COMPUTER APPRECIATION and APPLICATION to AGRICULTURE Course Developer:Dr. Joseph

Total Page:16

File Type:pdf, Size:1020Kb

COMPUTER APPRECIATION and APPLICATION to AGRICULTURE Course Developer:Dr. Joseph NATIONAL OPEN UNIVERSITY OF NIGERIA CIT204: COMPUTER APPRECIATION AND APPLICATION TO AGRICULTURE Course Developer:Dr. Joseph Gusen ICT Lecturer, Department of Science and Technology Education Faculty of Education, University of Jos Course Editor: Dr. Greg Onwodi Programme Leader: Prof. N. E. Mundi (NOUN) Course Coordinator: Mr. Awolumate Samuel (NOUN) 1 CONTENTS Page Course Guide………………………………………………………….. 1 Introduction……………………………………………………………. 1 Course Introduction……………………………………………………. 1 What you need to learn………………………………………………… 2 The course……………………………………………………………... 2 Course aims…………………………………………………………… 2 Course Objectives……………………………………………………... 2 Working through the Course………………………………………….. 2 The Course Material…………………………………………………… 2 The course outline……………………………………………………... 3 Synopses of Module 1: Understanding the computer…………………. 3 Synopses of Module 2: The component of the computer……………… 3 Synopses of Module 3: Programming the 4 computer…………………… Synopses of Module 4: The areas of application of computer………… 4 Synopses of Module 5: Treats to the 4 computer………………………… Textbooks……………………………………………………………… 4 Assessment…………………………………………………………….. 5 Self-Assessment Exercise……………………………………………... 5 Tutor-Marked Assignment…………………………………………….. 5 End of course Examination……………………………………………. 5 Summary………………………………………………………………. 5 Module 1 Understanding the computer………………………………………….. 7 Unit 1 Basic concept of the computer………………………………………… 7 1.0 Introduction……………………………………………………………. 7 2.0 The objectives……………………...………………………………….. 7 3.0 The main content…………………..………………………………….. 7 3.1 The concept of the computer……………………………………. 7 3.2 Data and its types………..……………………………………… 8 3.3 Information………………..…………………………………….. 9 3.4 Comparison of Data and Information ...………………………… 9 3.5 Philosophy of Data Processing………………………………... 9 3.6 Objectives of Data Processing………………………………….. 9 3.7 Functions of Data Processing…………………………………… 10 3.8 Approach to Data Processing…………………………………… 11 3.9Methods of Data Processing……………………………………….. 11 3.10 Advantages of computers………………………………………. 12 3.11Disadvantages of computer…………………………………….. 12 3.12 Characteristics of a Computer………………………………….. 13 3.1The Computer System…………………………………………….. 13 4.0 Conclusion…………………………………………………………….. 16 5.0 Summary………………………………………………………………. 16 6.0 Tutor-Marked Assignment…………………………………………….. 16 7.0 References/Further Readings………………………………………….. 16 Unit 2 The History of computer………………………………………………. 17 1.0 Introduction……………………………………………………………. 17 2 2.0 The objectives……………………...………………………………….. 17 3.0 The main content……………………………………………………… 17 3.1 History of computer from the calculating devices……………… 17 3.2 Evolution of the computer from mechanical period…………… 18 3.3 Development of computer from electromechanical period…….. 20 3.4 The computer period….………………………………………… 20 4.0 Conclusion…………………………………………………………….. 31 5.0 Summary………………………………………………………………. 31 6.0 Tutor-Marked Assignment…………………………………………….. 31 7.0 References/Further Readings………………………………………….. 31 Unit 3 Generation of computer……………………………………………… 32 1.0 Introduction…………………………………………………………… 32 2.0 The objectives……………………...………………………………….. 33 3.0 The main content……………………………………………………… 33 3.1 The first generation of computer with its characteristics 33 3.2 The second generation computer with its characteristics..……… 34 3.3 The third generation computer with its characteristics.………… 36 3.4 The fourth generation computer with its characteristics.……….. 38 3.5 The fifth generation computer with its characteristics.