Yakі tekhnіchnі zasobi obrobki іnformatsії. Technical data processing. Keyboard - attachment for entering textual information

Golovna / I'll build a cleaning

It's easy to send your harn to the robot to the basics. Vikoristovy form, raztastovanu below

Students, graduate students, young adults, like victorious base of knowledge in their trained robots, will be your best friend.

Placed on http://www.allbest.ru/

MINISTRY OF STUDIES AND SCIENCES OF UKRAINE

NATIONAL TECHNICAL UNIVERSITY

"KHARKIV POLYTECHNICAL INSTITUTE"

DEPARTMENT "INFORMATION SYSTEMS"

on the topic: "Technical data processing"

from the course "Informatics"

Vikonav: 1st year student, group: Ek50A

Gorbachenko Olena Dmitrivna

Perevіriv: Associate Professor of the Department СІ

Tkachenko V.O.

Kharkiv 2010

Entry

For computer science, a computer is a tool for working with information, and an object of learning. You know, like a computer of power, you can help a robot to help you, for which software you can work.

From long ago, people jumped to lighten their work. From this method, different machines and mechanisms were created that strengthen the physical ability of people. The computer of finding faults in the middle of the XX century has increased the possibilities of a romatic robot and a person, i.e. a robot with information.

For its recognition, the computer is a universal technical zasib for robotic people with information. I will arrange a computer behind the principles - the same model of a person, as a practice for information.

More than 50 years have passed since then, when the first electronic counting machine appeared. During this short period, the number of generations of numbered cars has changed for the development of the suspіlstva, and the first number of cars have been changed, and the first EOM today is a museum rіdkіst. The very history of the development of numerical technology becomes of considerable interest, showing the close relationship between mathematics and physics modern technology, We are equal to the development of such richness in which the progress in the selection of methods of calculation technique is determined.

1. History of computer development

1.1 The first generation of EOM (1948 - 1958)

The elemental base of machines of this generation was electronic lamps - diodes and triodies. The cars were assigned to the cherry-picking of awkward scientific and technical tasks. Up to the next generation of EOM can be carried: MESM, BESM-1, M-1, M-2, M-Z, "Strela", "Minsk-1", "Ural-1", "Ural-2", "Ural- 3", M-20, "Setun", BESM-2, "Razdan". There were a few significant expansions, they survived great fatigue, a small amount of work and weak software security. The swedcode did not exceed 2-3 thousand operations per second, mnist operational memory-2K or 2048 machine words (1K=1024) up to 48 double characters. implementation of the main logical principles of stimulating electronic computing machines and the concepts of John von Neumann, that the EOM works on the program, which is entered into memory, and the data (numbers).

computer keyboard monitor misha

1.2 Another generation of EOM (1959-1967)

The elemental base of the machines of this generation was equipped with napіvprovіdnikovі fittings. The machines were assigned to various labor-intensive scientific and technical tasks, and to manage the technological processes in the manufacturing industry. The appearance of conductor elements in electronic circuits has significantly increased the capacity of operational memory, reliability and SWIDCODE of the EOM. The roses have changed, the weight of that tightness has been relieved. With the advent of machines of another generation, the scope of electronic computing technology has significantly expanded, the main rank of development software.

Specialized machines also appeared, for example, EOM for the implementation of economic tasks, turning by manufacturing processes, transmission systems, etc.

1.3 The third generation of EOM (1968-13-973)

The elemental base of the EOM is small integrated circuits (MIS). The machines were assigned for a wide selection at various fields of science and technology (carrying out surveys, managing virobnitstv, ruhomimi objects, etc.). Zavdyaki integrated circuits were able to improve the technical and operational characteristics of the EOM. For example, machines of the third generation, equal to machines of another generation, may have more operational memory, increased speed, increased surplus, and reduced pressure, occupied area, and the mass has changed.

1.4 Fourth generation of EOM (1974-1982)

The elemental base of the EOM is the large integrated circuit (BIC). The machines were assigned for a sharp increase in the productivity of work in science, manufacturing, management, health protection, and service. A high level of integration helps to increase the width of the layout of electronic equipment, increase the reliability, which leads to an increase in the SWID code of the EOM and a decrease in the vartost. All this is directly connected to the logical structure (architecture) of the EOM and software security.

1.5 Five generations

90s; EOM with a wealth of dozens of parallel microprocessors that allow efficient knowledge processing systems; EOM on overfolding microprocessors with a parallel-vector structure, which chirp dozens of the last program commands at once;

The next generation is coming; optoelectronic EOM with massive parallelism and neutron structure - with a divided array of a great number (tens of thousands) of clumsy microprocessors that model the architecture of neutron biological systems.

2. Classification of EOM

According to the recognition of EOM, it can be divided into three groups: universal (general recognition), problem-oriented and specialization.

Universal EOM is recognized for the implementation of the most sophisticated engineering and technical tasks: economic, mathematical, informational and other tasks, which are based on the complexity of the algorithms and the great obligation to obtain data. The stench is widely vikoristovuyutsya in the centers of collective corystuvannya and other straining obschislyuvalnye complexes.

Characteristic rices of universal EOM є:

high productivity;

variability of forms of data collection: double, decimal, symbolic, with a great range of their changes and the high level of their tribute;

the nomenclature of victorious operations is great, such as arithmetic, logical, and special;

large capacity of operational memory;

the organization of the system of input and output of information has been sanctioned, which ensures the connection of various types of outbuildings.

Problem-oriented EOM to serve on the top of a large number of zavdan, po'yazanih, zvuchchay, s management of technological objects; registration, the accumulation of such a small collection of data; vikonannyam rozrahunkіv schodo vydnosno clumsy algorithmіv; stench can be interchanged with universal hardware and software resources.

Prior to the problem-oriented EOM, one can see, zocrema, various control and calculation complexes.

The specializations of EOM are victorious for the implementation of the high-level stake of the manager or the implementation of the singing group of functions. Such a high school orientation of EOM allows to clearly specialize its structure, to significantly reduce its folding and versatility while saving high productivity and reliability of its work.

Prior to the specialization of the EOM, it is possible to carry, for example, the programming of microprocessors special recognition; adapters and controllers logical functions management of okremy clumsy technical outbuildings Uzgodzhennya that podednannya robots vuzlіv enumeration systems. Such computers also lie, for example, on-board computers of cars, ships, aircraft, space vehicles. On-board computers manage the methods of orientation and navigation, control the camp of on-board systems, and perform functions automatic keruvannya that connection, as well as more functions of optimizing the parameters of the object’s work (for example, optimizing a vitratypal object in the fallow of specific minds). Specialized mini-EOM, oriented to work with graphics, are called graphic stations. Specialized computers, which combine the computers of the enterprise in one measure, are called file servers. Computers, which ensure the transfer of information between different participants of the all-world computer network, are called network servers.

In case of various needs of the managers of specialized computer systems can cope and universal computers But it is important that the choice of special systems is still more effective. The criterion for evaluating efficiency is to increase the productivity of the possession to the value of 100 percent.

According to the dimensions and functional possibilities, the EOM can be divided into oversized, large, small, oversized (microEOM).

The functional capabilities of the EOM provide the most important technical and operational characteristics:

shvidkodiya, which are moderated by a moderate number of operations, which are beaten by a machine in one hour;

razryadnіst and forms of submission of numbers, with yakim operating EOM;

nomenclature, capacity and code of all outbuildings, what to remember;

nomenclature and technical and economic characteristics of outbuildings, savings, exchange and input and output of information;

type and throughput of the building of the building of the connection and connection of the connection of the EOM between itself (internal machine interface);

zdatnіst EOM one hour pratsyuvati z dekіlkom koristuvachami and vikonuvati one hour kіlka programs (bagatoprogramnіst);

types and technical and operational characteristics operating systems, which are beaten in the car;

presence that functionality software security;

construction of programs written for other types of EOM ( software confusion with other types of EOM);

system and structure of machine instructions;

the possibility of connecting to the channels of the connection and the counting measure;

operational reliability of EOM;

coeficient of the coryne whiskey of the EOM at the hour, which is determined by the time cordless roboti that time of prevention.

Scheme of classification of EOM, depending on their calculation of tightness and dimensions

Historically, the first were the great EOMs, the elemental base of which went through the path from vacuum tubes to integrated circuits with a higher level of integration. The first is great JOM ENIAK was created in 1946. The car is small, more than 50 tons, number of operations per second, operational memoryєmnistyu 20 numbers; occupied a majestic hall with an area of ​​​​100 square meters.

