODEL Transport
same as OSI Model
TCP MODEL Internet
Same as network in OSI model
TCP MODEL network
encompasses the physical & data dink layers
Network hardware: switch
An OSI layer 2 network device meant to route traffic inside a network using MAC addresses.