…………. 40 3.6 The sixth generation computer with its characteristics………… 42 3.7 The Seventh Generation of computer with its characteristics….. 44 4.0 Conclusion…………………………………………………………….. 45 5.0 Summary………………………………………………………………. 45 6.0 Tutor-Marked Assignment…………………………………………….. 46 7.0 References/Further Readings………………………………………….. 46 Unit 4 Classification of computers…………………………………………… 47 1.0 Introduction…………………………………………………………… 47 2.0 The objectives…………………………………………………………. 47 3.0 The main content………………………………………………………. 47 3.1 Classification of computers by types of datarepresentation…... 47 3.2 Classification of computers by purpose………………………… 51 3.3 Classification of computers by capacity……………………….. 53 4.0 Conclusion…………………………………………………………….. 60 5.0 Summary………………………………………………………………. 60 6.0 Tutor-Marked Assignment…………………………………………….. 61 7.0 References/Further Readings………………………………………….. 61 Module 2 Computer Hardware…………………………………………………… 62 Unit 1 Hardware Components………………………………………………… 62 1.0 Introduction……………………………………………………………. 62 2.0 The objectives…………………………………………………………. 63 3.0 The main content………………………………………………………. 63 3.1 The input unit…………………………………………………… 63 3.2 The CPU unit…………………………………………………… 89 3.3 The Primary Unit……………………………………………….. 96 3.4 The Secondary Unit……………………………………………... 104 3.5 The output Unit…………………………………………………. 109 4.0 Conclusion…………………………………………………………….. 112 5.0 Summary………………………………………………………………. 112 6.0 Tutor-Marked Assignment…………………………………………….. 113 7.0 References/Further Readings………………………………………….. 113 3 Module 3 The computer software………………………………………………… 114 Unit 1 Component of the Computer 114 Software…………………………………. 1.0 Introduction……………………………………………………………. 114 2.0 The objectives…………………………………………………………. 115 3.0 The main content………………………………………………………. 115 3.1 Types of software………..……………………………………… 115 3.2 The operating system…………………………………………… 115 3.3 Operating system component…………………………………. 119 3.4 Language Translators…………………………………………… 124 3.5 The utility software……………………………………………... 125 3.6 Comparison of compiler and Interpreter………………………... 126 3.7 Comparison of Assembler, compiler and Interpreter…………... 127 3.8 Utility Software…………………………………………………. 127 4.0 Conclusion…………………………………………………………….. 130 5.0 Summary………………………………………………………………. 130 6.0 Tutor-Marked Assignment…………………………………………….. 130 7.0 References/Further Readings………………………………………….. 130 Unit 2 Component of the computer software………………………………… 132 1.0 Introduction……………………………………………………………. 132 2.0 The objectives………………………………………………………… 132 3.0 The main content……………………………………………………… 132 3.1 The concept of application software……………………………. 132 3.2 Types of Application programs………………………………… 133 3.3 Mail Merge…………………………………………………….. 144 3.4 Difference between operating system software, utility software and application software………………………………………… 146 3.5 Difference between utility program and application 146 program……… 3.6 Difference between operating system and application 147 system……... 4.0 Conclusion…………………………………………………………….. 148 5.0 Summary………………………………………………………………. 148 6.0 Tutor-Marked Assignment…………………………………………….. 148 7.0 References/Further Readings………………………………………….. 149 Module 3 Programming the Computer…………………………………………… 150 Unit 1 Computer Languages………………………………………………….. 150 1.0 Introduction……………………………………………………………. 150 2.0 The objectives…………………………………………………………. 150 3.0 The main content……………………………………………………… 150 3.1 Overview of Computer Programming Languages……………… 150 3.2 Definition of Programming Language………………………….. 151 3.3 Reasons for the study of programming languages……………… 152 3.4 Classification of computer programming languages……………. 153 3.4.1 Machine language……………………………………………… 153 3.4.2 Assembly language…………………………………………..... 