The productivity of high EOMs turned out to be insufficiently low: weather forecasting, control of folding defense complexes, modeling of environmental systems and others. Tse rethinking the development of that creation of supercomputers, the most advanced computational systems, are intensively developing at the hour.

The appearance in the 70s of small EOMs was, on the one hand, progress in the field of electronic elemental base, on the other hand, the overworld resources of great EOMs for low supplements. Malі EOM vikorivuyutsya most often keruvati technological processes. They are more compact and much cheaper for large EOM.

Further successes in the field of elemental base and architectural solutions have led to the vindication of the supermini-EOM - a counting machine, which can be considered as architecture, expanding that vartosity to the class of small EOM, and for productivity it can be compared with the great EOM.

Vinahid in 1969, the microprocessor brought about another EOM class, the microEOM, before the appearance in the 70s. The very presence of the microprocessor served as the primary sign of the microEOM. Today, microprocessors will be stationed in the current EOM classes.

Supercomputers are the most valuable for the code and productivity of the calculation machine. Before superEOM one can see "Cray" and "IBM SP2" (USA). They are victorious for the accomplishment of large-scale calculation tasks and modeling, for complex calculations in aerodynamics, meteorology, high energy physics, and also for the financial sphere.

Great machines and mainframes (Mainframe). Mainframes are victorious in the financial sector, the defense complex, and are recruited for the staffing of domestic, territorial and regional accounting centers.

The middle EOM of a wide range of vikory are made with folding technological processes.

Mini-EOM spramovavani vykoristannya like managing billing complexes, like merezhevyh servers.

Micro-EOM - all computers, in which the central processor is replaced by a microprocessor. Before them, one can see the introduction of micro-EOM (the provision of various equipment, equipment or accessories) and personal computers PC.

Modern personal computers may have their own characteristics, like and min-EOM in the last ten years. On the basis of this class of EOM, automated work stations (AWS) for fakhivtsiv of various equals will be developed, which will be collected as a collection of information processing in information systems.

To personal computers one can see the floor and portable PCs.

Before portable EOMs, there are Notebooks (notebook or notepad) and small personal computers (Personal Computers Handheld - Handheld PC, Personal Digital Assistants - PDA and Palmtop).

3 EOM architecture

The classical principles of the EOM architecture were inspired by the work of J. von Neumann, G. Goldsteig and A. Berks in 1946 as "von Neumann's principles". The authors defiantly demonstrated the advantages double system for the technical implementation of the arithmetic, the simplicity of vikonannya for nіy arithmetic and logical operations. EOM began to process and non-numerical information - textual, graphic, sound and other, and even double coding of data, like before, to become the informational basis of any modern computer.

3.1 The principle of the program to be saved

At the beginning of the program, the program was set by the installation of jumpers on a special switching panel. It was more than a laborious job. Neiman was the first to guess that the program can also be saved from looking at zeros and ones, moreover, in your own memory, what are the numbers that are processed by it. The existence of a principled difference between the program and the data gave the opportunity for the EOM to form the program for itself properly until the results are calculated

Von Neumann, as if hanging on the main principles of the logical arrangement of the EOM, and having propagated the її structure (see Fig. 1), as if it was realized by stretching the first two generations of the EOM.

Attachment control (CU) and arithmetic-logical attachment (ALU) in today's computers are combined into one block - the processor, which transforms information, which comes from memory and zovnishnіh attachments.

Memory (memory) stores information (data) and programs. The memory attachment for modern computers is "large-tiered" and includes the operational memory attachment (OZP) and the current storage attachment (VZP)

RAM is attached, which stores that information, with which the computer works without interruption at a given hour (the program has been released, part of the data necessary for it, some of the necessary programs). VZU-attachment is rich in more capacity, lower RAM, and a little more.

3.2 The principle of consecutive vikonannya operations

Structurally, the main memory is composed of numbered centers. The processor at a certain moment of the hour is available to be-yak komіrka. Zvіdsi can give names to areas of memory, those so that, until forgotten, for some values, it would be possible to change them in the process of victoring the program with the help of assigning names.

4. Attach PC and yogo characteristics

Computers are called personal computers, on which you can spend more than one koristuvach at a time. Personal computers can only have one job.

Under the term "configuration" of the computer, a list of attachments that can be entered into the warehouse.

Vіdpovіdno to the principle of vіdkritoї arkhіtektury hardware security of computers can be even more different. Ale, be it a personal computer, maє obov'yazkovy and dodatkovy set of attachments.

Obov'yazkovy set of attachments:

Monitor - attachment for viewing text graphic information.

The keyboard is an attachment for entering textual information.

The system block is an association of a large number of different computer attachments.

4.1 System unit

The system block is the top block of the computer. Blocks are connected to the new one, ranks of ovnishnimi or peripheral outbuildings. The system block has the main electronic components of the computer. PC of impulses based on HBIS (super-large integrated circuits), and may be all stinks are in the middle system unit, on special boards (the board is a plastic plate, on which the electronic components are attached to each other - HBIC, microcircuits and other.). The most important computer board is the system board. It contains a central processor, a spin processor, an operational attachment - RAM and sockets for connecting the controller boards of external attachments.

The system block has:

· The block of living - attachments, which transforms the changing voltage of electrical circuits into a constant voltage of different polarity, that value, which is necessary for the living of the system payment and internal outbuildings. The block of life is replaced by a fan, which creates circulating air flows to cool the system unit.

System board (motherboard);

trunk (system bus);

· Processor;

a sound card

· Video card (graphic card);

· Storage on hard magnetic disks;

· Storage on flexible magnetic disks;

· Optical, magneto-optical and accumulative;

· Nakopichuvach CD-ROM, DVD-ROM;

4.2 Monitor

The monitor is one of the main universal tools for viewing information that shows how to run the computer at the moment. The monitor is connected to the video card installed on the computer.

Monitors are available with different tubes - 14 to 21 inches. Wiring of the tube is carried out diagonally from the apex to the apex - it is not possible to extend it to the horizontal width. Shards of sound between the tubes are often attached to the monitor case, the diagonal of the screen is visible less than її rozmіr indications.

If you choose to prepare books or magazines before publication, or create large-scale armchairs and diagrams, then in which case you need a monitor with a size of 21 inches. Ale, as you are a great shorty, you will be satisfied with 15 or 17-inch monitors.

There can be regulators, buttons or combinations of others on the monitor control panel. In all monitors that have found the cream, the instructions for setting up are displayed on the screen. Adjustment parameters allow you to change the brightness, contrast and colorization of the image on the screen.

Deyaki monitors (of a more old-fashioned type) may have a speaker and a microphone, and sometimes a video camera for videoconferencing.

4.3 Keyboard

The keyboard is borrowed first from the hierarchy of buildings. For a new set of letters to the alphabet, numbers and mathematical signs, on the keyboard there are key keys, so tabulation and carriage rotation. Krym tsgogo, є klavіshi, pov'yazanі vykljuzanі z commands - for example, shifting the cursor across the screen, moving to the beginning of the document or the end of the document and vidalennya pardons. The main function of the keyboard is to enter numeric and text information. The keyboard is of different colors and shapes, but not directly sane looking generates a standard set of digital codes, which are recognized by the computer. The keyboard is folded from a microprocessor, as well as 104 keys and 3 informational modes and a light indicator in the right. upper codend. The cable provides power to the computer and directs it to the keyboard. Contact the skin key with the microprocessor so that the skin key can be easily identified. When pressing the button, there is a breath in the electric pot. The microprocessor sends a code to the computer, ranks the code of the keyboard. Vіn also signifies, if two keys are pressed at the same time, like a different Shift for other great letters. In cheap keyboards, contacts under the key make sandwiches on a flexible membrane. The stench goes out of tune faster for expensive models, in some kind of mechanical jumpers for skin keys. The retail field is also in the form of robots and noise.

Standard keyboards may have a QWERTY layout (the name looks like the first six English letters in the top row) and there are offensive types: brudovidshtovhuvalny and vodovidshtovhuvalny; ergonomic, keyboards for children and infrared, as they do not require a cable connection.

4.4 Porty

Peripheral attachments for input/output are connected to ports. The ports' sockets ring directly on the system board and hang on the back of the computer. Ports interoperate with the chipset bridge, it is also a possible option, if the porters are serviced by a special SuperlO chip, which, in their line, interoperates with the pneumatic bridge. Ports are called interfaces. On the rear panel of the computer, you can see the roses of the forward ports (interfaces).

