Thursday, November 21, 2013
Role of operating system
The operating system was created to facilitate the users computer. In such a way that the user does not need to know the mechanism or system hardware . The operating system will be prepared to work in areas that need it in order to serve the various needs of users. Which can characterize the performance of the system as follows.
1 . The user interface . So that the user can use the computer more convenient.
2 . Monitoring devices and the computer.
3 . Resource management in a computer system.
1: Interact with the user (User Interface).
Users who are able to communicate or control the computer through the operating system. The system then sends a message to a user in response to a user command or order with various input devices available at the same time it acts as an intermediary between the various application programs . To connect with a computer as we use them too. (Or the things in computer that receive our orders(any electronic devices)
2: Monitoring devices and the computer.
Since the computer through the operating system may not necessarily have a deeper understanding of the work inside the computer. Therefore, the operating system must be responsible for overseeing the operation of the equipment. To make the system work is to accurately and consistently.
3:Resource management in a computer system.
Resource is being used to continue programs such as the processor (CPU) , memory devices and display data. (Input / Output).
Therefore, the operating system must manage these resources to achieve maximum benefit. If the operating system is known to be effective and creative resources . The programs can be made more quickly .And the workload increased.
Memory Management
The process of managing computer memory . That is, the memory book . Upon request . And restore memory when not in use .
How to manage memory has continued to develop efficient memory management increase. Especially how to use virtual memory . Which is how the area of secondary memory to act in the same manner as the main memory. The amount of memory is more . Therefore, the performance of a virtual memory management , thus affecting the system performance significantly.
Process Management
A process is a running program in such a group (batch job) program of the rationing system (time-shared user program)
Process requires different resources in each work such as processing time, memory ,files and data transmission . This process may have been when these resources are created . Or acquired during work. Resources can also be passed to other processes as well , such as the one responsible for the status of the file on the screen , it can get information from a data file.
CPU scheduling
It is the working principle of a computer operating system that has the ability to run multiple programs at the same time. The median time from the CPU to the process that may be sent several times. Processes simultaneously. While the CPU may have fewer processes. Or may have only a single CPU . Will cause the computer to run more workloads than the work done by the CPU processor.
The basic requirement .
The purpose of the program is to run multiple applications . CPU needs to be running all the time so that the CPU is fully used . And efficiently. The system has a single CPU . At any one time, the CPU will work just the same . If multiple applications or multiple applications . The rest had to wait until . Will be managed into the CPU.
Main Memory Fetch-Cycle
CPU stands for Central Processing Unit , is the central processing unit . Also known as the processor (Processor) or chips (Chip) CPU is a small chip inside the CPU will feature vast amounts of electronic circuits . Which can not be seen with the naked eye CPU serves to calculate the number of commands entered by the user program to the CPU to read a set of instructions that interpret and perform calculations on the results , it will send the results to show the screen.
The main components of the computer.
Current computers were designed according to the principles of John Von Neumann, which will have three main components, including CPU Memory I / O.
CPU consists of two units, the main unit is a control unit (Control Unit), acting on orders from the main memory into the register and then transcode (Decoding) called stroke order. (Instructional Cycle) and then sent him to the operating tempo (Execution Cycle) and logical unit (ALU: Arithmetic and Logical Unit) to calculate and compare Then send the results stored in the Register, which serves to store and relay information command was introduced.
The main components of the computer.
Current computers were designed according to the principles of John Von Neumann, which will have three main components, including CPU Memory I / O.
![]() |
| John Von Neumann |
The basic operation of the computer.
Computer is an electronic device that can be used for many different functions, which allows for greater human comfort. To the results, it can make the computer work and processes to find answers quickly. As a result of the computer itself automatically.
CPU (Central Processing Unit).
The computer has a central processing unit , also known as the CPU (CPU: Central Processing Unit) , which is part of the processing equipment (processing device) the main function is to processing orders received that can be done. CPU will handle the process themselves .Because they have the units for the specific work .
Control unit (Control Unit) controls the function of every unit in the CPU and peripherals . From the moment I entered the command . The command to retrieve data from memory and then interpret. To send to the Arithmetic Logic Unit calculations . And decide whether to store it anywhere .
Arithmetic Logic Unit (ALU: Arithmetic and Logic Unit) which acts as an agent in mathematics (arithmetic) as quotients and data logic (logical) as true or false. Comparison operators using three basic values that are less than and equal to .