154 3.4.3 High-level language………….………………………………… 154 3.4.4 Very High Level Language…………………………………….. 155 3.5 Generation of computer programming languages………………. 155 3.6 Why are many computer programming languages in the world….. 156 4 4.0 Conclusion…………………………………………………………….. 158 5.0 Summary………………………………………………………………. 158 6.0 Tutor-Marked Assignment…………………………………………….. 158 7.0 References/Further Readings………………………………………….. 158 Unit 2 Basic Principles of Computer 160 Programming……………………………. 1.0 Introduction……………………………………………………………. 160 2.0 The objectives…………………………………………………………. 160 3.0 The main content………………………………………………………. 160 3.1 Programming tools……………………………………………… 160 3.2 Programming environment……………………………………… 161 3.3 Factors to consider when writing computer programs………….. 162 3.4 Problem solving with computer………………………………… 162 3.5 Twelve Steps to consider when creating Professional Web Design 164 3.6 Constrains of Teaching Programming to secondary schools …….. 170 4.0 Conclusion…………………………………………………………….. 170 5.0 Summary………………………………………………………………. 170 6.0 Tutor-Marked Assignment…………………………………………….. 171 7.0 References/Further Readings………………………………………….. 171 Unit 3 Programming with Beginners All Purpose Symbolic Instruction Code 172 (Basic), Pseudocode/Flowchart…………………………………………. 1.0 Introduction…………………………………………………………… 172 2.0 The objectives…………………………………………………………. 172 3.0 The main content………………………………………………………. 172 3.1 History of BASIC……………………………………………… 172 3.2 Advantages of BASIC………………………………………….. 172 3.3 Structure of a BASIC Program…………………………………. 173 3.4 The area of a circle……………………………………………… 174 3.5 Programming with Flowcharts and 174 pseudocode……………………... 3.6 Sequential 182 flowchart...........................………………………………... 4.0 Conclusion…………………………………………………………….. 191 5.0 Summary………………………………………………………………. 191 6.0 Tutor-Marked Assignment…………………………………………….. 192 7.0 References/Further Readings………………………………………….. 192 Module 4 Areas of Application of Computers…………………………………… 193 Unit 1 Application of Computers in Education……………………………….. 193 1.0 Introduction……………………………………………………………. 194 2.0 The objectives…………………………………………………………. 194 3.0 The main content………………………………………………………. 194 3.1 Application of computers in Education..……………………….. 194 3.1.1 Advantages of using ICT in education…………………………. 194 3.2 Use of Web-based Training
Recommended publications
  • Intel Technology Journal
    Intel® Technology Journal | Volume 14, Issue 1, 2010 Intel Technology Journal Publisher Managing Editor Content Architect Richard Bowles Andrew Binstock Herman D’Hooge Esther Baldwin Program Manager Technical Editor Technical Illustrators Stuart Douglas Marian Lacey InfoPros Technical and Strategic Reviewers Maria Bezaitis Ashley McCorkle Xing Su John Gustafson Milan Milenkovic Rahul Sukthankar Horst Haussecker David O‘Hallaron Allison Woodruff Badarinah Kommandur Trevor Pering Jianping Zhou Anthony LaMarca Matthai Philipose Scott Mainwaring Uttam Sengupta Intel® Technology Journal | 1 Intel® Technology Journal | Volume 14, Issue 1, 2010 Intel Technology Journal Copyright © 2010 Intel Corporation. All rights reserved. ISBN 978-1-934053-28-7, ISSN 1535-864X Intel Technology Journal Volume 14, Issue 1 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4744. Requests to the Publisher for permission should be addressed to the Publisher, Intel Press, Intel Corporation, 2111 NE 25th Avenue, JF3-330, Hillsboro, OR 97124-5961. E mail: [email protected]. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in professional services. If professional advice or other expert assistance is required, the services of a competent professional person should be sought.