Last port (COM). Presence in computers is already more than two dozen years, but in the rest of the hour it does not stop very often. There were two last ports of COMI and COM2 in the computers, however, in some modern boards, there is only one for COMI, and in some new boards, the last port is daily, as old.

Parallel port (LPT). Up to the new ones are added some models of printers, scanners and other attachments. The standard parallel port may not be higher than the swidcode, which is why it is possible to speed up the operation modes of ECP or EPP. This port is also old and can be used on some new boards.

Game port. Joysticks, kerma and other gaming manipulators are connected to the new one. On computers, this port is not available, and modern gaming devices are connected for additional USB.

PS/2 port. Most computers have two specialized ports: the first one is for connecting the keyboard, the other is for the mouse. If not, then the keyboard and the mouse should be connected to the USB socket.

USB. The most popular interface for the most demanding peripherals. On the back panel, sound є vyd 2 to 8 USB plugs, moreover, sprats of roses can be present on the front panel of the computer

IEEE 1394 (FireWire). High end port for digital video applications. The non-skin motherboard complies with IEEE 1394, which requires an additional controller to work with digital video.

Retailing the sound adapter. The skin system board is equipped with a sound adapter, and on the back panel you can hear a socket for connecting speakers, a microphone and other audio devices. In the rest of the hour, more and more often you can use rich high-quality sound adapters (HD Audio), as well as new types of sockets: optical and coaxial.

VGA. For connecting a monitor. For the presence of an integrated video adapter, this rose will be present on the back wall of the system board.

4.5 Misha

Misha's computer is not similar to his namesake, but the name was somehow attached to her. The main task of the mouse is to move the cursor around the screen with your hand.

Usі mishі pratsyut mayzhe however. The bag in the middle of the mouse is about the rollers. At the end of the skin roller there is a disk and a sensor for detecting movement. The wrapper is also transferred to two plastic shafts, the positions of which are read with great accuracy by infrared optocouplers (that is, by pairs of "light-and-prominuvach-photodetector"). One video rotates for an hour, turn to the right, and the other one - for an hour, turn back and forward. Numbers are fixed in the instructions of the screen indicator.

Most of the mice are opto-mechanical. Ale іsnuyu povnіstyu mekhanіchnі і optical varianty. The mechanical parts of the mouse are a steel bag covered with gum and two (or more) rollers. The rollers are operated with optical detectors that mark the lines horizontally and vertically. Additional rollers are needed to stabilize the work of the bag - to make it more smooth. Under the hour of the rush, the rollers fix the degree, the speed, and straight ahead. The data is loaded onto the computer. Koristuvach presses one of the keys of the mouse. the signal is sent to the operating system and it informs the software that the key has been pressed. After which software is taken care of.

There are three ways to connect a mouse to a computer. Most mice are connected to the PS / 2 port, which are equipped with modern computers. On older computers, mice are connected to the last port. Active mice are connected via a USB port (in this way, laser bears are connected to the computer). Only new computers can make such a port.

Razdіlna zdatnіst mice sound become close to 600 dpi (dot per inch - dot per inch). This means that when the mouse moves 1 inch (2.54 cm), the mouse indicator on the screen moves 600 pixels.

Mishі zvіchay mâyut dvі control buttons, yakі vikoristovuyutsya when working with a graphical program interface. At the given hour, bears appeared with an additional collar, as if roztashovuetsya between buttons. It is suitable for scrolling up or down images, texts or Web pages that do not fit on the screen.

Modern models of mice are often droto-free - they are connected to the computer without the help of a cable for the help of great batteries.

In portable computers, instead of a mouse, there is a touchpad touchpad (like the English word TouchPad), like a panel of rectangular shape, sensitive to moving a finger and pressing a finger. Movement of the finger along the surface touch panel changes to move the cursor on the monitor screen. Pressing on the surface of the touch panel is equivalent to pressing the mouse button.

5. Structural diagram and attachments of PC

The main attachment of the PC is the motherboard, which determines its configuration. All PC attachments are connected to the payment for additional roses, roztashovanih on this payment. Construction of all outbuildings single system take care of the additional system backbone (tire), which is the data transmission lines, the address of that management.

The core of the PC is made up of a processor (central microprocessor) and main memory, which is made up of operational memory and permanent memory (ROM) or a reprogrammed permanent memory of PROM. ROM is assigned to record that permanent data collection.

Connection of all external attachments: keyboard, monitor, external RFP, mouse, printer, etc. secure through controllers, adapters, cards.

Controllers, adapters and cards can use their processor and memory, tobto. are a special processor.

Microprocessor .

The central microprocessor (a small microcircuit that controls all the processing and processing of information) is the core of the PC. Computers of the IBM PC type have Intel microprocessors and microprocessors of other companies combined with them.

Microprocessor components:

· ALU vikonu logical and arithmetic operations

· Attachment management manages all PC attachments

· Register vikoristovuyutsya to save data that address

· Scheme of bus and ports management – ​​zdijsnyu podgotovka pіstroїv before the exchange of data between the microprocessor and the port of introduction - vyvedennya, as well as managing the address bus and management.

The main characteristics of the processor:

· Razryadnist - the number of two rows, which are completed at the same time when one team wins. Most current processors are 32-bit processors, but 64-bit processors are also available.

· Clock frequency - the number of cycles of robots will be built in one hour. Chim is more clock frequency, Tim is more productivity.

· Availability of a math sp_vprotsesora

· Presentation and expansion of cache memory.

· Working memory

Operational attachment (RAM or RAM) - a memory area, recognized for storing information by stretching one session with a computer. Structurally, RAM is designed as an integrated microcircuit.

From there, the processor reads the program and input data for processing in its register, and records the results in it. The name "operational" took away the memory of the one who does it even more quickly, as a result, the processor does not have to check for an hour of reading, or write data for a riddle.

Prote svidkodiya RAM is lower than svidkodії regіstrіv protsessora, to that before vykonannym commands the processor rewrites data from the RAM registers. Following the principle of dividing dynamic memory and static memory.

Centers of dynamic memory are microcapacitors, which accumulate charge on their plates. Centers of static memory are triggers, which can be in two stable camps.

The main parameters that characterize the RAM are the capacity of that hour to memory. RAM type DDR SDRAM (synchronous memory with floating data transfer) is considered the most promising for PCs.

Cache memory

Computer must be secured swedish access to operational memory, otherwise the microprocessor is idle, and the computer's firmware is changed. Therefore, modern computers are equipped with cache memory or super-operational memory.

For the presence of the cache memory, the data from the RAM are rewritten first to it, and then to the processor register. When you re-apply to memory, the request for required data from the Cash-memory and the necessary data from the Cash-memory are transferred to the register, which is subject to the security code.

Controllers

Only the information that is stored in RAM is available to the processing processor. Therefore, it is necessary that his operational memory knew the program and data.

For a PC, information from the external attachments (keyboard, hard drive, etc.) is transferred to the RAM, and information (results of the program) from the RAM is also displayed on the external attachments (monitor, hard drive, printer, etc.).

In this rank, the computer is to blame for the exchange of information (introduction-visitation) between the operational memory and the existing outbuildings. Attachments, yakі zdіysnyuyut exchange of information between operational memory and zvnіshnіmi podstroyami, are called controllers or adapters, and other cards. Controllers, adapters and cards can use their processor and memory, tobto. are a special processor.

Controllers or adapters (schemes that control external computer attachments) are located on the same boards, which can be inserted into unified roses (slots) on the motherboard

System highway.

The system backbone (bus) is a set of wires and roses, which ensures the connection of all PC attachments to a single system and that interaction.

For connecting controllers or adapters to modern PCs, such slots as PCI can be used. PCI-E Express slots for connecting new add-ons to a larger Swiss data bus. AGP slots are recognized for connecting a video adapter

For connecting storage devices (hard disks and CDs), IDE and SCSI interfaces are used. Interface - tsukupnіst zasobіv z'єdnannya that zv'yazku pristroїv computer'yu.

Connecting peripherals (printers, mice, scanners, etc.) is connected through special interfaces, which are called ports. Ports are installed on the rear wall of the system unit.

Slots (pins) for PC configuration expansion are designed for connecting additional devices to the main bus of this computer. To the main expansion boards, recognized for connection to the bus of additional attachments, one can see:

· Video adapters (video cards)

Sound pay

Internal modems

Merezhnі adapters (for connecting up to local lines)

· SCSI - adapters

Zovnishnya memory. Classification of accumulators

To save the program data from the PC, the accumulators of different types are collected. Accumulators - tse attachments for recording and reading information from other sources of information. They separate the accumulated zminnym and vbudovanym noses.