Router registers (Register) is a set of instructions for spool data results and data processing occurs while the CPU is only temporary . Not a memory at all. Registry router to send and receive data at high speeds. And run under the control of the control unit, as well as other units .
Fetch Execute Cycle
Typically, a central processing unit, or CPU. Command can process only 1 order at a time, but at very high speeds but also depending on the speed of the CPU. When CPU works on each command until finish they will call the next command to process it. CPU keep doing this again and again as a cycle so we call it Machine Cycle
Machine Cycle involves mainly by reading and processing data from the main memory. And forwarding the work related to the next. Which can be divided into four stages as follows.
Step 1: (Fetch) this process the control unit will pull out various commands and datas from the main memory.
Step 2: Interpretation (Decode) control unit of the CPU instruction set to locate and interpret the meaning of such a statement was issued that set. What is to be done. To generate a control signal sent to the Arithmetic Logic Unit or ALU manipulate the data to get to it.
Step 3: The Executable (Execute) on the arithmetic and logic processing signals received from the control unit. Its function is to calculate and compare the order is received. And forward the results to management.
Step 4: To store the results (Store) results from the calculation of the arithmetic and logic, and data is written to the address or location of the memory. To wait for the rest
Friday, November 1, 2013
Article Review 3 Self-driving cars from Google
Google's Driverless Car
Google is developing a car that doesn't need a driver a technology for autonomous cars .From the result after these cars have been driven for a long way but never made any incident , so this mean that its much more safer even than the car with professional driver .The car work together with Google street view Google and many intelligence technologies with many censors around help controlling the car .Expected it will be on the car market in 2019 because in that time censor's technology and driverless connection system would work perfectly and in each car may be able to communicate with other cars to prevent an accident.
The Major Concept:
- Google Inc. has been working on self-driving car to solve problem accident in the street that cause by human.
- These driverless cars are a lot safer and smoother driving than human.
Advantage
- The article pick up the evidence shows that these self'driving cars are safe . In August 2011 a human controlled Google driverless car was involved in a crash near Google headquarters in mountain. A previous incident a Google driverless car being rear-ended while stop at the traffic light. Both incidents causes by human.
Question
- Are there any other Inc. that is working on an autonomous car too ?
- If its really that good so it must be so expensive ?
Citation
"Google Driverless Car." Wikipedia. Wikimedia Foundation, 31 Oct. 2013. Web. 01 Nov. 2013.
"Self-Driving Car Test: Steve Mahan - Google Jobs." Self-Driving Car Test: Steve Mahan - Google Jobs. N.p., n.d. Web. 01 Nov. 2013.
Worstall, Tim. "Google To Build Its Own Driverless Cars." Forbes. Forbes Magazine, 24 Aug. 2013. Web. 01 Nov. 2013.
SAPVoice. "Google Driverless Car: Why You Will Probably Never Own One." Forbes. Forbes Magazine, 23 Oct. 2013. Web. 01 Nov. 2013.
Worstall, Tim. "Google's Driverless Car Problem Isn't Technology, It's Liability And Regulation." Forbes. Forbes Magazine, 21 Aug. 2013. Web. 01 Nov. 2013.
"Google: Self-driving Cars Safer than Professional Drivers." - Cars. N.p., n.d. Web. 01 Nov. 2013.
Sunday, October 13, 2013
Tuesday, October 8, 2013
The Fifth Generation of Computer
The Fifth Generation of Computer or Artificial Intelligence
Artificial Intelligence is a very interesting topic because it's about High Technology in the future about Robots and many things.
1:First we choose the group which my group members are Tee and Chatt.
2:Then we organize who will do what slide.
3:I work on What is AI , The Fifth Generation of Computer , Decorating , Video .Chatt works on Parallel processing ,Citation and find some information . Tee on Types of AI and Example of AI.
4:And then after finished adding information we decor it to makes it looks really more like a future topic.
5:DONE!!
Thursday, September 26, 2013
Thai Culture Presentation
This video is about Thai Culture , what is culture and explain about it. After we've already finished working on power point presentation from my previous post ,so now we all have to make a video using the data and video that we presented ,make it looks better and more attractive. Same group members : Pete ,Folk , Pat , Tee , Book ,Far , Give and Chatt but this Video Editing work we do it individually.
This video is edited using Camtasia Studio Version 8 . Pictures are mostly from Google , other videos inside the video are from Youtube downloaded using Keepvid.com website and checked all the sources by easybib.com .