    [Show full text]
  • A the Hacker
    A The Hacker Madame Curie once said “En science, nous devons nous int´eresser aux choses, non aux personnes [In science, we should be interested in things, not in people].” Things, however, have since changed, and today we have to be interested not just in the facts of computer security and crime, but in the people who perpetrate these acts. Hence this discussion of hackers. Over the centuries, the term “hacker” has referred to various activities. We are familiar with usages such as “a carpenter hacking wood with an ax” and “a butcher hacking meat with a cleaver,” but it seems that the modern, computer-related form of this term originated in the many pranks and practi- cal jokes perpetrated by students at MIT in the 1960s. As an example of the many meanings assigned to this term, see [Schneier 04] which, among much other information, explains why Galileo was a hacker but Aristotle wasn’t. A hack is a person lacking talent or ability, as in a “hack writer.” Hack as a verb is used in contexts such as “hack the media,” “hack your brain,” and “hack your reputation.” Recently, it has also come to mean either a kludge, or the opposite of a kludge, as in a clever or elegant solution to a difficult problem. A hack also means a simple but often inelegant solution or technique. The following tentative definitions are quoted from the jargon file ([jargon 04], edited by Eric S. Raymond): 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
    [Show full text]
  • Trends in Electrical Efficiency in Computer Performance
    ASSESSING TRENDS IN THE ELECTRICAL EFFICIENCY OF COMPUTATION OVER TIME Jonathan G. Koomey*, Stephen Berard†, Marla Sanchez††, Henry Wong** * Lawrence Berkeley National Laboratory and Stanford University †Microsoft Corporation ††Lawrence Berkeley National Laboratory **Intel Corporation Contact: [email protected], http://www.koomey.com Final report to Microsoft Corporation and Intel Corporation Submitted to IEEE Annals of the History of Computing: August 5, 2009 Released on the web: August 17, 2009 EXECUTIVE SUMMARY Information technology (IT) has captured the popular imagination, in part because of the tangible benefits IT brings, but also because the underlying technological trends proceed at easily measurable, remarkably predictable, and unusually rapid rates. The number of transistors on a chip has doubled more or less every two years for decades, a trend that is popularly (but often imprecisely) encapsulated as “Moore’s law”. This article explores the relationship between the performance of computers and the electricity needed to deliver that performance. As shown in Figure ES-1, computations per kWh grew about as fast as performance for desktop computers starting in 1981, doubling every 1.5 years, a pace of change in computational efficiency comparable to that from 1946 to the present. Computations per kWh grew even more rapidly during the vacuum tube computing era and during the transition from tubes to transistors but more slowly during the era of discrete transistors. As expected, the transition from tubes to transistors shows a large jump in computations per kWh. In 1985, the physicist Richard Feynman identified a factor of one hundred billion (1011) possible theoretical improvement in the electricity used per computation.
    [Show full text]
  • Control Theory
    Control theory S. Simrock DESY, Hamburg, Germany Abstract In engineering and mathematics, control theory deals with the behaviour of dynamical systems. The desired output of a system is called the reference. When one or more output variables of a system need to follow a certain ref- erence over time, a controller manipulates the inputs to a system to obtain the desired effect on the output of the system. Rapid advances in digital system technology have radically altered the control design options. It has become routinely practicable to design very complicated digital controllers and to carry out the extensive calculations required for their design. These advances in im- plementation and design capability can be obtained at low cost because of the widespread availability of inexpensive and powerful digital processing plat- forms and high-speed analog IO devices. 1 Introduction The emphasis of this tutorial on control theory is on the design of digital controls to achieve good dy- namic response and small errors while using signals that are sampled in time and quantized in amplitude. Both transform (classical control) and state-space (modern control) methods are described and applied to illustrative examples. The transform methods emphasized are the root-locus method of Evans and fre- quency response. The state-space methods developed are the technique of pole assignment augmented by an estimator (observer) and optimal quadratic-loss control. The optimal control problems use the steady-state constant gain solution. Other topics covered are system identification and non-linear control. System identification is a general term to describe mathematical tools and algorithms that build dynamical models from measured data.