According to the type of carrying information, accumulators are divided into accumulators on magnetic lines and disk accumulators. Before accumulating on magnetic lines, there are streamers and other. The broader class of accumulators is folded by disk accumulators.

According to the method of recording and reading information on a portable disk, the accumulators are divided into magnetic, optical and magneto-optical.

Before disk accumulators can be seen:

· Storage on floppy disks;

· Accumulation on permanent hard disks (winchester);

· Accumulation on replacement hard disks;

· Storage on magneto-optical disks;

· Storage on optical discs (CD-R CD-RW CD-ROM) with one-time recording i

· Accumulating on optical DVDs (DVD-R DVD-RW DVD-ROM and in)

Appendices

Peripheral attachments - all attachments that are connected to PC controllers and expand their functionality

For recognition of addendums, they are subdivided into:

· add-on input (trackballs, joysticks, light sources, scanners, digital cameras, digitalizers)

· outbuildings for display (plotters or graphobudivniki)
storage attachments (streamers, zip storage devices, magneto-optical storage devices, HiFD storage devices etc.)

Attach exchange (modems)

6. Submission of information in the computer, the only information available

The EOM has a dual number system, tobto. all numbers in the computer are represented by additional zeros and 1, so the computer can process more information, given in digital form.

For converting numerical, textual, graphic, sound information to digital, it is necessary to stop coding. Coding is the transformation of data of one type through data of another type. EOM has a system of binary coding, based on the data given by a sequence of two characters: 1 and 0, which are called binary digits (binary digit - short bit).
Otzhe, the unity of information in the computer is one bit, that is. double row, which can be 0 or 1. The last bits add up bytes. In one byte, you can encode the value of one character out of 256 possible ones (256 = 2 at stage 8). The largest unit of information is a kilobyte (KB), equal to 1024 bytes (1024 = 2 steps 10). There are more data in the world: megabyte, gigabyte, terabyte (1 MB = 1024 KB; 1 GB = 1024 MB; 1 TB = 1024 GB).

The numbers of the number are encoded with a two-coded code, it is easy to complete (by way of the number by two). To encode non-numeric information, an advanced algorithm is used: all possible values ​​of information that are encoded are numbered and qi numbers are encoded in addition to the double code.

For example, for the presentation of textual information, a symbol numbering table or a symbol coding table is used, where a number (serial number) is given to the skin symbol. Vіsіm double rows can encode 256 different symbols.

The main ASCII standard (8-digit coding system) contains two coding tables - the base one and the extension. The first table contains 128 basic characters, the other table has 128 extended characters.

If the standard does not include symbols of national alphabets in other countries, then the skin borders of 128 extension character codes are replaced by symbols of the national alphabet. In Denmark, there is an impersonal character coding table, in which 128 codes of extended characters are replaced by characters of the national alphabet.

So, for example, the coding of symbols in the Russian movie Widows-1251 is designed for computers, as they work under Windows OS. Another coding for the Russian movie is tse KOI - 8, as it is also widely played in computer networks of that Russian sector of the Internet.

At present, the UNICODE universal system is used, based on a 16-bit character encoding. This 16-bit system provides universal code for 65536 different characters, that is. symbols of the greater country of the world can be placed at this table.

For coding graphic data, for example, the coding method is used as a raster. The coordinates of the points of that power are described with the help of integer numbers, as they are encoded with the help of the double code. So black and white graphic objects can be described by a combination of dots with 256 gradations of gray color, tobto. for koduvannya yaskravostі be-yakoy point enough 8-digit dvіykovogo number.

The mode of representation of color graphics in the RGB system from 24 grades (8 rows for the skin three main colors) is called all-color. For the full color mode in the CMYK system, you need 32 grades (chotiri colors for 8 grades).

Visnovki

The history of PC development consists of 5 stages:

· The first generation of EOM (1948-1958)

Another generation of EOM (1959-1967)

· Third generation of EOM (1968-1973)

Fourth generation of EOM (1974-1982)

· Five generations of EOM

The skin of the next generation of EOM may be compared with the previous ones best features. So, the productivity of EOM and the capacity of all attachments increase, as a rule, by an order of magnitude more.

The development of the PC called for more swedish ta the easy way processing of information. Computers have become accessible to skin people, not just skin people. The work of all versions of the service has become easier.

PC add-ons:

System block

· Keyboard

Monitor

At our hour, before the addition of a PC, there are also speakers (for sound), a printer, a scanner, webcams and more.

List of victorious literature

1. Ugrinovich N. D. Workshop on informatics and information technologies. - Binom.Laboratory of knowledge, 2004 - 106 pages.

2. Tsvetkova A.V. Informatics and information technologies, 2008 - 228 pages.

Listed on Allbest.ur

Similar documents

    Spheri zastosuvannya personal computer. The main blocks of the PC, methods of computer processing of information. Added input and output, information storage: system unit, keyboard, monitor, mouse, scanner, digitizer, printer, disk storage device.

    presentation, donation 25.02.2011

    Operation of information by computers. Make sure that the information is converted into digital form and back. Main attachments: system unit, hard drive, motherboard. Attach the introduction and display of information: keyboard and mouse manipulator.

    course work, donations 11/25/2010

    Analysis of the features of robots and special attachments for the introduction of information on the riddle about the computer. The keyboard is an attachment that allows you to enter numerical and textual information. See manipulators: mouse, trackball, joystick. Attachment for the introduction of digital information.

    course work, donations 04/14/2013

    Functions of the main components: system unit, keyboard, mouse manipulator, monitor. Assigned to the system unit, the power of external materials. Characteristics and principles of robotic and rare-crystal and plasma monitors.

    control of the robot, additions 10.10.2009

    Trends in the development of computational technology. The most important characteristics of the workplace and sanitary and hygienic standards. Safety equipment for an hour of work on a personal computer, yoga attachment and software security. Possible accumulation of information.

    presentation, donation 12.07.2011

    Characteristics of information. Converting the number from the double system to ten, sixteen and seven. Methods for assessing the quantity of information. Technical data processing. The principle of work, the history of the winemaking of an inkjet printer.

    control of the robot, additions 10/22/2012

    Classification of personal computers (PC) according to the level of specialization, processor architecture and other. The main structural elements of a PC: system unit, monitor, mouse, keyboard, outdoor extensions. Additional attachments that are connected to the computer.

    presentation, donation 11.07.2017

    See the information from which modern computers work. The concept of "information": in physics, in biology, in cybernetics. Submission of information. Coding and transmission channels of information. Local computer systems. Saving information from files.

    control of the robot, additions 01/13/2008

    Information security, її tsіlі ta zavdannya. Channels for the flow of information. Software and technical methods and protection of information from unauthorized access. Threat model for the security of information that is processed on the objects of enumeration technology.

    thesis work, donation 19.02.2017

    Components of a personal computer: living block, motherboard, processor attachments, RAM, video sound card, twill adapter and hard drive. Significant noses information. Monitor, keyboard and mouse. Peripheral outbuildings.

1.3 Complex of technical data processing

The complex of technical zasobiv v obrobki іnformatsії - tsukupnіst autonomous additions to the collection, accumulation, transmission, processing and submission of information, as well as zasobіv office equipment, management, repair and preventive and others. To the complex of technical zasobіv hang low vymog:

Safe execution of tasks with minimal costs, necessary accuracy and reliability

Possibility of technical integrity of outbuildings, their aggregation

Security of high reliability

Minimal windows to the bathhouse

A wide range of technical tools for the processing of information is produced by foreign trade and industry, which are supported by the elemental base, constructive vicons, different types of information, operational characteristics and others.

1.4 Classification of technical methods for processing information

Techniques for processing information are divided into large groups. Tse main and additional tasks.

Additional benefits - the possession, which ensures the safety of the work of the main benefits, as well as the possession, which makes it easier to make the management work comfortable. Before additional information processing, office equipment and repair and preventive maintenance are included. Office equipment is represented by a wide range of costs, including office supplies, to delivery, replication, collection, request and reduction of basic data, administrative and production calls, and so on, to make the work of a kerivnik handy and comfortable.

The main tasks - tse znaryaddya pratsі z automated processing of information. Apparently, for the management of these and other processes, a single managerial information is necessary, which characterizes the state of the parameters of technological processes, kіlkіsnі, varіtіsnі and labor indicators of virobnitstva, postachannya, zbutu, financial activity, etc. To the main benefits technical processing be aware of: making the registration and collection of information, making the receipt and transmission of data, making the preparation of the data, making the input, making the processing of information and making the submission of information. Below, all the bones are reviewed in a report.