This video is going to presents about Thai Culture . What do Thai people eat , what do they like , what do they don't like and many more :)))
Take your time enjoying the video ;)
And this is the full presentation
Tuesday, September 10, 2013
Thai Culture
1: We separated people in different countries , and I'm Thai.
2:We start with the definition of Culture , what does it mean.
3:And then we shared everyone ideas of Thai culture , what do Thai people wear or anything.
4:After that , we start working on it on google drive. share the information to everyone in the group.
5:Everyone can do any topic that they like and if other member of the group have something to suggest so they just helping each other .
6:Decorate it with theme that not looks too much complicated and too much plain.
7:Check the presentation for the last time to make sure that its all perfect.
8:Done!!
Monday, September 9, 2013
5 Great (and free) Cloud Storage Providers
Google Drive is good for Google users and free space up to 5GB. You can pay extra additional fees if you want more storage. Its usable on Mac, Windows, Linux on PCs, Android, iOS, and Blackberry.
iCloud provides syncing of contacts, calendars, email and bookmarks between iOS devices, Macs and PCs. It also provides iOS device backup, PhotoStream, Find my iPhone, and Documents in the Cloud and it provides 5GB of free space for you to use.
Microsoft Skydrive is a cloud storage that gives you storage of 7GB upload of file and its a really choice for Microsoft documents where you can save your work and its both usable on Mac and PC.
Dropbox is a cloud computing service from which you can save your all data at one place and can access from anywhere you just dont need to copy to from one device to other , they also let us use 2GB of storage for free.
Box allows you to have 5GB of storage on the cloud. This drive is really useful for business and tools on for business. It's usable on PC and on every smart phone mobile devices.
Potential Problems
1: How did they get 5 most popular cloud stores ? How did they know that these are most popular
2: What if there's some other cloud storage that are better than what they're suggesting us ?
Questions
Why dont they suggest other cloud storage that like have more free space to use such as Mimedia and Cubby ?
iCloud provides syncing of contacts, calendars, email and bookmarks between iOS devices, Macs and PCs. It also provides iOS device backup, PhotoStream, Find my iPhone, and Documents in the Cloud and it provides 5GB of free space for you to use.
Microsoft Skydrive is a cloud storage that gives you storage of 7GB upload of file and its a really choice for Microsoft documents where you can save your work and its both usable on Mac and PC.
Dropbox is a cloud computing service from which you can save your all data at one place and can access from anywhere you just dont need to copy to from one device to other , they also let us use 2GB of storage for free.
Box allows you to have 5GB of storage on the cloud. This drive is really useful for business and tools on for business. It's usable on PC and on every smart phone mobile devices.
Potential Problems
1: How did they get 5 most popular cloud stores ? How did they know that these are most popular
2: What if there's some other cloud storage that are better than what they're suggesting us ?
Questions
Why dont they suggest other cloud storage that like have more free space to use such as Mimedia and Cubby ?
Video
Citation
"Sky Drive." YouTube. YouTube, n.d. Web. 24 Sept. 2013.
"Sky Drive." YouTube. YouTube, n.d. Web. 24 Sept. 2013.
5 Great (and Free) Cloud Storage Providers | Neotericuk.co.uk." N.p., n.d. Web. 19 Sept. 2013.
Tuesday, September 3, 2013
Ethics and Copyright Presentation
1:First we divide works to do, which slide is for me which slide is for other people.
2:Searching the internet with various information to get the best one .
3:Everyone were working on their slide and then finally becomes a real presentation.
4:after that we decorate them together with some animation and other pictures.
5:And then done!!
Friday, August 30, 2013
Facebook Use Predicts Decreases In Life Satisfaction
First of all , In this article they are researching about Facebook decreasing your happiness of your life and make you feel lonely . In other words, the more you use the pervasive social media tool, the more your life satisfaction drops. Look from the outside Facebook might be the thing that fulfill us when we are having an depression or any problem because it has all human needs for social connection ,but actually it makes us feel miserable , sad or lonely because like When you're on a site like Facebook, you get lots of posts about what people are doing. That sets up social comparison you maybe feel your life is not as full and rich as those people you see on Facebook.
The main point
- " Rather than enhance well-being, we found that Facebook use predicts the opposite result -- it undermines it.". It shows that what most of people that think Facebook gives us happiness are wrong.
- As long as you using Facebook as much as it decrease your well-being.
