Professional Documents
Culture Documents
INTRODUCTION
The value 256 is more than the number of symbols; it is the number of
patterns of 0 and 1 that can be created using eight bits. This number can be
obtained using a calculation. There are only two possible states for a switch, on and
off. In a byte, there are eight switches. To calculate the number of patterns, raise 2
to the number of bits: 28 = 256.
● ASCII. This stands for American Standard for Information Interchange. Today,
the ASCII character set is by far the most commonly used in computers for all
types.
● Extended ASCII. This is an eight-bit code that specifies the character for
values from 128 to 255. The first 40 symbols represent pronunciation and
particular punctuation. The remaining signs are graphic symbols.
● Integer
Each integer is represented in binary, where a single number
will usually be expressed in one byte.
● Characters
● Unicode
It is a standardization of assigning values to a specific character;
this is needed as there are hundreds of different characters in different
languages. If done by each community, there would likely be overlaps.
● Strings
Strings are a concatenation of characters and were represented
in binary, as each 8-bit character following each other. Each word will
be around 16-32 bits.
● Colors
Colors are represented in the hexadecimal number system. It
will be six hexadecimal values 2 for each prime color, in the order of
Red, Green, Blue (RGB.) For example, the color red will be FF 00 00.
When viewed on a display screen, it will usually have a hashtag before
the value, e.g., #FF 00 00. A maximum of around 16.8 million different
colors may be input. (16 to the power of 6 or 2 to the power of 24.).
Please see the EXCELLENT chart below to understand better how hexadecimal is
used to express colors. The image below shows the equivalent data of colors in text
and numbers4:
Let’s have an exercise…
Try this with your computer: Identify the different Unicode equivalent of each
character in the world by inserting symbols in your MS Office Word application.
Construct a one or two sentences and write the equivalent ASCII and Unicode of the
sentence. Could you understand the equivalent codes of your sentences? Why?
Lesson 3.3 How Computers Process Data
● Control Unit
All the computer’s resources are managed from the control unit. Think of the
control unit as a traffic signal directing the flow of data through the CPU, as well as to
and from other devices. The CPU’s instructions for carrying out commands are built
into the control unit. The instructions, or instruction sets, list all the operations that
the CPU can perform.
5
3.3.1- Types of Data Processing On Basis of Process/Steps Performed
Batch processing is one of the widely used types of data processing, which is
also known as serial/sequential, tacked/queued of offline processing. The
fundamental of this type of processing is that different jobs of different users are
processed in the order received. Once the stacking of jobs is complete, they are
provided/sent for processing while maintaining the same order. This processing of a
large volume of data helps in reducing the processing cost, thus making it data
processing economical.
Batch Processing is a method where the information to be organized is sorted
into groups to allow for efficient and sequential processing. Online Processing is a
method that utilizes Internet connections and equipment directly attached to a
computer. It is used mainly for information recording and research. Real-Time
2. Online Processing
As the name suggests, this method is used for carrying out real-time
processing. This is required where the results are displayed immediately or at the
lowest time possible. The data fed to the software is used almost instantaneously for
processing purposes. The nature of the processing of this type of data processing
requires the use of an internet connection, and data is stored/used online. No lag is
expected/acceptable in this type, and receiving and processing of the transaction is
carried out simultaneously. This method is costly than batch processing, as the
hardware and software capabilities are better. An example includes the banking
system, ticket booking for flights, trains, movie tickets, rental agencies, etc.
This technique can respond almost immediately to various signals to acquire
and process information. These involve high maintenance and upfront cost attributed
4. Distributed Processing
5. Multi-Processing
Multi-processing perhaps is the most widely used type of data processing. It is
used almost everywhere and forms the basis of all computing devices relying on
processors. Multi-processing makes use of many parallel CPUs, which have two or
more CPUs. The task or sets of operations are divided between CPUs available
simultaneously, thus increasing efficiency and throughput. The breakdown of jobs
that need to be performed is sent to different CPUs working parallel within the
mainframe. The result and benefit of this type of processing are reducing the time
required and increasing the output.
Moreover, CPUs work independently as they are not dependent on other
CPU; failure of one CPU does not result in halting the complete process as the
additional CPUs continue to work. Examples include processing of data and
instructions in computer, laptops, and mobile phones
6. Time-sharing
The time-based use of CPU is the core of this data processing type. Multiple
users use a single CPU. All users share the same CPU, but the time allocated to all
users might differ. The processing takes place at different intervals for different users
as per allotted time. Since multiple users can use this type, it is also referred to as a
multi-access system. This is done by providing a terminal for their link to the main
CPU, and the time available is calculated by dividing the CPU time between all the
public users as scheduled.
Machines Cycles6
Each time the CPU executes an instruction, it takes a series of steps. The
completed sequence of steps is called the machine cycle. The actions performed
by the computer processor for each machine language instruction received. The
machine cycle is a four process cycle that includes reading and interpreting the
machine language, executing the code, and then storing that code. A machine cycle
itself can be broken down into cycles such as the following:
installed into the memory slot on a computer motherboard. This memory module
connects to the memory slot on a computer motherboard.
Secondary storage is about two orders of magnitude cheaper than primary storage.
Consequently, a hard drive or an additional, slower SSD may be used as secondary
storage to a primary, faster, PCIe SSD. Short for solid-state drive, an SSD is a
storage medium that uses non-volatile memory to hold and access data. Unlike a
hard drive, an SSD has no moving parts, which gives it advantages, such as faster
access time, noiseless operation, higher reliability, and lower power consumption.
The picture shows an example of an SSD made by Crucial Company. 8
There are several types of memory for computers. They are listed below.