The possession of primary information and registration is one of the laborious processes. That is why there is a wide demand for extensions for mechanized and automated vimir, collection and registration of data. The nomenclature of these benefits is already great. Before them you can see: electronic cars, various smart phones, scoreboards, vitratomers, cash registers, machines for banknotes, ATMs and a lot of other things. Here you can see different registrars of records, recognized for registration and fixation of statements about government operations on machine noses.

Make sure to receive that transmission of information. Under the transfer of information, the process of transferring data (reconciliation) from one building to the next is understood. Vzaєmodіyucha sukupnі і єktіv, scho utvoryuyuyutsya pristroї transfers і obrobki danih, nazryvaetsya merezhey. Combine attachments designated for transmission and reception of information. The stench will ensure the exchange of information between the month and the payment and the exchange of information. The structure of the costs and methods of data transmission depends on the distribution of information and the processing of data, obligations and hours for the transmission of data, types of communication lines and other factors. Transfer of data by subscriber stations (AP), transmission equipment, modems, multiplexers.

Arrangements for the preparation of these data are provided by the attachments for the preparation of information on machine noses, attachments for the transfer of information from documents on the nose, which include attachments to the EOM. Tsі pristroї can zdіysnyuvat sortuvannya that koriguvannya.

Use your own input to serve for the purpose of acknowledging data from machine wear and entering information in computer systems

Costs of information processing play the most important role of a complex of technical tools for processing information. Before you can do the processing, you can bring computers, as in your own room we divide them into chotiri classes: micro, small (min); great and superEOM. Micro EOM has two types: universal and special.

I universal and specialized can be as well as re-insured on a rich coristuvachіv - potuzhnі EOM, possessed by dekilkom terminals and functional in the hourly mode (servers), and odnokostuvalnye (robochі stantsії), yak specialize on one type of robot.

Malі EOM - pratsyyuyut in the mode under the hour and in the rich task mode. Its positive side is its superiority and simplicity in operation.

Great EOM - (mainfermi) are characterized by a great obsession with memory, high endurance to maturity and productivity. It is also characterized by high arrogance and arrogance of data; the possibility of connecting a large number of coristuvachs.

Super-EOM is the most expensive EOM with 40 billion operations per second.

The server is a computer, vision for the processing of requests from the available stations and providing these stations with access to system resources and sharing these resources. A universal server is called an addendum server. Hard servers can be brought up to small and large EOMs. Marshall servers are the leader, as well as Cray servers (64 processors).

Make sure to display the information for displaying the results of the calculation, final data and programs on the machine's nose, other screen, thin screen. Monitors, printers and plotters can be connected to the outbuildings.

Monitor - ce attachments, appointments for the display of information, which should be entered by a shorthand from the keyboard or a computer.

Printer - ce attachment for paper carrying text and graphic information.

The plotter is an attachment for the creation of an armchair and schemes of large formats on paper.

Technology - the whole complex of scientific and engineering knowledge, implemented in the practice, sets of material, technical, energy, labor factors of production, ways to create the product for the creation of chi services, which help to improve the performance. To this, technology is inextricably linked to the machinization of a non-viral chirp, which is in front of the managerial process. Management technologies are based on stasis of computers and telecommunication equipment.

According to the designation adopted by UNESCO, information technology is a complex of mutually related, scientific, technological and engineering disciplines, as it develops methods of effective organization of the work of people involved in the processing and collection of information; enumeration technique and methods of organization and interaction with people and human possessions. These are practical additions, as well as related to the current social, economic and cultural problems. The very information technologies mean complex training, great cobs and science technology. Їkhnє zaprovadzhennya may begin with the creation of mathematical security, the formation of information flows in systems for the preparation of fahіvtsіv.





For example, it is possible to propagate the classification shown in fig. 1.13. More precisely types of TCO will be reviewed in the upcoming divisions. Significantly less, scho z choice of CO slid z'yasovuvati, yakі є osnovnі tactical and technical characteristics. For example, for especially important objects of bazhano, the possibility of detecting CO was close to 0.98; spratsovvannya on the Hibna spratsovvannya - up to 2500 and up to 3500.

Document in identical appearance - RTF of appointments for revision of documents, their editing in different versions of software products. 2. Advanced technical skills that are used to create and process documents The skills that are used to create and process documents are in their own line of processing information, and they can be divided into two large groups. What are the main...

Appointment, creation and appearance of tables, modification of assignments (structures, schemes) of relevant tables, search for data in tables for singing criteria (records), creation of entries about the data base. For work with Access 2.0 DBMS, you need: IBM PC or a smart computer with processor 386 or DOS 3.3 or more Microsoft Windows 3.1 or more Not less than 6 MV operational ...

For the help of such skins, who, having mastered the language, can himself create such structures, as if they were handy, and introduce the necessary control elements into them. The need for programming has always led to a wide selection of data bases from management and the versatility of small businesses. Great enterprises could allow themselves to develop the programming of a specialized system “for yourself”. Malim...

INFORMATION IN MANAGEMENT

COMMERCIAL DIALNISTY

At the time of the market, information is one of the most important elements in the management of the commercial activity of the trade enterprise. Information security from the position of the market - on the right, it’s new, and that’s why it’s necessary to develop it.

Information security includes retrieval, transfer, processing, accumulation and implementation of external information. The whole lanchyozhok po'yazaniy z rich tostuіnchasti prosuvannyam, analysis and systematization of information. With information security, a warehouse is installed that structure of the necessary information. There are two types of external information: information that characterizes all aspects of the activity of the trade business; information about the market of the state of the medium, as well as ordering, vikonavcha, normative information, classifiers and codifiers. Dzherela zoseredzhennya mass and analytical information provided in the table. 5.1.

Table 5.1 Dzherela

Sobi 1mas01viy

Legislative and legal materials: laws, regulations, normative and regulatory acts

Official state statistics

Specializations information agencies

Galuzev's journals


Marketing follow-up of product markets

Post-chief-workers, mediators

Competitors, partners of Commercial structures

Trade and industry exhibitions of Practical conferences


All functional information is integrated into a single information base, which is an information system. Distinguish between vertical and horizontal integration: vertically aligned with vertical information flows; horizontal - horizontal. Perevag іtegrаlї іnformatsії field in the offensive:

Separate information flows and blocks are combined into a single information array;

Changes in the number of admissible pardons in the general information;



Increased speed of processing and exchange of information;

The effectiveness of the resulting information is being promoted.

Before the information, the following are presented:

credibility - may be argued that again with її otrimannі and vidachі;

arrogance - is guilty of constantly accumulating at a sufficient obsyazі and novlyuvatisya;

efficiency- May be specific and lucid, so that you can make your own commercial decisions;

systematic -її the choice is due to be carried out without interruption and systematically;

complexity - it is to blame for the diligence of the trading enterprise in the complex, as well as data about the market and the middle ground.

The high dynamism of the slow market that is developing, due to the stagnation of modern technical facilities, the creation of that functioning of the information system. In this hour, personal computers are widely used in trade enterprises, including those in commercial services, one of the tasks of designing information security, the creation of automated technology, and the processing of information, for example, such advances:

» unification of technical and software security, which transfers the top commercial tasks of different levels out of the logic of procedures;

“adaptability and gradual expansion of the possibilities of winning technical skills;

» Security of centralized accumulation, processing and visualization of rich functional information in the mode of a really set hour;

high efficiency of technology development: “a person -ma-.


Settled on the right side of the river information system allows the distribution of commercial food along the whole way of passing goods from the sphere of medicine, from the sphere of endowment. We are starting to work step by step, and thoroughly managing the commercial processes of the trade enterprise, which supports the commodity market.

TECHNICAL REQUIREMENTS FOR COLLECTION, PROCESSING AND SPECIFIC INFORMATION

For the automated collection of external information, processing and visualization of results, a complex of technical tools is established, which are responsible for information, software and technical complexity, as well as adapting to the minds of functionality.

When picking up technical costs, the following warehouses are insured:

The nature of that warehouse is the head of the house, which makes the vikonannyu;

Carry and obsyag input and output information;

Form and method of presenting the results;

Uzgodzhenіst and summіsnіst dіy tekhnіchnіh zasobіv raznoї priznachennostі.