    [Show full text]
  • Introduction to Computer System
    Chapter 1 INTRODUCTION TO COMPUTER SYSTEM 1.0 Objectives 1.1 Introduction –Computer? 1.2 Evolution of Computers 1.3 Classification of Computers 1.4 Applications of Computers 1.5 Advantages and Disadvantages of Computers 1.6 Similarities Difference between computer and Human 1.7 A Computer System 1.8 Components of a Computer System 1.9 Summary 1.10 Check your Progress - Answers 1.11 Questions for Self – Study 1.12 Suggested Readings 1.0 OBJECTIVES After studying this chapter you will be able to: Learn the concept of a system in general and the computer system in specific. Learn and understand how the computers have evolved dramatically within a very short span, from very huge machines of the past, to very compact designs of the present with tremendous advances in technology. Understand the general classifications of computers. Study computer applications. Understand the typical characteristics of computers which are speed, accuracy, efficiency, storage capacity, versatility. Understand limitations of the computer. Discuss the similarities and differences between the human and the computer. Understand the Component of the computer. 1.1 INTRODUCTION- Computer Today, almost all of us in the world make use of computers in one way or the other. It finds applications in various fields of engineering, medicine, commercial, research and others. Not only in these sophisticated areas, but also in our daily lives, computers have become indispensable. They are present everywhere, in all the dev ices that we use daily like cars, games, washing machines, microwaves etc. and in day to day computations like banking, reservations, electronic mails, internet and many more.
    [Show full text]
  • The Strange Birth and Long Life of Unix - IEEE Spectrum Page 1 of 6
    The Strange Birth and Long Life of Unix - IEEE Spectrum Page 1 of 6 COMPUTING / SOFTWARE FEATURE The Strange Birth and Long Life of Unix The classic operating system turns 40, and its progeny abound By WARREN TOOMEY / DECEMBER 2011 They say that when one door closes on you, another opens. People generally offer this bit of wisdom just to lend some solace after a misfortune. But sometimes it's actually true. It certainly was for Ken Thompson and the late Dennis Ritchie, two of the greats of 20th-century information technology, when they created the Unix operating system, now considered one of the most inspiring and influential pieces of software ever written. A door had slammed shut for Thompson and Ritchie in March of 1969, when their employer, the American Telephone & Telegraph Co., withdrew from a collaborative project with the Photo: Alcatel-Lucent Massachusetts Institute of KEY FIGURES: Ken Thompson [seated] types as Dennis Ritchie looks on in 1972, shortly Technology and General Electric after they and their Bell Labs colleagues invented Unix. to create an interactive time- sharing system called Multics, which stood for "Multiplexed Information and Computing Service." Time-sharing, a technique that lets multiple people use a single computer simultaneously, had been invented only a decade earlier. Multics was to combine time-sharing with other technological advances of the era, allowing users to phone a computer from remote terminals and then read e -mail, edit documents, run calculations, and so forth. It was to be a great leap forward from the way computers were mostly being used, with people tediously preparing and submitting batch jobs on punch cards to be run one by one.
    [Show full text]
  • 'A Superb Explanatory Device': the MONIAC, an Early Hydraulic Analog Computer
    ‘A superb explanatory device’ The MONIAC, an early hydraulic analog computer Anna Corkhill Since 1953, the University of when it was rediscovered, partially rubber tubing and powered by a Melbourne has owned a rare restored and given a position in a mechanical pump. (In the prototype, machine: a hydraulic analog simple display case on level 1 of the the pump’s motor was recycled from computer capable of explaining the Economics and Commerce Building. a World War II Lancaster bomber, economy and performing complex The machine has recently been but the university’s MONIAC economic calculations. It is generally moved to the entrance of the new was commercially made.) It is known as the MONIAC (which Giblin Eunson Business, Economics approximately two metres high and stands for ‘MOnetary National and Education Library in the ICT one metre wide, with a metal backing Income Analog Computer’), Building, 111 Barry Street. enclosing the machine’s pump and though it has also been called Though a reasonably accurate connecting tubing. The machine has the ‘Financephalograph’, the computational device, the MONIAC’s three main water tanks, representing ‘National Income Monetary Flow key aim was to demonstrate taxes and government spending, Demonstrator’ and simply the Keynesian economic models in a savings and investment, and import– ‘Phillips Machine’, after its inventor, clear, visual way. As a pedagogical aid, export. The ‘active balances’ tank at Bill Phillips. The machine, one of it used coloured water to represent the bottom represents the total stock approximately 12 ever created, was money flowing through the economy, of currency and bank credit in the purchased by the Department of and showed the relationships between economy at any given time.