● EDO RAM - Short for Extended Data Out, and alternatively referred to as
hyper page mode memory, EDO is a type of memory developed in 1995 by
Micron and was first used with Pentium computers. EDO allows a CPU to
access memory 10 to 15-percent faster the compatible Fast Page memory by
not turning off the data output drivers after the memory has removed the
column address.
● DDR RAM - Short for double data rate, DDR is a memory that was first
introduced in 1996 and has since been replaced by DDR2. DDR utilizes both
the rising and falling edge of the system clock, potentially doubling the speed
of memory. Today, DDR technology is found on high-end video cards and
computer memory, such as DDR-SDRAM.
● DDR2 RAM - Short for double data rate two, DDR2 is the second generation
of DDR memory that was released in September 2003. DDR2 can operate at
more incredible speeds than DDR, offers a tremendous bandwidth potential,
operates on less power, and generates less heat. Due to architectural
differences, DDR2 memory modules are incompatible with DDR slots.
clock speed of 400 MHz up to 1066 MHz, range in size from 1 to 24 GB, and
consume nearly 30% less power than their predecessors. DDR3 RAM sticks
for a desktop computer have 240 pins. For a laptop computer, DDR3 RAM
sticks have 204 pins. These memory chips can only be installed on a
motherboard that supports DDR3 memory and is not backward compatible
with DDR2 memory slots.
The above types of memory all fall into the general categories of SIMM or DIMM.
3.5.5 - The Difference Between SIMM and DIMM
SIMM
Short for the single in-
line memory module, SIMM
is a memory module
developed by Wang
Laboratories in 1983. The
SIMM circuit board that
holds six to nine memory chips per board. The ninth chip usually an error checking
chip (parity or non-parity). The SIMM was used with computers using a 486, early
Intel Pentium, and compatible processors. However, because the Pentium is 64-bit
and a SIMM is only 32-bits wide, they must be installed two at a time to work
DIMM
SO-DIMM, which is short for small outline dual in-line memory module, is
available in both a 72-pin and 144-pin configuration. SO-DIMMs are commonly
utilized in laptop computers.
Below is an example picture of a 4 GB SODIMM memory stick from Crucial.
1. DIMMs have separate contacts on each side of the board, which provides
twice as much data as a single SIMM.
2. The command address and control signals are buffered on the DIMMs. With
heavy memory requirements, this buffering reduces the loading effort of the
memory. When referring to memory, a buffer is a temporary storage in the
memory that stores information while processing other information.
Note:
Online buffering happens while streaming music and videos before they play.
Buffering allows you to watch or listen to media almost instantly by downloading a
small portion and then playing the file while the remainder downloads. RAMs are
important factor in the buffering of data inside a computer system.
If your Internet connection is fast enough, you should only buffer for a few
seconds when you first start playing the media and never buffer again. If your
computer or device frequently buffers, your connection is not fast enough, or there's
a problem with your connection or the streaming provider. One of the solutions to
increase buffering is to increase the size of the system memory or the Random
Access Memory (RAM).
Let us reflect…
Data transformation, to some is a phenomenon, especially when it comes to
the aspect of electrical, electronic and data conversion and communication. To some
scientist, it can be a body of knowledge of science wherein it can be harness for the
benefit of mankind. To the programmer and ICT individual, it can be a vast area of
material that can be a source of many useful tools and everyday helper for humanity.
How about you, as a student, how do you see the vastness of data and
information transformation as a powerful tool in the computer world? Can you see
the unlimited potential of the art of data transformation that can change many lives?
Reflect on these things…it will be an avatar of your technology skills in the coming
years.
Name:__________________________________________ Score:_________
Course/Year/Section:______________________________ Date:__________
Professor/Instructor:_______________________________
6. The CPU’s instructions for carrying out commands are built into the
__________.
7. More ___________ makes the computer faster.
Direction: Using the Internet, research on the following and write in your own words
(minimum of 500 words) a synthesis of the topics below.
a. Determine the different CPU Architectures of modern computers.
Suggested Readings:
● Books/Journals:
o ―Computer Data and Information‖. https://media.lanecc.edu/ users/
loftl/CS275/ ch01.pdf
o ―Computer - Data and Information‖. https://www.tutorialspoint.com
/computer_fundamentals/computer_data.htm
o Data Science for Dummies by Lillian Pierson, 2 nd Edition
o Introduction to Algorithms, 3rd Edition by By Thomas H. Cormen,
Charles E. Leiserson, Ronald L. Rivest, Clifford Stein
o Big Data – Special Issue on Visualization on Data Science by Maryann
Liebert, Volume 6, 2014, ISSN 2147-4441
o International Journal of Business Intelligence and Data Mining
o Lecture 1:The Information Processing Approach to Intelligence.
https://link.springer.com/chapter/10.1007/978-94-009-4406-0_6
o Data and Information Research Works and Articles, Academia.edu
● Websites
o ―Information Processing‖. https://sites.google.com/a/campioncollege
.com/it_eveningschoool/inform
o ―Information processing‖. https://www.britannica.com/technology/
information-processing
o ―Examples of Data Processing‖. https://simplicable.com/new/data-
processing
o ―DATA PROCESSING‖. https://peda.net/kenya/css/subjects/computer-
studies/form-three/driac2/data-processing
o ―Information Processing by Science Direct Journals and Books‖.
https://www.sciencedirect.com/ topics/computer-science/information-
processing
o ―Data and Information Processing‖. https://planningtank.com/computer-
applications/information-processing-cycle/searchAI
o ―Data and Information Research Works and Articles, Academia.edu‖.
https://www.academia.edu/search?utf8=%E2%9C%93&q=data+and+in
formation+processing
References:
8 https://www.computerhope.com/jargon/s/ssd.htm