AT technological process information security are included sequentially at the last stage of the selection of technical aids, the following classifications are established:

make sure to collect information(registrars of output data, attached to the collection and transformation of information in the form, handy for remote transmission and further processing);

ensure the transfer of information in hours and space(transmission is required for additional telephone, teletype and facsimile calls);

save the accumulated information(microEOM or computers, which can see information at a different level of detail and in the required form for analysis and further implementation);

see the information(other appendices, displays, video terminals, which give the resultant information, for which the relevant management decisions are accepted).

The main technical features of the human-machine system are computers. Modern computers may be rich in functionality, significant memory obsyag and shvidko-


rim deyu when programming data processing. The stench is becoming an invisible working element of commercial practitioners. The software and microprocessor security of the computer allows you to operate and manage commercial processes on different levels, exchange information with participants in trade and government communications.

The necessary amount of technical aids can be developed according to the formula

de Q.- obsyag robit, scho pіdlyagayut vykonannya for help tehnіchnogo zabu;

YG-productivity of the /-th technical problem; B - planning fund for working hours; K m - coefficient of the working hour fund.

The coefficient of achievement of the working hour fund (with the improvement of the hour spent on the prevention and elimination of technical faults) is good 0.9.

The technological process of processing data in information systems is needed for help:

    technical assistance for the collection and registration of data;

    sobіv telecommunіkatsіy;

    systems zberіgannya, pokuku and vibіrki danih;

    contributing to the calculation of data;

    technical zasobіv office equipment

In today's information systems, technical problems of data processing are complex, on the basis of technical and economic development of dotsіlnostі їх zastosuvannya z urakhuvannya spіvvіdnoshennia "price / quality" and naіynosti roboti technical zasobіv.

Information technologies

Information technology can be considered as a collection methods– adopting and processing data algorithms instrumental– software and technical faculties of processing data.

Information technology can be mentally subdivided into categories:

    Basic information technologies - all universal technological operations of data processing, sound, how to lie down in the form of processed information, for example, launching programs for viewing, copying, remote, moving and searching for files in the same way. The stench is founded on the basis of widely stowed software and technical tools for processing data.

    Special information technology - a complex of information support for basic information technologies, recognized for vikonannya special operations for the compensation of money and/or forms of tribute

Information technologies are the basis for the creation of information systems.

Information systems

The information system (ІВ) is a communication system for collecting, transmitting, processing information about the object, which ensures the safety of practitioners of various ranks for the implementation of the management function.

Koristuvachami ІС є organizational units of management - structural subdivisions, managerial personnel, vikonavtsі. The basis of IC is formed by functional components - models, methods and algorithms for forming key information. The functional structure of the IC is the sequence of functional components: subsystems, task complexes, procedures for processing information, which determine the sequence of mind and mind.

The implementation of information systems should be carried out with the method of improving the efficiency of the state's work and the work of the object for the work of not only the processing and collection of routine information, the automation of office work, but also for the management of new methods. These methods are based on modeling of facsimiles of organization when making decisions (methods of piece intelligence, expert systems, etc.) counting measure and etc.

Classification ІС is carried out for the following signs:

    the nature of the processing of information;

    scale and integration of IC components;

    information-technological architecture ІС.

Due to the nature of the processing of information and the complexity of the algorithms for processing ІС, it is accepted to divide into two great classes:

    IC for operational processing of data. The traditional IS for the appearance and processing of the first data of the great obliga- tion from the zastosuvannyam zhorstko regulated algorithms, the fixed structure of the data base (DB) is too thin.

    ІС support and decision. The stench is oriented towards the analytical processing of great communications of information, the integration of various data sources, and the selection of methods and techniques for analytical processing.

In the given hour, the main information and technological architectures were formed:

    ІС from the centralized processing of data;

    architecture type "file-server";

    architecture type "client-server".

Centralized processing transferring the connection to one computer of the PS to the core interface, addenda and database.

AT architecturefile server” rich koristuvacham merezhі hope files head computer merezhі file server. You can also save files for files, files for data bases and programs. All processing data will be carried out on the computers of the Koristuvachs. Such a computer is called working station(RS). The PS interface and add-ons are installed on it, which can be introduced as a PC add-on, as well as transferred as needed from the file server. The file-server can also be used for centralized storage of files of the same number of files, which are transferred by them from the PC. Architecture file server”Stops more importantly at local computer networks.

AT architectureclient-server“Software security is oriented as a collective selection of resources, and it is also processed by the distribution of the resource for the needs of employees. The software systems of the "client-server" architecture are composed of two parts: the software security of the server and the software security of the core-client. The work of these systems is organized in the following way: the software clients are downloaded to the computer of the host and force the application to the software server, as if they are working on the computer of the main access. The main processing of data is processed by a hard server, but in the computer of the coristuvacha, less results are processed. So, for example, the database server works in hard DBMS, such as Microsoft SQL Server, Oracle, etc., which work with different databases. Data base servers are covered for work with large amounts of data (tens of gigabytes and more) and for a large number of employees and ensure high productivity, superiority and security. The "client-server" architecture of the singing sense is the main one in the appendages of the global computer networks.

Main characteristics of PC modules

Personal computers are made up of the following main modules:

  1. system unit
    1. Living block
    2. Motherboard
    3. Processor
    4. Memory
  2. extension for displaying information (monitor)
  3. add-on for entering information (keyboard, teddy bear)
  4. save information

Let's take a look at the modules of the report

System block (case)

The case of the PC protects the internal elements of the PC from the outside.

Housing includes: Living unit, connection cables maternity pay, additional fans.

The number of entries is the maximum value for the expansion of the system.

Type of buildings.

Name Dimensions, height / width / length (cm) Tension b.p., W Number of vidsikiv additional characteristics
5,25 3,5
slim line 7*35*45 1-2 1-2 Enriched with the possibility of expansion and modernization
Desktop 20*45*45 200-250 2-3 1-2 Borrow a lot of money
mini tower 45*20*45 200-250
Midi Tower 50*20*45 200-250 Biggest Extensions
Big Tower 63*20*45 250-350
File Server 73*35*55 350-400 Naydorochchiy

Living block.

The block of zhivlennya viroblya raznі naprugi for vnutrіshnіh pristroїv that maternal payment. The term for the work of the block of life becomes 4-7 years, and it is possible to continue it with a few included and broken PCs.

There are three form-factors (types) of living blocks and types of motherboards.

  • AT - connected to two sockets on the motherboard. Vykoristovuvalis at PCs of old types. The implication of that vimikannya living in them is carried out by a great treadmill vimikach, which is carried out under an elastic tether.
  • ATX - 1 rose. Included behind the team s mat. pay. The ATX power supply unit is used for the offensive scheme: at t 0 to 35 0 C, the fan wraps around with a minimum speed and is practically not a little bit practical. If t 0 reaches 50 0 Z, the fan speed increases to the maximum value and does not decrease to the temperature change.

Motherboards to the ATX standard, as a rule, do not mix with AT standard life blocks. It is necessary that the body and the board are of the same type.

  • BTX - may 2 language components:
    • Thermal balance module, which directs fresh air directly to the processor heatsink.
    • Boost module, which is installed on the motherboard. The trimming module is designed to compensate for shocks and post-installation of the system, changing the distortion of the motherboard. Zavdyaki youmu far away to increase the maximum allowable weight of the processor heatsink from 450 to 900 grams. Before that, the configuration of the mother's payment was changed to the system unit. Now the best PC components are being sorted out by expensive flows again, increasing the CCD of case coolers.

"-" insufficiency with ATX, regardless of the mechanical and electrical insufficiency of the blocks of life (400 W, 120 mm fan).

What threatens the PC with the lack of pressure of the PSU?

At the time of the supra-world ambition, the PSU spratsyuє scheme zahistu, and the PSU simply does not start. For a larger view, the titles can be different, for example, even more summable for hard disks. Reduced HDD voltage is considered as a signal before turning on and the HDD starts to park the heads, which is read. If the voltage rises, the disc will reappear and begin to spin.

Also, there may be little-understood problems with robotic programs. An unacceptable BP in case of an emergency situation can lead to a mate. payment and video card.

Motherboard

@ Motherboard (system) board є the central part of any computer central processor, spivprocessor, inspectors, which secures the connection of the central processor with peripheral devices, operational memory, cache memory, BIOS element(Basic input/output system), battery for battery, crystal oscillator clock frequency і slots(roses) for connection of other outbuildings. All these modules are connected at once behind the auxiliary system bus, which, as we already know, is located on the motherboard.

The overall productivity of the mother's pay is no less clock frequency, ale i kіlkіstyu(distribution) of data, cultivation at one o'clock central processor , as well as rozryadnistyu bus exchange danih mizh various outbuildings mother's pay.