- This article is not only about Facebook but about all of the social medias
Advantage
- They also proved their researching by taking 82 young adults who used Facebook and had smartphones. Researchers gauged their well-being by texting the study participants five times a day for two weeks. The texts had links to online survey questions including: "How do you feel right now?", "How lonely do you feel right now?", "How much have you used Facebook since the last time we talked?", and "How much have you interacted with other people 'directly' since the last time we talked?" Which shows that Facebook really makes them feel lonely sad or in negative way.
Disadvantage
- This article is about telling us that Facebook is giving us depression ,but for some people for sometime its even make them feel even better to play Facebook , like expresses their feeling on Facebook's wall chatting with friend that live in the place that much far away.Facebook can give us happiness too .The researchers have proved that's right but its just a little number of people compare to people that plays Facebook .
Question?
1:If people knows that Facebook depresses them why don't they just stop using it ?
2:How do they ensure that Facebook really decrease people sanctification by testing only 82 people in only adult age ?
Video
or for more information here :http://www.huffingtonpost.com/2013/08/14/facebook-life-satisfaction-decrease-well-being-happiness_n_3756964.html?ir=Technology&ncid=edlinkusaolp00000003
Pete -->(30/08/2013) 11:53 pm
Thursday, August 29, 2013
ICT Rules
1:We discussed to make the new rules for our ICT class.
2:We had a vote and finally got the best 12 rules.
3.I took the rules and design it with Microsoft Word (Using Text Boxes, Pictures ,Arranging the lines and many other things)
4.And then i posted to vote again which one will teacher choose to be class poster , finding the most beautiful one.
Sunday, August 18, 2013
HOW TO STAYING SAFE ON THE INTERNET
Internet gives us opportunities to explore create contact people working or even shopping which is sound pretty good but how do we know that all of it are safe and not going to steal the information from us? Protect your identity.
1. First of all , most of the websites before we're going to their site we have to signing up first right? and yes never use your real identity it's too dangerous to write down who are we to the whole world isn't it .Lets just separate real world and internet world , like in real world your name is John Smith but in internet world you will be Sarah Hamster something like that to hide your self from a internet thieves? i don't know what do they call but there's always have people that trying steal our identity to do something bad .Use your real identity only with the website that we can really trust and have a strong protection.
2.Never use easy password like 1234 or something like that which is so very easy to guess ,that kind of password is just like putting a luggage on the front door of your house. Use the password that has character and number together would be great , as hard as your password is as safe as your information are.
3.Use Antivirus that have a strong protection for our identity from being steal or from malfunctioning our computer.
4.Never open e-mail attachments from strangers unless you can trust them and have security settings on your computer. Some junk e-mails may contain viruses or spyware that can harm your computer. These e-mails may be automatically marked as "spam" or "junk," but virus-ridden emails from unwitting friends can also slip through.
Alright now those were just some of the example to be safe on the internet .All we can do is just to suggest but after that is depend on you , you will lose a little time to make your identity safer or choose to enjoy your internet without any protection .
Here is an easy tips video
Or more information from here = "http://safe.met.police.uk/internet_safety/get_the_facts.html"
<18/08/13> or here "http://www.wikihow.com/Be-Safe-on-the-Internet"
1. First of all , most of the websites before we're going to their site we have to signing up first right? and yes never use your real identity it's too dangerous to write down who are we to the whole world isn't it .Lets just separate real world and internet world , like in real world your name is John Smith but in internet world you will be Sarah Hamster something like that to hide your self from a internet thieves? i don't know what do they call but there's always have people that trying steal our identity to do something bad .Use your real identity only with the website that we can really trust and have a strong protection.
2.Never use easy password like 1234 or something like that which is so very easy to guess ,that kind of password is just like putting a luggage on the front door of your house. Use the password that has character and number together would be great , as hard as your password is as safe as your information are.
3.Use Antivirus that have a strong protection for our identity from being steal or from malfunctioning our computer.
4.Never open e-mail attachments from strangers unless you can trust them and have security settings on your computer. Some junk e-mails may contain viruses or spyware that can harm your computer. These e-mails may be automatically marked as "spam" or "junk," but virus-ridden emails from unwitting friends can also slip through.
Alright now those were just some of the example to be safe on the internet .All we can do is just to suggest but after that is depend on you , you will lose a little time to make your identity safer or choose to enjoy your internet without any protection .
Or more information from here = "http://safe.met.police.uk/internet_safety/get_the_facts.html"
<18/08/13> or here "http://www.wikihow.com/Be-Safe-on-the-Internet"
Subscribe to:
Posts (Atom)