    [Show full text]
  • The Strange Birth and Long Life of Unix - IEEE Spectrum
    The Strange Birth and Long Life of Unix - IEEE Spectrum http://spectrum.ieee.org/computing/software/the-strange-birth-and-long-li... COMPUTING / SOFTWARE FEATURE The Strange Birth and Long Life of Unix The classic operating system turns 40, and its progeny abound By WARREN TOOMEY / DECEMBER 2011 They say that when one door closes on you, another opens. People generally offer this bit of wisdom just to lend some solace after a misfortune. But sometimes it's actually true. It certainly was for Ken Thompson and the late Dennis Ritchie, two of the greats of 20th-century information technology, when they created the Unix operating system, now considered one of the most inspiring and influential pieces of software ever written. A door had slammed shut for Thompson and Ritchie in March of 1969, when their employer, the American Telephone & Telegraph Co., withdrew from a collaborative project with the Photo: Alcatel-Lucent Massachusetts Institute of KEY FIGURES: Ken Thompson [seated] types as Dennis Ritchie looks on in 1972, shortly Technology and General Electric after they and their Bell Labs colleagues invented Unix. to create an interactive time-sharing system called Multics, which stood for "Multiplexed Information and Computing Service." Time-sharing, a technique that lets multiple people use a single computer simultaneously, had been invented only a decade earlier. Multics was to combine time-sharing with other technological advances of the era, allowing users to phone a computer from remote terminals and then read e-mail, edit documents, run calculations, and so forth. It was to be a great leap forward from the way computers were mostly being used, with people tediously preparing and submitting batch jobs on punch cards to be run one by one.
    [Show full text]
  • 1992 Cern School of Computing
    ORGANISATION EUROPEENNE POUR LA RECHERCHE NUCLEAIRE CERN EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH 1992 CERN SCHOOL OF COMPUTING Scuola Superiore G. Reiss Romoli, L'Aquila, Italy 30 August-12 September 1992 PROCEEDINGS Editor: C. Verkerk GENEVA 1993 © Copyright CERN, Genève, 1993 Propriété littéraire et scientifique réservée Literary and scientific copyrights reserved in pour tous les paya < 11» inonde. Ce document ne all countries of the world. This report, or peut être reproduit ou traduit en tout ou en any part of it. may not be reprinted or trans­ partie sans l'autorisation écrite du Directeur lated without written permission ol the copy­ général du CERN, titulaire du droit d'auteur. right holder, the Director-General of CERN. Dans les cas appropriés, et s'il s'agit d'utiliser However, permission will be freely granted for le document à des fins non commerciales, cette appropriate non-commercial use. autorisation sera volontiers accordée. If any patentable invention or registrable Le CERN ne revendique pas la propriété des design is described in the report. CERN makes inventions brevetables et dessins ou modèles no claim to property rights in it but offers i( susceptibles de dépôt qui pourraient être for the free use of research institutions, man­ décrits dans le présent document ; ceux-ci peu­ ufacturers and others. CERN, however, may vent être librement utilisés par les instituts de oppose any attempt by a user to claim any recherche, les industriels et autres intéressés. proprietary or patent rights in such inventions Cependant, le CERN se réserve le droit de or designs as may be described in the present s'opposer à toute revendication qu'un usager document.