The architecture of motherboards is gradually being improved: the functional capacity is increasing, the productivity is increasing. The presence on the motherboard of such devices as a dual-channel E-IDE HDD controller (hard drives), an FDD controller (floppy disks), a fully parallel (LPT) and serial (COM) ports, as well as a serial infrared port .

@ Port - bagatorozryadny entrance or exit at the annex.

COM1, COM2-Sequential damage, as they transmit electrical impulses (information) one by one (scanner, bear). Hardware implemented for the help of 25-pin and 9-pin sockets, as if they were placed on the rear panel of the system unit.

LPT- the parallel port can increase the speed, the oscillators transmit 8 electrical impulses at the same time (connect the printer). The hardware is implemented at a 25-pin socket on the back panel of the system unit.

USB– (universal serial bus) secure high-width connection to a PC at once for a number of peripheral devices (connect flash drives, webcams, external modems, HDD, etc.). This port is universal and building replacement of all other ports.

^ PS/2– special port for keyboard and mouse.

AGP– graphics port acceleration for monitor connection.

The firmware of various computer components (processor, operative memory and controllers of peripheral devices) can be significantly changed.

^ For the convenience of the swedcode on the motherboard special microcircuits are installed(chipsets) that include the RAM controller (the so-called pіvnіchny mіst) and controller of peripheral devices ( pivdenny city).

The storage area ensures the exchange of information between the processor and the operational memory of the system backbone.

The processor has an internal multiplier frequency, so the frequency of the processor is higher, the frequency of the system bus is lower. On modern computers, the processor frequency can exceed the system bus frequency by a factor of ten (for example, the processor frequency is 1 GHz, and the bus frequency is 100 MHz).

Logical mother board scheme

The PCI bus (Peripheral Component Interconnect bus) is connected to the pivnіchny bridge (Peripheral Component Interconnect bus - a bus for interfacing peripheral devices), as it ensures the exchange of information with the controllers of peripheral devices. (The frequency of the controllers is lower than the system bus frequency, for example, if the system bus frequency is set to 100 MHz, then the PCI bus frequency is set to a lower value - 33 MHz.) Peripheral outbuildings(sound card, motherboard, SCSI controller, internal modem) are installed at the system card expansion slot .

A special AGP bus is used to connect video payments(Accelerated Graphic Port - accelerated graphic port), connected with a pivnіchny bridge and maє frequency, the kіlka has a larger, lower PCI bus.

Processor

Have a hot temper @ understand with a processor attachment to carry out a set of operations on data presented in digital form (two code).

Stosovno to counting technique@ understand under the processor central processing unit (CPU), which can select, decode and decode commands, as well as transmit and receive information from other devices.

The number of companies that develop and manufacture processors for PCs is small. At this time, you can see: Intel, Cyrix, AMD, NexGen, Texas Instrument.

Structure and functions of the processor:

The structure of the processor can be represented as follows:

1 ) WU - cheruє all the course of the computational and logical process in the computer. This is the "brain" of the computer, which controls everything. The functions of the UU are used in order to read the devil's command, recognize it and connect the necessary electronic lances and attachments for the vikonann.

2) ALU– zdіysnyuє uninterrupted processing of data from double code. ALU wins over the simplest set of simplest operations:

  • Arithmetic operations (+, -, *, /);
  • Logical operations (porivnyannya, reverberation of the mind);
  • Transition operations(From one area of ​​operational memory to another).

3) Clock generator- Sets the rhythm for all operations in the processor by forcefully one impulse through equal intervals of an hour (tact). Win synchronizes with the PC robot.

@Tact - tse interval of an hour between the cobs of the supply of two last pulses of the clock frequency generator. GTS synchronizes the robot of the PC nodes.

^4) SpivProcessor– allows you to significantly speed up the computer robot with floating point numbers (talk about speech numbers, for example, 1.233 * 10 -5). Under an hour of work with texts, the processor does not win.

5) The current processor may have such a high speed of code that the information from the RAM cannot reach the new processor in a timely manner. No matter what, the processor will have a special microcircuit memory cache .

@ CACHE - Memory overlay is recognized for saving intermediate results. May volume 128-1024 Kb.

Crimea is assigned to the elemental base of the processor, there are special registers, so that they can take part in the processing commands without intermediary.

6) Register- Processor memory, but a number of special seredkіv, to remember.

Registry has two functions:

  • short-hour sberigannya number of chi teams;
  • vikonannya from them deyakyh operations.

The most important processor registers are:

  1. number of commands - to serve for automatic selection of commands of the program from the last memory, the address of the command is taken from the new one;
  2. command register - to serve as a command code saving.

The command by the processor breaks down into the following steps:

  1. from the memory room, the address that is saved in the command list, the team is selected in the operational memory, (there is a command in the memory);
  2. from the OP the command is transmitted from the control panel (command register);
  3. add control to decode the address field of the command;
  4. for signals I will add a keruvannya operands are selected from memory in ALU (near the register of operands);
  5. UU deciphering the code of the operation, it is a signal to the ALU to vikonat the operation, as it is vikonuetsya at the adder;
  6. the result of the operation is kept by the processor, or it is turned to RAM.

Memory

^ Classification of elements of memory.

File system

The order of storing files on the disk is determined by the different file system, which may be affected by the file allocation table, which in 2 examples is saved from the system area of ​​the disk.

On the level of the physical disk under the file, there is a sequence of bytes. However, shards minimal unit per disk є sector then you can use the file to understand deaku sequence of sectors. Ale true file ce pov'azana sequence of clusters.

@ cluster – the number of total number of total sectors of the disk (from 1 to a number of tens).

It is traditionally accepted that the cluster and sector are the same, but the same is the case. The size of the cluster can be changed in the fallow in the capacity of the disk. The greater the capacity of the disk, the greater the size of the cluster. Cluster size can be changed from 512 bytes to 64 KB.

^ Clusters need to change the file allocation tables.

As if it were some sort of order to destroy the file allocation table, then, regardless of those given on the disk, the stench will not be available. At the link with the cym, 2 such tables are saved on the disk.

Clusters change the size of tables. But here is another problem. ^ Intervention disk space.

When writing a file to disk, the number of clusters will always be occupied.

For example, the file size is 1792 bytes, and the size of the cluster is 512 bytes. In order to save the file, we need 2 more sectors + 256 bytes from the third sector. In this way, the third sector is free to lose 256 bytes. (1792 = 3 * 512 +256); (512 * 4 = 2048)

^ Byte, what was left out in the fourth cluster cannot be found. It is important that in the average 0.5 clusters of wasted space fall on the skin file. spend up to 15% of the disk space. Tobto іz 2 GB occupied mіstsya - 300 MB spent. In the world of distant files, it turns to the right.

The file allocation table was earlier used in the MS-DOS operating system and was called the FAT table (File Allocation Table).

^ Distinguishing the types of file allocation table (FAT).

Zahalna FAT structure

Before

At the 34th cluster, the addresses of the 35th cluster are taken, at the 35th address of the 36th, at the 36th address of the 53rd, and so on. For 55 clusters, the file end sign is saved.

The file system is NTFS.

For the basis of the file NTFS systems bula taken file system Families of UNIX operating systems

There is an element to the file and two parts: the name of the file and the index descriptor.

The file is written to disk in the following order:

Є 13 blocks, so that the addresses of the blocks of these distributions can be written on the disk, from them:

11 - show block of indirect addressing from 256 blocks of data. Vykoristovuetsya at vipadkah, so I write down the address of the blocks of data, the first 10 blocks were rejected, that is. the file may be a great expansion.

12 - specify not a block of dependent indirect addressing (256 * 256), it will be victorious only if the address of the blocks of data for recording did not reach the given space.

13 – addresses to the block of random addressing (256*256*256).

in such a manner, maximum file size maybe booty up to 16 GB.

Such a mechanism gives great protection to the data. Whereas FAT can simply zip tables, NTFS can be bridged between blocks for a long time.

NTFS can repair, fragment, fragment across the disk, all service areas, general surface failures, among the first 16 MFT elements. Another copy of the first three records should be taken exactly in the middle of the disc.

NTFS is a stand-alone system, as a whole you can bring yourself to the correct camp in case of practical, if any, real failures. Whether a modern file system is based on such a concept, like transaction - action that is charged as a whole and correctly or not charged separately.

Example 1: write data to disk. It is raptly stated that in those places where we scribbled together to write down a damned portion of data, writing did not go far. physical ushkodzhennya surface The behavior of NTFS at times is logical: the transaction is recorded again - the system understands that the record has not been made. The place is marked as zbіyne, and the data is recorded in another place - a new transaction is initiated.

Example 2: The next step is to write data to disk. Raptom turns on life and the system is re-vanquished. At what phase was the record recorded, where are the data? Another mechanism of the system comes to the rescue - the transaction log, which has the beginning of that completion, whether it be transactions. On the right, in that the system, having learned that it was necessary to write to disk, marked the metafile in the metafile. When re -quanted, the file is visible to the enchantment of incomplete transaqui, yaki bouli perenvyvyyu I result the result of non -transcontition - all the transactics, in the yak of the health, I know the jacket , and the system becomes stable.

^ It is important, however, that the NTFS authentication system guarantees the correctness of the file system,not your data.

NTFS has a leather disk that has been broken into volumes. The skin volume has its own MFT (table of files), so you can sort out any part of the disk between the volumes.

Vmist HDD

1. Magnetic disk it is a round plate made of aluminum (in a few steps from a special warehouse), the surface is cut to a high accuracy class. There can be 1 to 4 such magnetic disks. To give the plates magnetic power, their surface is covered with an alloy based on chromium, cobalt or ferromagnet. Take a coat of high hardness. The skin side of the disk may have a high number.

^ 2. For the wrapping of discs, special electric motor , the design of which includes special bearings, which can be both superb sacks, and common ones (they have a special ointment instead of sacks, which dries up the impact force, which increases the durability of the dvigun). Rіdkі bearings mаut lower level of noise and may not see heat pіd hour of work.

In addition, the deacons of such a Winchester may dvigate, more and more zanureniya hermetic dishes with oil, which allows efficient heat input to the windings.

3. The skin disk needs a pair of write/read heads. The gap between the heads and the surface of the disks should be 0.1 microns, which is 500 times less for a human hair. magnetic head є collapsible design, which consists of dozens of details. (The details of the flooring are small, which are prepared by the method of photolithography in the same way, like modern microcircuits, so that they are laser-etched with high accuracy) Working on the surface of the ceramic body of the head, it is polished with the same high accuracy, like a disk.

4. Bring heads it is a flat salted coil with a mid-range dart, placed between the poles of a permanent magnet and fixed on the ends of the cord, which is wrapped around the bearing. On the other side, there is an easy arrow with magnetic heads.

The coil is able to move in a magnetic field under a strum, to pass through it, moving all the heads at the same time in a radial direction. Sob the cat with the heads did not turn side to side at the non-working station, it was a magnetic fixator, which stole the heads of the fixed hard drive on the arm. In the non-working steel of the accumulating head, the heads are located near the center of the disks, near the "parking zone" and are pressed to the sides of the plates with light springs. The only moment when the heads are sticking on the surface of the disk. Ale varto disks are almost wrapping - and potіtrya poіtrya podnіmaє heads over their surface, pushing the susilla of springs. The heads "splice" and for the first time they are above the disk, but they do not stick around. Since the mechanical contact of the head with the disk is daily, wear of the disks and heads is not required.

5. The same is the middle of the HDA posiluvach signal , the rooms are closer to the heads, so that you can change the direction of the outside transitions. Vіn z'єdnany with heads with a flexible strіchkovy cable. The same cable is connected to the head drive, and sometimes to the motor. Through a small rose, all the components are tied to the controller's board.

At the process of formatting disks, it can happen that on the surface of the plates there is one or a few small files, reading or recording of them is accompanied by pardons (so called bad sectors, or bad blocks).

Sectors, reading or writing, in which they are accompanied by pardons are called @ beaten sectors .

Prote do not wikipedate through the disk and do not respect yoga zіpsovanim, but everything less signify tsі sectors and a special rank, and the stench nadalі are ignored. Sob koristuvach not bachiv tsgo dissimilarity, winchester vengeance of a sprinkling of spare tracks, with which electronics accumulate "on the fly" replacing defective surfaces on the surface, they are absolutely transparent for the operating system.

In addition, not the entire area of ​​the disk is available for recording data. Part of the informational surface is accumulated for the needs. Tse area of ​​service, as її іnоdі name, іnzhenernoї іnformatsії.

Optical disc structure

AT According to the accepted standards, the surface of the disk is divided into three areas:

1. Input directory - the area near the visible ring, closest to the center of the disk (width 4 mm). Reading information from the disk is based on the input directory itself, where it is possible to change the address of the records, the number of titles, the description of the disk, the name of the disk;

2. Danish area ;

3. External directory - May sign the end of the disk.

Types of optical discs:

  1. CD-ROM. On a CD-ROM disc, we will prescribe a way to record information, and it is impossible to re-record it. 5-inch CD-ROM discs with a capacity of 670 MB were the largest. For their characteristics, the stench is almost identical to the great music CDs. The data on the disc are recorded as a spiral.
  2. CD-R. The abbreviation CD-R (CD-Recordable) stands for the technology of one-time optical recording, which can be used for archiving data, creating prototype discs for serial production and for serial production of CDs, recording audio and video. The purpose of the add-on CD-R is to record data on CD-R CDs, which can be read on CD-ROM and CD-RW storage devices.
  3. CD-RW. Old data can be erased, and their replacement can be written down new. The capacity of carrying CD-RW is 650 MB and more disk space CD-ROM and CD-R.
  4. ^ DVD-ROM, DVD-R, DVD-RW. Similar to the earlier types of optical discs, but there may be great capacity.
  5. Razroblyaetsya HVD(Holografic Versatile Dosc) 1 TB capacity.

DVD technology allows 4 types of discs:

  • single-sided, single-balloon - 4.7 GB
  • one-sided, two-ball - 8.5 GB
  • double-sided, single-balloon - 9.4 GB
  • double-sided, two-ball - 17 GB

At the two-ball disks there is a victorious ball, which began to record information. When reading the information of the first ball, which is placed in the depth of the disk, the laser passes through the opening of the smelting of the other ball. When reading information from another ball, the controller sends a signal to the drive to focus the laser exchange of the other ball and the reading is carried out from the new one. With this, the diameter of the disk becomes 120 mm, and the thickness is 1.2 mm.

As it was already suggested, for example, a double-sided double-ball disc DVD-disk can hold up to 17 GB of information, which is approximately 8 years of high-quality video, 26 years of music, or more precisely - a hundred paper written off from two sides with a height of 1.4 kilometer!

^ Format DVD

  1. DVD-R. they can be less single-ball, or you can create double-sided discs. The principle behind how to record a DVD-R is the same as for a CD-R. When the ball changes its characteristics, under the infusion of the laser, the increased pressure is changed. DVD-R does not carry in itself anything new, technically the same CD-R, only insurance on thinner tracks. When creating a DVD-R, the most respect is given to the totality of the essential DVD-ROM drives. Dozhina of the recording laser 635 Nm + protection of discs that are recorded as copies.
  2. DVD+R. The principles for which DVD+R prompts are identical to those of DVD-R. There is a difference between them in the format of the record, which is victorious. So, for example, DVD+R discs support the recording from a splint of receivers. Dozhina of the recording laser 650 Nm + surface, which is more high-quality.

^ There are two main classes of CDs: CD and DVD.

ZIP accumulators.

Magneto-optical disks.

They are made from aluminum alloy and are used in plastic shells. Size 25-50 GB.

Reading is carried out by the optical method, and recording by magnetic means, like a floppy disk.

The technology for recording data is advancing: laser promin heats a blob on the disc, and an electromagnet changes the magnetic orientation of the center point depending on whether it is necessary to record: 0 or 1.

The reading is carried out by a laser change of less pressure, which, by vibrating through the points, changes its polarity.

The sound of a magneto-optical wearable is a 3.5 floppy disk, less than a trio of tovish.

Flash storage

Tsya technology is new to achieve and that does not lie down to cheap solutions, prote є all reconsider lowering the compatibility of the outbuildings of this class,

The basis of any flash storage is energy-independent memory. There are no rotting parts near the outbuilding, and it is not susceptible to vibrations and mechanical shocks. Flash is not inherently magnetic and does not inject magnetic fields into it. And the energy saving is only needed for an hour of writing / reading operations, moreover, there is enough life in the USB port.

^ Flash storage capacity varies from approximately 256 MB to a maximum of GB (4-5 GB).

In addition, the flash-accumulator can be broken down for recording, and more importantly, that transferred information can be broken down into logical disks that install yoga with a vanity disk.

Perevagi

  • compact size;
  • the daily need for a savory meal;
  • completely acceptable swidk_st of robots.

Technical data processing

© 2022 androidas.ru - All about Android