    [Show full text]
  • Analog Computer on a Chip – Compiling Solutions
    Analog Computer on a Chip – Compiling Solutions John Milios Nicolas Clauvelin Sendyne Corp. Sendyne Corp. New York, NY, USA New York, NY, USA [email protected] [email protected] Abstract --- The original room-sized analog computers of the sometimes if, they converge to a solution. The Columbia 1950s were programmed using paper drawings and manual cable University team, lead by Professor Yannis Tsividis, revisited the connections. The Apollo IC is the first digitally programmed analog old idea of analog computing and re-invented it using today’s computer, implemented in a 4x4 mm2 CMOS IC and capable of CMOS analog technology. The result was what we now call the solving problems with high speed and extremely low power. The Apollo IC, the first integrated, digitally programmable general high level programming language of an analog computer consists purpose analog computer (GPAC) chip [2] and associated of the differential equations describing the system to be simulated. computer board. Sendyne, through an exclusive license from The solution to each programmed model is achieved by the proper Columbia University used this technology to build the SA100, interconnection and calibration of the analog computer elements a digitally controlled analog computer that can be programmed in such a way as to implement the aforementioned differential and exchange data with a digital computer through a USB port equations. Deducing from the equations the right interconnections [3]. and implementing these in the analog computer circuitry is the role of an analog computer compiler. Such a compiler has been During the same period researchers at MIT started developed for the first time by MIT researchers for the Apollo IC investigating suitability of analog computing elements in analog computer.
    [Show full text]
  • Squinting at Power Series
    Squinting at Power Series M. Douglas McIlroy AT&T Bell Laboratories Murray Hill, New Jersey 07974 ABSTRACT Data streams are an ideal vehicle for handling power series. Stream implementations can be read off directly from simple recursive equations that de®ne operations such as multiplication, substitution, exponentiation, and reversion of series. The bookkeeping that bedevils these algorithms when they are expressed in traditional languages is completely hidden when they are expressed in stream terms. Communicating processes are the key to the simplicity of the algorithms. Working versions are presented in newsqueak, the language of Pike's ``squint'' system; their effectiveness depends critically on the stream protocol. Series and streams Power series are natural objects for stream processing. Pertinent computations are neatly describable by recursive equations. CSP (communicating sequential process) languages1, 2 are good vehicles for implementation. This paper develops the algorithmic ideas and reduces them to practice in a working CSP language,3 not coincidentally illustrating the utility of concurrent programming notions in untangling the logic of some intricate computations on sequences. This elegant approach to power series computation, ®rst demonstrated but never published by Kahn and MacQueen as an application of their data stream system, is still little known.4 Power series are represented as streams of coef®cients, the exponents being given implicitly by ordinal position. (This is an in®nite analogue of the familiar representation of a polynomial as an array of coef®cients.) Thus the power series for the exponential function ∞ 1 1 1 e x = Σ x n / n! = 1 + x + __ x 2 + __ x 3 + ___ x 4 + .
    [Show full text]
  • Unix and Linux System Administration and Shell Programming
    Unix and Linux System Administration and Shell Programming Unix and Linux System Administration and Shell Programming version 56 of August 12, 2014 Copyright © 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2009, 2010, 2011, 2012, 2013, 2014 Milo This book includes material from the http://www.osdata.com/ website and the text book on computer programming. Distributed on the honor system. Print and read free for personal, non-profit, and/or educational purposes. If you like the book, you are encouraged to send a donation (U.S dollars) to Milo, PO Box 5237, Balboa Island, California, USA 92662. This is a work in progress. For the most up to date version, visit the website http://www.osdata.com/ and http://www.osdata.com/programming/shell/unixbook.pdf — Please add links from your website or Facebook page. Professors and Teachers: Feel free to take a copy of this PDF and make it available to your class (possibly through your academic website). This way everyone in your class will have the same copy (with the same page numbers) despite my continual updates. Please try to avoid posting it to the public internet (to avoid old copies confusing things) and take it down when the class ends. You can post the same or a newer version for each succeeding class. Please remove old copies after the class ends to prevent confusing the search engines. You can contact me with a specific version number and class end date and I will put it on my website. version 56 page 1 Unix and Linux System Administration and Shell Programming Unix and Linux Administration and Shell Programming chapter 0 This book looks at Unix (and Linux) shell programming and system administration.
    [Show full text]